Computational Methods for Electromagnetic Inverse Scattering Computational Methods for Electromagnetic Inverse Scattering Xudong Chen National University of Singapore This edition first published 2018 © 2018 John Wiley & Sons Singapore Pte. Ltd All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions. The right of Xudong Chen to be identified as the author of this work has been asserted in accordance with law. Registered Offices John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA John Wiley & Sons Singapore Pte. Ltd, 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628 Editorial Office 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628 For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com. Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that appears in standard print versions of this book may not be available in other formats. Limit of Liability/Disclaimer of Warranty While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limitsed to special, incidental, consequential, or other damages. Library of Congress Cataloging-in-Publication data applied for ISBN: 9781119311980 Cover design by Wiley Cover Image: © agsandrew/Shutterstock Set in 10/12pt WarnockPro by SPi Global, Chennai, India 10 9 8 7 6 5 4 3 2 1 To Lin, Yuexin, Yide, and my parents. vii Contents Foreword xiii Preface xv 1 1.1 1.2 1.3 1.4 Introduction 1 Introduction to Electromagnetic Inverse Scattering Problems 1 Forward Scattering Problems 2 Properties of Inverse Scattering Problems 3 Scope of the Book 6 References 9 2 Fundamentals of Electromagnetic Wave Theory 13 2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.8.1 2.8.2 2.8.3 2.8.4 2.9 2.9.1 2.9.2 2.10 Maxwell’s Equations 13 Representations in Differential Form 13 Time-Harmonic Forms 14 Boundary Conditions 15 Constitutive Relations 16 General Description of a Scattering Problem 16 Duality Principle 18 Radiation in Free Space 18 Volume Integral Equations for Dielectric Scatterers 20 Surface Integral Equations for Perfectly Conducting Scatterers Two-Dimensional Scattering Problems 22 Scattering by Small Scatterers 24 Three-Dimensional Case 24 Two-Dimensional Case 27 Scattering by a Collection of Small Scatterers 28 Degrees of Freedom 28 Scattering by Extended Scatterers 29 Nonmagnetic Dielectric Scatterers 29 Perfectly Electrically Conducting Scatterers 31 Far-Field Approximation 32 21 viii Contents 2.11 2.12 Reciprocity 34 Huygens’ Principle and Extinction Theorem References 39 3 Time-Reversal Imaging 41 3.1 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.2 3.2.1 3.2.2 3.2.3 3.3 Time-Reversal Imaging for Active Sources 41 Explanation Based on Geometrical Optics 41 Implementation Steps 43 Fundamental Theory 45 Analysis of Resolution 48 Vectorial Wave 49 Time-Reversal Imaging for Passive Sources 53 Imaging by an Iterative Time-Reversal Process 54 Imaging by the DORT Method 55 Numerical Simulations 56 Discussions 62 References 64 4 Inverse Scattering Problems of Small Scatterers 67 4.1 4.2 4.2.1 4.2.2 Forward Problem: Foldy–Lax Equation 68 Uniqueness Theorem for the Inverse Problem 69 Inverse Source Problem 70 Inverse Scattering Problem 71 Locating Positions 72 Retrieving Scattering Strength 72 Numerical Methods 73 Multiple Signal Classification Imaging 73 Noniterative Retrieval of Scattering Strength 77 Inversion of a Vector Wave Equation 79 Forward Problem 79 Multiple Signal Classification Imaging 82 Nondegenerate Case 82 Degenerate Case 83 Noniterative Retrieval of Scattering Strength Tensors 88 Subspace Imaging Algorithm with Enhanced Resolution 90 Discussions 97 References 99 4.3 4.3.1 4.3.2 4.4 4.4.1 4.4.2 4.4.3 4.4.4 4.5 5 Linear Sampling Method 103 5.1 5.2 5.2.1 5.2.2 Outline of the Linear Sampling Method 104 Physical Interpretation 106 Source Distribution 106 Multipole Radiation 108 35 Contents 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.4 5.5 Multipole-Based Linear Sampling Method 109 Description of the Algorithm 109 Choice of the Number of Multipoles 110 Comparison with Tikhonov Regularization 113 Numerical Examples 114 Factorization Method 116 Discussions 118 References 119 6 Reconstructing Dielectric Scatterers 123 6.1 6.1.1 6.1.2 6.1.3 6.2 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.3 6.3.1 6.3.2 6.3.3 6.3.4 6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.5 Introduction 124 Uniqueness, Stability, and Nonlinearity 124 Formulation of the Forward Problem 126 Optimization Approach to the Inverse Problem 127 Noniterative Inversion Methods 129 Born Approximation Inversion Method 130 Rytov Approximation Inversion Method 130 Extended Born Approximation Inversion Method 131 Back-Propagation Scheme 133 Numerical Examples 134 Full-Wave Iterative Inversion Methods 139 Distorted Born Iterative Method 139 Contrast Source Inversion Method 142 Contrast Source Extended Born Method 144 Other Iterative Models 146 Subspace-Based Optimization Method (SOM) 149 Gs-SOM 149 Twofold SOM 161 New Fast Fourier Transform SOM 164 SOM for the Vector Wave 169 Discussions 171 References 174 7 Reconstructing Perfect Electric Conductors 183 7.1 7.1.1 7.1.2 7.2 7.3 7.3.1 7.3.2 7.4 Introduction 183 Formulation of the Forward Problem 183 Uniqueness and Stability 184 Inversion Models Requiring Prior Information 185 Inversion Models Without Prior Information 186 Transverse-Magnetic Case 187 Transverse-Electric Case 192 Mixture of PEC and Dielectric Scatterers 196 ix x Contents 7.5 Discussions 202 References 203 8 Inversion for Phaseless Data 207 8.1 8.2 8.2.1 8.2.2 8.2.3 8.3 8.3.1 8.3.2 8.3.3 8.3.4 8.3.5 8.4 8.5 Introduction 207 Reconstructing Point-Like Scatterers by Subspace Methods 209 Converting a Nonlinear Problem to a Linear One 210 Rank of the Multistatic Response Matrix 212 MUSIC Localization and Noniterative Retrieval 213 Reconstructing Point-Like Scatterers by Compressive Sensing 214 Introduction to Compressive Sensing 214 Solving Phase-Available Inverse Problems by CS 215 Solving Phaseless Inverse Problems by CS 216 Applicability of CS 218 Numerical Examples 219 Reconstructing Extended Dielectric Scatterers 220 Discussions 223 References 224 9 Inversion with an Inhomogeneous Background Medium 227 9.1 9.2 9.3 9.4 9.5 9.5.1 9.5.2 9.6 Introduction 227 Integral Equation Approach via Numerical Green’s Function 229 Differential Equation Approach 235 Homogeneous Background Approach 240 Examples of Three-Dimensional Problems 243 Confocal Laser Scanning Microscope 246 Near-Field Scanning Microwave Impedance Microscopy 249 Discussions 252 References 254 10 Resolution of Computational Imaging 257 10.1 10.2 10.2.1 10.2.2 10.3 10.4 10.5 10.6 Diffraction-Limited Imaging System 257 Computational Imaging 261 Inverse Source Problem 261 Inverse Scattering Problem 262 Cramér–Rao Bound 264 Resolution under the Born Approximation 268 Discussions 272 Summary 277 References 278 Contents Appendices A.1 A.2 A.3 A.3.1 A.3.2 A.3.3 A.4 A.4.1 A.4.2 A.4.3 A.4.4 A.5 281 Ill-Posed Problems 281 Regularization Theory 282 Regularization Schemes 283 Spectral Cutoff 284 Tikhonov Regularization 285 Iterative Regularization 285 Regularization Parameter Selection Methods 286 Discrepancy Principle 287 Generalized Cross Validation 287 L-Curve Method 287 Trial and Error 288 Discussions 288 B Least Squares 291 B.1 B.1.1 B.1.2 B.2 Geometric Interpretation of Least Squares Real Space 291 Complex Space 292 Gradient of Squared Residuals 292 C Conjugate Gradient Method A Ill-Posed Problems and Regularization 291 C.1 C.1.1 C.1.2 C.2 295 Solving General Minimization Problems 295 Real Space 295 Complex Space 296 Solving Linear Equation Systems 296 D Matrix-Vector Product by the FFT Procedure D.1 D.2 One-Dimensional Case 299 Two-Dimensional Case 300 Appendix References 301 Index 303 299 xi xiii Foreword I am thankful to Dr. Xudong Chen for asking me to write a Foreword to his book on Computational Methods for Electromagnetic Inverse Scattering. This book comes at an opportune time as the field of inverse scattering has been studied for several decades now. I feel that this field is about to enter a new era, just as the field of artificial intelligence has evolved in the last three decades. To recount the history of artificial intelligence briefly, it started out as a field in computer science to emulate human intelligence with computers. However, to emulate human intelligence with the computers of three decades ago was a tall order. Very quickly, the field evolved to a less ambitious goal of developing expert systems to replace humans. Expert systems found applications in many machines that can perform quasi-intelligent menial tasks for humans. When the field of artificial neural networks was conceived, it again aroused much excitement in the computer science community: it portended great potential for machines to emulate the inner workings of the human brain. However, the excitement period subsided gradually, as many of the algorithms were too slow, and it was too difficult and time consuming to train neural networks of high complexity. Nevertheless, neural networks re-emerged later in the new field of machine learning. This was especially significant when machines were trained to beat humans in a game as complicated as the ancient oriental board game go in Japanese, or weiqi (weichi in Wade–Giles phonetics) in Chinese. Three main reasons precipitate this breakthrough in artificial intelligence: (1) Computers have become at least 10 million times faster in the last three decades. (2) Computer memories are a lot cheaper compared to three decades ago, due to the compounding effect of Moore’s Law. (3) Algorithms for information propagation through neural nets have become cleverer and faster. Inverse scattering is facing the same juncture at this point as it shares many similar features with artificial intelligence; for instance, one of the bottle-necks of the inverse scattering algorithm is its computational cost or labor. But after several decades, computer technologies have grown a lot more powerful and cheaper. The clever use of modern computer technologies in massively parallel computations, the use of a priori data in inverse scattering and imaging, and xiv Foreword the development of compressive sensing knowledge can be the game changers in this field. Moreover, the dogged pursuit of more efficient inverse scattering algorithms by many researchers makes the time ripe for this field to undergo a major revolution, as has been witnessed in the field of artificial intelligence. Another reason that this field has become very interesting is that it is a field that is highly inter-disciplinary, drawing upon knowledge from mathematics, wave physics, and signal processing, as well as computer science. The confluence of various forms of knowledge and their judicious synergy are important to stimulate the next generation of technology that can follow from inverse scattering: for instance, in various forms of imaging, detection, and identification applications. This book will become an excellent resource for researchers and students who wish to learn the relevant knowledge needed for studying inverse scattering and related topics. Dr. Chen has started from the fundamentals of electromagnetic scattering theory and guides the readers slowly into the advanced form of scattering and inverse scattering theory. He also gives comprehensive coverage of the major inverse scattering techniques, plus pertinent signal processing methods. It is pleasing to see that both perfect electric conductor inversion and dielectric object inversion are discussed, as well as the complicated case when the background is inhomogeneous. Small-scatterer inversion is discussed alongside with large-scatterer inversion. The issue of phaseless imaging (or reconstruction) as well as imaging with phase information have been discussed. Phase imaging has been done at microwave frequency but is becoming increasingly popular at optical frequency as optical measurements become more precise. The manner the book is organized makes this knowledge accessible to researchers who are not in mainstream electromagnetic physics. Also, topics are added to ease the learning of computational mathematics and signal processing. In summary, Dr. Chen should be lauded for spending the effort to write this book, which will become an important resource for researchers and students in this field. September 2017 Weng Cho Chew Purdue University xv Preface This book is dedicated to presenting computational methods for solving electromagnetic inverse scattering problems. The intended audience includes graduate students and researchers in electrical engineering and physical sciences who are interested in inverse scattering and related imaging or who may encounter this subject in their work. Researchers in applied mathematics might also find the book useful. There are two main reasons that motivated me to write this monograph. First, despite the fact that a rapidly expanding number of research articles on inverse scattering have been published, thanks to its wide range of real-world applications as well as the availability of powerful and cheaper computational resources, few research textbooks have been written on the subject. In particular, there has not yet been a book dedicated to solving electromagnetic inverse scattering problems without making linearization approximations. The lack of a suitable reference book has been an inconvenience for many researchers who are either in this area or are interested in entering into this subject. Second, although progress in the research into inverse scattering would not be possible without the confluence of various forms of knowledge, researchers in the engineering community usually have little knowledge on the theories and tools that have been developed in the applied mathematical community. Although there are excellent textbooks on the topic in applied mathematics, these books are usually inaccessible to engineering readers due to a lack of sufficient training in mathematics. Based on my research experiences in the subject during 2006–2016, I wrote this monograph, keeping in mind these two concerns. The book mainly addresses inverting exact wave equations, without making linearization approximations, which results in a highly nonlinear problem. The book is written in such a way that it presents the following features: 1) Most of the major inversion algorithms are reviewed and, in particular, their strengths and weakness are discussed, as well as their relationships to other algorithms. xvi Preface 2) Important mathematical concepts, such as existence, uniqueness, and stability, are introduced. A general introduction to ill-posed problems and regularization is provided in the Appendix. Some inversion algorithms that prevail in the applied mathematical community are also introduced, such as the well-established linear sampling method. All these mathematical topics are presented in a way accessible to engineering readers. 3) The book is highly oriented to the practical implementation of algorithms. The details of solving the forward problem and the implementation steps of individual inversion algorithms are presented such that readers can practice them without a long learning curve. Along the same pragmatic direction, several important tools are provided in Appendices. To summarize, the book presents inverse scattering for an engineering audience in a well-balanced way; that is, emphasizing pragmatism of computational methods but still with the right formal rigor. Keeping in mind that the research into the inverse problem requires a deep or fairly good understanding of the corresponding forward problem, I always hesitate to directly apply a general optimization method to a high-dimensional nonlinear problem, where the original forward problem is iteratively evaluated. I am convinced that insights and intuitions, no matter whether they are mathematical, physical, or engineering, potentially help us to solve the problem in a more efficient and elegant way. In inverse scattering problems, induced source plays an essential role. The analysis of induced source, such as its degrees of freedom, multipole expansion, Fourier series, and expansion with respect to singular vectors, provides deep insights into solving inverse scattering problems, which is demonstrated throughout this book. Supplementary materials, such as the MATLAB m-files used to generate many of the examples and figures, can be found on my personal website. These materials help readers make rapid progress in learning the subject and comparing the various solution methods. I am indebted to my Ph.D. supervisor Professor Jin Au Kong who taught me electromagnetic wave theory and to my Masters supervisors Professor Guangzheng Ni and Professor Shiyou Yang who introduced me to the field of optimization and taught me the importance of physical insight. Their passion and enthusiasm in teaching greatly influenced my view on education. I am very grateful to Professor Weng Cho Chew who was so generous in writing the Foreword to the book and provided me with valuable suggestions on my writing. The depth and width of his knowledge, as well as his interest in learning whenever and wherever possible, have deeply impressed and influenced me. I would like to thank my close collaborators Dr. Dominique Lesselier, Professor Colin Sheppard, Professor Lixin Ran, and Professor Zhi-Xun Shen, together with whom I worked on various inverse problems and imaging projects. I appreciate my friendship with many mathematicians; in particular, Professor Preface Gunther Uhlmann, Professor Jun Zou, Professor Hongkai Zhao, Professor Jenn-Nan Wang, and Professor Gen Nakamura, who have helped me in various ways, taught me mathematics, and influenced my style of research. I have been very fortunate to work with brilliant Ph.D. students and postdoctoral fellows on this subject, in particular, Yu Zhong, Krishna Agarwal, Li Pan, Xiuzhu Ye, Rencheng Song, Rui Chen, and Zhun Wei. Dr. Zhong and Dr. Agarwal, my first two Ph.D. students, started working on inverse scattering almost at the same time as I did. I cherish the time and effort we spent together in embarking on a new journey in inverse scattering. Special thanks go to Dr. Wei and Dr. Chen who generated many of the figures and provided a lot of editorial assistance to the book. I would also like to thank Dr. Maokun Li, who read most of chapters and provided many suggestions for improvements. Finally, I am deeply grateful to my wife, Lin, my children, Yuexin and Yide, and my parents, for their tremendous support, patience and love during this project. September 2017, Singapore Xudong Chen xvii 1 1 Introduction The purpose of this chapter is to provide an overview of the book. First, the concept of electromagnetic inverse scattering problems (ISPs) is introduced, which is followed by their scientific and real-world applications. Second, we address the forward scattering problem, also known as the direct problem. Third, the fundamental properties of electromagnetic ISPs, including the existence, uniqueness, and stability of the solution, are presented. The inherent nonlinearity of ISPs is emphasized and the classification of ISPs is discussed. Finally, the scope of the book is specified. The topics covered by the remaining chapters are overviewed, which is followed by extension of the methods presented in the book to other areas. Other related topics that are not covered by the book are briefly mentioned. 1.1 Introduction to Electromagnetic Inverse Scattering Problems The electromagnetic scattering problem deals with determining the scattered field generated by a given scatterer when it is illuminated by incoming electromagnetic waves. This is also called the forward or direct problem. The opposite of the forward problem is called the inverse problem. Electromagnetic inverse scattering is concerned with determining the nature of an unknown scatterer, such as its shape, position, and material, from knowledge about measured scattered fields. Figure 1.1 shows a schematic diagram of inverse scattering problems. An unknown scatterer is located in the domain D, referred to as the domain of interest (DOI), and is illuminated by incoming waves generated by transmitters labelled Tx1, Tx2, …. For each illumination, the scattered fields are measured by an array of receivers labelled Rx1, Rx2, …. The goal of the inverse scattering problem is to determine the shape, position, and material of the scatterer from the measured scattered fields. Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 2 Electromagnetic Inverse Scattering T×1 Ei, Hi Figure 1.1 Schematic diagram of inverse scattering problems. R×1 S Es, Hs T×2 D R×2 T×3 R×3 Using electromagnetic waves to probe obscured or remote regions, the imaging techniques based on electromagnetic ISPs are suitable for a wide range of applications. For example, in nondestructive evaluation (NDE), the ISP has been applied to detection of possible cracks in civil and industrial structures [1–4]. In geography, this is used in remote detection of subsurface inclusions, such as detecting unexploded ordnance and mines [5, 6]. In the oil industry, it is used for oil and gas exploration [7]. In medicine, it is used for the detection of the early stages of breast cancer [8–12]. In security checks, it is applied to concealed weapon detection [13]. It can also be used for material characterization, such as the determination of constituents and evaluation of porosity [14]. Some real-world applications of inverse scattering in the microwave range can be found in chapter 10 of [15]. In physical science, the interpretation of Rutherford’s gold foil experiment, which discovered the atomic nucleus, is also an inverse scattering problem. From this short and incomplete list, it is apparent that the scope of electromagnetic ISP is extensive and its applications are diverse and important. Nevertheless, compared with its increasing importance, research in inverse scattering technique is still in the nascent stage. The purpose of this book is to introduce several computational methods for solving electromagnetic ISPs. Before discussing the inverse problem, we have to give the rudiments of the corresponding forward problem, which is the topic of the next section. 1.2 Forward Scattering Problems Electromagnetic scattering theory is based on Maxwell’s equations. Maxwell’s equations are four partial differential equations that describe the electric and magnetic fields arising from distributions of electric charges and currents. Electromagnetic scattering occurs when scatterers are illuminated by a Introduction radiation source. The perturbation field due to the presence of scatterers is referred to as the scattered field; that is, the scattered field is the difference between the fields with and without the scatterers. Since the scattering problem is formulated in an unbounded domain, the boundary condition at infinity is called the radiation boundary condition, which requires the scattered field to be a local plane wave that propagates outward. Broadly speaking, scatterers can be categorized into two types: Penetrable and impenetrable scatterers. For penetrable scatterers, the wave field is not zero inside the scatterers and satisfies the wave equation that depends on the constitutive parameters of the scatterer. At the interface between a penetrable scatterer and the background medium, continuity of certain components of electric and magnetic fields should be satisfied. For an impenetrable scatterer, the wave field is zero inside the scatterer and the total field satisfies a certain boundary condition, such as the Dirichlet (or sound-soft [16]) boundary condition, Neumann (or sound-hard [16]) boundary condition, or the impedance boundary condition. In this book, scatterers made of nonmagnetic dielectric material are penetrable scatterers, and scatterers made of perfect electric conductors (PEC) are chosen for impenetrable scatterers. In solving ISPs, the values of permittivity of dielectric scatterers have to be reconstructed, whereas the boundary of PEC scatterers has to be determined. In the applied mathematical community, scattering problems involving penetrable and impenetrable scatterers are often referred to as the medium and obstacle problem, respectively [16, 17]. This book deals with time-harmonic waves; that is, monochromatic waves. We do not specify any particular frequency range; for example, radio frequency, microwave, millimeter wave, or optical wave. Instead, we are interested in expressing dimensions and positions in terms of wavelength. The mathematical methods, both theoretical and numerical ones, used to investigate the forward and inverse scattering problems depend heavily on the operating frequency of the wave. For scatterers whose dimensions are much larger than the wavelength, the mathematical methods used to study their scattering phenomena are very different from those used for scatterers whose dimensions are much smaller than, or comparable to, the wavelength. This book is primarily concerned with the forward and inverse scattering problems associated with the scatterers whose dimensions are much smaller than, or comparable to, the wavelength. The theories, formulations, and computational methods for the (forward) scattering problem are provided in Chapter 2. 1.3 Properties of Inverse Scattering Problems Following the definition by Hadamard [18], a problem is well posed if its solution exists, is unique, and depends continuously on data. If one of these conditions is not satisfied, the problem is ill- or improperly posed. It is obvious 3 4 Electromagnetic Inverse Scattering that the first two properties, that is, the existence and uniqueness, should be discussed when the data is noise-free. Otherwise, for example, for a given set of measurement data that are contaminated with noise (such as measurement error and background noise), if there is no candidate acting as an input to the problem that produces an output exactly matching the measured data, then the solution to the problem does not exist. The last property, referred to as continuity (or stability), essentially means that a small perturbation of the data results in a small perturbation of the solution. Mathematical techniques known as regularization methods have been developed to construct a stable approximate solution of an ill-posed problem. More details on ill-posedness and regularization can be found in Appendix A. For electromagnetic inverse scattering problems, we will address the following questions: the existence, uniqueness, and stability of the solution, the inherent nonlinearity, and classifications. For electromagnetic inverse scattering problems, the question about existence is trivially confirmative since the measured scattering data for an inverse scattering problem must be generated by a certain scatterer and obviously this scatterer is an automatic solution to the inverse scattering problem. Turning to the question of uniqueness, [19] and section 7.1 of [16] proved the uniqueness theorem under certain conditions for dielectric and PEC scatterers, respectively. The conclusion for dielectric scatterers is that, under certain conditions, for a fixed wavenumber and all directions of incidence and all polarizations of the electric field, the knowledge of the electric far field pattern for all angles uniquely determines permittivity. The conclusions for PEC scatterers are that (1), for a fixed wavenumber, the electric far field patterns for all incidence direction and all polarizations uniquely determine the PEC scatterer; and (2), for one fixed incidence direction and polarization, the electric far field pattern for all wavenumbers contained in some interval uniquely determines the PEC scatterer. It is important to note that this book concentrates mainly on computational methods that solve inverse scattering problems with a unique solution. Inverse scattering problems that do not have a unique solution are not considered in this book. In fact, the conditions of non-uniqueness are rather stringent, and thus in practice such inverse scattering problems are not often encountered. For example, for anisotropic scatterers, if the permittivity and permeability are allowed to be zero or infinite, then it is possible to have infinite solutions to the inverse scattering problem. One of the applications of such non-uniqueness is invisibility and cloaking, and the idea of designing such kinds of anisotropic scatterers is referred to as transformation optics [20, 21]. In addition, many inverse scattering methods cannot work reliably when a penetrable isotropic scatterer does not scatter off a certain incidence wave for certain wavenumbers. In the mathematical community, such a wavenumber is referred to as the transmission eigenvalue of the interior transmission problem [22]. This book Introduction considers only scattering problems where all discrete physical and numerical resonance frequencies are avoided [23]. Next, we turn to the question of stability. Inverse scattering problems involving dielectric or PEC scatterers cannot be stably solved. In fact, even if the amount of data collected is sufficient to guarantee uniqueness, the unknown parameters (either the boundaries for PEC scatterers or the values of permittivity for dielectric scatterers) do not usually depend on the measured data in a stable way (mathematically referred to as continuous). An obvious question to ask is how large the error of the solution could be in the worst case if the error in the measured data is at most 𝜏. For an ill-posed problem, the error in solution could be arbitrarily large, which means instability. In order to recover some kind of stability, we need to restrict the space of admissible unknowns by assuming that they satisfy a priori conditions, such as some kind of smoothness, sparseness, or non-negative constraint. With this a priori information, it is possible to prove that the unknowns depend in a continuous way on the measured data. Determining the modulus of this continuity is referred to as the stability estimate (section 2.2 of [24]). For electromagnetic inverse scattering problems, it has been proven that the stability is of a logarithmic type [25, 26]. Roughly speaking, if the error in the measured data is at most 𝜏, then the error of solution in the worst case is on the order of | ln 𝜏|−s (where 0 < s < 1). By the L’Hôpital’s rule, as 𝜏 approaches zero, we see that a small error in measured data leads to a much larger error in the solution. In addition to instability, the second main difficulty of inverse scattering problems is the fact that inverse problems are nonlinear, even if the corresponding forward problems are linear ones. The inverse scattering problem deals with the relationship between scattered field and scatterer’s parameter, whereas the forward scattering problem deals with the relationship between the incident and scattered fields. The nonlinearity of the inverse problem is obvious due to the fact that the scattered field will not be doubled when the scatterer’s permittivity is doubled. The nonlinearity is due to the multiple scattering effect that physically exists. In addition, the nonlinearity is not a convex one. The intrinsic nonlinearity of the inverse scattering problem makes the development of effective algorithms a difficult task because a solution procedure can get trapped in false solutions that are in fact different from the exact one. Since multiple scattering effects physically exist, any imaging algorithm that ignores multiple scattering effects will cause an error, which is hard or impossible to remove using simple post-processing methods. Thus, numerical reconstruction that takes multiple scattering effects into account is expected to be one of the main research directions for the inverse problem community in the near future. Usually, the nonlinear problem is solved by casting it into an optimization problem, where the mismatch between the measured and predicted data is minimized by adjusting the unknowns that are used for prediction. The bottleneck of reconstruction algorithms that take multiple 5 6 Electromagnetic Inverse Scattering scattering effects into account lies in the high computational cost for solving the associated forward problem conducted at each iteration of the optimization process. However, the enormous increase in computing power of modern computers and the development of powerful inversion algorithms are expected to make it possible to reconstruct objects within the framework of multiple scattering in many real-world applications in the near future. Electromagnetic inverse scattering problems can be classified by different criteria. Depending on the material properties of scatterers, the ISPs can be classified into penetrable and impenetrable ones. Depending on the size of scatterers, in comparison with the wavelength, the ISPs can be classified into two types involving small scatterers (also known as point-like scatterers) and extended scatterers. Depending on the property of background medium, classification can be homogenous and inhomogeneous background ISPs. In terms of availability of phase information of measured scattered fields, classification can be ISPs with phaseless data or phase-available data. From the angle of inversion algorithms, classification can be linear and nonlinear, iterative and noniterative, or quantitative and qualitative. When multiple scattering is taken into account, the ISP is inherently nonlinear, and consequently any inversion algorithm that directly solves the nonlinear problem is called a full-wave nonlinear algorithm. Under some conditions, such as scatterers being weak in scattering, the nonlinear problem can be well approximated by a linear one, and the accompanying algorithms are linear ones. Certain inversion algorithms are able to provide accurate or good approximate solutions with one or only a few steps of manipulation, whereas some algorithms provide final reconstruction results by iteratively minimizing the mismatch between measured and predicted data. In practical applications, the objectives of ISPs can be very different. If the values of permittivity are needed, then quantitative inversion algorithms should be adopted. If only approximate information on the shape, position, and size of scatterer is needed, then qualitative inversion algorithms suffice. 1.4 Scope of the Book The main purpose of this book is to introduce computational methods for solving electromagnetic inverse scattering problems. The remaining chapters cover the following topics regarding forward and inverse electromagnetic scattering problems. Chapter 2 gives the rudiments of the theory behind the forward scattering problem. The fundamentals of electromagnetic wave theory are reviewed, and equations are developed for scattering problems involving dielectric scatterers and perfect electric conductors. The chapter aims to provide readers with some quick practice in solving forward scattering problems. Introduction Chapters 3–5 present qualitative inversion algorithms, which include time-reversal imaging, the multiple signal classification (MUSIC) method, and the linear sampling method. These inversion algorithms do not provide the values of permittivity of scatterers, but instead provide indicators that show the possibility of the existence of scatterers at particular spatial points from which the size, shape, and position of scatterers can be inferred. In particular, Chapter 4 shows that the MUSIC theoretically reaches an unlimited resolution for point-like scatterers in absence of noise and, once the position is determined, the scattering strengths of point-like scatterers can be noniteratively retrieved. Chapters 6–9 address quantitative inversion algorithms. The focus of these chapters is full-wave nonlinear ISPs where the multiple scattering effect is taken into account. Chapter 6 deals with reconstructing dielectric scatterers where both iterative and noniterative algorithms are introduced. Chapter 7 addresses the ISPs involving PEC scatterers, either PEC scatterers alone or a mixture of PEC scatterer and dielectric scatterers. Chapter 8 covers inversion algorithms for phaseless data. Chapter 9 deals with inverse scattering problems that have an inhomogeneous background medium, which is general enough to model most real-world applications. In these chapters, although an optimization approach is used to solve full-wave nonlinear ISPs, the main focus is not optimization algorithms, but instead the application of mathematical and physical insights to the development of objective functions with reduced nonlinearity. Chapter 10 discusses the resolution of an image that is obtained by solving inverse scattering problems. An important conclusion is that the classical resolution widely used in traditional optical microscopy is not applicable to inverse scattering problems. Four Appendices are provided at the end of the book. Appendix A is a short introduction to the mathematical theories of inverse problems, mainly ill-posedness and regularization. The text is oriented to engineering readers. This topic has been deliberately chosen for placement in the Appendices, since otherwise it might disrupt the flow of engineering readers if it was placed in the main body. The remaining three appendices are pragmatic and concise. Appendices B and C outline two widely used optimization methods; that is, the linear least squares method and the conjugate gradient method. Appendix D presents the fast implementation of the convolution-type matrix-vector product. We mention in passing that, although not provided in the appendix, matrix analysis is important for analyzing and implementing inversion algorithms throughout the book. Readers are referred to [27, 28] for information about matrix analysis. It is worth stressing that the concept of induced source is used throughout the book. Induced source plays an important role in solving electromagnetic inverse scattering problems since it provides a bridge to the inverse source 7 8 Electromagnetic Inverse Scattering problem, a linear problem. The analysis of induced source, such as its degrees of freedom, multipole expansion, Fourier series, and expansion with respect to singular vectors, provides deep insights into solving inverse scattering problems. In fact, inverse scattering problems can be viewed as inverse source problems subject to constraints imposed by the material properties of a scatterer when it is under multiple illumination sources. For all presented inversion algorithms, numerical examples are provided to test their performances. In addition to synthetic data, some lab-controlled experimental data are used to test some of the proposed inversion algorithms. Whenever possible, the last section of each chapter lists relevant references that test inversion algorithms with lab-controlled experimental data or even real-world field data. The computational methods introduced in this book, used for solving electromagnetic ISPs, can be extended to solve many other inverse problems, such as acoustic ISPs [29], seismic exploration [30], inversion of elastic wave equation [31], quantum ISPs (chapter 20 of [32]), inverse transport equation [33, 34], optical diffusion tomography [35], and electric impedance tomography [36]. Since electromagnetic ISP is a multidisciplinary topic, it is impossible to cover all relevant topics in a single volume. I have chosen the topics in electromagnetic inverse scattering problems from the perspective of my own research experiences. This inevitably means that certain areas of electromagnetic ISP are either given only cursory attention or completely ignored. First, I’d like to mention some books that primarily focus on electromagnetic ISPs. Theories and numerics on fast linear methods, such as diffraction tomography, are extensively discussed in [37–39]. Instrumentation and apparatuses for microwave imaging, as well as layouts of transmitters/receivers, can be found in [15, 38]. The inverse source problem is addressed in great detail in chapter 5 of [37]. Theories and examples for one-dimensional electromagnetic ISPs are given in [40–42] and section 9.2 of [43]; Various optimization methods for solving electromagnetic ISPs are presented in [44]. The test on lab-controlled experimental data is presented in chapter 9 of [39]. Rigorous mathematical treatments of the electromagnetic ISP, which is nevertheless less pragmatic, can be found in [16]. This book focuses on full-wave nonlinear inversion methods and is complementary to the aforementioned books. Next, I’d like to mention some aspects of electromagnetic ISPs that are not covered by this book. Time domain inversion algorithms can be found in [45–49]. Hybrid imaging modalities, such photoacoustic or thermoacoustic tomography, can be found in [50–53]. Inverse problems for scattering by periodic structures can be found in [54]. Electromagnetic ISPs can be tackled by the Bayesian approach [55] or along the same lines, the “combination of states of information” approach [56]. Machine learning approaches, such as support vector machines and neural networks, have been applied to solve electromagnetic ISPs [57, 58]. Introduction References 1 Zoughi, R. (2012) Microwave non-destructive testing and evaluation princi- ples, Springer Science & Business Media. 2 Ida, N. (1994) Numerical modeling for electromagnetic non-destructive evaluation, vol. 1, Springer Science & Business Media. 3 Kharkovsky, S. and Zoughi, R. (2007) Microwave and millimeter wave non- 4 5 6 7 8 9 10 11 12 13 14 15 16 destructive testing and evaluation – overview and recent advances. IEEE Instrumentation Measurement Magazine, 10 (2), 26–38. Marklein, R., Mayer, K., Hannemann, R., Krylow, T., Balasubramanian, K., Langenberg, K.J., and Schmitz, V. (2002) Linear and nonlinear inversion algorithms applied in nondestructive evaluation. Inverse Probl., 18 (6), 1733. Persico, R. (2014) Introduction to ground penetrating radar: inverse scattering and data processing, John Wiley & Sons, Inc. Zhdanov, M.S. (2002) Geophysical inverse theory and regularization problems, Elsevier. Abubakar, A., Habashy, T.M., Druskin, V.L., Knizhnerman, L., and Alumbaugh, D. (2008) 2.5D forward and inverse modeling for interpreting low-frequency electromagnetic measurements. Geophysics, 73 (4), F165–F177. Nikolova, N.K. (2011) Microwave imaging for breast cancer. IEEE Microwave Magazine, 12, 78–94. Bond, E.J., Li, X., Hagness, S.C., and Veen, B.D.V. (2003) Microwave imaging via space-time beamforming for early detection of breast cancer. IEEE Transactions on Antennas and Propagation, 51 (8), 1690–1705. Paulsen, K.D., Meaney, P.M., and Gilman, L.C. (2005) Alternative breast imaging: Four model-based approaches, Springer Science and Business Media. Fear, E.C., Li, X., Hagness, S.C., and Stuchly, M.A. (2002) Confocal microwave imaging for breast cancer detection: localization of tumors in three dimensions. IEEE Transactions on Biomedical Engineering, 49 (8), 812–822. Khor, W.C., Bialkowski, M.E., Abbosh, A., Seman, N., and Crozier, S. (2007) An ultra wideband microwave imaging system for breast cancer detection. IEICE Transactions on Communications, 90 (9), 2376–2381. Zhuge, X. and Yarovoy, A.G. (2011) A sparse aperture mimo-SAR-based UWB imaging system for concealed weapon detection. IEEE Transactions on Geoscience and Remote Sensing, 49 (1), 509–518. Bolomey, J. and Joachimowicz, N. (1994) Dielectric metrology via microwave tomography: Present and future. MRS Proceedings, 347. Pastorino, M. (2010) Microwave imaging, John Wiley & Sons, Inc. Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scattering theory, 2nd Edn, Springer-Verlag, Berlin, Germany. 9 10 Electromagnetic Inverse Scattering 17 Bao, G. and Li, P. (2005) Inverse medium scattering problems for electro- magnetic waves. SIAM Journal on Applied Mathematics, 65 (6), 2049–2066. 18 Hadamard, J. (1923) Lectures on Cauchy’s problem in linear partial differen- tial equations, Yale University Press. 19 Colton, D. and Päivärinta, L. (1992) The uniqueness of a solution to an 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 inverse scattering problem for electromagnetic waves. Archive for Rational Mechanics and Analysis, 119 (1), 59–70. Pendry, J.B., Schurig, D., and Smith, D.R. (2006) Controlling electromagnetic fields. Science, 312, 1780–1782. Leonhardt, U. (2006) Optical conformal mapping. Science, 312 (5781), 1777. Colton, D. and Kress, R. (2006) Using fundamental solutions in inverse scattering. Inverse Probl., 22, R49–R66. Chew, W.C. and Song, J.M. (2007) Gedanken experiments to understand the internal resonance problems of electromagnetic scattering. Electromagnetics, 27 (8), 457–471. Isakov, V. (2006) Inverse problems for partial differential equations, vol. 127, Springer Science and Business Media. Caro, P. (2010) Stable determination of the electromagnetic coefficients by boundary measurements. Inverse Probl., 26 (10). Isakov, V. (1992) Stability estimates for obstacles in inverse scattering. J. Comput. Appl. Math., 42 (1), 79–88. Golub, G.H. and van Loan, C.F. (2013) Matrix Computations, 4th Edn. JHU Press. Horn, A. and Johnson, C.R. (2012) Matrix analysis, Cambridge University Press, Cambridge, UK. Colton, D., Coyle, J., and Monk, P. (2000) Recent developments in inverse acoustic scattering theory. SIAM Rev., 42 (3), 369–414. Weglein, A.B., Araújo, F.V., Carvalho, P.M., Stolt, R.H., Matson, K.H., Coates, R.T., et al. (2003) Inverse scattering series and seismic exploration. Inverse Probl., 19 (6), R27. Nakamura, G. and Uhlmann, G. (1994) Global uniqueness for an inverse boundary problem arising in elasticity. Inventiones Mathematicae, 118 (1), 457–474. Newton, R.G. (1982) Scattering theory of waves and particles, Springer. Bal, G. (2009) Inverse transport theory and applications. Inverse Probl., 25 (5), 053 001. Ren, K. (2010) Recent developments in numerical techniques for transport-based medical imaging methods. Commun. Comput. Phys., 8 (1), 1–50. Markel, V.A. and Schotland, J.C. (2001) Inverse problem in optical diffusion tomography. i. fourier-laplace inversion formulas. J. Opt. Soc. Am. A, 18 (6), 1336–1347. Introduction 36 Borcea, L. (2002) Electrical impedance tomography. Inverse Probl., 18, R99–R136. 37 Devaney, A.J. (2012) Mathematical foundations of imaging, tomography and wavefield inversion, Cambridge University Press. 38 Nikolova, N.K. (2017) Introduction to microwave imaging, Cambridge University Press. 39 Fiddy, M.A. and Ritter, R.S. (2014) Introduction to imaging from scattered fields, CRC Press. 40 Hopcraft, K. and Smith, P. (1992) An Introduction to electromagnetic inverse scattering, Springer. 41 Tabbara, W. (1979) Reconstruction of permittivity profiles from a spectral 42 43 44 45 46 47 48 49 50 51 52 analysis of the reflection coefficient. IEEE Transactions on Antennas and Propagation, 27 (2), 241–244. Habashy, T.M. and Mittra, R. (1987) On some inverse methods in electromagnetics. J. Electromagnet Wave, 1 (1), 25–58. Chew, W.C. (1995) Waves and fields in inhomogeneous media, IEEE Press. Noghanian, S., Sabouni, A., Desell, T., and Ashtari, A. (2014) Microwave tomography: Global optimization, parallelization and performance evaluation, Springer. Winters, D.W., Bond, E.J., Veen, B.D.V., and Hagness, S.C. (2006) Estimation of the frequency-dependent average dielectric properties of breast tissue using a time-domain inverse scattering technique. IEEE Transactions on Antennas and Propagation, 54 (11), 3517–3528. Klibanov, M.V., Fiddy, M.A., Beilina, L., Pantong, N., and Schenk, J. (2010) Picosecond scale experimental verification of a globally convergent algorithm for a coefficient inverse problem. Inverse Probl., 26 (4), 045 003. Fhager, A., Hashemzadeh, P., and Persson, M. (2006) Reconstruction quality and spectral content of an electromagnetic time-domain inversion algorithm. IEEE Transactions on Biomedical Engineering, 53 (8), 1594–1604. Gustafsson, M. and He, S. (2000) An optimization approach to two-dimensional time domain electromagnetic inverse problems. Radio Sci., 35 (2), 525–536. Moghaddam, M. and Chew, W.C. (1992) Nonlinear two-dimensional velocity profile inversion using time domain data. IEEE Transactions on Geoscience and Remote Sensing, 30 (1), 147–156. Xu, M. and Wang, L.V. (2002) Time-domain reconstruction for thermoacoustic tomography in a spherical geometry. IEEE Transactions on Medical Imaging, 21 (7), 814–822. Wang, L.V. and Hu, S. (2012) Photoacoustic tomography: In vivo imaging from organelles to organs. Science, 335 (6075), 1458–1462. Kuchment, P. and Kunyansky, L. (2008) Mathematics of thermoacoustic tomography. Eur. J. Appl. Math., 19 (02), 191–224. 11 12 Electromagnetic Inverse Scattering 53 Bal, G. and Uhlmann, G. (2010) Inverse diffusion theory of photoacoustics. Inverse Probl., 26 (8), 085 010. 54 Bao, G. and Friedman, A. (1995) Inverse problems for scattering by periodic structures. Arch Ration Mech An, 132 (1), 49–72. 55 Carfantan, H. and Mohammad-Djafari, A. (1995) A Bayesian approach for nonlinear inverse scattering tomographic imaging, in International Conference on Acoustics, Speech, and Signal Processing, vol. 4, pp. 2311–2314. 56 Tarantola, A. (2005) Inverse problem theory and methods for Model parameter estimation, Society for Industrial and Applied Mathematics. 57 Bermani, E., Boni, A., Caorsi, S., and Massa, A. (2003) An innovative real-time technique for buried object detection. IEEE Transactions on Geoscience and Remote Sensing, 41 (4), 927–931. 58 Rekanos, I.T. (2002) Neural-network-based inverse-scattering technique for online microwave medical imaging. IEEE Transactions on Magnetics, 38 (2), 1061–1064. 13 2 Fundamentals of Electromagnetic Wave Theory Before discussing the inverse scattering problem we have to give the rudiments of the theory behind the corresponding forward problem. The electromagnetic scattering problem is based on Maxwell’s equations. The purpose of this chapter is to review the fundamentals of electromagnetic wave theory. In addition, equations are developed for scattering problems involving dielectric scatterers and perfect electric conductors (PEC). The presentation is intended as a review of the aforementioned concepts rather than an introduction, and an in-depth treatment can be found in references [1–7]. The presentation materials in this chapter are highly oriented to the following two aspects: (1) numerical implementation of forward problem solvers; and (2) theories and formulas that can be directly used in later chapters. The details of linear equation systems for some types of forward problems are provided, which should facilitate readers’ quick practice and understanding of the numerics of the forward problem. 2.1 Maxwell’s Equations 2.1.1 Representations in Differential Form Maxwell’s equations govern electromagnetic phenomena. In three-dimensional vector notation, Maxwell’s equations are 𝜕 (2.1) ∇ × H(r, t) = D(r, t) + J(r, t) 𝜕t 𝜕 ∇ × E(r, t) = − B(r, t) (2.2) 𝜕t ∇ ⋅ D(r, t) = 𝜌(r, t) (2.3) ∇ ⋅ B(r, t) = 0 (2.4) where E, D, B, H, J, and 𝜌 are real-valued functions of space and time. E is the electric field strength, D is the electric flux density (also known as the electric Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 14 Electromagnetic Inverse Scattering displacement), B is the magnetic flux density, H is the magnetic field strength, J is the electric current density, and 𝜌 is the electric charge density. The units for these physical parameters are as follows: volt/m for E, coulomb/m2 for D, weber/m2 for B, ampere/m for H, ampere/m2 for J, and coulomb/m3 for 𝜌. Equation (2.1) is Ampere’s law, (2.2) is Faraday’s law, (2.3) is Gauss’ law for electric fields, and (2.4) is Gauss’ law for magnetic fields. The electric current density J and the electric charge density 𝜌 are governed by the continuity law, 𝜕 𝜌(r, t) (2.5) 𝜕t which describes the transport of electric charge that is a conserved quantity; that is, the divergence of current J from an infinitesimal volume surrounding r is equal to the decreasing of the electric charge density 𝜌 with time t. ∇ ⋅ J(r, t) = − 2.1.2 Time-Harmonic Forms For electromagnetic waves of a particular frequency in the steady state, the fields are time-harmonic and are known as monochromatic waves or continuous waves. For time-harmonic fields, it is mathematically convenient to use their complex representations, which are also known as phasors. For an angular frequency 𝜔, the complex representation E(r) of the time-domain field E(r, t) is defined to satisfy E(r, t) = [E(r)e−i𝜔t ] (2.6) where [⋅] denotes the real part of a complex quantity. The complex-valued E(r) is a function of space only and independent of time. Note that e−i𝜔t denotes the convention of time dependence adopted in this book. Under this time convention, the plane wave E(x) = ŷ E0 eikx propagates in the +x direction, which can be seen from the fact that when time t increases, x has to increase so that the time-domain expression E(r, t) = ŷ E0 cos(kx − 𝜔t) retains a fixed phase. Under complex representation, it is easy to verify that Maxwell’s equations read ∇ × H(r) = −i𝜔D(r) + J(r) (2.7) ∇ × E(r) = i𝜔B(r) (2.8) ∇ ⋅ D(r) = 𝜌(r) (2.9) ∇ ⋅ B(r) = 0 (2.10) where the time derivative is replaced by the factor −i𝜔. The continuity law (2.5) becomes ∇ ⋅ J(r) = i𝜔𝜌(r) (2.11) Fundamentals of Electromagnetic Wave Theory 2.1.3 Boundary Conditions The time-harmonic Maxwell’s equations (2.7)–(2.10) are differential forms applied locally at each point in space. By means of the divergence theorem and Stokes’ theorem, they can be cast in integral form. At the boundary of two different media, the integral-form Maxwell’s equations can be used to deduce the boundary conditions. Consider two media that are shown in Fig. 2.1, with the normal n̂ of the boundary pointing from medium 1 into medium 2. For an infinitesimal closed contour C with the long arms on either side of the boundary, as shown in Fig. 2.1, the application of Stokes’ theorem to (2.7) and (2.8) gives the following boundary conditions, in the limit of zero length of the short arms of C, n̂ × (H2 − H1 ) = Js (2.12) n̂ × (E2 − E1 ) = 0 (2.13) where the subscripts 1 and 2 denote fields in medium 1 and 2, respectively, and Js is the surface current density with the unit ampere/m. For an infinitesimal pillbox V straddling the boundary, as shown in Fig. 2.1, the application of the divergence theorem to (2.9) and (2.10) gives the following boundary conditions, in the limit of zero height of the pillbox, n̂ ⋅ (D2 − D1 ) = 𝜌s (2.14) n̂ ⋅ (B2 − B1 ) = 0 (2.15) where 𝜌s is the surface charge density, with the unit coulomb/m2 . It is important to note that the boundary conditions (2.12) and (2.13) automatically imply (2.14) and (2.15), respectively. This is because such a dependence relationship roots from the corresponding differential forms of Maxwell’s equations. Indeed, the divergence of Ampere’s law (2.7), together with the vector identity ∇ ⋅ ∇ × H = 0 and the continuity law (2.11), implies Gauss’ law for Figure 2.1 Schematic diagram of a boundary between two different media. The infinitesimal loop and pillbox are used to derive boundary conditions. 2 1 C n E2, B2 D2, H2 ρs, Js V E1, B1 D1, H1 15 16 Electromagnetic Inverse Scattering electric fields (2.9). Similarly, Faraday’s law (2.8) automatically implies Gauss’ law for magnetic fields (2.10). Thus, it suffices to apply only two boundary conditions (2.12) and (2.13) when solving electromagnetic wave problems. 2.1.4 Constitutive Relations The electric and magnetic flux densities are related to the electric and magnetic field strengths via constitutive relations. The constitutive relations characterize the medium that is under study. The simplest constitutive relations are for a linear and isotropic medium, D = 𝜖E (2.16) B = 𝜇H (2.17) where the scalars 𝜖 and 𝜇 are the permittivity and permeability of the medium, respectively. In free space, 𝜖 = 𝜖0 ≈ 8.85 × 10−12 farad/m and 𝜇 = 𝜇0 = 4𝜋 × 10−7 henry/m. For a material, if its permeability is equal to 𝜇0 , then it is called nonmagnetic. A more complex constitutive relation is for a linear anisotropic medium, where 𝜖 and 𝜇 are 3 × 3 matrices. Other complex constitutive relations are beyond the scope of this book. It is worth mentioning the conducting medium, which is characterized by J = 𝜎E, where 𝜎 denotes the conductivity. The right-hand side of (2.7) can be rewritten as −i𝜔(𝜖 + i𝜎∕𝜔)E. Thus, we can define 𝜖 + i𝜎∕𝜔 as the complex permittivity and simply write it as complex-valued 𝜖, without arousing ambiguity. We often define relative permittivity 𝜖r = 𝜖∕𝜖0 , which is consequently also complex valued. Thus, both insulating material (𝜎 = 0) and conducting material (𝜎 ≠ 0) can be represented by relative permittivity. Since relative permittivity is often referred to as the dielectric constant, we use the term “dielectric material” to describe both insulating and conducting materials. For a perfect electric conductor (PEC), 𝜎 approaches infinity and thus PEC can be treated as a special dielectric material. 2.2 General Description of a Scattering Problem This section and the next three sections describe the electromagnetic scattering problem involving dielectric scatterers. The topic of perfect electric conductor will be discussed in Section 2.6. Consider a dielectric scatterer, as shown in Fig. 1.1, that is located otherwise in a homogenous background medium. For simplicity, let the homogenous background medium be free space (or more realistically, air). The scatterer is illuminated by a primary source, also known as the active source, located somewhere outside the scatterer. The fields E and H can be decomposed into two parts due to the principle of linear superposition. The first part is incident fields, Ei and Hi , generated by the primary source in the Fundamentals of Electromagnetic Wave Theory absence of the scatterer. The second part is scattered fields, Es and Hs , which are due to the presence of the scatterer. The fields in the immediate vicinity of the scatterer satisfy Maxwell’s equations in the presence of the scatterer, ∇ × H = −i𝜔𝜖E (2.18) ∇ × E = i𝜔𝜇H (2.19) The incident fields in the immediate vicinity of the scatterer satisfies Maxwell’s equations in the absence of the scatterer, ∇ × Hi = −i𝜔𝜖0 Ei i ∇ × E = i𝜔𝜇0 H i (2.20) i s (2.21) i s Since E = E + E and H = H + H , we find that (2.18)–(2.21) lead to ∇ × Hs = −i𝜔𝜖0 Es − i𝜔(𝜖 − 𝜖0 )E (2.22) ∇ × E = i𝜔𝜇0 H − [−i𝜔(𝜇 − 𝜇0 )H] (2.23) s s By comparing (2.22) and (2.7), we find the last term in (2.22) plays the role of electric current density, J = −i𝜔(𝜖 − 𝜖0 )E (2.24) The last term in (2.23) is mathematically equivalent to the magnetic current density, K = −i𝜔(𝜇 − 𝜇0 )H (2.25) Note that K does not physically exist, but instead is a concept of mathematical equivalence. The introduction of the magnetic current density makes Maxwell’s equation symmetric, which will be discussed in the next section. The electric current density (2.24) and the magnetic current density (2.25) are referred to as secondary source, induced source, or passive source. Equations (2.22) and (2.23) state that the scattered fields can be regarded as the radiated fields by secondary sources in free space. The task of finding radiation fields in free space will be presented in Section 2.4. Since the scatterer is distributed in a finite region, radiating in an unbounded space, boundary conditions must be imposed at infinity to ensure a unique solution. Such boundary conditions are called the radiation boundary conditions and require outgoing scattered fields. In a three-dimensional problem, where r = r̂r is the conventional spherical coordinate variable, radiation conditions take the form lim r(Es + r̂ × 𝜂0 Hs ) = 0 r→∞ (2.26) (2.27) lim r(H − r̂ × E ∕𝜂0 ) = 0 √𝜇 0 , with the unit ohm, is defined as the intrinsic impedance of where 𝜂0 = 𝜖 s s r→∞ 0 free space. 17 18 Electromagnetic Inverse Scattering 2.3 Duality Principle Before formulating the radiation fields in free space by an electric current or magnetic current, it is worth introducing the duality principle. After the introduction of the mathematical-equivalence concept of magnetic current density, Maxwell’s equations exhibit almost prefect symmetry, and consequently any equation describing electric or magnetic fields and sources can be used to directly arrive at a dual equation describing the complementary fields and sources. For example, under the following replacements, E → H, H → −E, J → K, K → −J, 𝜖 → 𝜇, 𝜇→𝜖 (2.28) Ampere’s law and Faraday’s law are a dual pair and one can be derived from the other, ∇ × H = −i𝜔𝜖E + J (2.29) ∇ × E = i𝜔𝜇H − K (2.30) The constitutive relations (2.16) and (2.17) are also a dual pair and one can be derived from the other by this replacement. Since the replacements listed in (2.28) are sufficient within the scope of this book, other replacements, such as charge density, will not be discussed. 2.4 Radiation in Free Space As presented in Section 2.2, scattered fields can be regarded as the radiated fields in free space by induced electric and magnetic currents. This section is devoted to the task of finding radiation fields in free space. Due to the linear superposition principle, it is sufficient to separately consider the radiating fields due to electric current and magnetic current. First, we consider the case where only electric current exists in free space. From Maxwell’s equations, ∇ × H(r) = −i𝜔𝜖0 E(r) + J(r) (2.31) ∇ × E(r) = i𝜔𝜇0 H(r) (2.32) we eliminate H, by taking the curl of (2.32) and then using (2.31), and obtain the vector wave equation, (2.33) ∇ × ∇ × E(r) − k02 E(r) = i𝜔𝜇0 J(r), √ where k0 = 𝜔 𝜇0 𝜖0 is the wavenumber in free space. The unit of k0 is rad/m, and it can be proven that k0 = 2𝜋∕𝜆0 , where 𝜆0 is the wavelength in free space. For an arbitrary electric current distribution J(r), it is convenient to calculate Fundamentals of Electromagnetic Wave Theory its radiation fields by using the concept of the dyadic Green’s function G(r, r′ ), which is defined to satisfy ∇ × ∇ × G(r, r′ ) − k02 G(r, r′ ) = I𝛿(r − r′ ) (2.34) where I is a unit dyad that can be represented by a unit diagonal matrix. The operation of I on any vector yields the vector itself. Roughly speaking, the dyadic Green’s function can be treated as a vector version impulse response function. Through the superposition principle for linear problems, the radiation fields by the current distribution J(r) can be formulated as the convolution of the dyadic Green’s function with J(r), E(r) = i𝜔𝜇0 ∫∫∫ G(r, r′ ) ⋅ J(r′ )dr′ The explicit expression of the dyadic Green’s function is given by [ ] 1 ′ G(r, r ) = I + 2 ∇∇ g(r, r′ ) k0 (2.35) (2.36) where the scalar Green’s function g(r, r′ ) satisfies the following differential equation, (∇2 + k02 )g(r, r′ ) = −𝛿(r − r′ ) (2.37) The scalar Green’s function can be treated as an impulse response function, and its explicit expression is given by eik0 |r−r | 4𝜋|r − r′ | ′ g(r, r′ ) = (2.38) The uniqueness of the solution to (2.37) is ensured by the radiation condition, also known as the Sommerfeld radiation condition, [ ] 𝜕g(r, r′ ) ′ lim r (2.39) − ik0 g(r, r ) = 0 r→∞ 𝜕r which represents an outgoing wave. For convenience to use in later chapters, the closed-form elements of the 3 × 3 matrix G(r, r′ ) are provided here, ) [( i 1 𝛿u,𝑣 1+ − Gu𝑣 (r, r′ ) =g(r, r′ ) k0 R k02 R2 ( )] Ru R𝑣 3i 3 1+ (2.40) − 2 − R k0 R k02 R2 where u, 𝑣 = 1, 2, 3, R = r − r′ and R = |R|. 19 20 Electromagnetic Inverse Scattering Once the radiated electric field is obtained from (2.35), the magnetic field is consequently deduced from (2.32), H(r) = ∇ × ∫∫∫ = ∫∫∫ = ∫∫∫ G(r, r′ ) ⋅ J(r′ )dr′ (2.41) ∇ × [Ig(r, r′ ) ⋅ J(r′ )]dr′ [∇g(r, r′ ) × I] ⋅ J(r′ )dr′ where the vector identity ∇ × ∇f = 0 for an arbitrary scalar function f is used. Note that r and r′ are different coordinate systems, so that the ∇× operator can be moved inside the integral. For convenience to use in later chapters, the closed-form elements of the 3 × 3 matrix ∇ × G(r, r′ ), equivalently ∇g(r, r′ ) × I, is provided here, 0 ⎡ ⎢ (z − z′ ) ′ ∇ × G(r, r ) = ⎢ −(y − y′ ) ⎢ ⎣ −(z − z′ ) (y − y′ ) ⎤ ( ) ik0 0 −(x − x′ ) ⎥ 1 ′ ) − g(r, r ⎥ (x − x′ ) 0 R R2 ⎥ ⎦ (2.42) Next, we consider the radiation fields when only the magnetic current exists in free space. The answer can be found by duality relationships. The dual equations to (2.35) and (2.41) are, respectively, H(r) = i𝜔𝜖0 E(r) = ∫∫∫ ∫∫∫ G(r, r′ ) ⋅ K(r′ )dr′ [−∇ × G(r, r′ )] ⋅ K(r′ )dr′ (2.43) (2.44) Now we have found the expressions of the radiation fields in free space by electric and magnetic currents. 2.5 Volume Integral Equations for Dielectric Scatterers From the relationship between the scattered fields and induced currents, (2.22) and (2.23), we are able to directly arrive at the following expressions of the scattered fields by using the concept of dyadic Green’s function that was introduced in the previous section 2.4, E(r) − Ei (r) = i𝜔𝜇0 + ∫∫∫ ∫∫∫ G(r, r′ ) ⋅ J(r′ )dr′ [−∇ × G(r, r′ )] ⋅ K(r′ )dr′ (2.45) Fundamentals of Electromagnetic Wave Theory H(r) − Hi (r) = i𝜔𝜖0 + ∫∫∫ ∫∫∫ G(r, r′ ) ⋅ K(r′ )dr′ [∇ × G(r, r′ )] ⋅ J(r′ )dr′ (2.46) It is important to note that the right-hand sides cannot be calculated yet since the induced electric current density (2.24) and magnetic current density (2.25) depend on the electric field E and magnetic field H, respectively, which are the unknowns to be determined, however. Instead, we should treat (2.45) and (2.46) as volume integral equations for the unknowns E(r) and H(r) where r is inside scatterer. Equations (2.45) and (2.46) are referred to as the electric field integral equation (EFIE) and the magetnic field integral equation (MFIE), respectively. In the special case in which the scatterer is nonmagnetic, that is, 𝜇 = 𝜇0 , then the induced magnetic current vanishes, leaving EFIE and MFIE as E(r) − Ei (r) = i𝜔𝜇0 H(r) − Hi (r) = G(r, r′ ) ⋅ J(r′ )dr′ (2.47) [∇ × G(r, r′ )] ⋅ J(r′ )dr′ (2.48) ∫∫∫ ∫∫∫ respectively. It is obvious that the EFIE (2.47) involves only E as the unknown since J = −i𝜔(𝜖 − 𝜖0 )E. By the relationship of E and H that is shown in (2.18), we have J = (1 − 1∕𝜖r )∇ × H so that the MFIE (2.48) can be rewritten such that it involves only H as the unknown. 2.6 Surface Integral Equations for Perfectly Conducting Scatterers After presenting the scattering problem for dielectric scatterers, we turn to the scattering problem for scatterers made of perfectly electrically conducting materials. Consider a PEC scatterer, occupying a space D in free space, with the closed boundary 𝜕D that is illuminated by a primary source. Since electromagnetic waves cannot penetrate PEC materials, the electric and magnetic fields inside the PEC scatterer are identically zero. Consequently, the boundary conditions (2.12) and (2.13) reduce to n̂ × H = Js (2.49) n̂ × E = 0 (2.50) where the normal direction n̂ points from the PEC scatterer into free space. Thus, the surface electric current with density Js is induced on the PEC boundary, and there is no induced surface magnetic current. 21 22 Electromagnetic Inverse Scattering Following the same procedure presented in Section 2.5, we can derive the following surface integral equations from (2.49) and (2.50), { } [∇ × G(r, r′ )] ⋅ Js (r′ )dr′ = Js (2.51) n̂ × Hi + ∫ ∫𝜕D+ { } n̂ × Ei + i𝜔𝜇0 G(r, r′ ) ⋅ Js (r′ )dr′ = 0 (2.52) ∫ ∫𝜕D where the 𝜕D+ denotes an surface at an infinitesimal distance outside of the scatterer surface 𝜕D. Equations (2.52) and (2.51) are referred to as the surface EFIE and surface MFIE, respectively. The uniqueness of the solution to surface EFIE and surface MFIE is discussed in detail in chapter 6 of [4]. We mention in passing that for infinitesimally thin open PEC scatterers, the original boundary condition (2.12) should be used since either side of PEC scatterers is not necessarily zero. 2.7 Two-Dimensional Scattering Problems The electromagnetic radiation and scattering problems discussed in Sections 2.4–2.6 are general three-dimensional problems. A special type of three-dimensional problem is those with all physical parameters invariant in one direction. Throughout this text, we let the direction of invariance be in the z direction, and we use the term “cylinder” to denote structures whose parameters are invariant along the z-axis. All physical parameters are functions of x and y. Thus, this special physically three-dimensional problem is referred to as a mathematically two-dimensional problem. All conclusions drawn in Sections 2.4–2.6 can be directly, or after minor modifications, applied to two-dimensional problems. Since 𝜕∕𝜕z = 0, the ∇ becomes 𝜕∕𝜕xx̂ + 𝜕∕𝜕ŷy, which can be written as ∇t in shorthand, where the subscript t means “transverse.” Since the source is also invariant along the z-axis, the integration of the three-dimensional scalar Green’s function (2.38) along the whole z-axis leads to the two-dimensional scalar Green’s function, i (2.53) g(r, r′ ) = H0(1) (k0 |r − r′ |) 4 where H0(1) (⋅) is the zeroth order Hankel function of the first kind. It is usually convenient to decompose the fields into transverse electric (TE) and transverse magnetic (TM) parts. Whether a field is a TE or TM case depends on whether an electric or magnetic field is transverse to a chosen reference. The reference chosen here is the z-axis, and consequently the TE case means that the electric field is transverse to the z-axis, that is, the z Fundamentals of Electromagnetic Wave Theory component of the electric field is absent, whereas the TM case means that the magnetic field is transverse to the z-axis. Before solving scattering problems, it is important to first discuss radiation problems. The z component of the electric current density J generates the TM component, and the transverse components of J generate the TE components. Consequently, (2.35) is decomposed into g(r, r′ )̂zẑ ⋅ J(r′ )dr′ ] [ 1 I 2 + 2 ∇t ∇t g(r, r′ ) ⋅ [I 2 ⋅ J(r′ )]dr′ ETE (r) = i𝜔𝜇0 ∫∫ k0 ETM (r) = i𝜔𝜇0 ∫∫ (2.54) (2.55) and (2.41) is decomposed into HTM (r) = HTE (r) = ∫∫ ∫∫ ∇t g(r, r′ ) × [̂zẑ ⋅ J(r′ )]dr′ (2.56) ∇t g(r, r′ ) × [I 2 ⋅ J(r′ )]dr′ (2.57) We observe that, for the TM case, the electric field only has the z component, whereas the magnetic field only has the transverse component. For the TE case, the magnetic field only has the z component, whereas the electric field only has the transverse component. For radiation by magnetic current density K, the electric and magnetic fields can be obtained via the duality relationship. Now we consider a nonmagnetic dielectric 2D scatterer. For the TM case, the induced electric current is along the z direction and there is no magnetic current. Consequently, the EFIE (2.47) has only the z component and the corresponding scalar equation is Ez (r) − Ezi (r) = k02 ∫∫ g(r, r′ )[𝜖r (r′ ) − 1]Ez (r′ )dr′ (2.58) The MFIE is seldom used to solve the TM scattering problem. For the TE case, the induced electric current is in the transverse plane and there is no magnetic current. The vectorial property of the induced electric current makes the equation more complex than (2.58) no matter whether the EFIE or the MFIE is used. For the EFIE, we extract the x and y components of (2.47) where the right-hand side is given by (2.55). For the MFIE, we extract the z component of (2.48), where the right-hand side is given by (2.57). The above discussions about the nonmagnetic dielectric scatterer are also applicable to the PEC cylinder scattering problem. It is worth noting that, in the TE case, the induced transverse electric current follows on the surface of the PEC cylinder, which consequently means that the current flow direction is perpendicular to both the z and the n̂ directions; that is, tangential to the surface of the PEC scatterer. 23 24 Electromagnetic Inverse Scattering Finally, we mention in passing that, in the two-dimensional case, the Sommerfeld radiation conditions for scattered fields are given by ( s ) √ 𝜕Ez lim 𝜌 (2.59) − ik0 Ezs = 0 𝜌→∞ 𝜕𝜌 ( s ) √ 𝜕Hz lim 𝜌 (2.60) − ik0 Hzs = 0 𝜌→∞ 𝜕𝜌 for the TM and TE cases, respectively, where 𝜌 is the radial variable in cylindrical coordinates. 2.8 Scattering by Small Scatterers It is important to analyze scattering by small particles, which is often referred to as Rayleigh scattering. When the size of a scatterer is much smaller than the wavelength, then the scattering problem is in the quasistatic regime and the scattered field can be well approximated by the lowest orders of multipole expansion. 2.8.1 Three-Dimensional Case For dielectric small particles, Rayleigh scattering results from the electric polarizability of the particles. The oscillating electric field of incident wave acts on the charges within a particle, causing them to move at the same frequency. The particle therefore becomes a small radiating electric current dipole that radiates what we see as a scattered field. The induced electric current dipole Il depends on the permittivity, size, and shape of the small particle, and is related to the incident electric field E by Il = 𝜉 ⋅ E (2.61) where 𝜉 is in general a 3 × 3 matrix, which is called the electric polarization tenor, the polarization strength, or the depolarization factor. Note that the incident electric field E (as well as the incident magnetic field H) is nearly constant over the particle’s volume. For example, for a small spherical particle of radius a, with isotropic permittivity 𝜖, the electric polarization tenor can be solved by electrostatic principles (section 6.1 of [1]), 1 𝜖 − 𝜖0 𝜉 = −i4𝜋k0 a3 I , (2.62) 𝜂0 𝜖 + 2𝜖0 3 where I 3 is a three-dimensional identity matrix. That is, the electric polarization tenor is a scalar for an isotropic sphere. The scattered fields Es (r) and Hs (r) at Fundamentals of Electromagnetic Wave Theory position r, which are the reradiated fields by the induced electric current dipole at position r0 , have the analytical expressions (section 4.3 of [1]), ) )] [( ( RR i 3i 1 3 s Il − 2 ⋅ Il 1 + E (r) = i𝜔𝜇0 g(r, r0 ) 1 + − − k0 R k02 R2 R k0 R k02 R2 (2.63) ( ) ik0 1 (2.64) − 2 Hs (r) = R × Il g(r, r0 ) R R where R = r − r0 and R = |R|. In fact, these reradiated fields can be also derived from the general radiation formula given in Section 2.4. Since the size of scatterer is much smaller than the wavelength, we can treat it centered at r0 and consequently the integral (2.35) and (2.41) are carried out over a small volume V0 centered at r0 . When the observation point r is sufficiently far, compared with the size of the scatterer, from the scatterer, (2.35) and (2.41) are simplified to be Es (r) = i𝜔𝜇0 G(r, r0 ) ⋅ Hs (r) = ∇g(r, r0 ) × ∫ ∫ ∫V0 ∫ ∫ ∫V0 J(r′ )dr′ J(r′ )dr′ (2.65) (2.66) respectively. By comparing (2.63–2.66) with the closed-form expressions of G(r, r0 ) (shown in (2.40)) and ∇g(r, r0 )× (shown in (2.42)), we find that the electric current dipole moment is in fact defined as Il = ∫ ∫ ∫V 0 J(r′ )dr′ (2.67) which has the unit ampere ⋅ meter. Consequently, the unit of the electric polarization tensor 𝜉, defined in (2.61), is meter square per ohm. For magnetic small particles, magnetic current dipoles will be induced by a time-harmonic magnetic field due to the magnetization process in the material associated with the atomic scale current loops. The induced magnetic current dipole Kl is related to the incident magnetic field H by the magnetic polarization tensor 𝜁, Kl = 𝜁 ⋅ H (2.68) The unit of Kl is volt ⋅ meter and the unit of 𝜁 is meter square ⋅ ohm. For example, for a small spherical particle of radius a, with isotropic permeability 𝜇, the magnetic polarization tenor can be solved by magnetostatic principles 25 26 Electromagnetic Inverse Scattering (sections 5.10 and 5.11 of [6]), 𝜇 − 𝜇0 𝜁 = −i4𝜋k0 a3 𝜂0 I , 𝜇 + 2𝜇0 3 (2.69) which is in fact the dual of (2.62). The scattered electric and magnetic fields, which are the reradiated fields by the induced magnetic current dipole, can be directly written out from (2.63) and (2.64) by duality, ) )] [( ( RR i 3i 1 3 s Kl − 2 ⋅ Kl 1 + H (r) = i𝜔𝜖0 g(r, r0 ) 1 + − − k0 R k02 R2 R k0 R k02 R2 (2.70) ( ) ik0 1 (2.71) − 2 Es (r) = −R × Kl g(r, r0 ) R R For small PEC scatterers, both electric and magnetic current dipoles are induced, due to the polarization of surface charge density and the circulation of surface current, which is different from the volumetric behavior for the cases of dielectric and magnetic scatterers. The electric and magnetic polarization tensors of a small spherical PEC scatterer are 1 I 𝜂0 3 (2.72) 𝜁 = +i2𝜋k0 a3 𝜂0 I 3 (2.73) 𝜉 = −i4𝜋k0 a3 respectively. We briefly mention the electric and magnetic polarization tensors of some frequently seen small scatterers. For anisotropic spheres, the electric and magnetic polarization tensors are (section 5.6 of [5]) [ (1) ] 𝜖 − 𝜖0 𝜖 (2) − 𝜖0 𝜖 (3) − 𝜖0 1 𝜉 = −i4𝜋k0 a3 ⋅ diag (1) , (2) , (3) (2.74) 𝜂0 𝜖 + 2𝜖0 𝜖 + 2𝜖0 𝜖 + 2𝜖0 [ (1) ] 𝜇 − 𝜇0 𝜇(2) − 𝜇0 𝜇(3) − 𝜇0 3 𝜁 = −i4𝜋k0 a 𝜂0 ⋅ diag (1) , , (2.75) 𝜇 + 2𝜇0 𝜇(2) + 2𝜇0 𝜇(3) + 2𝜇0 respectively, where 𝜖 (1) , 𝜖 (2) , and 𝜖 (3) (𝜇(1) , 𝜇(2) , and 𝜇(3) ) are the diagonal values of permittivity (permeability) tensor. The electric and magnetic polarization tensors for a needle made of PEC is given by ([8]) [ ] 3 a k0 8𝜋 4𝜋 8𝜋 1 𝜉 = −i ⋅ diag a b2 , a b2 , (2.76) 𝜂0 3 1 1 3 1 1 3 ln(a1 ∕b1 ) ] [ 8𝜋 8𝜋 4𝜋 (2.77) 𝜁 = −ik0 𝜂0 ⋅ diag − a1 b21 , − a1 b21 , − a1 b21 . 3 3 3 Since a1 ∕b1 ≫ 1, the induced electric dipole along the needle direction is much more dominant than other electric dipoles and all magnetic dipoles. Fundamentals of Electromagnetic Wave Theory The electric and magnetic polarization tensors for a disk made of PEC is given by ([8]) ] [ k 16 3 16 3 4𝜋 2 (2.78) 𝜉 = −i 0 ⋅ diag a2 , a2 , a2 b 2 , 𝜂0 3 3 3 ] [ 4𝜋 4𝜋 8 (2.79) 𝜁 = −ik0 𝜂0 ⋅ diag − a22 b2 , − a22 b2 , − a32 , 3 3 3 Since a2 ∕b2 ≫ 1, two components of induced electric dipoles, both of which are in the plane of the disk, and one component of induced magnetic dipoles that is aligned with the normal direction of the disk, are far more dominant than other components of electric and magnetic dipoles. 2.8.2 Two-Dimensional Case For a two-dimensional small scatterer, its cross section in the xy plane is a small area A0 . The induced sources are defined in a way similar to (2.67), Il = ∫ ∫A0 J(r′ )dr′ (2.80) However, the physical meaning is different from the three-dimensional case. The z component of Il is a two-dimensional monopole and the x, y components are two-dimensional dipoles. The z component and the x, y components of the current generate TM and TE waves, respectively, where the formula of the electric and magnetic fields are given in (2.54)–(2.57). The electric and magnetic polarization tensors, 𝜉 and 𝜁, can be defined in the same way as in the three-dimensional case. Here, we list the electric and magnetic polarization tensors of some commonly seen two-dimensional scatterers. For a small circular anisotropic dielectric cylinder, with radius a and permittivity tensor diag[𝜖 (1) , 𝜖 (2) , 𝜖 (3) ], the electric polarization tensor is given by [ (1) ] 𝜖 − 𝜖0 𝜖 (2) − 𝜖0 𝜖 (3) − 𝜖0 −i2𝜋k0 a2 𝜉= diag (1) , (2) , (2.81) 𝜂0 2𝜖0 𝜖 + 𝜖0 𝜖 + 𝜖0 The expression of 𝜁 can be obtained by duality. Obviously, (2.81) is applicable to circular isotropic dielectric cylinder as well. For a small elliptic isotropic dielectric cylinder, the electric polarization tensor is given by 𝜉= −i𝜋k0 a2 cosh u0 sinh u0 diag 𝜂0 [ ] eu0 (𝜖 − 𝜖0 ) eu0 (𝜖 − 𝜖0 ) 𝜖 − 𝜖0 , , 𝜖 sinh u0 + 𝜖0 cosh u0 𝜖 cosh u0 + 𝜖0 sinh u0 𝜖0 (2.82) where a is the distance between its local origin and either foci and u0 defines the contour of the ellipse. The expression of 𝜁 can be obtained by duality. 27 28 Electromagnetic Inverse Scattering For a small circular PEC cylinder, the radius of which is a, the polarization tensors are given by [ ] −i2𝜋 1 𝜉= diag k0 a2 , k0 a2 , , (2.83) 𝜂0 k0 ln(k0 a) 𝜁 = i𝜋k0 𝜂0 a2 diag[2, 2, 1], (2.84) In these three examples for the 2D case, the z component of 𝜉 and the x and y components of 𝜁 are for the TM case, and the z component of 𝜁 and the x and y components of 𝜉 are for the TE case. 2.8.3 Scattering by a Collection of Small Scatterers Suppose there are M three-dimensional small scatterers illuminated by a time-harmonic electromagnetic wave. The centers of the scatterers are located at r1 , r2 , … , rM , and their polarization tenors are 𝜉 m and 𝜁 m , m = 1, 2, … , M. When multiple scattering between scatterers are taken into account, the total incident field Et (rm ) (Ht (rm )) upon the mth scatterer includes both the incident field directly from antennas Ei (rm ) (Hi (rm )) and the scattered fields from other scatterers. The total incident fields are governed by the Foldy–Lax equation, ∑ {i𝜔𝜇0 G(rm , rm′ ) ⋅ 𝜉 m′ ⋅ Et (rm′ ) Et (rm ) = Ei (rm ) + m′ ≠m − ∇g(rm , rm′ ) × [𝜁 m′ ⋅ Ht (rm′ )]} Ht (rm ) = Hi (rm ) + ∑ (2.85) {i𝜔𝜖0 G(rm , rm′ ) ⋅ 𝜁 m′ ⋅ Ht (rm′ ) m′ ≠m + ∇g(rm , rm′ ) × [𝜉 m′ ⋅ Et (rm′ )]} (2.86) Thus, the unknowns Et (rm ) and Ht (rm ), m = 1, 2, … , M, can be solved from the linear equation systems (2.85) and (2.86), where the number of scalar unknowns and the number of scalar equations are both 6M. 2.8.4 Degrees of Freedom Since scattered field is the reradiated field by induced sources, the degrees of freedom of the scattered field are equal to the degrees of freedom of induced sources. For example, a small nonmagnetic dielectric sphere is able to provide three electric dipoles, whereas a small magnetic dielectric sphere provides three electric and three magnetic dipoles. A small PEC sphere is also able to provide three electric and three magnetic dipoles. A small PEC circular cylinder provides a single dominant source, that is, the monopole of the z-direction electric current, when it is under TM illumination, whereas it provides three dominant sources, that is, two electric dipoles in the xy plane and one magnetic monopole Fundamentals of Electromagnetic Wave Theory in the z direction, when it is under TE illumination. This information is of great importance in solving inverse scattering problems involving small scatterers, since the degrees of freedom of induced sources can be directly inferred from the measured scattering data. Consequently, the number of small scatterers might be accurately estimated if certain a priori information is available. 2.9 Scattering by Extended Scatterers For scattering by extended scatterers, there is no close-form solution except for few special geometries and, consequently, we have to resort to numerical approaches. This section does not intend to present an in-depth treatment of computational methods, but instead to provide the formula of discrete linear equation systems that can be directly used to solve scattering problems. Readers are referred to [4, 9, 10] for in-depth treatments of computational electromagnetics. We first deal with nonmagnetic dielectric scatterers and then deal with PEC scatterers. 2.9.1 Nonmagnetic Dielectric Scatterers Consider an extended nonmagnetic dielectric scatterer. It is isotropic and the distribution of its relative permittivity is 𝜖r (r). It is discretized into M small cells and the permittivity within each cell can be considered to be homogenous. By “small,” the rule of thumb is that the maximum linear extent of each cell is no larger √ than one-tenth of the wavelength of the medium inside the cell; that is, 𝜆0 ∕ 𝜖r , where 𝜆0 is the wavelength in free space. First, we introduce the method of moments (MoM), which is also referred to as the weighted-residual method. The solutions of differential or integral equations are assumed to be well approximated by a finite sum of basis functions. Since the solution is approximate, the original equation will not be satisfied exactly and we will be left with a residual. The MoM tries to minimize the residual in a weighted average sense, with respect to certain chosen weighting functions (also known as testing functions). For a 2D TM scattering problem, both the electric field and the induced current are along the z direction and consequently the EFIE becomes a scalar equation as shown in (2.58). It is convenient to rewrite the equation in terms of the current J = −i𝜔(𝜖 − 𝜖0 )E. The cross section of of the scatterer is divided into square cells, whose area is denoted as S. Applying the pulse basis function and the delta test function, we obtain the following M × M linear equation system, i E =Z⋅J i (2.87) where E = [Ezi (r1 ), Ezi (r2 ), … , Ezi (rM )]T is an M-dimensional column vector, consisted of the incident electric field evaluated at the center of each cell, 29 30 Electromagnetic Inverse Scattering where the superscript T denotes the transpose operator. The M-dimensional column vector J is defined in a similar way. The M × M matrix Z has the following entries, Zm,m′ 𝜂 𝜋a ⎧ 0 J1 (k0 a)H (1) (k0 |rm − rm′ |), if m ≠ m′ 0 ⎪ 2 =⎨ i𝜂0 𝜖r (rm ) 𝜂 𝜋a ⎪ 0 H1(1) (k0 a) + , if m = m′ ⎩ 2 k0 (𝜖r (rm ) − 1) (2.88) √ where a = S∕𝜋 is the radius of the circle of the same area of the square cell. Once the J is obtained from (2.87), the scattered field is then directly evaluated from (2.54). The application of the pulse basis function and delta testing function to 2D TE case and 3D case can be found in sections 2.6 and 10.11 of [4], respectively. The limitations of the pulse basis function and delta testing function are also discussed in these two sections. Other choices of basis and testing functions can be found in chapters 5 and 9 of [4]. For a small scale problem, (2.87) can be solved by a direct matrix inversion. However, for large scale problems, it is computational costly to apply a direct matrix inversion since its computational complexity is O(M3 ). Instead, the linear equation can be solved by iterative methods, such as the conjugate gradient (CG) method (see Appendix C), where the computational complexity in each iteration is O(M log M) if the fast Fourier transform (FFT) is used to evaluate the matrix-vector product (see Appendix D). Next, we introduce the coupled dipole method (CDM), which is also known as the discrete dipole approximation (DDA) [11]. In this method, the volume of the scatterer is divided into small cells and scattered field is considered to be the superposition of reradiation of induced dipoles. The dipole moment is derived from the original EFIE (2.47). It is important to note that the CDM is based on the concept of an exciting field rather than the actual field. The exciting field for a cell refers to the total field incident upon the cell, consisting of the original incident field coming directly from transmitters and the scattered field coming from all other cells. For a cell, the exciting field coming from other cells is derived from the original EFIE (2.47) by moving the cell’s self-contribution term on the right-hand side of (2.47) to the left-hand side. The dipole moment induced within a cell is the product of polarization tensor (also known as depolarization tensor) and the exciting field, which is exactly the topic of Section 2.8. Thus, from this point of view, compared with the MoM, the CDM is easier to learn and implement since the singular integral present in the cell’s self-contribution term has been automatically considered in the polarization tensor that was introduced in Fundamentals of Electromagnetic Wave Theory Section 2.8. For a 2D TM scattering problem, the linear equation system is given by ∑ i𝜔𝜇0 g(rj , rm )𝜉m Ezt (rm ) (2.89) Ezt (rj ) = Ezi (rj ) + m≠j for j = 1, 2, … , M. The 𝜉m for the mth cell is the third component of the polarization tensor (2.81). Thus, the M unknowns Ezt (rj ) can be solved by M linear equations. For a 2D TE scattering problem, the linear equation system is given by ∑ i𝜔𝜇0 G(rj , rm ) ⋅ 𝜉 m ⋅ Et (rm ) (2.90) Et (rj ) = Ei (rj ) + m≠j for j = 1, 2, … , M. The 𝜉 m for the mth cell is the first two components of −i2𝜋k a2 𝜖 −𝜖 the polarization tensor (2.81), that is, 𝜉 m = 𝜂 0 𝜖m +𝜖0 I 2 for the isotropic 0 m 0 medium. The 2M unknowns Ext (rj ) and Eyt (rj ) can be solved from the 2M linear equations. For a 3D scattering problem, the linear equation system has the same format as (2.90), except that a 3D Green’s function is used and 𝜉 m is given by (2.62). In fact, the equation system is just (2.85), with 𝜁 = 0 for nonmagnetic materials. The 3M unknowns Et (rj ), j = 1, 2, … , M, can be solved from the 3M linear equations. It has been proven in [12] that the CDM is equivalent to the MoM that employs a pulse basis function and delta testing function. For an extensive review of the CDM (or equivalently, the DDA), including both theoretical and computational aspects, the reader is referred to [12, 13] and references therein. 2.9.2 Perfectly Electrically Conducting Scatterers We consider a 2D TM PEC scattering problem. Since both the electric field and the induced current are in the z direction, the EFIE (2.52) becomes a scalar equation. The integral over the boundary is now along a closed loop 𝜕D, so that the reduced EFIE reads Ei (r) + i𝜔𝜇0 ∫𝜕D g(r, r′ ) ⋅ J(r′ )dr′ = 0 (2.91) The boundary 𝜕D is discretized into a total number of M small line cells, with the center of them being at rm , m = 1, 2, … , M. Define the following M-dimensional vectors: the vector of induced current deni sity J = [J(r1 ), J(r2 ), … , J(rM )]T and the vector of incident field E = [Ei (r1 ), Ei (r2 ), … , Ei (rM )]T . Applying the pulse basis function and the delta test function, we obtain the following M-dimensional linear equation system, i E =Z⋅J (2.92) 31 32 Electromagnetic Inverse Scattering where the M × M matrix Z has the entries Zm,m′ ⎧ k𝜂𝑤 ⎪ if m ≠ m′ H0(1) (k|rm − rm′ |), ⎪ 4 { [ ( ) ]} =⎨ ⎪ k𝜂𝑤 1 + i 2 ln 𝛾k𝑤 − 1 , if m = m′ ⎪ 4 𝜋 4 ⎩ (2.93) where 𝑤 is the length of the line element, and 𝛾 ≈ 1.781. The M-dimensional unknown J can be solved from (2.92), which can be then used in (2.54) to calculate the scattered field. 2.10 Far-Field Approximation When the observation point is very far away from the source, approximations can be made in the evaluation of radiated fields in the far zone. The source, either active or induced source, is assumed to be located in a locally finite domain. By “far away,” we mean the distance of the observation point r = r̂r to the source is much larger than the wavelength 𝜆0 , or equivalently k0 r ≫ 1. It is convenient to first introduce the concept of angular spectrum representation of electromagnetic fields in a homogenous medium. The electric field E in free space, as an example of a homogenous medium, satisfies the vector Helmholtz equation, (∇2 + k02 )E = 0. (2.94) In any plane where the z coordinate is a constant, the two-dimensional Fourier transform of the field E is represented as ∞ ∞ ̂ x , ky ; z) = 1 E(k E(x, y, z)e−i(kx x+ky y) dxdy 4𝜋 2 ∫−∞ ∫−∞ (2.95) The inverse Fourier transform reads as ∞ E(x, y, z) = ∞ ∫−∞ ∫−∞ ̂ x , ky ; z)ei(kx x+ky y) dkx dky E(k (2.96) Plugging (2.96) into (2.94), we find that the Fourier spectrum Ê evolves along the z-axis as ̂ x , ky ; z) = E(k ̂ x , ky ; 0)e±ikz z E(k where the wavenumber along the z direction is defined as ⎧ √ 2 k0 − kx2 − ky2 k02 − kx2 − ky2 ≥ 0 ⎪ kz = ⎨ √ ⎪ i kx2 + ky2 − k02 k02 − kx2 − ky2 < 0 ⎩ (2.97) (2.98) Fundamentals of Electromagnetic Wave Theory This definition assures outgoing waves and a finite energy density at infinity. In the exponent in (2.96), the + sign refers to a wave propagating in the positive z direction and the − sign denotes a wave propagating in the negative z direction. Without loss of generality, we consider only the +z-going wave from here onward. Consequently, inserting the result of (2.97) into (2.96), we obtain ∞ E(x, y, z) = ∞ ∫−∞ ∫−∞ ̂ x , ky ; 0)ei(kx x+ky y+kz z) dkx dky E(k (2.99) which is known as the angular spectrum representation; that is, any wave in a source free region can be represented by a superposition of plane waves. When the observation is in far zone, kz ≫ 1, the second type of the plane wave in (2.98), referred to as the evanescent wave, exponentially decays and thus does not contribute to the far field. The first type of the plane wave in (2.98), referred to as the travelling wave or propagation wave, is able to reach to far field. Thus, the domain of integral in (2.99) is reduced kx2 + ky2 ≤ k02 . The asymptotic behavior of the double integral as kr ≫ 1 can be evaluated by the method of stationary phase (section 3.3 of [14]), where the fast oscillation of the phase cancels out the integrand everywhere except at the spectral point where the phase is stationary. It turns out that the stationary phase occurs at the spectral point satisfying kx ∕x = ky ∕y = k0 ∕r. If the wave vector k is written ̂ then the stationary phase occurs at as k0 k, k̂ = r̂ (2.100) which applies that at the far zone r = r̂r, the field consists of only a single plane wave with the propagation direction identical to the observation direction. This result is of great significance, since several important conclusions can be derived from it. • Since the observation is in far zone, the receiver senses a locally plane wave within its finite neighborhood, just like we feel flat ground at a local level due to the large radius of the Earth. In fact, the statement that the far field is an outward going locally plane wave is just the radiation boundary conditions formulated in (2.26) and (2.27). • Since both the electric and magnetic fields of a plane wave are perpendicular ̂ we conclude that the electric and magnetic to the propagation direction k, fields in far zone do not have the radial component, considering the fact that k̂ = r̂ . In other words, in spherical coordinate systems, the electric and magnetic fields in the far zone only have the 𝜃̂ and 𝜙̂ components. ̂ no matter whether it rep• For a plane wave, the ∇ can be replaced by k0 k, resents the curl, divergence, or gradient. This replacement greatly simplifies the far-field expression of the electric field in (2.35). Finally, we provide the far-zone field radiated by an electric current dipole that is located at r0 . Considering the far field condition k0 r ≫ 1 and 33 34 Electromagnetic Inverse Scattering |r − r0 | ≈ r − r̂ ⋅ r0 , we simplify the electric current dipole radiation equation (2.63) to eik0 r −ik0 r̂ ⋅r0 (Il − r̂ r̂ ⋅ Il) e 4𝜋r which can be also written as Es (r) = i𝜔𝜇0 Es (r) = −i𝜔𝜇0 eik0 r −ik0 r̂ ⋅r0 r̂ × r̂ × Il e 4𝜋r (2.101) 2.11 Reciprocity In the radiation or scattering of electromagnetic waves, the background medium in which an electromagnetic wave propagates plays an important role. One of the properties of the background medium is the reciprocity condition, which is an important concept that will be frequently used in this book, such as in Section 2.12, and Chapters 3 and 9. Consider a source a, denoted as Ja and Ka , illuminated by a field Eb and Hb that is generated by the source b, denoted as Jb and Kb . The reaction of the source a with the field b is defined as ⟨a, b⟩ = ∫ ∫ ∫V Ja ⋅ Eb − Ka ⋅ Hb dV (2.102) The reaction can be thought of as generalized measurements. A medium is said to be reciprocal, if it satisfies ⟨a, b⟩ = ⟨b, a⟩ (2.103) It can be proven that isotropic medium, with both 𝜖(r) and 𝜇(r) being scalar, is reciprocal. The purpose of this section is mainly to present the Green’s function representation of reciprocity condition. In an isotropic medium, with the distribution of permittivity 𝜖(r) and permeability 𝜇(r). The electric field is related to the electric source by the vector wave equation, [ ] 1 ∇× (2.104) ∇ × E(r) − k02 𝜖r (r)E(r) = i𝜔𝜇0 J(r) 𝜇r (r) We define the electric Green’s function GE (r, r′ ) that satisfies ] [ 1 ∇× ∇ × GE (r, r′ ) − k02 𝜖r (r)GE (r, r′ ) = 𝛿(r − r′ )I 𝜇r (r) (2.105) Note that the physical meaning of GE is the same as the G that has been used in previous sections. The subscript E is added in order to differentiate the magnetic Green’s function to be introduced later. We easily see that the electric and Fundamentals of Electromagnetic Wave Theory magnetic fields generated by an electric current source are given by +∞ E(r) = i𝜔𝜇0 ∫ ∫ ∫−∞ GE (r, r′ ) ⋅ J(r′ )d3 r′ (2.106) +∞ H(r) = 1 ∇ × GE (r, r′ ) ⋅ J(r′ )d3 r′ ∫ ∫ ∫−∞ 𝜇r (r) (2.107) By duality, we define the magnetic Green’s function GM (r, r′ ) that satisfies [ ] 1 ′ ∇× (2.108) ∇ × GM (r, r ) − k02 𝜇r (r)GM (r, r′ ) = 𝛿(r − r′ )I 𝜖r (r) The magnetic and electric fields generated by a magnetic current source are given by +∞ H(r) = i𝜔𝜖0 ∫ ∫ ∫−∞ GM (r, r′ ) ⋅ K(r′ )d3 r′ (2.109) +∞ E(r) = −1 ∇ × GM (r, r′ ) ⋅ K(r′ )d3 r′ ∫ ∫ ∫−∞ 𝜖r (r) (2.110) Without derivation, we provide the following relationships between Green’s functions, which are implied by the reciprocity condition. T GE (r, r′ ) = GE (r′ , r) T GM (r, r′ ) = GM (r′ , r) 1 1 ∇ × GE (r, r′ ) = [∇′ × GM (r′ , r)]T 𝜇r (r) 𝜖r (r′ ) (2.111) (2.112) (2.113) where the superscript T denotes the transpose operator. 2.12 Huygens’ Principle and Extinction Theorem Huygens’ principle states that the electromagnetic fields in a source-free region V are completely determined by the tangential fields specified over the surface S enclosing V . The extinction theorem is a closely related theorem. Both of them are important in solving electromagnetic radiation and scattering problems. The derivation of the Huygens’ principle starts from the following two equations, ] [ 1 (2.114) ∇ × E(r) − k02 𝜖r (r)E(r) = i𝜔𝜇0 J(r), ∇× 𝜇r (r) [ ] 1 ∇× (2.115) ∇ × GE (r, r′ ) − k02 𝜖r (r)GE (r, r′ ) = 𝛿(r − r′ )I 𝜇r (r) 35 36 Electromagnetic Inverse Scattering After lengthy but simple vector manipulations, we arrive at ∫ ∫ ∫V − ∯S E(r′ ) ⋅ 𝛿(r − r′ )d3 r′ = i𝜔𝜇0 ∫ ∫ ∫V GE (r, r′ ) ⋅ J(r′ )d3 r′ ̂ ′ ) × H(r′ )] + GEM (r, r′ ) ⋅ [E(r′ ) × o(r ̂ ′ )]dS(r′ ), i𝜔𝜇0 GE (r, r′ ) ⋅ [o(r (2.116) where V is an arbitrarily chosen volume and its boundary is a closed surface ̂ GEM (r, r′ ) is the dyadic Green’s function, S with outward normal direction o. expressing the relationship of electric-field and magnetic-source, +∞ E(r) = ∫ ∫ ∫−∞ GEM (r, r′ ) ⋅ K(r′ )d3 r′ , (2.117) and it is related to the electric dyadic Green’s function by GEM (r, r′ ) = [ ]T −1 ′ ′ ∇ × G (r , r) , which can be seen from (2.110) and (2.113). E 𝜇r (r′ ) If we choose V to be an arbitrary space Vs that encloses all electric current sources, that is, its complementary space Vs f = ℝ3 \V is a source-free region, then we obtain ∯S ̂ ′ ) × H(r′ )] + GEM (r, r′ ) ⋅ [E(r′ ) × n(r ̂ ′ )]dS(r′ ) i𝜔𝜇0 GE (r, r′ ) ⋅ [n(r { E(r), if r ∈ source-free region = (2.118) 0, if r ∈ source region Note that the direction n̂ is from source region Vs to source-free region Vs f , as shown in Fig. 2.2. It is important to stress that if there are multiple sources, including both active and induced sources, we proceed with the linear superposition principle. When dealing with one of the sources, we let other sources be zero and then apply (2.118). We mention in passing that (2.118) will remain the same if the integration domain V in (2.116) is chosen as Vs f . z Source y Vs S0 n Vsf x Figure 2.2 Configuration for the derivation of Huygens’ principle: The space Vs encloses all electric current sources and its complementary space Vs f = ℝ3 \V is a source-free region. The direction n̂ is from source region Vs to source-free region Vs f . Fundamentals of Electromagnetic Wave Theory By duality, the magnetic counterpart of the surface integral (2.118) yields the exact magnetic field in the source free region and zero in the source region. The following discussions on (2.118) are worth emphasizing: 1) In the source free region, the electric field is uniquely determined by the tangential electric and magnetic fields on the surface S enclosing the source. In comparison, in the source region, the surface integral in (2.118) does not represent physical fields and it is numerically equal to zero. 2) A model that makes (2.118) physically meaningful in both the source and source-free region does this by inserting at S the surface electric current ̂ The density Js = n̂ × H and surface magnetic current density Ks = E × n. surface current densities reproduce the electric and magnetic fields in the source-free region, which is known as the Huygens’ surface equivalent principle. The surface current densities yield null fields in the source region. In addition, the surface current densities accounts for the discontinuity of the fields across the surface S; that is, the boundary condition is satisfied. 3) Since (2.118) is derived for an arbitrary isotropic medium, the surface integral still yields null fields in the source region if the medium therein is replaced by a different one. The replacement of the medium in the source region changes neither the electric/magnetic fields in the source region nor the electric/magnetic surface current densities, which consequently means that the tangential electric/magnetic fields at the boundary S on the side of the source-free region are not altered. To summarize, changing the isotropic medium in the source region does not change the right-hand side of (2.118) in either the source or source-free region. Care should be taken to ensure that the dyadic Green’s function in the left-hand side should be changed to one accounting for the new medium in the source region and the original medium in the source-free region. The freedom of choosing an arbitrary medium in the source region sometimes allows us to arrive at an analytical dyadic Green’s function. Such freedom brings significant convenience in solving inverse scattering problems, as demonstrated in Chapter 9 and [15]. 4) Equation (2.118) is derived for a radiation problem in presence of an arbitrary isotropic background medium, which can be either homogeneous or inhomogeneous. For a scattering problem, scatterers can be considered to be a perturbation of permittivity with respect to the background medium, and the scattered field can be considered to be the reradiation of induced sources in the scatterer. Thus, when (2.118) is applied to the scattered field, the surface integral reproduces the scattered field in the region of scatterer-free and yields null fields in the region of scatterer. For example, we can apply (2.118) to solve the following scattering problem. As shown in Fig. 2.2, the electric current source is located in the region Vs , which is enclosed by two surfaces, S0 that is next to the source free region Vs f , and S∞ that is located at infinity. The scatterer is located in the region Vs f and 37 38 Electromagnetic Inverse Scattering the medium in region Vs is homogenous with constant relative permittivity 𝜖r . The total electric field consists of the incident field and the scattered field, E(r) = Ei (r) + Es (r). (2.119) The incident field is due to the active source located in region Vs , radiating in a homogenous medium. The application of (2.118) yields ∯S0 ̂ ′ ) × Hi (r′ )] + GEM (r, r′ ) ⋅ [Ei (r′ ) × n(r ̂ ′ )] dS(r′ ) i𝜔𝜇0 GE (r, r′ ) ⋅ [n(r { Ei (r), = 0, if r ∈ Vsf if r ∈ Vs (2.120) where GE and GEM are the dyadic Green’s function for a homogeneous medium with relative permittivity 𝜖r , and they can be expressed analytically. It is important to note that the integral over S∞ that is located at infinity is equal to zero due to the property of the radiation condition. That is why the integral in (2.120) is carried out only on S0 . The scattered field is due to the induced source in region Vs f . Consequently, the normal direction at the surface S0 is now −n̂ since it is defined as going from the source region to the source free region. When applying (2.118) to the scattered field yield, the corresponding source region Vs f can be changed to an arbitrary isotropic medium. It is easy to see that the analytical formula of a dyadic Green’s function will be available if the medium Vs f is replaced by the medium in region Vs . Consequently, the application of (2.118) yields ∯S0 ̂ ′ ) × Hs (r′ )] + GEM (r, r′ ) i𝜔𝜇0 GE (r, r′ ) ⋅ [(−n)(r ̂ ′ )]dS(r′ ) ⋅ [Es (r′ ) × (−n)(r { 0, if r ∈ Vs f = s E (r), if r ∈ Vs (2.121) We have seen that (2.121) − (2.120) leads to Ei (r) − ∯ S0 ̂ ′ ) × H(r′ )] + GEM (r, r′ ) i𝜔𝜇0 GE (r, r′ ) ⋅ [n(r ̂ ′ )]dS(r′ ) ⋅ [E(r′ ) × n(r { 0, if r ∈ Vs f = E(r), if r ∈ Vs (2.122) This equation is evocative of Huygens’ principle. It says that when the observation point is in the source region (i.e., in the exterior of scatterer region), then the total field consists of the incident field and the contribution of field due to equivalent surface sources on S0 . But if the observation point is in a source-free Fundamentals of Electromagnetic Wave Theory region (i.e., in the region of scatterer), then the equivalent surface sources on S0 generate a field that exactly cancels out the incident field making the total field in this region zero. This is in fact the vectorial analogy of the Ewald–Oseen extinction theorem in optics [16] (section 2.4.2). In this example, if the region Vs is not homogeneous, then the analytical dyadic Green’s functions GE and GEM are generally not available. In this case, the conclusion in (2.122) still applies, but the dyadic Green’s functions have to be numerically obtained. Finally, the Huygens’ principle and the extinction theorem are applicable to scalar waves as well, for example, acoustic waves. Consider a scalar wave field u(r), the scalar counterpart of (2.118) reads [ ] 𝜕g(r, r′ ) 𝜕u g(r, r′ ) − (r′ ) + u(r′ )dS(r′ ) ∯S 𝜕n 𝜕n(r′ ) { u(r), if r ∈ source-free region = 0, if r ∈ source region (2.123) Note that the direction n̂ is from source region Vs to source-free region Vs f . (r′ ) is called the amplitude of the source In the mathematical community, − 𝜕u 𝜕n ′ for single-layer potential and u(r ) is called the amplitude of the source for = ∇u ⋅ n is the directional derivative of u double-layer potential. Note that 𝜕u 𝜕n in the direction of n. For electromagnetic waves, there is no 3D scalar wave. However, in the extreme case of an electrostatic regime; that is, k0 = 0, the u in (2.123) represents the electric potential, the source for single-layer potential is the surface charge, and the source for double-layer potential is the dipole layer (section 1.8 of [6]). Instead, the scalar wave occurs in the 2D TM case, E = Ez ẑ . ′ ̂ ′ ) × H(r′ )] in (2.118) It can be easily seen [ that the ] first term i𝜔𝜇0 GE (r, r ) ⋅ [n(r 𝜕E ̂ ′ )] reduces to g(r, r′ ) − 𝜕nz (r′ ) ẑ , and the second term GEM (r, r′ ) ⋅ [E(r′ ) × n(r 𝜕g(r,r′ ) in (2.118) reduces to 𝜕n(r′ ) Ez (r′ )̂z. These observations imply that, for the 2D TM case, the first term in (2.123) represents the radiation by the z-direction surface electric current and the second term represents the radiation by the transverse direction surface magnetic current. References 1 Kong, J.A. (2000) Electromagnetic wave theory, EMW, Cambridge, MA. 2 Harrington, R.F. (1961) Time harmonic electromagnetic fields, McGraw-Hill, New York. 3 Chew, W.C. (1995) Waves and fields in inhomogeneous media, IEEE Press. 39 40 Electromagnetic Inverse Scattering 4 Peterson, A.F., Ray, S.L., and Mittra, R. (1998) Computational methods for electromagnetics, IEEE Press, New York. 5 Bohren, C.F. and Huffman, D.R. (1983) Absorption and scatttering of light by small particles, John Wiley & Sons, Inc., New York. 6 Jackson, J.D. (1998) Classical electrodynamics, 3rd Edn., John Wiley & Sons, Inc., New York. 7 Jones, D.S. (1986) Acoustic and electromagnetic waves, Clarendon Press, Oxford: Oxford University Press, New York. 8 Chambers, D.H. and Berryman, J.G. (2006) Target characterization using 9 10 11 12 13 14 15 16 decomposition of the time-reversal operator: electromagnetic scattering from small ellipsoids. Inverse Probl., 22, 2145–2163. Chew, W., Michielssen, E., Song, J.M., and Jin, J.M. (Eds) (2001) Fast and efficient algorithms in computational electromagnetics, Artech House, Inc., Norwood, MA, USA. Jin, J.M. (2015) The finite element method in electromagnetics, John Wiley & Sons, Inc. Purcell, E.M. and Pennypacker, C.R. (1973) Scattering and absorption of light by nonspherical dielectric grains. Astrophys. J., 186, 705–714. Lakhtakia, A. (1992) Strong and weak forms of the method of moments and the coupled dipole method for scattering of time-harmonic electromagnetics fields. Int. J. Mod. Phys. C, 3, 583–603. Yurkin, M.A. and Hoekstra, A.G. (2007) The discrete dipole approximation: an overview and recent developments. J. Quant. Spectros Radiative Trans., 106 (1), 558–589. Mandel, L. and Wolf, E. (1995) Optical coherence and quantum optics, Cambridge University Press. Takenaka, T. and Moriyama, T. (2012) Inverse scattering approach based on the field equivalence principle: inversion without a priori information on incident fields. Opt. Lett., 37 (16), 3432–3434. Born, M. and Wolf, E. (1999) Principles of optics (7th Edn), Cambridge University Press. 41 3 Time-Reversal Imaging A time-reversal mirror (TRM) is a device that records an incoming wave and then re-transmits its time-reversed version. The re-transmitted wave propagates back through the same medium and refocuses on the original source. TRM properties can be used not only to locate active sources; that is, to solve an inverse source problem, but also to detect passive targets in the frame of inverse scattering problems. Time-reversal principles apply to both acoustic wave and electromagnetic waves, as long as the medium is reciprocal and lossless. Time-reversal techniques have been an actively researched field with wide applications, such as source localization, medical imaging, telecommunications, and medical therapy. Since the time-domain signal can be expressed as a linear superposition of its Fourier components, this chapter focuses on frequency-domain representation. This choice is convenient when discussing spatial resolution of imaging in terms of wavelength. The organization of the chapter is as follows. Section 3.1 presents TRM for active sources that radiate by themselves, where the implementation steps and fundamental theory are discussed. The scalar wave is presented first, followed by the vectorial wave. Section 3.2 presents the application of TRM for target detections, where targets are illuminated by other active sources and consequently secondary sources are induced on targets. Section 3.3 briefly discusses several topics, such as the application of TRM in a random medium and the properties of time-domain TRM. 3.1 Time-Reversal Imaging for Active Sources 3.1.1 Explanation Based on Geometrical Optics A straightforward explanation of TRM, which is easy to understand but not rigorous, is based on geometrical optics. In Fig. 3.1(a), the ray coming from a source object (labelled “O”) in front of a flat mirror is reflected, and all reflected Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 42 Electromagnetic Inverse Scattering O O (a) (b) O (c) Figure 3.1 Basic principle of time-reversal imaging. (a) Imaging by a mirror; (b) the functionality of mirror can be considered as a device in the black box; and (c) the received signal is sent back along the original path to yield an image at the position of the original object. rays seem to come from a point (labelled “I”) that is behind the mirror, which is referred to as the virtual image. In addition, at the virtual image position, the rays radiating in all direction turn out to be in phase, and what’s more, the common phase turns out to just be the phase of the original source. This fact can be easily proven. For each ray that is radiated from the source object and intersects the mirror at a point, it takes the same travelling time from the object “O” or the virtual image “I” to the intersection point. Since all rays at the source position “O” are in phase, all conjugate virtual rays are also in phase at “I.” To conclude, the virtual image seems to radiate with the same phase as the original source object. In fact, we can treat the mirror as a type of device, placed in the black box in Fig. 3.1(b), which is able to generate symmetric rays and consequently generate a focal spot at which all rays are in phase. Any device placed inside the black box that is able to realize such functionalities can be said an imaging device. Examples of such devices are the time-reversal mirror (TRM) and phase conjugation mirror (PCM). The PCM has been known and used for decades in the optical domain, and readers are referred to [1] for the physical realization and working principle of the PCM. This chapter discusses only the TRM. The TRM is an array of transceivers that first record the received signal and then send the time-reversed signal back to the space of the original source point. Figure 3.1(c) sketches the intuitive idea of time-reversal imaging and Time-Reversal Imaging shows that the TRM has realized the functionality of the mirror that is shown in Fig. 3.1(a), except that the generated image is in front of the mirror. In addition, the TRM image is focused by physical rays and thus the image is a physically true image, instead of a virtual one. 3.1.2 Implementation Steps Time-reversal is equivalent to phase conjugation of every frequency component, which will be proven in Section 3.1.3. For ease of presentation, we start with frequency domain TRM and postpone the time domain TRM to Section 3.1.3. In the frequency domain, TRM imaging is realized by the following two implementation steps: (1) during the recording step, the TRM is passive and records the outgoing fields that are radiated from the source; and (2) during the time-reversal step, the TRM is active with the driving source being the complex conjugate of the recorded fields in step (1), and the radiated fields focus at the original source position. At this step, the original source is absent, since the position of the source is exactly the parameter that the imaging problem looks for. The two steps are illustrated in Fig. 3.2. It can be proven that the fields radiated by all TRM transmitters are in phase at the original source position. Since the original source simultaneously radiates rays in all redirections, rays propagating to all directions are in phase at the source position, which is denoted as 𝜙. Consider the ith transceiver, which is separated by a distance of di from the source. At the first step of the implementation, the phase of this ray becomes 𝜙 + kdi when it reaches the ith Received signal Time reverse Source Receiving antennas Transmitting signal Image Transmitting antennas Figure 3.2 Illustration of the time-reversal implementation steps. The TRM is a transmitter-receiver array. The first step consists of recording fields radiated by the source and the second step consists of transmitting time-reversed fields back through the same medium, which tend to focus at the original source position. Adapted from: Liu 2005, IEEE Trans. Antennas Propag., 53, 3058–3066. [39] Reproduced with permission of IEEE. 43 44 Electromagnetic Inverse Scattering transceiver, where k is the wavenumber of the medium. At the second step of the implementation, the driving source at the ith transmitter is the complex conjugate of the recorded signal in step (1); that is, the driving source has a phase of −𝜙 − kdi . When the field radiated by the ith transmitter reaches the original source position, the phase becomes (−𝜙 − kdi ) + kdi , which is simply −𝜙, independent of di . That is, all rays that propagate back in the second step are in phase (−𝜙) at the original source position. At the first sight, the above analysis seems to reach the conclusion that, while the physical flat mirror shown in Fig. 3.1(a) generates a virtual image that is an exact replica of the original source, the TRM generates a true image that is a phase-conjugate of the original source. However, this conclusion is obtained for an observation domain that is much larger than the wavelength; that is, in the sense of geometrical optics. If the observation domain is comparable to the wavelength, the conclusion is different. A question that is naturally asked is that, if the source is an ideal point source, that is a delta function in space, will the image generated by the TRM be also a delta function; that is, a perfect image? This question can be answered in the spectrum domain. A spherical wave due to a point source can be expressed in terms of plane waves (section 2.2.2 of [2]) as eikr i eikx x+iky y+ikz |z| dkx dky (3.1) = 4𝜋r 8𝜋 2 ∫−∞ ∫−∞ kz where the wavenumber along the longitudinal direction (i.e., the z direction) is defined as ⎧ √ 2 k − kx2 − ky2 k 2 − kx2 − ky2 ≥ 0 ⎪ kz = ⎨ √ (3.2) ⎪ i kx2 + ky2 − k 2 k 2 − kx2 − ky2 < 0 ⎩ This definition assures outgoing waves and a finite energy density at infinity. Equation (3.1) is referred to as the Weyl identity. The integrand that corresponds to the first type of kz in Eq. (3.2) represents a travelling wave (a.k.a. propagating wave), and the integrand that corresponds to the second type of kz represents an evanescent wave. The travelling wave changes only the phase during propagation, whereas an evanescent wave changes both phase and magnitude during propagation. It is obvious that if the information of point source is fully recovered by the TR process, the phase of travelling wave has to be compensated for and at the same time both the phase and amplitude of evanescent wave have to be compensated for. First, the evanescent wave exponentially decays and cannot be received by receivers that are usually placed in the far field. This is the first reason why the resolution of TR image is limited. Second, for the transceivers shown in Fig. 3.1(c), the array covers only a finite aperture so that only a portion of travelling waves are collected. Thus, the phase compensation by the TR process is for only a portion of travelling waves. Due to these two reasons, the TR image is not a perfect image anymore. The TR image of the original delta-function source will be an expanded spot. ∞ ∞ Time-Reversal Imaging In the spatial-frequency space, all components satisfying kx2 + ky2 > k 2 and part of components satisfying kx2 + ky2 ≤ k 2 are lost during the TR imaging process. 3.1.3 Fundamental Theory Time-reversal invariance (or T-symmetry) is the theoretical symmetry of physical laws under a time-reversal transformation: T ∶ t → −t; that is, the related physical quantities transform in a consistent fashion so that the form of the equation is unchanged (section 6.10 of [3]). For a scalar wave equation in a lossless medium, 1 𝜕 2 u(r, t) ∇2 u(r, t) − 2 =0 (3.3) 𝑣 (r) 𝜕t 2 it is obvious that the u(r, t) is even under time-reversion transformation: Tu(r, t) = u(r, −t) since the wave equation only contains an even order time-derivative operator. Considering the fact that u(r, t) is a real-valued signal, we find that its Fourier transform ∞ 1 u(r, t)e−i𝜔t dt (3.4) 2𝜋 ∫−∞ implies u(r, −𝜔) = u∗ (r, 𝜔), where the superscript * denotes complex conjugate. Thus, time-reversal is equivalent to phase conjugation of every frequency component Tu(r, 𝜔) = u∗ (r, 𝜔). Hereafter the discussion centers around monochromatic waves. The time-reversal principle is based on Green’s theorem. Consider a monochromatic scalar wave u(r) propagating in a medium characterized by the spatially varying wavenumber k(r), which is defined as 𝜔∕𝑣(r), where 𝑣(r) is the local velocity of the wave. Such a u(r) satisfies the Helmholtz equation u(r, 𝜔) = ∇2 u(r) + k 2 (r)u(r) = −f (r) (3.5) where the source f (r) is distributed in a finite spatial domain. Green’s function G(r, r′ ) of the wave equation Eq. (3.5) satisfies ∇2 G(r, r′ ) + k 2 (r)G(r, r′ ) = −𝛿(r − r′ ) (3.6) The multiplication of G(r, r′ ) with the complex conjugate of Eq. (3.5) minus the multiplication of u∗ (r) with Eq. (3.6) yields G(r, r′ )∇2 u∗ (r) − u∗ (r)∇2 G(r, r′ ) = u∗ (r)𝛿(r − r′ ) − G(r, r′ ) f ∗ (r) (3.7) Integrate Eq. (3.7) over a domain V , the boundary S of which encloses all sources f (r), and we obtain 𝜕u∗ (r) 𝜕G(r, r′ ) G(r, r′ ) u∗ (r)𝛿(r − r′ ) − u∗ (r) dS(r) = ∯S ∫ ∫ ∫V 𝜕n(r) 𝜕n(r) − G(r, r′ ) f ∗ (r)d3 r, (3.8) where the integration by part and the divergence theorem have been used. Note that 𝜕u = ∇u ⋅ n is the directional derivative of u along n that is the 𝜕n 45 46 Electromagnetic Inverse Scattering normal direction at the surface, pointing outside of the domain V . Since r and r′ coordinates are conventionally reserved for representing the field and source, respectively, we swap the r and r′ in Eq. (3.8). Use the reciprocity property G(r, r′ ) = G(r′ , r), and we obtain ∯S G(r, r′ ) 𝜕u∗ (r′ ) 𝜕G(r, r′ ) ∗ ′ u∗ (r′ )𝛿(r′ − r) − u (r )dS(r′ ) = ∫ ∫ ∫V 𝜕n(r′ ) 𝜕n(r′ ) − G(r, r′ ) f ∗ (r′ )d3 r′ , (3.9) For an observation point r that is inside the domain V , that is, r ∈ V , the left-hand side of Eq. (3.9) is defined as the time-reversal field, denoted as uTR , uTR (r) = ∯S G(r, r′ ) 𝜕u∗ (r′ ) 𝜕G(r, r′ ) ∗ ′ − u (r )dS(r′ ). 𝜕n(r′ ) 𝜕n(r′ ) (3.10) Its value can be calculated from the right-hand side of Eq. (3.9), uTR (r) = u∗ (r) − G(r, r′ ) f ∗ (r′ )d3 r′ ∫ ∫ ∫V [ ]∗ = G(r, r′ ) f (r′ )d3 r′ − G(r, r′ ) f ∗ (r′ )d3 r′ ∫ ∫ ∫V ∫ ∫ ∫V = ∫ ∫ ∫V = ∫ ∫ ∫V [G∗ (r, r′ ) − G(r, r′ )] f ∗ (r′ )d3 r′ [−2i[G(r, r′ )]] f ∗ (r′ )d3 r′ (3.11) where [⋅] denotes the imaginary part operator. This theoretical model of the closed surface TR imaging needs further discussions. First, the formula of time-reversal field Eq. (3.10) shows that a theoretical TRM contains both monopole and dipole sources that are located at a closed surface S enclosing all sources. The axes of the dipoles are perpendicular to the surface S. The monopole sources emit the phase conjugated normal derivative signals and the dipole sources emit the phase conjugated signals. In the special case of spherical surface S with a large radius, which is often encountered in practical applications, the TR re-transmitting sources are greatly simplified. The field in far-field zone (r ≫ 𝜆) satisfies the Sommerfeld radiation condition, 𝜕G(r, r′ ) (3.12) ≈ ikG(r, r′ ) 𝜕r which represents an outgoing spherical wave in the far field. The same condition applies to the u(r). Since the normal direction of a spherical surface is just the radial direction, the TR field Eq. (3.10), where r′ is in the far zone, is reduced to either uTR (r) G(r, r′ )u∗ (r′ )dS(r′ ) (3.13) = ∯S −2ik Time-Reversal Imaging or uTR (r) 𝜕G(r, r′ ) 𝜕u∗ (r′ ) = dS(r′ ). −2i∕k ∯S 𝜕n(r′ ) 𝜕n(r′ ) (3.14) In (3.13) and (3.14), the same device is used as an emitter and a receiver, with the former being monopole only and the latter dipole only. From a practical point of view, this property brings significant conveniences compared with the ideal time-reversal device. In addition, the time-reversal fields for the monopole-transceiver-only case (3.13) and the dipole-transceiver-only case (3.14) are different from the ideal time-reversal field just by a factor (−2ik and −2i∕k, respectively). Consequently, the patterns of the time-reversal field are the same in all the three cases. It is worth mentioning that this conclusion is valid only for the case when the surface S is spherical with a large radius. For other cases, the properties of the TR field obtained by monopoletransceiver-only TRM and dipole-transceiver-only TRM are discussed in [4, 5]. Second, the derivation of the TR field (3.10) indicates that the formula is valid regardless of whether the boundary S is near or far field. In other words, even if the boundary S is near zone of the original source, the measurement of near field signal does not change the result of the TR field (3.11) and consequently the resolution. In fact, this should not be a surprise. In order to fully recover the information of a point source by the TR process, the phase of travelling wave has to be compensated for and at the same time both the phase and amplitude of evanescent wave have to be compensated for. For an evanescent wave, √ k 2 +k 2 −k 2 |z| − x y the amplitude decays by a factor of e when captured by the receiver. When the evanescent wave is sent back√ to the original source position, the wave − k 2 +k 2 −k 2 |z| x y . Thus, even in an ideal case further decays by the same factor, e where the sensors are placed in the near zone and are unlimitedly accurate in sensing weak evanescent waves, the time-reversed signal has to be first ampli√ 2 k 2 +k 2 −k 2 |z| x y before it is sent back. Since the TR process does fied by a factor of e not involve this amplification, the measurement of near field does not enhance the resolution of TR imaging. Third, the medium in which a wave propagates has to be reciprocal and lossless, which are two necessary conditions to achieve time-reversal imaging. If the medium is lossy, there will be a term in (3.3) containing the first-order time derivative of u(r, t). Since the equation contains both odd and even order time derivatives, the invariance of the wave equation under time-reversal is lost. Fourth, we discuss the time-domain implementation of TR imaging. Since time-reversal operator Tu(r, t) = u(r, −t) is equivalent to phase conjugation of every frequency component Tu(r, 𝜔) = u∗ (r, 𝜔), when implementing the second step of the TR process that is described in Section 3.1.2, the driving source is chosen as u(ri , −t) at the ith antenna. In practice, the time t is often nonnegative, and thus it is more practical to formulate the driving source as 47 48 Electromagnetic Inverse Scattering u(ri , T0 − t), where T0 is a large number, representing a sufficiently long break in time between the two events: the source emits signal and the TRM sends back signal. That is, the received signal at receivers during the recording step should be negligibly small for t > T0 . Intuitively speaking, the fact that driving current is chosen as u(ri , T0 − t) at the ith antenna means that a receiver that receives the signal later compared to another receiver in the array needs to send the signal back earlier, which ensures a synchronization of all re-transmitted waves when they reach the original source position. Fifth, the time-reversal principle for closed surface TRM presented here is based on Green’s theorem. For a finite aperture case, Green’s theorem cannot be used. In this case, the TR imaging technique can be understood as a matched filter when the TRM consists of only monopole transceivers. In the language of signal processing, if a delta function is the original signal, then the received signal at the TRM is the impulse response (here, referred to as Green’s function) of the channel (here, referred to as the background medium). It is well known that the TRM sends the reversed version of the impulse response back through the same channel, which means autocorrelation. This autocorrelation function has a peak at the position where the original source is. In addition, we notice that the time-reversal processing carries out a matched filtering in both time and spatial domains [6–8]. Lastly, for acoustic waves, the wave equation presents a slightly different format compared with (3.3) [6, 9], ) ( 𝜕 2 u(r, t) ∇u(r, t) 1 = 0, (3.15) − ∇⋅ 2 𝜌(r) 𝜌(r)𝑣 (r) 𝜕t 2 where the density 𝜌(r) varies with the space. Following the steps of deriving (3.10), we are able to reach the time-reversal field for acoustic wave [6], ] [ ∗ ′ 𝜕G(r, r′ ) ∗ ′ 1 ′ 𝜕u (r ) (3.16) uTR (r) = G(r, r ) − u (r ) dS(r′ ). ∯S 𝜕n(r′ ) 𝜕n(r′ ) 𝜌(r′ ) The only difference from (3.10) is the factor 1∕𝜌(r′ ) appearing in the integrand. 3.1.4 Analysis of Resolution Note that the result (3.11), that is, uTR (r) = ∫ ∫ ∫V [−2i[G(r, r′ )]] f ∗ (r′ )d3 r′ for full aperture TRM is applicable to any background medium, provided that it is lossless and reciprocal. For the special case of homogeneous background medium, the Green’s function is eikr ∕(4𝜋r) when the source is placed at the origin and thus uTR (r) = −i sin(kr) ∝ sinc(kr). 2𝜋r (3.17) Time-Reversal Imaging 1 –10 0.8 0.8 –5 0.6 0.6 0 0.4 0.4 5 0.2 0.2 y –15 10 0 15 –15 –10 –5 0 x (a) 5 10 15 –0.2 1 Sinc(x) x –15 –10 5 –5 10 15 –0.2 –0.4 (b) Figure 3.3 The spatial distribution of the TR field for 3D scalar wave case: (a) in the xy plane; (b) along the x-axis. The values are normalized so that the peak value is 1. The spatial distributions of the TR field in the xy plane and along the x-axis are plotted in Fig. 3.3 (a) and (b), respectively. The wavenumber k is 1. The first zero of the sinc function appears at r = 𝜋; that is, when the distance is at half wavelength from the point source. If the resolution of image is defined as the distance between the main lobe and the first zero, then the resolution of TR imaging is half a wavelength. Note that there are other definitions on resolution, but their results do not significantly differ from each other. Thus, the obtained resolution of half wavelength in an homogeneous background medium can be used as a rule of thumb, and consequently any imaging result that achieves a better resolution than half a wavelength can be referred to as super-resolution imaging. In an inhomogeneous background medium, it is possible to achieve superresolution TR imaging. A focal spot as small as one-thirtieth of the wavelength has been reported when the background medium is chosen as a microstructured medium that is strongly heterogeneous [10]. In such a case, the focus is still given by the imaginary part of the Green’s function, but the near-field scattering of the wave off the medium’s heterogeneities (i.e., the microstructure) allows the Green’s function to fluctuate faster than the wavelength. For finite aperture TRM case, there is in general no analytical solution for the distribution of TR field except for some special cases. For example, the resolution of TR image in both longitudinal and transverse directions for the case of a paraxial wave TRM is discussed in [5]. 3.1.5 Vectorial Wave The time-reversal technique can be easily generalized to 3D electromagnetic waves [11, 12]. The 𝜖(r) is the permittivity that accounts for inhomogeneity. 49 50 Electromagnetic Inverse Scattering We assume that all materials√ under study are nonmagnetic; that is, 𝜇(r) = 𝜇0 . The wavenumber is k(r) = 𝜔 𝜖(r)𝜇0 . The electric field E(r) that is generated by a source distribution J(r) satisfies the following equation, ∇ × ∇ × E(r) − k 2 (r)E(r) = i𝜔𝜇0 J(r) (3.18) The dyadic Green’s function G(r, r′ ) for the background medium 𝜖(r) is defined as ∇ × ∇ × G(r, r′ ) − k 2 (r)G(r, r′ ) = 𝛿(r − r′ )I (3.19) The transceivers are distributed within a closed surface S, the outward normal ̂ The time-reversal electric field interior to S direction of which is denoted as n. is defined as ETR (r) = ∯S ̂ ′ )) × (−H∗ (r′ ))] i𝜔𝜇0 G(r, r′ ) ⋅ [(−n(r ̂ ′ ))]dS(r′ ) + GEM (r, r′ ) ⋅ [E∗ (r′ ) × (−n(r (3.20) where GEM (r, r′ ) = −[∇′ × G(r′ , r)]T , which means, by the reciprocity principle, the dyadic Green’s function expressing the electric field generated by a unit magnetic dipole source. Following the steps of deriving (3.11), the time-reversal electric field is found to be ETR (r) = ∫ ∫ ∫V − 2i[G(r, r′ )] ⋅ (−i𝜔𝜇0 )J∗ (r′ )d3 r′ (3.21) In electromagnetic wave TR process, the receivers in the TRM first measure the tangential components of electric and magnetic fields, and then ̂ and (−n) ̂ × (−H∗ ) are chosen as the driving magnetic and electric E∗ × (−n) current dipole source, respectively. Note that −n̂ is used since the observation point is inside S whereas n̂ points outside of S. In practice, it is not convenient to set up both electric and magnetic current sources. In the special case of spherical surface S with a radius much larger than wavelength, which is often encountered in practical applications, the TR retransmitting sources are greatly simplified. The field in far-field zone satisfies radiation condition, E∗ (r′ ) 𝜂 ̂ ′ ) × E∗ (r′ ) ≈ H∗ (r′ )𝜂 n(r ̂ ′ ) × H∗ (r′ ) ≈ − n(r (3.22) (3.23) ̂ ) × G(r , r)] ⋅ = G(r, r ) ⋅ ik n(r ̂ )× GEM (r, r )⋅ ≈ −[ik n(r ′ ′ ′ T ′ ′ (3.24) Thus, the first item in the integrand is equal to the second one. If a short-wire receiver measures the electric field and then the same device is used as a retransmitting antenna with the electric current dipole moment being the Time-Reversal Imaging complex-conjugated electric field (scaled by −1∕𝜂), then the time-reversed field in this case is equal to ∯S i𝜔𝜇0 G(r, r′ ) ⋅ E (r) E∗ (r′ ) dS(r′ ) = TR −𝜂 2 (3.25) It is worth noting that this conclusion is valid only for the case when the surface S is spherical with a large radius. Similarly, if small-loop antennas are used to measure magnetic fields and then they act as a magnetic dipole radiating antenna, the same result will be obtained. It is important to note that Maxwell equations are form-invariant, under the time-reversal transformation t → −t, if and only if D → D, E → E, 𝜌 → 𝜌, B → −B, H → −H, and J → −J. It is easy to show that D and E can be directly derived from electric charge density 𝜌, which doesn’t involve a time derivative. They are said to be even under time reversal. In comparison, J (involving time derivative), B and H are said to be odd under time reversal. In the frequency domain, it is easy to prove by the definition of Fourier transform that ̂ time-reversal operator means E∗ and −H∗ . That is why (3.20) presents E∗ × (−n) ̂ × (−H∗ ) as the driving magnetic and electric current dipole source, and (−n) respectively. For an electric dipole source located at the origin, oriented along the ẑ direction, the x, y, and z components of the TR electric field are proportional to [Gxz (r, 0)], [Gyz (r, 0)], and [Gzz (r, 0)], respectively. [( ) ] 3 3 1 xz −1 + 2 2 sin kr − [Gxz (r, 0)] = cos kr (3.26) 2 4𝜋r r [( k r ) kr ] 3 3 1 yz −1 + 2 2 sin kr − (3.27) cos kr [Gyz (r, 0)] = 2 4𝜋r r[( k r kr ) 1 z2 3z2 1 [Gzz (r, 0)] = 1 − 2 2 − 2 + 2 4 sin kr 4𝜋r k r r k r ( ) ] 2 1 3z + cos kr (3.28) − kr kr3 The x, y, and z components of the (normalized) ETR in the xy, yz, and zx planes are plotted in Fig. 3.4, where we see that the z-component of ETR is much larger than the x and y components. The z components of ETR along the x- and z-axes are plotted in Fig. 3.5. We see that the z component of ETR peaks at the original source position along both the x- and z-axes. The first zero of the z component of ETR along the x- and z-axes is x = 0.44 𝜆 and z = 0.71 𝜆, respectively. These results show that the position of the source is identified as where |ETR |, the magnitude of the TR field, is at a maximum. The quantitative information of the x, y, z components of the vector source, and consequently its polarization, can be obtained by solving an optimization problem that is formulated in [13]. 51 Electromagnetic Inverse Scattering –4λ –4λ 1 0.5 2λ 2λ 4λ 4λ –4λ 0 –2λ 0 x (b) 2λ 4λ z 0.5 2λ –4λ 0 y (d) 2λ 4λ 0 0 4λ –4λ 0 0.1 –2λ 0 x (c) 2λ 4λ –4λ 2λ –2λ 4λ –4λ 0 0.05 –2λ 0 0 2λ –4λ 1 –2λ z 0.5 –0.05 –2λ –4λ 0 y (e) 2λ 1 0.2 0 0.1 2λ 4λ –4λ 4λ 0 –2λ –4λ 0 y (f) 2λ 4λ –0.03 2λ –2λ 0.5 0 x 0 0 –2λ x 0.03 2λ –0.1 0.3 0.06 –2λ –0.1 0.3 –2λ z 0 x (a) –4λ 4λ –4λ 0 2λ –2λ 0.3 –2λ y 0 4λ –4λ –4λ 1 –2λ y y –2λ x 52 0.2 0 0.1 2λ 0 –0.06 4λ –4λ –2λ 0 z (g) 2λ 4λ 4λ –4λ –2λ 0 z (h) 2λ 4λ 0 4λ –4λ –2λ 0 z (i) 2λ 4λ –0.1 Figure 3.4 The plot of the (normalized) ETR : Top, middle, and bottom rows show the field distribution in the xy, yz, and zx planes, respectively; Left, middle, and right columns show the x, y, and z components of the field, respectively. 0.4 0.4 0.2 0.2 0 0 –0.2 –4λ –2λ 0 x (a) 2λ 4λ –0.2 –4λ –2λ Figure 3.5 The z component of ETR along the x- and z-axes. 0 z (b) 2λ 4λ Time-Reversal Imaging 3.2 Time-Reversal Imaging for Passive Sources Regarding the applications of TRM imaging, one of the most promising areas is the detection and imaging of passive targets. In fact, the problem of imaging of passive targets is closely related to the imaging of active sources, which has been discussed in Section 3.1, since scattered field generated by passive targets can be considered as the radiated field by an induced source, which is also known as the secondary source. The detection and imaging of passive targets is in fact an inverse scattering problem. A schematic of the problem is shown Fig. 1.1, where a target is illuminated by an array of transmitters and the scattered fields are measured at an array of receivers. In the application of TRM imaging, we use the same antenna array to function as both transmitters and receivers, which are referred to as transceivers. The scattering system can be described a multistatic response (MSR) matrix K. If N is the number of transceivers, the MSR matrix is of size N × N, with the element Ki,j representing the received field at the ith receiver when the jth transmitter is driven by a unit source. To study the problem of detecting passive targets, it is desirable to first look into a simple case, where an analytical expression of the MSR matrix K can be easily identified. In the special case of a total number of M point-like targets (size being much smaller than wavelength) that are sufficiently separated from each other so that multiple scattering effects can be ignored, the MSR matrix can be written as the product of three matrices: (1) a forward propagation matrix GI that describes the illumination process, that is, the propagation from transmitters to scatterers, (2) a scattering matrix C, which is diagonal, with the element being the scattering strength, which is also known as the reflectivity coefficients, of point targets, and (3) the backward propagation matrix GS that describes the process of radiation of scattered field; that is, the propagation from scatterers to receivers. K = GS ⋅ C ⋅ GI (3.29) The incidence matrix GI is of size M × N, with the element GIij being Green’s function evaluated at the position of the ith point-like targe and the jth transmitter. The scattering matrix C is an M-dimensional diagonal matrix, with the element Ci denoting the scattering strength of the ith target that is defined as the amplitude of induced source due to a unit excitation field. The scattering matrix GS is of size N × M, which is just the transpose of GI due to reciprocity. As a consequence of the well-known reciprocity theorem, the MSR matrix K is transpose symmetric. 53 54 Electromagnetic Inverse Scattering 3.2.1 Imaging by an Iterative Time-Reversal Process Imaging of passive targets can be realized by an iterative time-reversal process. The steps of implementation are as follows. Firstly, the transceiver array generates waves to illuminate the region of interest. Then, the transceiver array records the scattered field that is due to the presence of passive targets. Next, the recorded field is complex-conjugated, which is then chosen as the amplitude of the driving source at the transceiver. These steps of illuminating, recording, and time reversal are iteratively implemented. After some iterations, the process converges and produces a wavefront focused on the most reflective target under some conditions. If S0 is the initial driving source at the transceiver array, then the driving source after the time-reversal operation is the phase conjugate of the received signals S1 = (K ⋅ S0 )∗ (3.30) After two time-reversal operations, the driving source is given by ∗ S2 = K ⋅ K ⋅ S0 (3.31) It is easy to see that the driving source after 2n iterations of TR process is given by ∗ S2n = (K ⋅ K)n ⋅ S0 (3.32) ∗ The matrix K ⋅ K is called the time-reversal operator (TRO). Since K is symmetric, the time-reversal operator is Hermitian and its eigenvalues are all real. In addition, it is easy to prove that all eigenvalues are nonnegative. ∗ K ⋅ K ⋅ V i = 𝜆i V i , i = 1, 2, .., N (3.33) Since the set of N eigenvectors form an orthogonal basis in N , the vector of initial driving source S0 can be decomposed to S0 = N ∑ 𝛼i V i (3.34) i=1 Consequently, we obtain [14] S2n = N ∑ 𝜆ni 𝛼i V i (3.35) i=1 Consider the special case of well-resolved targets. For a given transceiver array, two targets are well resolved if time-reversal field that is due to the passive source induced at one target generates a zero illumination at the other target [14, 15]. Mathematically, a collection of well-resolved targets means T ∗ that GS,i ⋅ GS,j = 0 for i ≠ j, where GS,i , i = 1, 2, ..., M are the columns of the Time-Reversal Imaging scattering matrix GS . In other words, the columns of GS are orthogonal in the sense of vector inner product. In this case, the time-reversal operator has a simplified formula, ∗ T ∗ 2 K ⋅ K = GS ⋅ Diag[|C12 ||GS,1 |2 , |C22 ||GS,2 |2 , ..., |CM ||GS,M |2 ] ⋅ GS (3.36) It is straightforward to verify that the eigenvectors of the time-reversal operator are, ∗ V i = GS,i , i = 1, 2, .., M (3.37) associated with the eigenvalues 𝜆i = |Ci2 ||GS,i |4 , i = 1, 2, .., M (3.38) √ The term |Ci ||GS,i |2 , which is equal to 𝜆i , is referred to as the apparent reflectivity. If the first scatterer has the greatest scattering ability so that 𝜆1 > 𝜆2 ≥ ..., ≥ 𝜆M , then for a large integer n, the driving source after 2n times TR process (3.35) reduces to ∗ S2n ≈ 𝜆n1 𝛼1 GS,1 (3.39) The value of n that is large enough to reach the above approximation depends on the ratio 𝜆1 ∕𝜆2 . The driving source after 2n times TR process is proportional to the signal after one TR process in the fictitious case when the first target alone were present. Thus, the TR field after 2n times TR process focuses on the first target. 3.2.2 Imaging by the DORT Method The iterative TR process in fact can be considered to experimentally obtain the eigenvector associated with the largest eigenvalue of the TRO matrix. Alternatively, a numerical approach by implementing an eigenvalue decomposition of the TRO matrix will be more powerful, since all eigenvalues and associated eigenvectors can be obtained simultaneously. This imaging approach is referred to as the DORT method, which is the French acronym for “Décomposition de l’Opérateur de Retournement Temporel” (decomposition of the time-reversal operator) [16]. The DORT method is performed in three steps: The first step is to obtain the MSR matrix K by conducting a total number of N 2 transmit-receive operations. The second step is to perform an eigenvalue decomposition of the time-reversal ∗ operator K ⋅ K. The third step is to apply each eigenvector as the driving source at transceivers and send waves back to the region of interest. This can be done either experimentally or numerically. For a set of well-resolved scatterers, the iterative time-reversal process allows a selective focusing on the most reflective scatterer, whereas the DORT method is able to focus on each scatterer provided that their apparent reflectivities are 55 56 Electromagnetic Inverse Scattering different. If the eigenvalues 𝜆i formulated in (3.38) are different from each, written in decreasing order 𝜆1 > 𝜆2 > … , > 𝜆M , then the eigenvector V i that is formulated in (3.37) is the signal that would act as the driving source after a time-reversal process if only the ith target were present. Thus, the TR field due to V i focuses on the ith target. In addition, we see that the number of non-zero eigenvalues is equal to the number of scatterers. As a side note, for the continuous counterpart of K, the focusing property of its eigenfunctions is extensively discussed in [17]. 3.2.3 Numerical Simulations Since the iterative TR process can be considered to be a special case of the DORT method in the sense that the former obtains only the first eigenvector of the TRO matrix, all imaging results presented in this section are computed by the DORT method. Before conducting numerical simulations, it is worth discussing well-resolved scatterers and the physical interpretation of the DORT method. For a collection of well-resolved scatterers, the requirement is for any pair of scatterers that the time-reversal field that is due to the passive source induced at one scatterer generates a zero illumination at the other scatterer. However, it is rare that scatterers are well-resolved. For a given array of transceivers, the positions of scatterers have to be carefully chosen so as to meet the condition of being well-resolved. For example, in the case of full aperture transceivers, the condition of well-resolved scatterers is that the imaginary part of Green’s function [G(ri , rj )] is equal to zero for any pair of scatterers. In practice, a good approximation to the condition of being well-resolved is that scatterers are sufficiently separated from each other. Nevertheless, to apply the DORT in such an approximation condition is of little interest, since the imaging problem is not challenging for sufficiently separated scatterers. Indeed, there are many existing algorithms to image sufficiently separated scatterers. Considering the above, our numerical simulations in this section do not require that scatterers have to be well resolved. For scatterers that are not well resolved, the physical meaning of the DORT method can be interpreted from the singular value decomposition H (SVD) of the MSR matrix K, which satisfies K ⋅ 𝑣p = 𝜎p up and K ⋅ up = 𝜎p 𝑣p , p = 1, 2, … , N, where 𝜎p is singular value, left singular vectors up are mutually orthogonal unit vectors, and so are the right singular vectors 𝑣p . The superscript H denotes the Hermitian operation. Since the K is symmetric, the ∗ H time-reversal operator K ⋅ K can be rewritten as K ⋅ K, which is well known to have eigenvalues 𝜎p2 and the corresponding eigenvectors 𝑣p . When the initial driving source at transceivers is chosen to be 𝑣p , the driving source after two time-reversal operations (3.31) is given by ∗ ind K ⋅ K ⋅ 𝑣p = (GS ⋅ Sp )∗ (3.40) Time-Reversal Imaging ind where the M-dimensional vector Sp = 𝜎p C ⋅ GI ⋅ u∗p is referred to as the eigen-source, which is a vector of the induced sources at all scatterers. Equation (3.40) is the signal that would act as the driving source after a ind time-reversal process if the eigen-source Sp were present. It is important to note that the interpretation (3.40) using the concept of eigen-source applies to the case of multiply scattering scatterers as well, with the only difference ind being that the vector of induced source Sp is more complex than the single scattering case. The single scattering model (3.29) is for the purpose of ease in presentation, but the DORT imaging method is not limited to the single scattering case. From (3.40), we tell that the number of non-zero singular values is equal to the degrees of freedom of eigen-sources [18]. For scalar wave equations, the induced source at point-like scatterers is monopole source and thus the number of independent of sources is equal to the number of scatterers. For vectorial waves, dipole sources are induced at point-like scatterers and consequently one scatterer corresponds to two or three eigenvalues in the 2D or 3D case, respectively. If electric and magnetic dipoles are simultaneously induced in small scatterers, then one scatterer corresponds up to six nonzero singular values [19]. As a side note, the distribution of singular values is quite different for an extended scatterer [20]. In numerical simulations, both scalar and vector wave DORT imaging results are presented. The system is a two-dimensional problem, which is invariant in the z-axis. The background is air, and the wavelength 𝜆 is 1 m. The array of transceivers consists of 100 line elements that are uniformly distributed in a circle of radius 200 𝜆. If the line transceiver is electric current line source when operating in the transmitting mode and it measures the z-component of electric field when operating in receiving mode, the setup is the TM mode. By duality, if the line transceiver is magnetic current line source and it measures the z-component of magnetic field, it is in the TE mode. The scatterers considered in numerical simulations have a relative permittivity 𝜖r = 2.25 and a small radius R = 𝜆∕200. The numerical method to calculate the MSR matrix can be found in [21] and the noise-free data are treated as measured data. First, we consider a single scatterer located at (0.3 𝜆, −0.3 𝜆). For the TM mode, the dominant induced source is the electric current along the z–axis and, consequently, there should be only a single leading singular value, with others being close to zero. The first 15 singular values of the MSR matrix are shown in Fig. 3.6 (a), where we see that there is indeed a single dominant singular value. The DORT imaging result is shown in Fig. 3.7, where we see concentric patterns centred at the position of the scatterer. Since the application of DORT to detect a single scatterer is equivalent to locating a single induced source, it is not a surprise to see that Fig. 3.7 bears the resemblance to Fig. 3.3(a). For TE mode, the dominant induced sources are electric dipoles that have two degrees 57 5 –5 0 –10 log10(σj) log10(σj) Electromagnetic Inverse Scattering –5 –15 –10 –15 –20 0 5 10 Singular value number, j (a) 15 –25 5 5 0 0 log10(σj) log10(σj) 58 –5 –10 –15 0 5 10 Singular value number, j (b) 15 0 5 10 Singular value number, j (d) 15 –5 –10 0 5 10 Singular value number, j (c) 15 –15 Figure 3.6 The base-10 logarithm of the first 15 singular values of the MSR matrix. (a) A single scatterer under TM illumination; (b) a single scatterer under TE illumination; (c) two scatterers separated by d = 0.6 𝜆 under TM illumination; and (d) two scatterers separated by d = 0.2 𝜆 under TM illumination. 2 1 0.8 1 0.6 0 0.4 –1 –2 –2 0.2 –1 0 1 2 Figure 3.7 DORT imaging result for a single scatterer under TM illumination. Time-Reversal Imaging 2 1 0.8 1 2 1 0.8 1 0.6 0.6 0 0 0.4 0.4 –1 –2 –2 0.2 –1 0 (a) 1 2 –1 –2 –2 0.2 –1 0 1 2 (b) Figure 3.8 DORT imaging results for a single scatterer under TE illumination. Images (a) and (b) are obtained by the singular vectors corresponding to the first and the second singular values, respectively. of freedom in the xy plane. Consequently, there should be two leading singular values. The first 15 singular values of the MSR matrix are shown in Fig. 3.6(b), where we see that there are indeed two dominant singular values. Their corresponding singular vectors are used in the DORT to generate the imaging results that are shown in Fig. 3.8. We see that the DORT imaging results obtained by both singular vectors present a two-sidelobe pattern, which is centered at the position of the scatterer. However, the TR field is zero at the position of the scatterer, rather than being strongest. Next, we consider two scatterers located at (−d∕2, 0) and (+d∕2, 0), respectively, where d is the distance between the two scatterers. Under the TM mode, the DORT imaging results for two different values of d, that is, d = 0.6 𝜆 and d = 0.2 𝜆, are plotted in Fig. 3.9 and Fig. 3.10, respectively. The first 15 singular values of the MSR matrix are shown in Fig. 3.6(c) and (d) for the two separations, where we see two dominant singular values since two electric line sources are induced in each case. For a larger separation, d = 0.6 𝜆, Fig. 3.9(a) shows that the DORT imaging result generated by the first singular vector is able to successfully locate the positions of the two scatterers. Figure 3.9(b) shows that the second singular vector fails to do so. For a smaller separation, d = 0.2 𝜆, Fig. 3.10 shows that neither singular vector is able to successfully locate the positions of the two scatterers. Lastly, we consider a partial aperture of transceivers, which covers only the angle 0 ≤ 𝜙 ≤ 𝜋∕2. All other conditions are the same as those for Fig. 3.7 and Fig. 3.8. The DORT imaging result under TM illumination for partial aperture of transceivers is shown in Fig. 3.11. Compared with the result Fig. 3.7 for full aperture, Fig. 3.11 presents a focal spot that is elongated along the axis of symmetry of the partial aperture transceivers. The focal spot peaks at the location of the scatterer. 59 60 Electromagnetic Inverse Scattering 2 1 0.8 1 2 1 0.8 1 0.6 0.6 0 0 0.4 0.4 –1 –2 –2 0.2 –1 0 1 –1 –2 –2 2 0.2 –1 0 1 2 (b) (a) Figure 3.9 DORT imaging results for two scatterers under TM illumination. The separation of the two scatterers is d = 0.6 𝜆 and their exact positions are marked by black dots. Images (a) and (b) are obtained by the singular vectors corresponding to the first and the second singular values, respectively. 2 1 0.8 1 2 1 0.8 1 0.6 0.6 0 0 0.4 0.4 –1 –2 –2 0.2 –1 0 (a) 1 2 –1 –2 –2 0.2 –1 0 1 2 (b) Figure 3.10 DORT imaging results for two scatterers under TM illumination. The separation of the two scatterers is d = 0.2 𝜆 and their exact positions are marked by black dots. Images (a) and (b) are obtained by the singular vectors corresponding to the first and the second singular values, respectively. The phenomenon of axial elongation of the focal spot is also typical in lens imaging in optics [22]. Since the finite-aperture transceivers used in TR imaging are somewhat equivalent to a finite-size optical lens, it is worth further discussing the axial elongation of the focal spot. An intuitive understanding of the axial elongation of focal spot is as follows. Since the transceivers are in the far field, the radiation by a transceiver driven by a time-reversed signal is a plane wave in a finite region around the scatterer, with the propagation direction Time-Reversal Imaging Figure 3.11 DORT imaging result for a single scatterer under TM illumination, where transceivers cover only the angle 0 ≤ 𝜙 ≤ 𝜋∕2. 4 1 0.8 2 0.6 0 0.4 –2 –4 –4 0.2 –2 0 2 4 from the transceiver to the scatterer. If the origin of a local coordinate system is chosen at the position of scatterer, the axial direction is labelled as l, and the transverse plane is labelled as t, then the plane wave can be formulated as exp [i(k l ⋅ rl + k t ⋅ rt )]. For a pair of transceivers that are distributed symmetrically about the axis, the signs of their k t s are opposite, so that a standing wave pattern is formed along the transverse direction. On the other hand, their k l s have the same sign so that no standing wave is formed along the axial direction. It is well known that the magnitude of standing wave exhibits a spatial variation, whereas the magnitude of a plane wave does not. Thus, the magnitude of the TR field around the position of scatterer changes more slowly along the axial direction than along the transverse direction; that is, the focal spot is elongated along the axial direction. The DORT imaging result under TE illumination for partial aperture of transceivers is shown in Fig. 3.12. While the first singular vector generates an axial-elongated spot that peaks at the location of scatterer, the second one generates an axial-elongated two-sidelobe pattern, centered at the location of scatterer with a minimum magnitude. These numerical simulations use noise-free data. The performance of the DORT algorithm under additive noise and translational perturbations of transceivers is presented in [23]. For 3D simulation of the DORT algorithm, [24] presents several numerical illustrations. In particular, an interesting result is presented for a spherical scatterer, the permeability and permittivity of which are both different from those of the background medium. Although induced dipole sources have up to six freedoms, that is, three electric dipoles and three magnetic dipoles, [24] demonstrates that the MSR has only five nonzero singular values. The reason for this discrepancy is that the transceivers used in [24] are all oriented in the z direction, which generates a magnetic field that has only x and y components (see (2.64)). Thus, the one freedom that is missed is the z-oriented magnetic dipole. 61 62 Electromagnetic Inverse Scattering 4 1 0.8 2 4 1 0.8 2 0.6 0.6 0 0 0.4 0.4 –2 –4 –4 0.2 –2 0 (a) 2 4 –2 –4 –4 0.2 –2 0 2 4 (b) Figure 3.12 DORT imaging results for a single scatterer under TE illumination, where transceivers cover only the angle 0 ≤ 𝜙 ≤ 𝜋∕2. Images (a) and (b) are obtained by the singular vectors corresponding to the first and the second singular values, respectively. 3.3 Discussions The advantage of time-reversal imaging is that it is fast and easy to implement, and it is able to provide an approximate image of the source or scatterer. The weakness of the TR imaging is its limited resolution. The resolution limit is inherent, even in absence of noise. Considering the aforementioned properties, TR imaging is a convenient and useful tool in the following scenarios. Some real world applications only require detection of the presence/absence of source or scatterer and do not need super-resolution. For example, the aim is to detect submarines in underwater acoustics. If some applications require high resolution, the rich information that TR imaging quickly provides, such as rough estimation of scatterers’ positions, sizes, and number, can be used as initial guess or a priori knowledge for other super-resolution imaging algorithms. Time-reversal imaging has found wide applications in the area of imaging and detection, such as ultrasound imaging in medical diagnostics [25], structural health monitoring [26], microwave breast cancer detection [27], and detection of buried objects [28]. The performance of TR imaging has been validated both numerically and experimentally. Since this chapter discusses the application of time-reversal in imaging and detection, we only mention in passing that time reversal has many other applications, such as communication, filter design, and energy harvesting. This chapter mainly presents the TR in frequency domain. In addition to the reason that time-domain signal can be expressed as a linear superposition of its Fourier components, many real-world applications of TRM indeed deal with quasi-monochromatic waves. For temporal dispersion materials, it is more convenient to present in the frequency domain. On the other hand, the TR in the Time-Reversal Imaging time domain is also a rich research topic. Since time is also a variable, there is an additional freedom in time-domain TR. Time reversal provides both temporal and spatial matched filtering. The theory and implementation of time-domain time reversal can be found in [9, 29–33]. A closely related topic is ultrawideband (UWB) time-reversal imaging, which is discussed in [28, 34]. It is important to distinguish physical and computational time reversal. In physical time reversal, transceivers retransmit the time reversed signals to the medium. The beauty of physical time reversal is that we need not know any details of the medium, as long as it is lossless and reciprocal. The retransmitted signal will automatically focus on the vicinity of the original source or scatterer. For example, physical time-reversal has been applied to kidney stone destruction [35]. In comparison, computational time reversal simulates the process of physical time-reversal in computers, and in this situation we need to know the details of the medium so that the wave propagation can be numerically calculated or analytically derived. All numerical results presented in Section 3.2.3 are obtained by computational time-reversal. For electromagnetic time reversal, practically speaking, electric field is never directly measured, but instead voltages or currents on antennas are measured. In this direction, the time-reversal theory in terms of impedance is developed in [36], which is closer to microwave experiments. Impedance matrix formalism is very useful because it naturally takes into account the coupling between radiating antennas. Various numerical and experimental results have demonstrated that super-resolution time-reversal imaging can be achieved in rich scattering environments, such as in random media, in turbid media, and in cluttered environments [37–40]. The mathematical foundation of random-media time-reversal imaging can be found in [41, 42]. Generally speaking, the more inhomogeneous the media is, the higher the focusing resolution that is achieved. Intuitively, time reversal in rich scattering environments is equivalent to generating a virtual aperture that is larger than its actual physical size, yielding a much higher resolution. For point-like scatterers, when they are illuminated by transmitters, the scatterers can be identified as secondary sources. Since each incidence generates one set of secondary sources on point-like scatterers, the total number of sets of secondary sources is equal to the number of transmitters Nt . Mathematically, the sensing of secondary source has no difference from the sensing of primary source. Thus, we can effectively treat the MSR matrix as the measured signals that are due to the radiation of primary sources at Nt different time slots. Consequently, [43] shows that the time-reversal operator can be written as a covariance matrix, like the one introduced in classical primary-source detection. Signal processing methods that work on the covariance matrix that have been widely used in the field of source detection can be applied to solve inverse scattering problem involving point-like scatterers, which will be topic of the next chapter. 63 64 Electromagnetic Inverse Scattering References 1 He, G.S. (2002) Optical phase conjugation: principles, techniques, and applications. Prog. Quant. Electron., 26 (3), 131–191. 2 Chew, W.C. (1995) Waves and fields in inhomogeneous media, Van Nos- trand Reinhold, New York. 3 Jackson, J.D. (1998) Classical electrodynamics, 3rd edn., John Wiley & Sons, Inc., New York. 4 de Rosny, J. and Fink, M. (2007) Focusing properties of near-field time reversal. Phys. Rev. A, 76 (6). 5 Fannjiang, A.C. (2009) On time reversal mirrors. Inverse Probl., 25 (9), 095 010. 6 Fink, M. and Prada, C. (2001) Acoustic time-reversal mirrors. Inverse Probl., 17, R1–R38. 7 Tanter, M., Thomas, J.L., and Fink, M. (2000) Time reversal and the inverse filter. J. Acoust. Soc. Am., 108 (1), 223–234. 8 Chambers, D.H., Candy, J.V., Lehman, S.K., Kallman, J.S., Poggio, A.J., and 9 10 11 12 13 14 15 16 17 Meyer, A.W. (2004) Time reversal and the spatio-temporal matched filter (l). J. Acoust. Soc. Am., 116 (3), 1348–1350. Fink, M. (1992) Time reversal of ultrasonic fields–part 1: Basic principles. IEEE Trans. Ultrason. Ferroelect. Freq. Contr., 39, 555–566. Lerosey, G., de Rosny, J., Tourin, A., and Fink, M. (2007) Focusing beyond the diffraction limit with far-field time reversal. Science, 315, 1120–1122. Lerosey, G., de Rosny, J., Tourin, A., Derode, A., Montaldo, G., and Fink, M. (2004) Time reversal of electromagnetic waves. Phys. Rev. Lett., 92, 193 904. Carminati, R., Pierrat, R., de Rosny, J., and Fink, M. (2007) Theory of the time reversal cavity for electromagnetic fields. Optic. Lett., 32, 3107–3109. Iero, D.A.M., Crocco, L., and Isernia, T. (2016) On the role and choice of source polarization in time-reversal focusing of vector fields. IEEE Antennas and Wireless Propagation Letters, 15, 214–217. Prada, C. and Fink, M. (1994) Eigenmodes of the time-reversal operator: a solution to selective focusing in multiple-target media. Wave Mot., 20, 151–163. Devaney, A.J. (2005) Time reversal imaging of obscured targets from multistatic data. IEEE Trans. Antennas Propag., 53 (5), 1600–1610. Prada, C., Manneville, S., Spoliansky, D., and Fink, M. (1996) Decomposition of the time reversal operator: Detection and selective focusing on two scatterers. J. Acoust. Soc. Am., 99 (4), 2067–2076. Mast, T.D., Nachman, A.I., and Waag, R.C. (1997) Focusing and imaging using eigenfunctions of the scattering operator. J. Acoust. Soc. Am., 102 (2), 715–725. Time-Reversal Imaging 18 Rao, T. and Chen, X. (2006) Analysis of the time-reversal operator for a 19 20 21 22 23 24 25 26 27 28 29 30 31 single cylinder under two-dimensional settings. J. Electromagn. Waves Appl., 20 (15), 2153–2165. Chambers, D.H. and Berryman, J.G. (2004) Analysis of the time-reversal operator for a small spherical scatterer in an electromagnetic field. IEEE Trans. Antennas Propag., 52, 1729–1738. Zhao, H. (2004) Analysis of the response matrix for an extended target. SIAM J.Appl. Math., 64 (3), 725–745. Tortel, H., Micolar, G., and Saillard, M. (1999) Decomposition of the time reversal operator for electromagnetic scattering. J. Electromagn. Waves Appl., 13, 687–719. Nagorni, M. and Hell, S.W. (2001) Coherent use of opposing lenses for axial resolution increase in fluorescence microscopy. I. comparative study of concepts. J. Optic. Soc. Am. A:-Optics Image Science and Vision, 18 (1), 36–48. Yavuz, M.E. and Teixeira, F.L. (2008) On the sensitivity of time-reversal imaging techniques to model perturbations. IEEE Transactions on Antennas and Propagation, 56 (3), 834–843. Iakovleva, E. and Lesselier, D. (2008) Multistatic response matrix of spherical scatterers and the back-propagation of singular fields. IEEE Transactions on Antennas and Propagation, 56 (3), 825–833. Wang, Z., Li, J., and Wu, R. (2005) Time-delay- and time-reversal-based robust capon beamformers for ultrasound imaging. IEEE Transactions on Medical Imaging, 24 (10), 1308–1322. Wang, C.H., Rose, J.T., and Chang, F.K. (2004) A synthetic time-reversal imaging method for structural health monitoring. Smart Mat. Struct., 13 (2), 415–423. Kosmas, P. and Rappaport, C.M. (2006) A matched-filter FDTD-based time reversal approach for microwave breast cancer detection. IEEE Transactions on Antennas and Propagation, 54 (4), 1257–1264. Micolau, G., Saillard, M., and Borderies, P. (2003) DORT method as applied to ultrawideband signals for detection of buried objects. IEEE Transactions on Geoscience and Remote Sensing, 41 (8), 1813–1820. Cassereau, D. and Fink, M. (1992) Time-reversal of ultrasonic fields.3. theory of the closed time-reversal cavity. IEEE Transactions on Ultrasonics Ferroelectrics and Frequency Control, 39 (5), 579–592. Kosmas, P. and Rappaport, C.M. (2005) Time reversal with the FDTD method for microwave breast cancer detection. IEEE Transactions on Microwave Theory and Techniques, 53 (7), 2317–2323. Kosmas, P. and Rappaport, C.M. (2006) FDTD-based time reversal for microwave breast cancer detection – localization in three dimensions. IEEE Transactions on Microwave Theory and Techniques, 54(4), 1921–1927. 65 66 Electromagnetic Inverse Scattering 32 Yavuz, M.E. and Teixeira, F.L. (2006) Full time-domain DORT for 33 34 35 36 37 38 39 40 41 42 43 ultrawideband electromagnetic fields in dispersive, random inhomogeneous media. IEEE Transactions on Antennas and Propagation, 54(8), 2305–2315. Hoefer, W.J.R. (2015) Computational time reversal – a frontier in electromagnetic structure synthesis and design. IEEE Transactions on Microwave Theory and Techniques, 63 (1), 3–10. Yavuz, M.E. and Teixeira, F.L. (2008) Space-frequency ultrawideband time-reversal imaging. IEEE Transactions on Geoscience and Remote Sensing, 46 (4), 1115–1124. Thomas, J.L., Wu, F., and Fink, M. (1996) Time reversal focusing applied to lithotripsy. Ultrasonic Imag., 18 (2), 106–121. de Rosny, J., Lerosey, G., and Fink, M. (2010) Theory of electromagnetic time-reversal mirrors. IEEE Transactions on Antennas and Propagation, 58 (10), 3139–3149. Mosk, A.P., Lagendijk, A., Lerosey, G., and Fink, M. (2012) Controlling waves in space and time for imaging and focusing in complex media. Nature Photon., 6 (5), 283–292. Moura, J.M.F. and Jin, Y. (2008) Time reversal imaging by adaptive interference canceling. IEEE Transactions on Signal Processing, 56 (1), 233–247. Liu, D., Kang, G., Li, L., Chen, Y., Vasudevan, S., Joines, W., Liu, Q.H., Krolik, J., and Carin, L. (2005) Electromagnetic time-reversal imaging of a target in a cluttered environment. IEEE Trans. Antennas Propag., 53 (9), 3058–3066. Liu, D.H., Krolik, J., and Carin, L. (2007) Electromagnetic target detection, in uncertain media: Time-reversal and minimum-variance algorithms. IEEE Transactions on Geoscience and Remote Sensing, 45 (4), 934–944. Borcea, L., Papanicolaou, G., Tsogka, C., and Berryman, J. (2002) Imaging and time reversal in random media. Inverse Probl., 18, 1247–1279. Blomgren, P., Papanicolaou, G., and Zhao, H.K. (2002) Super-resolution in time-reversal acoustics. J.Acoust. Soc. Am., 111 (1), 230–248. Prada, C. and Thomas, J.L. (2003) Experimental subwavelength localization of scatterers by decomposition of the time reversal operator interpreted as a covariance matrix. J. Acoust. Soc. Am., 114, 235–243. 67 4 Inverse Scattering Problems of Small Scatterers The chapter considers scatterers whose dimensions are much smaller than the wavelength, which are often referred to as small scatterers, point-like scatterers, or Rayleigh scatterers. The inverse scattering problem (ISP) of small scatterers consists of determining the locations and scattering strengths of small scatterers. For inverse scattering problems, it is very important to discuss small scatters before solving the problems involving extended scatterers. The reasons are threefold: First, ISPs involving small scatterers can be tackled by semi-analytical and fast algorithms, and their mathematical foundation is solid; Second, physical insights into scattering mechanisms of small scatterers can be obtained, which are significantly important in understanding the scattering problem involving extended scatterers; Third, imaging resolution is usually defined as the ability to resolve two small scatterers. This chapter first addresses scalar wave ISPs of small scatterers in Sections 4.1–4.3, and then discusses the vector wave counterpart in Section 4.4. Section 4.1 introduces the Foldy–Lax equation, which is the governing equation for the forward scattering problem. Section 4.2 presents the uniqueness theorem that states that the locations and scattering strengthes of small scatterers can be uniquely determined. Numerical methods for solving ISPs of small scatterers are presented in Section 4.3, which consists of two parts; the first one being the multiple signal classification (MUSIC) method that determines the locations of scatterers and the second one being the two-step least-squares method that retrieves scattering strengths of scatterers in a noniterative way. Section 4.4 discusses the vector wave ISP, which is not a simple generalization of its scalar counterpart. Physical insights and mathematical manipulations are presented so that the inversion algorithm not only is able to reconstruct small scatterers with special shapes but also improves imaging resolution. Section 4.5 briefly discusses several topics, such as the relation of the small-scatterer ISP to the problem of determining the direction of arrival (DOA). Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 68 Electromagnetic Inverse Scattering 4.1 Forward Problem: Foldy–Lax Equation The Foldy–Lax equation has been widely used as an efficient numerical approximation of multiple scattering of time-harmonic wave through a medium with many separated scatterers, the radii of which are much smaller than the wavelength. For a scatterer that is much smaller than wavelength, its scattering mechanism can be well approximated by a point with scattering strength 𝜏, which is defined as the ratio of the amplitude of induced source to the field illuminating at this scatterer. Assume that there are M point-like scatterers located at rm , m = 1, 2, … , M, with scattering strength 𝜏m , m = 1, 2, … , M, respectively. For a given time-harmonic incident field 𝜓 i , the total field 𝜓 t as a consequence of the interaction of the incident field with the M point scatterer consists of two parts, with the first being the original incident field and the second being the scattered field; that is 𝜓 t (r) = 𝜓 i (r) + M ∑ G(r, rm )[𝜏m 𝜓 t (rm )], (4.1) m=1 where G denotes the background Green’s function. Equation (4.1) applies to all spatial points except at the point scatterers r = rm , where the background Green’s function is singular. It is important to note that a point-like scatterer physically occupies an infinitely small but still finite volume. The scattering strength 𝜏m is defined as the ratio of the amplitude of induced source to the field illuminating at this scatterer, which automatically absorbs the self-field contribution at the point scatterer rm . Consequently, the total field 𝜓 t (rm ) denotes the total field illuminating at rm , instead of the field generated at the center rm of the small but finite scatterer. When evaluated at the M point-like scatterers, Eq. (4.1) is replaced by the so-called Foldy–Lax equations ([1] and section 7.2 of [2]) ∑ 𝜏m′ G(Xm , Xm′ )𝜓 t (rm′ ), (4.2) 𝜓 t (rm ) = 𝜓 i (rm ) + m′ ≠m Written in a compact format, the total field 𝜓 t is related to the incident field 𝜓 i by 𝜓 t = (I M − Φ ⋅ Λ)−1 ⋅ 𝜓 i , (4.3) where 𝜓 t is an M-dimensional column vector, 𝜓 t = [𝜓 t (r1 ), 𝜓 t (r2 ), … , 𝜓 t (rM )]T and the superscript T denotes the transpose. The column vector 𝜓 i is defined similarly. I M is an M-dimensional identity matrix. Λ is a diagonal matrix, with Λ(m, m) = 𝜏m for m = 1, 2, … , M. Φ is an M × M matrix, with the mth row and m′ th column (m, m′ = 1, 2, … , M) being Φ(m, m′ ) = G(rm , rm′ ) for m ≠ m′ and zero otherwise. Once the total field 𝜓 t is computed at every point-like Inverse Scattering Problems of Small Scatterers scatterer, the scattered field can be evaluated at an arbitrary spatial point from the definition of Eq. (4.1), 𝜓 s (r) = M ∑ G(r, rm )[𝜏m 𝜓 t (rm )]. (4.4) m=1 In practice, consider a total number of Ni incidences that are due to transmitters located at rip , p = 1, 2, ..., Ni . For each incidence, the scattered electric field is measured by an array of Ns receivers, which are located at rsq , q = 1, 2, ..., Ns . The scattering property of the collection of point-like scatterers is represented by a multistatic response (MSR) matrix K. The MSR matrix is of size Ns × Ni , with the element Kij representing the received field at the ith receivers when the jth transmitter is driven by a unitary source. From (4.3) and (4.4), we obtain the expression of K as K = GS ⋅ Λ ⋅ (I M − Φ ⋅ Λ)−1 ⋅ GI , (4.5) where GS is the scattering matrix of size Ns × M, with the element being GS (q, m) = G(rsq , rm ), and GI is the incident matrix of size M × Ni , with the element being GI (m, p) = G(rm , rip ). 4.2 Uniqueness Theorem for the Inverse Problem The inverse scattering problem of determining the locations and scattering strengths of small scatterers can be uniquely solved, under mild conditions. The key of the theoretical foundation lies in the injectivity of the so-called source-to-field mapping operator, which is presented in the Theorem 2.1 of [3]. In a nutshell, if we consider a radiation problem where sources are placed at the locations of point-like scatterers, then it is impossible for two different sources to generate the same radiation fields at a set of discrete measurement positions, as long as the number of measurement points is large enough. This section is somewhat oriented to theoretical and mathematical aspects. Readers should feel free to skip this section if their primary interests are not in theories and mathematical proofs. Since this section does not involve any implementation details, the skipping of this section will not affect the understanding of the rest sections. However, a good understanding of this section will deepen the understanding of inverse scattering problems involving small scatterers. Mathematically, the radiation problem can be defined as an operator Gs , which maps the complex amplitude of source 𝜆 ∈ ℂM at the positions of M point-like scatterers to the space C(ℝ3 ⧵{r1 , r2 , … , rM }) of continuous function 69 70 Electromagnetic Inverse Scattering on the three-dimensional spatial space excluding the M point-like scatterers r ∈ ℝ3 ⧵{r1 , r2 , … , rM }, (Gs 𝜆)(r) ∶= M ∑ G(r, rm )𝜆m (4.6) m=1 The ℂM denotes the M-dimensional complex vector space. In practice, radiated field is measured at a finite, say N, discrete positions r′1 , r′2 , … , r′N . The key ingredient of the Theorem 2.1 of [3] makes the following statement: Define the operator Γ: ℂM to ℂN , which is a discrete version of the Gs operator, by 𝜆 → {(Gs 𝜆)(r′1 ), (Gs 𝜆)(r′2 ), … , (Gs 𝜆)(r′N )}T . (4.7) Then there exists an integer N0 such that the operator Γ is one-to-one (i.e., injective) for N ≥ N0 . The proof of the injectivity of Γ will not be outlined here and interested readers are referred to [3]. Nevertheless, it is worth mentioning that an important step in proving this statement is to first prove the injectivity of Gs . This step is simple but important and we briefly discuss it here. Let 𝜆 ∈ ℂM , such that (Gs 𝜆)(r) = 0 for all r ∈ ℝ3 ⧵{r1 , r2 , … , rM }. When r tends to one of the points rm , the fact that G(r, rm ) approaches infinity yields that 𝜆m = 0 for every m = 1, 2, … , M. Thus, if two vectors of source 𝜆1 and 𝜆2 generate the same radiation field (Gs 𝜆1 )(r) = (Gs 𝜆2 )(r) for all r ∈ ℝ3 ⧵{r1 , r2 , … , rM }, then we conclude 𝜆1 = 𝜆2 . Intuitively, the injectivity of the operator Γ is equivalent to the injectivity of the operator Gs for all r ∈ ℝ3 ⧵{r1 , r2 , … , rM } when the number of measurements is sufficiently large. Roughly speaking, from the perspective of linear algebra, the injectivity of Γ can be understood as follows: when the number of equations is sufficiently large so that the rank of the resultant linear equational system is equal to the number of unknowns, there is one and only one solution. As corollaries, the injectivity of the source-to-field operator Gs theoretically justifies the uniqueness of position-locating and the retrieval of scattering strengths, which will be discussed in detail hereafter. 4.2.1 Inverse Source Problem The inverse source problem consists of determining the positions and amplitudes of a collection of point sources. When the number of measurements is sufficiently large, the solution to the inverse source problem is unique, which can be proven by contradiction. Assume, to the contrary, that there are positions {r01 , r02 , … , r0M′ } of another set of point sources that are different from the positions {r1 , r2 , … , rM } of exact point sources, such that the former set Inverse Scattering Problems of Small Scatterers of sources 𝜆′m′ generates the same radiation field as the second set of sources 𝜆m does; that is, M ∑ ′ G(r, r0m′ )𝜆′m′ = m′ =1 M ∑ G(r, rm )𝜆m , (4.8) m=1 Consider the case when the number of measurement point r is sufficiently large. Then the new set of amplitudes of sources {𝜆′1 , … , 𝜆′M′ , −𝜆1 , … , −𝜆M }, corresponding to the group of M′ + M points {r01 , … , r0M′ , r1 , … , rM }, generates null fields at sufficiently many measurement points. Since the injectivity of the operator Γ applies to any finite number of point sources, (4.8) contradicts the injectivity of the operator Γ. After the uniqueness of the position-locating is proven, the amplitudes of sources at those positions are unique, which is a direct conclusion of the injectivity of the operator Γ. Although this proof first proves the uniqueness of position-locating and then proves the uniqueness of the amplitudes of sources, in practice of solving an inverse source problem, it is difficult to first determine the positions of sources and then determine the amplitudes. A common approach is as follows. If the domain of interest (DOI) is discretized into Q points that are sufficiently dense so that all M point-like scatterers are located at those points. We use 𝜆 ∈ ℂQ , the vector of complex Q-tuples, to denote the amplitude of source at Q points. Since the amplitude of the source at points unoccupied by scatterers is zero, the vector 𝜆 is sparse due to M ≪ Q. The radiated field E(r′n ) is measured at sufficiently many discrete positions r′1 , r′2 , … , r′N . The inverse source problem of determining the locations and amplitudes of sources amounts to solving the following linear problem, Q ∑ G(r′n , rq )𝜆q = E(r′n ), n = 1, 2, … , N (4.9) q=1 subject to the sparsity of the vector 𝜆. The positions of point-like scatterers are automatically identified as entries with nonzero amplitude. This approach naturally treats the uniqueness and the reconstruction in a unified way. Though the solution to the problem is unique, it is unstable in presence of noise since this inverse problem is severely ill-posed. Nevertheless, [4] presents the mathematical theory that can recover point sources precisely, that is, determining the exact locations and amplitudes, by solving a convex optimization problem, provided that the distance between sources is above a certain threshold. Interested readers are referred to [4] and [5]. 4.2.2 Inverse Scattering Problem Different to the inverse source problem, the inverse scattering problem considers passive scatterers that are illuminated by several incident waves 71 72 Electromagnetic Inverse Scattering generated by certain known primary sources. For each incidence, scattered field can be considered as the re-radiation of secondary sources induced on scatterers. Thus, for a single incidence, the inverse scattering problem reduces to an inverse source problem. Since there are multiple incidences, the procedure of solving the inverse scattering problem is significantly different to that for inverse source problems. For an inverse scattering problem, it is feasible to first determine the positions of sources and then determine the amplitudes. The theorems presented in this section not only prove the uniqueness of the inverse scattering problem but also directly lead to numerical methods that will be presented in Section 4.3. Locating Positions When the numbers of incidences Ni and measurements Ns are large enough so that the rank of the MSR matrix K is equal to the number M of scatterers, the positions of point-like scatterers can be uniquely determined. For any position r, the Ns -dimensional vector Gs (r) = [G(rs1 , r), … , G(rsN , r)]T , s which is referred to as the background Green’s function vector evaluated at r, is in the range (K) of the MSR matrix K if and only if r ∈ {r1 , r2 , … , rM }. The range (K) of the Ns × Ni dimensional matrix K denotes the space of K ⋅ V for all Ni -dimensional vector V . In proving the sufficient and necessary conditions of the above theorem, it is important to realize from (4.5) the fact that the range of K is the span of the columns of the GS matrix; that is, Gs (rm ), m = 1, 2, … , M. Proof of sufficient condition: Consider, for example, r = r1 . Since Ni > M and the rank of the MSR matrix K is equal to the number M of scatterers, there exists an Ni -dimensional vector V that satisfies the linear equation system Λ ⋅ (I M − Φ ⋅ Λ)−1 ⋅ GI ⋅ V = [1, 0, … , 0]T . In other words, since the number of transmitters is larger than the number of scatterers, there are freedoms in choosing the amplitude of driving current at transmitters such that the incident fields illuminating at all scatterers, except the first one, are equal to zero. Proof of necessary condition: If there is an r0 , which is different from r1 , r2 , … , rM , so that its Ns -dimensional radiation vector is in the range of K, then the new set of radiation vectors Gs (rm ), m = 0, 1, 2, … , M., corresponding to the group of M + 1 points {r0 , r1 , r2 , … , rM }, is linearly dependent that, however, contradicts the injectivity of Γ. The theorem lays the foundation for a numerical method for positionlocating, that is, the multiple signal classification (MUSIC) imaging method, which will be introduced in Section 4.3.1. Retrieving Scattering Strength After the positions of scatterers are obtained, we will determine the scattering strengths of point-like scatterers. Since the inverse scattering problem for a single incidence is equivalent to the inverse source problem, the injectivity of the Γ operator that is defined in (4.7) can be used in this section. Inverse Scattering Problems of Small Scatterers Once the positions of scatterers are obtained, for any single incidence, the amplitude of source 𝜏m 𝜓 t (rm ) induced at those scatterers can be uniquely determined from the measured scattered field by solving (4.4). Consequently, the total field 𝜓 t (rm ) incident onto the mth scatterer is obtained from the Foldy–Lax equation (4.2). Finally, the scattering strength 𝜏m of the mth scatterer is obtained as the numerical ratio of 𝜏m 𝜓 t (rm ) to 𝜓 t (rm ). These steps will be implemented in detail in Section 4.3.2. 4.3 Numerical Methods The theorems presented in Section 4.2.2 that prove the uniqueness of the solution to inverse scattering problems directly lead to numerical methods of locating the positions and determining the scattering strengths of scatterers. Note that we assume that the numbers of incidences Ni and measurements Ns are so large that the rank of the MSR matrix K is equal to the number M of scatterers. In practice, the condition that the rank of the MSR matrix K is equal to M can be easily realized as long as M < min(Ni , Ns ), unless transmitters and receivers are placed in extremely special positions relative to scatterers, which rarely happens and thus is out of the scope of discussion [6]. 4.3.1 Multiple Signal Classification Imaging As stated in the theorem in Section 4.2.2, whether a spatial point r is the position of scatterers can be determined by testing whether the background Green’s function vector Gs (r) = [G(rs1 , r), … , G(rsN , r)]T is in the range of the s MSR matrix K. The range of a matrix can be obtained by the singular value decomposition (SVD) of the matrix. From section 2.6 of [7], the SVD of the K of size Ns × Ni could be represented as H K =U ⋅Σ⋅V , (4.10) where U is an Ns × Ns unitary matrix, that is, its columns are unitary vectors that are mutually orthogonal, V is an Ni × Ni unitary matrix, and Σ is a diagonal Ns × Ni matrix with nonnegative real numbers on the diagonal. The superscript H denotes Hermitian. The columns up of U are called the left singular vectors and the columns 𝑣p of V the right singular vectors. The diagonal elements 𝜎p of Σ are called the singular values and they are sorted in nonincreasing order, 𝜎1 ≥ 𝜎2 … ≥ 𝜎M > 0 and 𝜎p = 0 for p > M. The SVD of K has the following properties, K ⋅ 𝑣p = 𝜎p up , H K ⋅ up = 𝜎p 𝑣p (4.11) Due to the orthogonality of unitary vectors up , p = 1, 2, … , Ns , they form a set of orthonormal bases of ℂNs , the vector space of complex Ns -tuples. It is obvious 73 74 Electromagnetic Inverse Scattering that the space ℂNS can be decomposed into a direct sum of two orthogonal and complementary subspaces, = span{up , 𝜎p > 0} and = span{up , 𝜎p = 0}, that is, ℂNs = ⊕ , ⟂ (4.12) The range (K) of K denotes the space of K ⋅ V for all vector V ∈ ℂNi . It is obvious that unitary vectors 𝑣p , p = 1, 2, … , Ni form a set of orthonormal bases of ℂNi . From the property of (4.11), we conclude that the range (K) coincides with the subspace . Consequently, the orthogonality between and yields |uH p ⋅ Gs (rm )| = 0 for all 𝜎p = 0, m = 1, 2, … , M. Define a pseudospectrum as Φ(r) = ∑ 1 H 𝜎p =0 |up ⋅ Gs (r)|2 , (4.13) To determine whether the background Green’s function vector Gs (r) is in the range of the MSR matrix K is equivalent to determine whether the pseudospectrum Φ(r) goes to infinity. In other words, the positions of scatterers are identified as where the pseudospectrum Φ(r) blows up. The aforementioned subspace approach to determining the locations of scatterers is called the multiple signal classification (MUSIC). MUSIC was originated by Schmidt in 1979 and was used to determine the parameters of multiple wavefronts arriving at an antenna array from measurements made on the signals received at the array elements [8]. At its early stage, MUSIC was used to estimate of individual frequencies of multiple time-harmonic signals and to determine the direction of arrival (DOA) of signals, among other applications. Later, Devaney applied the MUSIC method to locate point-like scatterers in 2000, where the name TR-MUSIC method was coined since the method blends ideas of standard MUSIC with the decomposition of the time-reversal operator technique (DORT) [9–12]. Standard MUSIC works on determining parameters of active sources by decomposing the covariance matrix, whereas DORT detects the positions of scatterers where passive sources are induced by decomposing the time-reversal operator. The analogy between the covariance matrix and time-reversal operator is established in [13]. Actually, there is no need to differentiate the subtle differences of the previously mentioned algorithms, and they can all be referred to as MUSIC-type algorithms. In the signal processing community, the subspace is referred to as the signal subspace and the as the noise subspace. Here we consider a numerical example of the MUSIC method. The system under consideration is invariant in the z direction and the 2D problem in the x-y plane is considered. The incident electric field is parallel to the z-axis, and this scattering problem is called the transverse magnetic (TM) mode, where scalar wave equation is involved. Let N = 20 antennas that function as transceivers be Inverse Scattering Problems of Small Scatterers uniformly located in a line (y = 10𝜆, −10𝜆 ≤ x ≤ 10𝜆) outside the DOI. Let two cylinders be present in the DOI, which is otherwise free space. The cylinders are isotropic with relative permittivity 𝜖r = 10. The radius of the cylinders is 𝜆∕30, which is so small in comparison with the wavelength that cylinders can be treated as point-like scatterers. The cylinders are located at r1 = (−d∕2, 0) and r2 = (d∕2, 0), where d is the distance between the two cylinders. The size of the MSR matrix K is 20 × 20. First we consider the case when the separation d = 𝜆∕3. When there is no noise in the measured data, the base 10 logarithm of the singular values of the MSR matrix for noise-free is plotted in Fig. 4.1(a), where two singular values are significantly larger than the rest. This observation indicates that there are two point-like scatterers. The base 10 logarithm of the pseudospectrum is shown in Fig. 4.1(c), where two peaks occur at the positions of the two scatterers. Next, we add white Gaussian noise 𝜅 to the exact K. The noisy matrix 5 0 −5 −10 Noise Subspace 0 −1 −15 −20 Signal Subspace 1 Noise Subspace log10(σj) log10(σj) 2 Signal Subspace 0 −2 5 10 15 20 Singular Value Number (j) 0 (b) (a) 2 2 1 10 0 5 −1 y/ λ y/ λ 5 10 15 20 Singular Value Number (j) −0.5 1 −1 0 −1.5 −1 −2 0 −2 −2 0 x/ λ (c) 2 −2 −2 0 x/ λ 2 (d) Figure 4.1 MUSIC method is applied to locate two point-like scatterers separated by 𝜆∕3. (a) and (b): The base 10 logarithm of the singular values of the MSR matrix for noise-free and SNR = 30 dB cases, respectively. (c) and (d): The base 10 logarithm of the pseudospectrum for noise-free and SNR = 30 dB cases, respectively. 75 76 Electromagnetic Inverse Scattering K + 𝜅 is treated as the measured MSR matrix. The noise level is quantified ||K ||F by the signal-to-noise ratio (SNR) in dB defined as 20 log10 , where || ⋅ ||F ||𝜅 ||F denotes the Frobenius norm of a matrix, also called the Euclidean norm, which is defined as the square root of the sum of the absolute squares of all its elements. When SNR = 30 dB, Fig. 4.1(b) shows that the gap between the singular values of signal subspace and noise subspace becomes smaller compared with the noise-free case. Figure 4.1(d) shows two peaks at the positions of two scatterers, although the two peaks spread out and their contrast with respect to the background is reduced. Next, we investigate the effect of noise on the imaging resolution. Four separation distances d = 𝜆∕8, 𝜆∕4, 𝜆∕2, and 𝜆 are considered under the influence of four different levels of SNR: noise free, 20, 10, and 5 dB. The base 10 logarithm of the pseudospectrum for the line passing the two scatterers is plotted in Fig. 4.2. We observe that the noise has a significant impact on the resolution; that is, the larger the noise the poorer the resolution. It is important to note 1 d = λ/ 8 1 d = λ/ 4 0.5 0 −0.2 0.5 −0.1 0 0.1 0.2 0 −0.5 −0.25 x/ λ 0.25 0.5 0.5 1 x/ λ 1 d = λ/ 2 1 d=λ 0.5 0 −1 0 0.5 −0.5 0 x/ λ 0.5 1 0 −1 −0.5 0 x/ λ Figure 4.2 MUSIC pseudospectrum for two identical cylinders with four different separation distances under four different noise levels. The MUSIC pseudospectrum is plotted for the line passing the two scatterers and it is normalized so that the maximum value in each subfigure is 1. The SNR levels are: No noise (solid line), 20 dB (dash line), 10 dB (dotted line), and 5 dB (dash-and-dot line). Inverse Scattering Problems of Small Scatterers that the two scatterers separated by d = 𝜆∕8 can be resolved well when there is no noise. 4.3.2 Noniterative Retrieval of Scattering Strength Once the positions of scatterers are determined, the problem of retrieving scattering strengths from the MSR matrix Equation (4.5) is nonlinear. Such a nonlinear inverse problem is usually dealt with by an iterative numerical approach, where the forward problem is repeatedly solved during iterations of the optimization procedure, but iterative algorithms do not always yield a convergent result [9]. This section presents a two-step least-squares method, which is noniterative and can be easily implemented. Section 4.2.2 shows that once the positions of scatterers are determined, the scattering strengths of scatterers can be uniquely obtained for a single incidence. For example, consider the first incidence where the first transmitter is driven by a unitary source. The scattered field is given by the first column of the MSR matrix, K 1 = GS ⋅ Λ ⋅ (I M − Φ ⋅ Λ)−1 ⋅ GI 1 , (4.14) Define the total field 𝜓 t1 = (I M − Φ ⋅ Λ)−1 ⋅ GI 1 and induced source J 1 = Λ ⋅ t 𝜓 1 . The least-squares solution (section 7.4 of [7]) for the overdetermined prob- lem K 1 = GS ⋅ J 1 is † J 1 = GS ⋅ K 1 (4.15) where the superscript † denotes a pseudoinverse of a matrix. If the singular † H value decomposition of GS is U ⋅ Σ ⋅ V , then its the pseudoinverse is GS = V ⋅ ′ H Σ ⋅ U where the diagonal element Σ′ii = Σ−1 for Σii ≠ 0 and Σ′ii = 0 for Σii = 0. ii † H H In fact, this definition of pseudoinverse is equivalent to GS = (GS ⋅ GS )−1 ⋅ GS , which is the formula presented in Appendix B. Then from (4.2), the total field is given by 𝜓 t1 = GI 1 + Φ ⋅ J 1 (4.16) From the definition of scattering strength, we obtain 𝜏m = (J 1 )m ∕(𝜓 t1 )m , m = 1, 2, … , M (4.17) The above solution obtained under a single incidence is exact when there is no noise in a scattered field. In presence of noise, multiple incidences help to improve the accuracy of the solution. For all Ni incidences, induced sources can be written in a matrix by stacking column-wise single-incidence solution (4.15), † J = GS ⋅ K (4.18) 77 78 Electromagnetic Inverse Scattering Similarly, the total field for all incidences is given by t 𝜓 = GI + Φ ⋅ J (4.19) t For the mth scatterer, the mth rows of J and 𝜓 satisfy t Cm (J) = Cm (𝜓 )𝜏m , m = 1, 2, … , M (4.20) where Cm (⋅) denotes extracting the mth row of a matrix and then writing it as a column vector. By solving an overdetermined problem, the least-squares solution of 𝜏m is given t 𝜏m = [Cm (𝜓 )]† ⋅ Cm (J), m = 1, 2, … , M (4.21) We observe that the proposed two-step least-squares method does not require to iteratively evaluate the forward scattering problem. It is worth mentioning that the first noniterative analytical algorithm was proposed in [14], where the first step is to design a driving source vector that yields an exactly zero total field at positions of all scatterers except one. Numerical results have shown that this noniterative retrieval method is superior to the iterative numerical approach. Another noniterative retrieval algorithm proposed in [15] is essentially the same as the one presented in this section, but the physical meaning of the former is not as clear as that of the latter. Here we present a numerical example of retrieving the scattering strength. The experiments are in two-dimensional free space, which considers M = 4 point scatterers under illumination by a set of Ns = Ni = 7 transceivers; that is, transmitters coincidence with receivers. The transceiver array is a uniform linear array distributed in the x-axis and with six wavelength inter-element separation, where the wavelength 𝜆 = 1. The four targets are located in a Cartesian grid at positions (−2.25, −14.75), (−0.25, −14.75), (0.75, −15.75), and (2.75, −15.75), all in units of a wavelength. All targets have unit-amplitude scattering strengths; that is, 𝜏m = 1, m = 1, 2, 3, 4. We assume that the correct positions of the scatterers are already known. We add additive white Gaussian noises to the exact scattering data and treat the noise-contaminated data as measured data. The accuracy of the estimates is quantified by a normalized percentage error, which is also the same as that used in [14], defined by ̂ E = 100 ⋅ ‖𝜏−𝜏‖ , where ‖⋅‖ denotes the L2 vector norm (its Euclidean length), ‖𝜏‖ 𝜏 = [𝜏1 , 𝜏2 , … , 𝜏M ]T is the actual value of the scattering strengths, and 𝜏̂ is the estimation of the scattering strengths. The errors in our numerical experiments are averages over 1000 repetitions. Both the presented two-step least-squares method and the noniterative method described in [14] are employed to calculate the values of 𝜏m . The retrieval results are shown in Fig. 4.3. We clearly see that, the least-squares retrieval method gives a better estimation than the method in [14] does. The reason why the least-squares method outperforms the one proposed in [14] is that one of the key intermediate formulas in [14] Inverse Scattering Problems of Small Scatterers 10 Least Squares Retrieval Method CRB Result by Marengo 8 % Errors Figure 4.3 Comparison of the result obtained by the least-squares retrieval method and that given by Marengo in [14]. The errors are averages over 1000 repetitions. The Cramer–Rao bound (CRB) of the estimation is also shown. Reproduced from Chen 2007, J. Acoust. Soc. Am., 122, 1325–1327, [15], with the permission of the Acoustical Society of America. 6 4 2 0 20 22 24 26 SNR (dB) 28 30 32 cannot be fully satisfied in the presence of noise and consequently it propagates errors to the next step, whereas the least-squares retrieval method minimizes the error in L2 norm in every step. The retrieval result is also compared with the Cramer–Rao bound (CRB), which expresses a lower bound on the variance of estimators [16] (chapter 3). Using the formulas in the appendix of Ref. [6], we calculate the Fisher matrix I, and take the trace of the inverse of I as the CRB of the total variance of the four scattering strengths. In Fig. 4.3, we observe that the result obtained √by the proposed algorithm is close to that specified by the CRB (ECRB = 100 tr{I −1 } ‖𝜏‖ ). 4.4 Inversion of a Vector Wave Equation For a three-dimensional electromagnetic wave inverse scattering problem, the locations of small scatterers can be obtained by the MUSIC method and their scattering strength tensors can be determined by the two-step least-squares retrieval method as well. However, the methods for solving a vector wave ISP is not a simple generalization of its scalar counterpart. A major difference is that electromagnetic waves are able to induce up to six independent sources inside a smaller scatterer, whereas the scalar wave induces only one inside a small scatterer. Physical insights and mathematical manipulations are presented that not only are able to reconstruct small scatterers with special shapes but also improve the resolution of imaging. 4.4.1 Forward Problem Suppose there are M three-dimensional objects illuminated by time-harmonic electromagnetic waves radiated by an array of N transceiver antenna units. We 79 80 Electromagnetic Inverse Scattering mention in passing that, after minor modifications, the formulas presented in this section can be easily applied to the case where transmitters are separated from receivers. The transceiver antenna units are located at rs1 , rs2 , … , rsN , each of which consists of three small electric dipole antennas oriented in the x, y and z direction with electric current dipole moment Ilxn , Ilyn , Ilzn , respectively, n = 1, 2, … , N. The size of each of the M scatterers is much smaller than the wavelength so that Rayleigh scattering is observed. These scatterers can be of any shape, but here we consider only spherical and ellipsoidal objects for ease of presenting. The centers of the scatterers are located at r1 , r2 , … , rM . The scatterers may be made of dielectric and magnetic (permeable) materials, or perfect electric conductor (PEC), and may be isotropic or anisotropic. As introduced in Section 2.8, the shape and composing material of each small scatterer determine its polarization tenor 𝜉 m (𝜁 m ), m = 1, 2, … , M, which relates the induced electric (magnetic) current dipole Il(rm ) (Kl(rm )) inside the object to the total incident electric field Et (rm ) (magnetic field Ht (rm )) by Il(rm ) = 𝜉 m ⋅ Et (rm ) (4.22) Kl(rm ) = 𝜁 m ⋅ Ht (rm ) (4.23) The analytical expression of 𝜉 m (𝜁 m ) for isotropic and anisotropic spheres and ellipsoids can be found in Section 2.8 and [17]. The units of Il, 𝜉 and Et are A⋅m, m2 ∕Ω, and V/m, respectively, and their magnetic counter parts Kl, 𝜁and Ht have the units of V⋅m, m2 ⋅ Ω, and A/m, respectively. When multiple scattering between scatterers is taken into account, the total incident field Et (rm ) (Ht (rm )) upon the mth scatterer includes both the incident field directly from antennas Ei (rm ) (Hi (rm )) and the scattered fields from other scatterers. The total incident fields are governed by the Foldy–Lax equation, ∑ {i𝜔𝜇0 G(rm , rm′ ) ⋅ 𝜉 m′ ⋅ Et (rm′ ) Et (rm ) = Ei (rm ) + m′ ≠m − ∇g(rm , rm′ ) × [𝜁 m′ ⋅ Ht (rm′ )]} ∑ {i𝜔𝜖0 G(rm , rm′ ) ⋅ 𝜁 m′ ⋅ Ht (rm′ ) Ht (rm ) = Hi (rm ) + (4.24) m′ ≠m + ∇g(rm , rm′ ) × [𝜉 m′ ⋅ Et (rm′ )]} (4.25) where 𝜖0 and 𝜇0 are the permittivity and permeability of the homogeneous )g(r, r′ ) is the dyadic background medium, respectively, G(r, r′ ) = (I 3 + ∇∇ k2 0 Green’s function of the background medium. Since electric parameters E and 𝜉 have different SI units from their magnetic counterpart H and 𝜁, respectively, it is convenient to normalize them so that each pair has the same units. With the help of normalization, we write Eqs. (4.24) and (4.25) in the following Inverse Scattering Problems of Small Scatterers compact matrix form, 𝜓 t = 𝜓 i + Φ ⋅ Λ ⋅ 𝜓 t, (4.26) where both 𝜓 t and 𝜓 i are 6M-dimensional vectors, 𝜓 t = [Et (r1 )T , Et (r2 )T , … , Et (rM )T , 𝜂0 Ht (r1 )T , … , 𝜂0 Ht (rM )T ]T 𝜓 i = [Ei (r1 )T , Ei (r2 )T , … , Ei (rM )T , 𝜂0 Hi (r1 )T , … , 𝜂0 Hi (rM )T ]T The elements in both 𝜓 t and 𝜓 i have the same SI unit, V/m. Λ is a block diagonal matrix, Λ = diag[P1 , P2 , … , PM , PM+1 , PM+2 , … , P2M ], (4.27) where Pm = 𝜂0 𝜉 m for m ≤ M, Pm = (1∕𝜂0 )𝜁 m−M for m > M, and 𝜂0 is the impedance of the background medium. The elements in Λ have the same unit, m2 . Φ is a 6M-by-6M matrix, ] [ 𝛼, −𝛽 (4.28) Φ= 𝛽, 𝛼, where both 𝛼 and 𝛽 consist of M × M sub-matrices whose formulas in the mth row and m′ th column (m, m′ = 1, 2, … , M) are given by 𝛼(m, m′ ) = ik0 G(rm , rm′ ) and 𝛽(m, m′ ) = 𝜒(rm , rm′ ) in case of m ≠ m′ and are both equal to zero otherwise. The matrix operator 𝜒(r, r′ ) is defined in a way such that 𝜒(r, r′ ) ⋅ A = ∇g(r, r′ ) × A for an arbitrary vector A, and the exact expression is given by (2.42), which is copied here, 0 −(z − z′ ) (y − y′ ) ⎡ 0 −(x − x′ ) 𝜒(r, r′ ) = ⎢ (z − z′ ) ⎢ ′ ′ 0 ⎣ −(y − y ) (x − x ) ( ) ⎤ ⎥ g(r, r′ ) ik0 − 1 (4.29) ⎥ R R2 ⎦ The elements in Φ have the same unit, m−2 . It can be seen that every parameter in (4.26) is a normalized parameter. By using the Foldy–Lax equation, we obtain a 3N × 3N multi-static response (MSR) matrix that relates the scattered electric fields to the driving electric current dipoles (Il) K = GS ⋅ Λ ⋅ (I 6M − Φ ⋅ Λ)−1 ⋅ GI . (4.30) where I 6M is a 6M-dimensional identity matrix. GI is a 6M × 3N matrix, GI = 𝜂0 [G, X]T , and both G and X consist of N × M sub-matrices whose formulas in the nth row and mth column (n = 1, 2, … , N, m = 1, 2, … , M) are given by G(n, m) = ik0 G(rsn , rm ) and X(n, m) = 𝜒(rsn , rm ). Finally, GS = [G, −X]. The elements in both G and X have the same SI unit, m−2 . 81 82 Electromagnetic Inverse Scattering In electromagnetic wave inverse scattering problems, we need to consider nondegenerate and degenerate cases. In a nondegenerate case, three independent electric dipole components and three independent magnetic dipole components are induced in each of the scatterers, ending up with 6M independent dipole sources. Thus, the rank of the MSR matrix is equal to 6M in case of 6M < 3N. Note that the condition 6M < 3N is assumed throughout the chapter. In a degenerate case, which is due to special shapes or composing materials of the scatterers, the rank of the MSR matrix is less than 6M. 4.4.2 Multiple Signal Classification Imaging Nondegenerate Case In a nondegenerate case, six independent dipole components are induced in each scatterer, and the range of MSR matrix K is spanned by the background Green’s function vectors corresponding to the x, y, and z components of the electric and magnetic dipoles evaluated at the position of each scatterer; that is, { } Gx (rm ), Gy (rm ), Gz (rm ), X x (rm ), X y (rm ), X z (rm ); (K) = span m = 1, … , M where Gx (rm ), Gy (rm ) and Gz (rm ) are the [3(m − 1) + 1]th, [3(m − 1) + 2]th, and [3(m − 1) + 3]th column of the matrix G, respectively, and X x (rm ), X y (rm ) and X z (rm ) the [3(m − 1) + 1]th, [3(m − 1) + 2]th, and [3(m − 1) + 3]th column of matrix X, respectively. The Green’s function vectors Gl (r) and X l (r) (l = x, y, z) evaluated at an arbitrary position r can be similarly defined. On the other hand, the singular value decomposition of the MSR matrix could be H represented as K ⋅ 𝑣p = 𝜎p up and K ⋅ up = 𝜎p 𝑣p , p = 1, 2, … , 3N. The vector space of complex 3N-tuples ℂ3N can be decomposed into the direct sum of the range Sr = span{up , 𝜎p > 0} and the orthogonal complement subspace Sn = span{up , 𝜎p = 0} that is referred to as the noise subspace. The orthogonality between the subspace Sr and the noise subspace Sn yields |uH p ⋅ Gl (rm )| = 0 and |uH p ⋅ X l (rm )| = 0, for 𝜎p = 0, m = 1, 2, … , M and l = x, y, z. Define the MUSIC pseudospectrum as 1 Φ(r) = ∑ , (4.31) H 2 𝜎p =0 |up ⋅ f (r)| where the test function f (r) can be any linear combination of Gx (r), Gy (r), Gz (r), X x (r), X y (r), and X z (r). The pseudospectrum becomes infinite at the position of each scatterer. When scatterers are all nonmagnetic and there are 3M independent induced electric dipoles, the test function f (r) can be chosen as any linear combination of Gx (r), Gy (r), Gz (r). Similarly, if there is zero electric dipole but 3M independent magnetic dipoles are induced, the test function f (r) can be chosen as any linear combination of X x (r), X y (r), and X z (r). These two special cases are referred to as electric and magnetic nondegenerate cases, respectively. Inverse Scattering Problems of Small Scatterers Degenerate Case In the degenerate case, only one or two independent electric (or magnetic) dipole components are induced inside some of the scatterers. The following analysis deals with degenerate electric dipoles, and the case of degenerate magnetic dipoles can be analyzed similarly. If only one independent electric dipole component is induced inside one of the scatterers, that is, all dipoles induced in this scatterer are parallel to each other, the test function f (r) should represent the background Green’s function corresponding to an electric dipole source aligned with the induced dipole. Otherwise, the pseudospectrum cannot produce an infinite peak at the position of this scatterer. If two independent electric dipole components are induced inside one of the scatterers, that is, all dipoles induced in this scatterer are located in a plane, f (r) should represent the background Green’s function corresponding to an electric dipole source oriented in the aforementioned plane. Therefore, when the test function f (r) is a proper linear combination of the background Green’s functions associated with the x, y, and z components of the electric dipole source, f (r) = [Gx (r), Gy (r), Gz (r)] ⋅ 𝛼, ̂ (4.32) where 𝛼̂ = [𝛼x , 𝛼y , 𝛼z ]T is a unit vector representing the direction of the test electric dipole, so that the test dipole source is within the subspace spanned by the physically induced independent electric dipole components, the pseudospectrum will produce an infinite peak at the location of the scatterer. However, it is nontrivial to choose the correct value of 𝛼̂ since for an arbitrary test point r in the DOI, there may be zero, one, two, or three independent electric dipole components induced. If there is no electric dipole induced at a position, there is no point in finding the “correct” 𝛼̂ since there is no 𝛼̂ at all that produces an infinite peak at the test position. Moreover, since the discrete small scatterers occupy only a small fraction of the DOI, it is desirable for an algorithm to make a quick decision on whether there is an electric dipole induced at the test position. If the test function f (r) is properly chosen, the pseudospectrum will produce an infinite peak at a position where an electric dipole is induced; that is, uH ̂ = 0, p ⋅ [Gx (r), Gy (r), Gz (r)] ⋅ 𝛼 for 𝜎p = 0. (4.33) Writing Eq. (4.33) in the matrix form, we have W (r) ⋅ 𝛼̂ = 0, (4.34) where matrix W (r) is of size p0 × 3, where p0 is the number of vanishing singular values and it is larger than 3 in practice. For a test position r, if the rank of W (r) is equal to 3, the solution to Eq. (4.34) is a null vector, which contradicts with the fact that 𝛼̂ is a unit vector. In this case, there is no electric dipole induced at the test position. If the rank of W (r) is equal to 0, any unit vector 𝛼̂ is a solution to Eq. (4.34), which indicates that three independent electric dipole components are induced at the position. If the rank of W (r) is equal to 1, the 83 84 Electromagnetic Inverse Scattering solution to Eq. (4.34) forms a subspace spanned by two linearly independent unit vectors 𝛼̂ 1 and 𝛼̂ 2 , which is identical to the plane of the physically induced electric dipoles. If the rank of W (r) is equal to 2, there is one and only one independent unit vector 𝛼̂ satisfying Eq. (4.34), which is identical to the single direction of the physically induced electric dipoles. The above analysis is valid only when there is no noise in the MSR matrix. The extension of it to noisy data can be done by solving a minimization problem: H 𝛼̂ H ⋅ W (r)W (r) ⋅ 𝛼. ̂ 𝛼̂ = arg min H 𝛼̂ ⋅𝛼=1 ̂ (4.35) Note that “arg min” means the argument of the minimum. The well-known Rayleigh theorem [7](section 4.2) gives the solution of 𝛼, ̂ which is the eigenvector corresponding to the minimum eigenvalue of the 3 × 3 Hermitian matrix H W (r)W (r). The MUSIC pseudospectrum generated by the test electric dipole whose direction is given by (4.35) exhibits peaks at positions where at least one independent electric dipole is induced. We mention in passing that the test dipole direction given by Eq. (4.35) is in fact a generalization of the 2D solution [18] to a 3D scenario. The proposed best-testing-direction MUSIC method is tested through the following numerical example. The background medium is free space, the wavelength at the operating frequency is 𝜆 = 3 m, and the transceiver antenna units are distributed in a 9 × 9 grid pattern with increment 2.5 𝜆 in a plane z = 1.5 𝜆. The center of the grid is directly above the origin. The length of each antenna is short and can be treated as an electric dipole antenna. Two small scatterers are present. One is a needle and the other is a disk. Both the needle and the disk are made of PEC, and their geometries are described as spheroids. The major and minor semi-axes of the needle are a1 = 1∕30 𝜆 and b1 = 1∕1200 𝜆, respectively, and the major and minor semi-axes of the disk are a2 = 1∕60 𝜆 and b2 = 1∕2400 𝜆, respectively. Note that the ratios of their major axes to minor axes are both equal to 40. The electric and magnetic polarization tensors for a needle made of PEC is given by (Section 2.8.1) [ ] a31 k 8𝜋 2 8𝜋 2 4𝜋 𝜉 = −i ⋅ diag , (4.36) ab, ab, 𝜂0 3 1 1 3 1 1 3 ln(a1 ∕b1 ) ] [ 8𝜋 8𝜋 4𝜋 (4.37) 𝜁 = −ik𝜂0 ⋅ diag − a1 b21 , − a1 b21 , − a1 b21 . 3 3 3 Since a1 ∕b1 ≫ 1, the induced electric dipole along the needle direction (the z-axis) is much more dominant than other electric dipoles and magnetic dipoles [19]. The electric and magnetic polarization tensors for a disk made of PEC is given by (Section 2.8.1) ] [ k 16 3 16 3 4𝜋 2 (4.38) 𝜉 = −i ⋅ diag a2 , a2 , a2 b 2 , 𝜂0 3 3 3 ] [ 4𝜋 4𝜋 8 (4.39) 𝜁 = −ik𝜂0 ⋅ diag − a22 b2 , − a22 b2 , − a32 . 3 3 3 Inverse Scattering Problems of Small Scatterers Since a2 ∕b2 ≫ 1, two components of induced electric dipoles, both of which are in the plane of the disk (the xy plane), and one component of induced magnetic dipoles that is aligned with the normal direction of the disk (the z-axis) are much more dominant than other components of electric and magnetic dipoles [19]. The needle is located at the origin, with orientation Euler angles (𝜋∕3, 𝜋∕4, 0) [20] (section 3.3), and the disk is located at (0.05𝜆, 0.05𝜆, 0.05𝜆), with orientation Euler angles (0, 𝜋∕6, 0). Thus the dominant electric dipole induced in the needle is in the direction (sin(𝜋∕4) cos(𝜋∕3), sin(𝜋∕4) sin(𝜋∕3), cos(𝜋∕4)). The dominant magnetic dipole induced in the disk is in the normal direction of the disk, (sin(𝜋∕6), 0, cos(𝜋∕6)), and the dominant components of electric dipoles are in the plane of the disk. In numerical simulations, we plot a logarithmic normalized MUSIC pseudospectrum 1 , (4.40) Φ(r) = log10 √ √∑ ̂ (r)|2 √ 𝜎 =0 |uH ⋅ f p √ p p0 instead of the original one defined in Eq. (4.31), where p0 is the number of singular values that are vanishing (in practice, smaller than a certain threshold) and f̂ (r) = f (r)∕||f (r)|| is a normalized test function. Since both up and f̂ (r) are unit vectors, the denominator of Eq. (4.40) represents an averaged orthogonality between the test vector and the singular vectors corresponding to vanishing singular values. First, we use noise-free MSR matrix to produce MUSIC pseudospectrum, where the test function is associated with the x̂ -oriented electric or magnetic dipole. We can also choose other arbitrary testing directions, such as ŷ and ẑ , since we do not know a priori the geometry of scatterers. Nevertheless, the arbitrarily chosen direction is unlikely to be the same as the directions of the aforementioned four dominant dipoles. The pseudospectra for test positions in the z = 0 and z = 0.05 𝜆 planes are shown in Fig. 4.4. We see that both scatterers are detected. Similar results are produced by the test function associated with the ŷ or ẑ oriented electric and magnetic dipoles. The reason for this is that although the aforementioned four dipole components are dominant, the other eight dipole components also contribute to the scattered field so that the range of the MSR matrix is spanned by a total of 12 Green’s functions associated with the three electric and three magnetic dipoles at each scatterer. We plot the 30 largest singular values of the MSR matrix in Fig. 4.5 (a), where we see four dominant singular values and the next eight singular values are much larger than the rest so that the range of the MSR matrix is spanned by the singular vectors corresponding to the 12 leading singular values. However, the results are quite different when the MSR matrix is contaminated with noise. When 30 dB Gaussian noise is added to the MSR matrix, its 30 largest singular values are plotted in Fig. 4.5(b). Compared with Fig. 4.5(a), 85 Electromagnetic Inverse Scattering 0.1 12 10 0 8 6 –0.05 14 12 0.05 y (λ) y (λ) 0.1 14 0.05 10 0 8 6 –0.05 4 4 0.1 0 x (λ) (a) 0.05 –0.1 –0.1 –0.05 0.1 0.1 14 12 0.05 10 0 –0.05 0 x (λ) (b) 0.05 0.1 14 12 0.05 8 y (λ) –0.1 –0.1 –0.05 y (λ) 86 6 –0.05 10 0 8 6 4 –0.1 –0.1 –0.05 0 x (λ) (c) 0.05 0.1 4 –0.1 –0.1 –0.05 0 x (λ) (d) 0.05 0.1 Figure 4.4 Logarithmic pseudospectrum for test positions in the z = 0 plane for (a) and (b), and in the z = 0.05 𝜆 plane for (c) and (d). The MSR matrix is noise-free. The testing sources are: (a) an electric dipole oriented in the x-axis (the position of the needle is correctly detected); (b) a magnetic dipole oriented in the x-axis (the position of the needle is correctly detected); (c) an electric dipole oriented in the x-axis (the position of the disk is correctly detected); and (d) a magnetic dipole oriented in the x-axis (the position of the disk is correctly detected). Source: Chen 2008, Journal of Physics: Conference Series, 124, 012016. [39] Reproduced with permission of IOP Publishing. Fig. 4.5(b) shows that although the first four singular values are still dominant the next eight are contaminated with noise and are in the same level in magnitude as the rest singular values. The pseudospectra with the test function corresponding to the x̂ oriented electric or magnetic dipoles are plotted in Fig. 4.6. Compared with Fig. 4.4, the values of peaks in the pseudospectra in Fig. 4.6 are much smaller and the peaks spread out. Moreover, the positions of the peaks do not agree with those of the scatterers. Thus the pseudospectra generated from the test function associated with the x̂ oriented electric or magnetic dipole that is different from the directions of the aforementioned four dominant dipoles fail to locate the needle and the disk. Next, for the noisy MSR matrix, we produce the MUSIC pseudospectrum in Fig. 4.7 with the orientation of the test dipole given by Eq. (4.35). The needle is −8 −10 −12 −14 −16 −18 −20 −22 −24 log10(σj) log10(σj) Inverse Scattering Problems of Small Scatterers 0 5 10 15 20 25 Singular value number, j −8 −10 −12 −14 −16 −18 −20 −22 −24 30 0 5 10 15 20 25 Singular value number, j (a) 30 (b) Figure 4.5 Thirty largest singular values of the MSR matrix. (a) Noise-free and (b) 30 dB Gaussian noise. Source: Chen 2008, Journal of Physics: Conference Series, 124, 012016. [39] Reproduced with permission of IOP Publishing. 0.1 2 1.9 0 1.8 1.75 0.05 y (λ) 2.1 0.05 y (λ) 0.1 2.2 1.7 0 1.65 1.8 –0.05 0.1 1.6 0 x (λ) (a) 0.05 0.1 y (λ) –0.1 –0.1 –0.05 0.1 2.2 2.1 0.05 2 1.9 0 1.6 –0.05 1.55 0 x (λ) (b) 0.05 0.1 1.8 1.75 1.7 0 1.65 1.8 –0.05 –0.1 –0.1 –0.05 1.7 1.6 0 x (λ) (c) 0.05 0.1 1.5 1.85 0.05 y (λ) –0.1 –0.1 –0.05 1.7 1.6 –0.05 1.55 –0.1 –0.1 –0.05 0 x (λ) (d) 0.05 0.1 1.5 Figure 4.6 Logarithmic pseudospectrum for test positions in the z = 0 plane for (a) and (b), and in the z = 0.05 𝜆 plane for (c) and (d). The MSR matrix is contaminated with Gaussian noise, where SNR = 30 dB. The testing sources are: (a) an electric dipole oriented in the x-axis (the position of the needle is not detected); (b) a magnetic dipole oriented in the x-axis (the position of the needle is not detected); (c) an electric dipole oriented in the x-axis (the position of the disk is not detected); and (d) a magnetic dipole oriented in the x-axis (the position of the disk is not detected). 87 Electromagnetic Inverse Scattering 0.1 3 0 2.5 –0.05 2.4 2.3 2.2 2.1 2 1.9 1.8 1.7 0.05 y (λ) y (λ) 0.1 3.5 0.05 0 –0.05 2 0.1 0 x (λ) (a) 0.05 3.4 3.2 3 2.8 2.6 2.4 2.2 2 1.8 0.05 0 –0.05 –0.1 –0.1 –0.05 –0.1 –0.1 –0.05 0.1 0 x (λ) (c) 0.05 0.1 0.1 0 x (λ) (b) 0.05 0.1 3.2 3 2.8 2.6 2.4 2.2 2 1.8 0.05 y (λ) –0.1 –0.1 –0.05 y (λ) 88 0 –0.05 –0.1 –0.1 –0.05 0 x (λ) (d) 0.05 0.1 Figure 4.7 Logarithmic pseudospectrum for test positions in the z = 0 plane for (a) and (b), and in the z = 0.05 𝜆 plane for (c) and (d). The MSR matrix is contaminated with Gaussian noise, where SNR = 30 dB. The orientation of the test dipole is given by Eq. (4.35). (a) An electric test dipole (the position of the needle is correctly detected); (b) a magnetic test dipole (the position of the needle is not correctly detected); (c) an electric test dipole (the position of the disk is correctly detected); and (d) a magnetic test dipole (the position of the disk is correctly detected). correctly located by the test function associated with an electric dipole and its position, that is, the peak of the pseudospectrum as shown in Fig. 4.7 (a), reads (0.002 𝜆, 0.001 𝜆, 0.000 𝜆), which is very close to the actual position (the origin). In comparison, Fig. 4.7 (b) shows that the needle is not correctly located by the test function associated with a magnetic dipole since there is no dominant magnetic dipole in the needle. Figure 4.7 (c) and (d) show that the position of the disk is correctly predicted by the electric and the magnetic test dipole. We read, from the pseudospectrum, the position of the disk to be (0.050 𝜆, 0.051 𝜆, 0.050 𝜆), very close to actual location of the disk. 4.4.3 Noniterative Retrieval of Scattering Strength Tensors The polarization tensors of scatterers can be retrieved after the positions of scatterers are located by the MUSIC method. This section presents a two-step Inverse Scattering Problems of Small Scatterers least-squares noniterative retrieval algorithm that applies to both nondegenerate and degenerate objects. Consider the case where either electric or magnetic dipole is not induced inside some scatterers; this is, Pm in Eq. (4.27) is a zero matrix for those scatterers. Define the matrix Lm (m = 1, 2, … , M), which is a zero matrix of size 3 × 3 if no electric dipole is induced in the mth scatterer, and is an identity matrix I 3 otherwise. The matrix Lm for m = M + 1, M + 2, … , 2M is defined similarly. Note that Lm can be easily determined from MUSIC pseudospectrum corresponding to an electric or magnetic test dipole. A matrix L is formed by diagonally connecting Lm (m = 1, 2, … , 2M) in sequence, followed by removing columns whose elements are all zero. The size of L is 6M × 3Itot , where Itot is the sum of the number of scatterers within which at least one electric dipole is induced and the number of scatterers within which at least one magnetic dipole is induced. Then the original rank deficient matrix in Eq. (4.27), of size 6M × 6M, can be effectively expressed as ′ T Λ=L⋅Λ ⋅L , (4.41) ′ where Λ , of size 3Itot × 3Itot , is constructed by diagonally concatenating the nonzero Pm , m = 1, 2, … , 2M. The substitution of Eq. (4.41) into Eq. (4.30) yields the MSR matrix K in terms ′ of Λ ′ T ′ T K = GS ⋅ L ⋅ Λ ⋅ L ⋅ (I 6M − Φ ⋅ L ⋅ Λ ⋅ L )−1 ⋅ GI (4.42) Define a 6M × 3N matrix 𝜓 tot , which is the total fields incident onto the scatterers, as ′ T 𝜓 tot = (I 6M − Φ ⋅ L ⋅ Λ ⋅ L )−1 ⋅ GI (4.43) and define a 3Itot × 3N matrix J, which is the induced current dipole moment, as ′ T J = Λ ⋅ L ⋅ 𝜓 tot (4.44) The noniterative retrieval algorithm consists of two steps. In the first step, we treat J as an unknown in Eq. (4.42), the least-squares solution of which is given by J = (GS ⋅ L)† ⋅ K, (4.45) where † denotes pseudoinverse of a matrix. In the second step, since 𝜓 tot comprises of the incident wave coming directly from transmitting antennas and incident wave due to multiple scattering, we can write (4.44) as ′ T J = Λ ⋅ L ⋅ (GI + Φ ⋅ L ⋅ J). (4.46) 89 90 Electromagnetic Inverse Scattering ′ Since the matrix Λ consists of diagonal blocks, (4.46) can be written as three-row block-wise equations, T ′ C3,i (J) = Λi ⋅ C3,i [L ⋅ (GI + Φ ⋅ L ⋅ J)], i = 1, 2, … , Itot , ′ Λi (4.47) ′ where 3 × 3 matrix is the ith block matrix in the diagonal of Λ and the 3 × 3N matrix C3,i (J) denotes the corresponding ith block row of J. Finally, the least ′ squares solution of Λ is obtained as ′ T Λi = C3,i (J) ⋅ {C3,i [L ⋅ (GI + Φ ⋅ L ⋅ J)]}† , i = 1, 2, … , Itot . (4.48) Note that (4.48) yields an exact solution when there is no noise in the measurement of the MSR matrix K and the positions of scatterers are exactly estimated by the MUSIC pseudospectrum. The retrieval error noticeably depends on the accuracy of the estimation of the locations of the scatterers. Various numerical simulation results show that the retrieval error is drastically reduced when the error in the estimation of the positions of the scatterers is decreased. This observation agrees with the retrieval method presented in [9, 21]. As an example, we apply the presented two-step least-squares retrieval method to retrieve the polarization tensors of the scatterers discussed in Section 4.4.2. In the presence of 30 dB of white Gaussian noise, after the positions of the scatterers are obtained, the retrieval method yields a normalized percentage error E = 3.23%. We briefly mention that the first noniterative analytical algorithm to retrieve scattering strengths in the electromagnetic inverse scattering problem is presented in [21]. However, it applies only to the nondegenerate case, where six independent electric and magnetic dipole components are induced in each scatterer; that is, both 𝜉 m and 𝜁 m , m = 1, 2, … , M, are invertible. This restriction refrains the method from applying to two types of media. The first one is those in which only one or two electric or magnetic independent dipoles can be induced. The second one is those in which either electric or magnetic dipole is absent. In comparison, the noniterative retrieval algorithm presented in this section applies to both nondegenerate and degenerate objects. 4.4.4 Subspace Imaging Algorithm with Enhanced Resolution Electromagnetic MUSIC imaging is different from its counterpart in acoustic MUSIC imaging in two aspects. The first is regarding degenerate scatterers inside which only one or two independent components of an electric (or magnetic) dipole are induced due to special shapes or composing materials of the scatterers, and this topic has been discussed in Section 4.4.2. The second is regarding the effect of test source on the resolution of MUSIC pseudospectrum. Different from the monopole test source in acoustic imaging, the test source in electromagnetic imaging is an electric or magnetic dipole. Although Inverse Scattering Problems of Small Scatterers the test dipole can be oriented in any direction in the noise-free case for nondegenerate scatterers, the MUSIC pseudospectrum depends noticeably on the orientation of the test dipole in noisy scenarios. This section presents an algorithm to obtain the direction of the test dipole that yields enhanced resolution, and what is equally important is that the proposed method can deal with degenerate cases as well. Different from standard MUSIC algorithms that search for the test dipole direction so that the corresponding Green’s function vector is orthogonal to the noise subspace, the proposed algorithm determines the test dipole direction so that the corresponding Green’s function vector is located in a subspace of the signal subspace. In a nutshell, the motivation of the algorithm is that it is not mandatory for all singular vectors that are in signal subspace to involve in evaluating the pseudospectrum. For example, for a single small nonmagnetic isotropic spherical scatterer, the MSR matrix has three nonzero singular values and the signal subspace is spanned by the first three singular vectors. If all three singular vectors are used to evaluate the pseudospectrum, that is, determining whether the test Green’s vector is within the signal subspace, then the test dipole can be in any direction. However, since we have the freedom to choose the direction of the test dipole, we may choose it as the direction of dipole that is induced in the spherical scatterer when the largest singular value occurs. Consequently, the second and third singular vectors are not involved in calculating the pseudospectrum. It can be seen that the pseudospectrum generated in this way is better than standard MUSIC pseudospectrum because the singular vector associated with the largest singular value is more stable than the other two singular vectors when noise is present. In this section, we know a priori that scatterers are all nonmagnetic and consequently we only consider the electric dipole. To find the optimal test dipole direction is equivalent to determine 𝛼̂ ∈ ℂ3 subject to ||𝛼|| ̂ = 1, so that the solution x ∈ ℂ3N to the equation K ⋅ x = D3 (r) ⋅ 𝛼̂ (4.49) is most robust in the presence of noise, where the 3N × 3 matrix D3 (r) is defined as [Gx (r), Gy (r), Gz (r)]. In fact, the right-hand side of (4.49) is a shorthand of (4.32). The SVD of K is given by K= 3N ∑ ui 𝜎i 𝑣H i . (4.50) i=1 where 𝜎1 ≥ 𝜎2 ≥ … , ≥ 𝜎3N ≥ 0. The least-squares solution of x is given by x= 3N ∑ uH ⋅ D3 (r) ⋅ 𝛼̂ i i=1 𝜎i 𝑣i for 𝜎i ≠ 0 (4.51) 91 92 Electromagnetic Inverse Scattering Note that the value of 1 𝜎i is large for a small 𝜎i . To obtain a stable solution x, ⋅ D3 (r) ⋅ 𝛼̂ is nonzero for only the first few items. we should find 𝛼̂ so that uH i It worth mentioning that even if in case of truncated singular value decomposition, that is, the regularization method is used, it is desirable to have a fast decaying series of uH ⋅ D3 (r) ⋅ 𝛼. ̂ Since ui form a set of orthogonal bases in i ℂ3N , we need to find 𝛼̂ so that D3 (r) ⋅ 𝛼̂ is a linear combination of the first few (say L) ui . L ∑ 𝜆i ui = D3 (r) ⋅ 𝛼. ̂ (4.52) i=1 The proposed MUSIC algorithm is based on the analysis of the induced electric current dipoles in the eigenstate, which is referred to as the eigen-dipole here(i) after. We use J m ∈ ℂ3 to denote the dipole induced in the mth scatterer in the ith eigen-state. We have ui = M ∑ (i) D3 (rm ) ⋅ J m , i = 1, 2, … , L. (4.53) m=1 The substitution of (4.53) into (4.52) yields M ∑ D3 (rm ) ⋅ L ∑ m=1 (i) 𝜆i J m = D3 (r) ⋅ 𝛼. ̂ (4.54) i=1 There are two cases to be considered: (1) when the test position r is not at any of the scatterers, rm , and (2) r is at one of the scatterers. It is important to stress that the map from induced dipoles to scattered electric fields is one-to-one, which has been proven in Section 4.2. When the test position r is not at any of the scatterers, (4.54) holds only if 𝛼̂ = 0 and 𝜆i = 0. H Therefore, for any dipole direction 𝛼, ̂ which satisfies ||𝛼|| ̂ = 1, ui ⋅ D3 (r) ⋅ 𝛼̂ is not equal to zero for all 3N left singular vectors ui . When r is at one of the scatterers, for example, r = r1 , (4.54) requires L ∑ (i) J 1 𝜆i = 𝛼̂ (4.55) i=1 L ∑ (i) J m 𝜆i = 0, m = 2, 3, … , M (4.56) i=1 Equation (4.56) amounts to determining the minimum value of L so that J̃ (1) , J̃ (2) , …, J̃ (L) are linearly dependent, where J̃ (i) is a column vector of length (i) 3(M − 1) consisting of J m , m = 2, 3, … , M. Therefore, the value of minimum L is equal to one plus the total number of independent dipoles induced in all other scatterers (numbering 2, 3, … , M). For example, for M isotropic spheres, Inverse Scattering Problems of Small Scatterers there are 3M non-zero singular values in total and the value of L equals to 3M − 2. It is stressed that the algorithm also applies to degenerate cases. For example, if only the first scatterer is disk-like, then there are 3M − 1 nonzero singular values in total and the value of L is equal equal to 3M − 2. If only the first scatterer is needle-like, then there are 3M − 2 nonzero singular values in total and the value of L is still equal to 3M − 2. When the sampling point r is at other scatterers, the results can be similarly obtained. To summarize, when the test point r is at one of the scatterers, the value of minimum L is equal to one plus the total number of independent dipoles induced in other scatterers. In practice, the value of L can be easily obtained after the total number of dominant singular values is found from the SVD spectrum. From the previous analysis, it is easy to conclude that the value of integer L has three possibilities. It might be equal to the total number D of dominant singular values, D − 1, or D − 2, depending on the case of degeneracy of the scatterers. Thus, for a given SVD spectrum, we try three times at most in order to obtain the best value of L. Once the value of L is determined, the next step is to obtain the test dipole ̂ = 1. As discussed earlier, the purpose is to let direction 𝛼̂ ∈ ℂ3 , subject to ||𝛼|| D3 (r) ⋅ 𝛼̂ be as close as possible to the space spanned by the first L dominant singular vectors ui ; that is, we aim at a minimum projection-angle between the vector D3 (r) ⋅ 𝛼̂ and the space spanned by the singular vectors ui , i = 1, 2, … , L: ∑L H |ui ⋅ D3 (r) ⋅ 𝛼| ̂ 2 𝛼̂ max = arg max𝛼̂ i=1 . (4.57) |D3 (r) ⋅ 𝛼| ̂ 2 Note that “arg max” means the argument of the maximum, that is, the point at which the function value is maximized. From the general eigenvalue decomposition, we obtain the solution 𝛼̂ that is given by the eigenvector corresponding to the maximum eigenvalue of the matrix (D3 (r)H ⋅ D3 (r))−1 ([U ⋅ D3 (r)]H [U ⋅ D3 (r)]), where U = [u1 , u2 , … , uL ]H . The proposed inversion method is tested through numerical simulations in two scenarios, the noise free case and noise-contaminated case. We assume that three small spheres are located at r1 = (0.084 𝜆, 0.196 𝜆, 0.084 𝜆), r2 = (−0.168 𝜆, −0.056 𝜆, −0.112 𝜆) and r3 = (−0.196 𝜆, −0.084 𝜆, 0.140 𝜆). The first two are isotropic spheres with permittivity 𝜖1 = 𝜖2 = 2𝜖0 , while the third is a rotated anisotropic sphere with permittivity tensor 𝜖 3 = diag[𝜖0 , 3𝜖0 , 9𝜖0 ] and rotation Euler angles (𝜓, 𝜙, 𝜃) = (𝜋∕4, 𝜋∕3, 3𝜋∕8) [20] (section 3.3). These three spheres are electrically small, with the same radius a = 𝜆∕30. Note that the smallest distance between the centers of spheres is 0.255 𝜆 (the distance between the second and the third one) and, for convenience in depicting the test results, all three spheres are chosen to locate in the y = x + 0.112 𝜆 plane. It can easily be seen from the constitutive parameters of the scatterers that there are up to eight independent secondary sources induced at the three scatterers. 93 Electromagnetic Inverse Scattering There are 16 antenna units employed in this simulation, half of which are aligned along the y-axis while the other half aligned along the z-axis in the x = −13 𝜆 plane. The two linear arrays are centered at (−13 𝜆, −9 𝜆, 11 𝜆) with 5 𝜆 separation distance between neighboring units. For the noise free case, the MSR matrix is calculated by (4.30). The singular values of the MSR matrix are shown in Fig. 4.8(a), in which we see that the first eight singular values are much larger than the rest, since they correspond to the eight singular vectors spanning the signal subspace. Figure 4.8(b), Fig. 4.8(c), and Fig. 4.8(d) are the pseudospectrum in the y = x + 0.112 𝜆 plane obtained by the standard MUSIC method using x-, y-, and z-oriented test dipoles, respectively. Not surprisingly, the standard MUSIC algorithm locates only the first two isotropic spheres and fails to locate the third degenerate anisotropic target. Here, since the value in pseudospectrum is too large at the positions of the scatterers, we plot the base 10 logarithm of it, and the horizontal and vertical −5 0.2 −10 0.1 z (λ) log10(σj) 0 −15 −20 −25 30 20 0 −0.1 0 20 40 Singular Value Number (j) 0.2 0.1 25 0.1 20 0 15 −0.1 10 0.1 z (λ) 30 (c) 0.1 (b) 0.2 –0.2 –0.1 0 x (λ) 10 –0.2 –0.1 0 x (λ) (a) z (λ) 94 30 20 0 −0.1 10 –0.2 –0.1 0 x (λ) 0.1 (d) Figure 4.8 Singular values and the pseudospectrum obtained by the standard MUSIC algorithm in the noise free case. (a) The base 10 logarithm of the singular values of the MSR matrix (j = 1, 2, … , 48). (b), (c), and (d) are the base 10 logarithm of the pseudospectrum in y = x + 0.112 𝜆 plane obtained by the standard MUSIC algorithm with test dipoles in x, y, and z directions, respectively. Source: Chen 2009, Inverse Problems, 25, 015008. [40] Reproduced with permission of IOP Publishing. Inverse Scattering Problems of Small Scatterers 0.2 2.5 2 0 −0.1 z (λ) z (λ) 0.1 3.5 0.1 3 0 0.1 0.1 10 0 5 −0.1 0.1 15 0.2 z (λ) 0.2 z (λ) 0.1 (b) 15 (c) 2 –0.2 –0.1 0 x (λ) (a) –0.2 –0.1 0 x (λ) 2.5 −0.1 1.5 –0.2 –0.1 0 x (λ) 0.2 0.1 10 0 5 −0.1 –0.2 –0.1 0 x (λ) 0.1 (d) Figure 4.9 Pseudospectrum obtained by the proposed MUSIC algorithm in the noise free case. (a), (b), (c), and (d) are the base 10 logarithm of the pseudospectrum in the y = x + 0.112 𝜆 plane obtained by the proposed MUSIC algorithm corresponding to the L = 4, 5, 6, and 7 cases, respectively. Source: Chen 2009, Inverse Problems, 25, 015008. [40] Reproduced with permission of IOP Publishing. axes in Fig. 4.8(b), Fig. 4.8(c), and Fig. 4.8(d) are the x and z coordinate of spatial points in the y = x + 0.112 𝜆 plane, so do the cases hereafter. The pseudospectrum obtained by the proposed MUSIC algorithm is shown in Fig. 4.9 with L = 4, 5, 6, and 7. From these results, we see that, to locate the first two isotropic spheres, we only need L = 6, but, to locate the third degenerate anisotropic sphere, we need L = 7. This is because when locating either of the first two isotropic spheres, the remaining two spheres only have five independent induced dipoles, which means that L = 6 is sufficient for (4.56) to have exact solutions; but, when we locate the third degenerate sphere, the remaining two isotropic spheres have totally six independent induced dipoles, thus only when L = 7 can we solve (4.56). For the L = 4 and 5 cases, since the L is not large enough to solve (4.56), none of the three scatterers can be located precisely. If L is further increased to 8 and 9, the result will be almost the same as the one in L = 7 case, which are not presented here. For the noise-contaminated case, we add white Gaussian noise to the MSR matrix so that SNR = 30 dB. Figure 4.10(a) shows the singular values of the 95 Electromagnetic Inverse Scattering × 107 0 3 z (λ) log10(σj) 0.2 −5 0.1 2 0 1 −0.1 0 20 40 Singular Value Number (j) (a) –0.2 –0.1 0 x (λ) 3 0.2 0.1 2 0 1 −0.1 –0.2 –0.1 0 x (λ) (c) 0.1 0.1 (b) × 107 × 107 2.5 0.2 z (λ) −10 z (λ) 96 2 0.1 1.5 0 1 −0.1 0.5 –0.2 –0.1 0 x (λ) 0.1 (d) Figure 4.10 Singular values and the pseudospectrum obtained by the standard MUSIC algorithm in a noise-contaminated case (30 dB). (a) The base 10 logarithm of the singular values of the MSR matrix (j = 1, 2, … , 48). (b), (c), and (d) are the pseudospectra in y = x + 0.112 𝜆 plane obtained by the standard MUSIC algorithm with test dipoles in x, y, and z directions, respectively. Source: Chen 2009, Inverse Problems, 25, 015008. [40] Reproduced with permission of IOP Publishing. noise-contaminated MSR matrix, in which the singular values corresponding to the noise subspace are much larger than those in the noise-free case. In such a case, if we apply the standard MUSIC algorithm to locate the scatterers, the pseudospectrum obtained by the test dipoles in x, y, and z direction are shown in Fig. 4.10(b), (c), and (d), respectively, which show that all the three test dipole directions fail to locate any of the three scatterers. By using the proposed MUSIC algorithm, the pseudospectrum are drawn in Fig. 4.11. In Fig. 4.11, for the L = 4, 5, 6, and 7 cases, image patterns are somewhat similar to those in noise-free case shown in Fig. 4.9. However, for the L = 8 and 9 cases, some unwanted disturbance appear in between the second and the third spheres, which shows that the singular vector corresponding to the eighth singular value is contaminated by the noise to such an extent it cannot be regarded as being in the signal subspace anymore. Inverse Scattering Problems of Small Scatterers 500 0.2 0.1 400 0.1 300 0 z (λ) z (λ) 1500 0.2 200 −0.1 0 0.1 –0.2 –0.1 0 x (λ) (a) 1500 1000 0 0.2 500 −0.1 500 −0.1 0.1 –0.2 –0.1 0 x (λ) 0.1 (d) 1500 0.1 1000 0 500 −0.1 0.1 0.2 1500 0.1 z (λ) 0.2 z (λ) 1000 0 (c) (e) 1500 0.1 z (λ) z (λ) 0.1 –0.2 –0.1 0 x (λ) 0.1 (b) 0.2 –0.2 –0.1 0 x (λ) 500 −0.1 100 –0.2 –0.1 0 x (λ) 1000 1000 0 500 −0.1 –0.2 –0.1 0 x (λ) 0.1 (f) Figure 4.11 Pseudospectra obtained by the proposed MUSIC algorithm in a noise-contaminated case (30 dB). (a), (b), (c), (d), (e), and (f ) are the pseudospectra in y = x + 0.112 𝜆 plane obtained by the proposed MUSIC algorithm corresponding to the L = 4, 5, 6, 7, 8, and 9 cases, respectively. Source: Chen 2009, Inverse Problems, 25, 015008. [40] Reproduced with permission of IOP Publishing. 4.5 Discussions A number of examples presented in this chapter have used synthetic data, but it is worth noting that the MUSIC algorithm has been applied to measured data experiments for various real world applications. For example, in seismic signal 97 98 Electromagnetic Inverse Scattering processing, MUSIC has been utilized to perform higher-resolution imaging of small-scale subsurface structures [22]; [23] has used sensor array to detect the direction of arrival (DOA); in the framework of inverse synthetic aperture radar (ISAR), MUSIC is used for radar target identification [24]; in [25], MUSIC algorithm was demonstrated to be suited for two-dimensional radar imaging; in [26], it is applied to through-the-wall detection of life signs. This algorithm is also extended to super-resolution fluorescence microscopy [27]. For point-like scatterers, one of the fundamental principles of MUSIC can be traced to the injectivity of the source-to-field mapping operator. The key step in proving injectivity lies in the singularity of the Green’s function as the observation point approaches to the point-like scatterer (or induced source). Consequently, MUSIC is not limited to the homogeneous background inverse scattering problem, as long as the singularity of the Green’s function holds. For example, MUSIC can be applied to locate point-like scatterers in a half-space background [28, 29] and for scattering data with only intensity information [30]. The information of point-like scatterers is not necessarily given a priori, but instead it can be inferred from the singular value distribution of the multistatic response matrix, where a few dominant singular values are much larger than the rest. If scatterers are larger than or comparable to the wavelength, that is, referred to as extended scatterers, then the singular values exhibit a slow-varying distribution. In principle, there is no rigorous theory on the application of MUSIC to extended scatterers due to the loss of injectivity of the source-to-field mapping operator. The reason can be intuitively understood as follows. The induced source in an extended scatterer is a spatially continuous source, rather than a discrete point source. The measured scattered field can be analytically continued in the background medium all the way to the boundary of the extended scatterer. Thus, when a test point is inside the extended scatterer, the aforementioned singularity of Green’s function cannot occur since the observation point that is analytically related to the measured scattered field is exterior to the scatterer. Due to this reason, if we force to apply MUSIC algorithm to an extended scatterer, the value of the pseudospectrum will not reach infinity for a test point inside the scatterer. For a convex scatterer, the pseudospectrum usually exhibits larger values inside than outside of the scatterer, but this property does not hold for a concave scatterer or two scatterers very close to each other. Numerical examples of the application of MUSIC to extended scatterers can be found in [31]. A special shape of scatterer is a thin line, which can be considered as a state between the point-like and extended scatterer. Theories and numerical examples of the application of MUSIC to thin line scatterers can be found in [32, 33]. The MUSIC algorithm can be used to locate point-like scatterers and to determine the direction of arrival (DOA). There is a great similarity between these two applications. The correspondence is as follows. For scalar waves, the Inverse Scattering Problems of Small Scatterers discrete point-like scatterer in spatial space corresponds to the discrete DOAs in the angle space. For vector waves, the polarization of induced dipoles inside point-like scatterers corresponds to the signal polarization of DOA problem. In Section 4.4.4, fewer singular vectors associated with larger singular values are used to enhance the resolution of the MUSIC imaging method. This idea can be further generalized to obtain an even higher resolution image by sampling pairs of spatial points [34]. This chapter has shown from theoretical and numerical viewpoints that MUSIC is able to achieve unlimited resolution for noise-free data. Nevertheless, it is not a well-posed question if one asks whether the MUSIC algorithm has taken scatterers’ multiple scattering effects into account. The reason is obvious from the definition of the MUSIC pseudospectrum, where the Green’s function is directly used to process measured data. In addition, even if in a fictitious situation where multiple scattering is absent in the forward problem (i.e., assuming that measured data correspond to the fictitious situation), MUSIC is still able to locate point-like scatterers, since multiple scattering changes only the amplitude of induced source rather the position of induced source. Mathematically, as mentioned earlier, the key step lies in the singularity of the Green’s function as the observation point approaches to the point-like scatterer (or induced source). Multiple scattering will not change the position where the Green’s function becomes singular. This chapter presents the theories and numerical methods of locating point-like scatterers in a way emphasizing wave physics. Other approaches are beyond the scope of the chapter. For example, the signal processing approach has discussed methods like RAP-MUSIC (recursively applied and projected MUSIC) [35] and ESPRIT (estimation of signal parameters via rotational invariance techniques) [36]. The mathematical approach to small scatterer localization can be found in [37, 38]. References 1 Lax, M. (1951) Multiple scattering of waves. Rev. Mod. Phy., 23, 287–310. 2 Tsang, L., Kong, J.A., Ding, K.H., and Ao, C.O. (2001) Scattering of electro- magnetic waves: Numerical simulations, John Wiley & Sons, Inc. 3 Kirsch, A. (2002) The MUSIC-algorithm and the factorization method in inverse scattering theory for inhomogeneous media. Inverse Probl., 18, 1025–1040. 4 Candès, E.J. and Fernandez-Granda, C. (2014) Towards a mathematical theory of super-resolution. Comm Pure Appl. Math., 67 (6), 906–956. 5 Fannjiang, A.C. (2011) The MUSIC algorithm for sparse objects: a compressed sensing analysis. Inverse Probl., 27 (3), 035 013. 99 100 Electromagnetic Inverse Scattering 6 Marengo, E.A. and Gruber, F.K. (2007) Subspace-based localization and 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 inverse scattering of multiply scattering point targets. EURASIP J. Adv. Signal Process., 2007, 17 342. Horn, A. and Johnson, C.R. (2012) Matrix analysis, Cambridge University Press, Cambridge, UK. Schmidt, R.O. (1986) Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag., 34, 276–280. Devaney, A.J., Marengo, E.A., and Gruber, F.K. (2005) Time-reversal-based imaging and inverse scattering of multiply scattering point targets. J. Acoust. Soc. Am., 118, 3129–3138. Devaney, A.J. (2005) Time reversal imaging of obscured targets from multistatic data. IEEE Trans. Antennas Propag., 53 (5), 1600–1610. Gruber, F.K., Marengo, E.A., and Devaney, A.J. (2004) Time-reversal imaging with multiple signal classification considering multiple scattering between the targets. J. Acoust. Soc. Am., 115 (6), 3042–3047. Lehman, S.K. and Devaney, A.J. (2003) Transmission mode time-reversal super-resolution imaging. J. Acoust. Soc. Am., 113 (5), 2742–2753. Prada, C. and Thomas, J.L. (2003) Experimental subwavelength localization of scatterers by decomposition of the time reversal operator interpreted as a covariance matrix. J. Acoust. Soc. Am., 114, 235–243. Marengo, E.A. and Gruber, F.K. (2006) Noniterative analytical formula for inverse scattering of multiply scattering point targets. J. Acoust. Soc. Am., 120, 3782–3788. Chen, X. and Zhong, Y. (2007) A robust noniterative method for obtaining scattering strengths of multiply scattering point targets. J. Acoust. Soc. Am., 122, 1325–1327. Kay, S.M. (1993) Fundamentals of statistical signal Processing: Estimation theory, Prentice-Hall, Upper Saddle River. Bohren, C.F. and Huffman, D.R. (1983) Absorption and scatttering of light by small particles, John Wiley & Sons, Inc., New York. Chen, X. and Agarwal, K. (2008) MUSIC algorithm for two-dimensional inverse problems with special characteristics of cylinders. IEEE Trans. Antennas Propag., 56, 1808–1812. Chambers, D.H. and Berryman, J.G. (2006) Target characterization using decomposition of the time-reversal operator: electromagnetic scattering from small ellipsoids. Inverse Probl., 22, 2145–2163. Arfken, G.B. and Weber, H.J. (2005) Mathematical methods for physicists, Elsevier Academic Press. Zhong, Y. and Chen, X. (2007) MUSIC imaging and electromagnetic inverse scattering of multiply scattering small anisotropic spheres. IEEE Trans. Antennas Propag., 55, 3542–3549. Inverse Scattering Problems of Small Scatterers 22 Asgedom, E.G., Gelius, L.J., and Tygel, M. (2012) Seismic coherency mea- 23 24 25 26 27 28 29 30 31 32 33 34 35 sures in case of interfering events a focus on the most promising candidates of higher-resolution algorithms. IEEE Signal Processing Magazine, 29, 47–56. Krim, H. and Viberg, M. (1996) Two decades of array signal processing research – the parametric approach. IEEE Signal Processing Magazine, 13, 67–94. Park, J.I. and Kim, K.T. (2010) A comparative study on ISAR imaging algorithms for radar target indentification. Prog. Electromag. Res., 108, 155–175. Odendaal, J.W., Barnard, E., and Pistorius, C.W.I. (1994) Two-dimensional superresolution radar imaging using the MUSIC algorithm. IEEE Trans. Antennas Propag., 42, 1386–1391. Ascione, M., Buonanno, A., D’Urso, M., Angrisani, L., and Lo Moriello, R.S. (2013) A new measurement method based on MUSIC algorithm for through-the-wall detection of life signs. IEEE Transactions on Instrumentation and Measurement, 62, 13–26. Agarwal, K. and Machan, R. (2016) Multiple signal classification algorithm for super-resolution fluorescence microscopy. Nature Comms., 7, 13 752. Ammari, H., Iakovleva, E., and Lesselier, D. (2005) A MUSIC algorithm for locating small inclusions buried in a half-space from the scattering amplitude at a fixed frequency. Multiscale Model. Sim., 3 (3), 597–628. Song, R., Chen, R., and Chen, X. (2012) Imaging three-dimensional anisotropic scatterers in multilayered medium by multiple signal classification method with enhanced resolution. J. Opt. Soc. Am. A, 29 (9), 1900–1905. Marengo, E.A., Hernandez, R.D., and Lev-Ari, H. (2007) Intensity-only signal-subspace-based imaging. J. Opt. Soc. Am. A, 24, 3619–3635. Marengo, E.A., Gruber, F.K., and Simonetti, F. (2007) Time-reversal MUSIC imaging of extended targets. IEEE Trans. Image Processing, 16, 1967–1984. Ammari, H., Garnier, J., Kang, H., Park, W.K., and SØlna, K. (2011) Imaging schemes for perfectly conducting cracks. SIAM J. Appl. Math., 71 (1), 68–91. Park, W.K. and Lesselier, D. (2009) MUSIC-type imaging of a thin penetrable inclusion from its multi-static response matrix. Inverse Probl., 25 (7), 075 002. Song, R., Zhong, Y., and Chen, X. (2012) A multi-dimensional sampling method for locating small scatterers. Inverse Probl., 28 (11), 115 004. Mosher, J.C. and Leahy, R.M. (1999) Source localization using recursively applied and projected (RAP) MUSIC. IEEE Trans. Signal Process., 47 (2), 332–340. 101 102 Electromagnetic Inverse Scattering 36 Roy, R. and Kailath, T. (1989) ESPRIT-estimation of signal parameters via 37 38 39 40 rotational invariance techniques. IEEE Transactions on Acoustics, Speech, and Signal Processing, 37 (7), 984–995. Ammari, H., Iakovleva, E., Lesselier, D., and Perruson, G. (2007) MUSIC-type electromagnetic imaging of a collection of small three-dimensional bounded inclusions. SIAM J. Sci. Comput., 29 (2), 674–709. Ammari, H. and Kang, H. (2004) Reconstruction of small inhomogeneities from boundary measurements, no. 1846 in Lecture Notes in Mathematics, Springer. Chen, X. and Zhong, Y. (2008) Electromagnetic imaging of multiplescattering small objects: non-iterative analytical approach. Journal of Physics: Conference Series, 124 (1), 012016, IOP Publishing. Chen, X. and Zhong, Y. (2009) MUSIC electromagnetic imaging with enhanced resolution for small inclusions. Inverse Problems, 25, 015008. 103 5 Linear Sampling Method To fully recover a scatterer’s information, such as the distribution of permittivity, one has to solve a nonlinear inverse problem, which is often cast into an optimization problem. This approach is referred to as the quantitative approach. The disadvantages of this approach are heavy computational cost and the possibility of being trapped in local minima. However, in many practical situations, it suffices to provide basic information, such as how many scatterers are present, their locations, shape, and size. In this case, the qualitative approach is preferred. Qualitative inversion methods seek to provide approximate information about the shape, size, and positions of scatterers but in general do not provide information about the material properties of the scatterer, such as the value of permittivity. Qualitative inversion methods choose an indicator function that is defined on the domain of interest (DOI) and then determine whether a spatial point lies inside or outside the scatterers. Since each spatial point in the DOI is sampled, qualitative inversion methods are also referred to as sampling methods. The time reversal (TR) imaging introduced in Chapter 3 and multiple signal classification (MUSIC) method introduced in Chapter 4 are both categorized as qualitative imaging approaches, though both methods are discussed from other motivations in the previous two chapters. In qualitative imaging methods, the definition of an indicator function usually exploits only the linearly mapped portion of the forward problem. Further, since the most computationally demanding part for evaluation of the indicator function involves only linear operations of matrices, the computational costs associated with the qualitative methods are significantly smaller than their nonlinear counterparts; that is, quantitative inversion methods. The disadvantage of qualitative methods is that quantitative information about the scatterer cannot be obtained. The linear sampling method (LSM) is one of the most frequently used qualitative inversion methods. It was developed in 1996 in the mathematical community [1], and has been numerically proven to be a fast and reliable method in many situations. This chapter mainly discusses the LSM for the following reasons. The indicator function is easy to calculate and its physical Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 104 Electromagnetic Inverse Scattering meaning is straightforward. The engineering community has provided several physical interpretations to the method and consequently provided several modified inversion algorithms. The organization of the chapter is as follows. Section 5.1 outlines the LSM, introducing the indicator function and the corresponding linear equation it satisfies. Section 5.2 provides physical interpretation to the mechanism of the LSM. Section 5.3 presents a modified LSM that is based on the multipole expansion of scattered field. Section 5.4 briefly introduces the factorization method (FM) that is closely related to the LSM and more importantly provides the proof of the rigor of the LSM. Section 5.5 discusses several topics regarding qualitative inversion methods, such as several other qualitative methods. 5.1 Outline of the Linear Sampling Method We consider a two-dimensional scalar electromagnetic scattering problem (i.e., infinitely extending cylinders under TM illumination where the electric field is parallel to the cylinder). Note that the LSM applies to the 3D case as well, and the reason for presenting a 2D problem is that it is easy to understand and to numerically implement. Scatterers can be either dielectric or perfectly electrically conducting (PEC). The space occupied by scatterers is referred to as the support of scatterers Σ and its boundary is denoted by 𝜕Σ. Scatterers are illuminated by plane waves and the scattered field is measured in far field. Let the measurement be carried out at Γ, which is a circle centered at the origin and has a sufficiently large radius r compared with the wavelength 𝜆. Let Es (r, 𝜃 s , 𝜃 i ) be the scattered electric field measured on Γ in the direction 𝜃 s , when a unit-amplitude plane wave impinges from the direction 𝜃 i . The far-field pattern of the scattered field E∞ (𝜃 s , 𝜃 i ) is defined by the following identity eikr Es (r, 𝜃 s , 𝜃 i ) = √ E∞ (𝜃 s , 𝜃 i ) r (5.1) The two-dimensional Green’s function is denoted by Φ(r, r′ ) = (i∕4)H0(1) (k|r − r′ |), where k is the wave number. It is obvious that the radiation source is a monopole, and its field pattern Φ(r, r′ ) is circularly symmetric with respect to r′ . The LSM chooses an indicator function that is defined on the domain of interest (DOI), denoted as D, and then determines whether a spatial point lies inside or outside the scatterers. For any test point rt = (rt cos 𝜃 t , rt sin 𝜃 t ) in D, the LSM first solves the far-field integral equation for the unknown g(rt , 𝜃 i ), ∫Γ E∞ (𝜃 s , 𝜃 i )g(rt , 𝜃 i )d𝜃 i = Φ∞ (𝜃 s , rt ) (5.2) where Φ∞ (𝜃 s , rt ) is the far-field pattern of the Green’s function Φ(r, rt ) when the source point is at rt and the observation point is in the direction 𝜃 s . Strictly Linear Sampling Method speaking, the differential length in (5.2) should be rd𝜃 i , where the constant r is left off for convenience. The large-argument asymptotic form of the Hankel function, together with the definition of far-field pattern (5.1), gives √ i 2 −i𝜋∕4 −ikrt cos(𝜃s −𝜃t ) s t Φ∞ (𝜃 , r ) ≈ e (5.3) e 4 𝜋k The L2 -norm of the solution g(rt , 𝜃 i ) is defined as [ ]1∕2 ||g(rt , 𝜃 i )|| = |g(rt , 𝜃 i )|2 d𝜃 i (5.4) ∫Γ which is often referred to as the energy of g(rt , 𝜃 i ). The LSM chooses ||g(rt , 𝜃 i )|| as the indicator function. According to [1–3], the value of ||g(rt , 𝜃 i )|| becomes unbounded if the sampling point rt , which is also referred to as the test point, does not belong to the scatterer support Σ. In other words, the support of scatterer is identified as those rt with corresponding indicator function ||g(rt , 𝜃 i )|| being finite. In numerical implementation of the LSM, all continuous vector spaces in (5.2) are discretized into finite-dimension vector spaces. In addition, there is always noise that contaminates the measured scattered field. Consequently, the indicator function ||g(rt , 𝜃 i )|| cannot be infinite for a sampling point rt that is out of the support of scatterer, but instead, the indicator function is much larger for rt that is outside the support than inside. The following procedure, used to determine g(rt , 𝜃 i ), has been proven to be numerically quite successful: 1) Select a grid of “sampling points” in a domain of interest D that is known a priori to contain the support Σ of scatterers. 2) For each rt in the foregoing grid, cast (5.2) into a matrix-vector linear equation and then use Tikhonov regularization to compute an approximate solution g(rt , 𝜃 i ) to the discrete linear equation. In discrete form, consider a system of Ni transmitters and Ns receivers. Equation (5.2) is converted to E ∞ ⋅ g = Φ∞ (5.5) where E∞ is a matrix of size Ns × Ni , g is an Ni dimensional vector that needs to be solved for, and Φ∞ is a vector of size Ns . In terms of the singular value decomposition (SVD), the matrix E∞ has the property of E∞ ⋅ 𝑣s = 𝜎s us , where us and 𝑣s denote the sth left and right singular vectors, and 𝜎s denotes the sth singular value of the matrix E∞ . The solution of vector g computed using Tikhonov regularization is denoted as, ∑ 𝜎s gT = uH ⋅ Φ∞ 𝑣s (5.6) 2 2 s s 𝜎s + 𝛼 where the subscript T denotes the Tikhonov regularization, 𝛼 denotes the Tikhonov regularization parameter, and the superscript H denotes the Hermitian operator. 105 106 Electromagnetic Inverse Scattering 3) Choose a cutoff value C, and determine the support of scatterers by the criterion that rt is in scatterer support Σ if and only if ||g(rt , 𝜃 i )|| ≤ C. The choice of C is heuristic. 5.2 Physical Interpretation In the LSM, the right-hand side of (5.2) represents a circularly symmetric far field pattern. However, this pattern is not necessarily achieved by an elementary point source or a circularly symmetric current around the sampling point. The reason for this argument is discussed next in Section 5.2.1. It highlights that this argument suggests other physical interpretations should be sought. Section 5.2.2 interprets the LSM from the angle of the multipole expansion of the far field, which eventually leads to the modified LSM that is to be discussed in Section 5.3. 5.2.1 Source Distribution First, we construct a source distribution in the free space that is able to produce the far field radiation pattern Φ∞ (𝜃 s , rt ). Let Ω be any smooth domain containing the sampling point rt ; that is, rt ∈ Ω. An arbitrary function u(r) ∈ C 2 (Ω) that is twice continuously differentiable on the closure Ω of Ω, satisfying the following boundary conditions, is chosen: u(r) = Φ(r, rt ) and 𝜕u(r) 𝜕Φ(r, rt ) = 𝜕n 𝜕n both for r ∈ 𝜕Ω (5.7) where 𝜕u = ∇u ⋅ n is the directional derivative of u in the direction of the out𝜕n ward pointing normal n to the surface element ds. We choose the source distribution in Ω as J(r) = −∇2 u(r) − k 2 u(r). (5.8) For r ∈ Ω, using the Green’s formula [4] (section 2.2), [ ] ′ ′ ′ 𝜕u(r ) ′ 𝜕Φ(r, r ) u(r) = Φ(r, r ) − u(r ) ds(r′ ) ∫𝜕Ω 𝜕n(r′ ) 𝜕n(r′ ) − ∫ ∫Ω [∇2 u(r′ ) + k 2 u(r′ )]Φ(r, r′ )dr′ . (5.9) and substituting (5.7) to it, we obtain [ ] ′ 𝜕Φ(r′ , rt ) ′ t 𝜕Φ(r, r ) u(r) = , r ) Φ(r, r′ ) − Φ(r ds(r′ ) ∫𝜕Ω 𝜕n(r′ ) 𝜕n(r′ ) + ∫ ∫Ω J(r′ )Φ(r, r′ )dr′ . (5.10) Linear Sampling Method It is easy to prove that the first integral vanishes by applying Green’s second theorem [4] (section 2.2), [ ] ′ 𝜕Φ(r′ , rt ) ′ t 𝜕Φ(r, r ) , r ) Φ(r, r′ ) − Φ(r ds(r′ ) ∫𝜕Ω 𝜕n(r′ ) 𝜕n(r′ ) = ∫ ∫Ω [Φ(r, r′ )∇2 Φ(r′ , rt ) − Φ(r′ , rt )∇2 Φ(r, r′ )]dr′ (5.11) considering the fact that the right-hand-side integral is equal to zero since both Φ(r′ , rt ) and Φ(r, r′ ) satisfy the Helmholtz equation. Thus, we have u(r) = ∫ ∫Ω J(r′ )Φ(r, r′ )dr′ (5.12) r ∈ Ω. 1.5 –1 –1 0 1 x axis (λ) (a) 1 2 0 1.5 –1 –1 0 1 x axis (λ) (b) 1 1 0 –1 –1 x 10–4 8 6 4 2 0 1 │υn│→ 0 1 y axis (λ) 2 y axis (λ) 1 y axis (λ) This definition of u(r) for r ∈ Ω can be extended to the domain outside Ω; that is, for r ∈ ℝ2 ∖Ω. Thus, u(r) satisfies the radiation condition, coincides with Φ(r, rt ) on r ∈ 𝜕Ω, and satisfies the Helmholtz equation in ℝ2 ∖Ω. Considering the fact that the Helmholtz equation has a unique solution in the closed domain ℝ2 ∖Ω once the boundary values are given at the two boundaries 𝜕Ω and Γ∞ , it can be concluded that u(r) = Φ(r, rt ) in ℝ2 ∖Ω. Thus, (5.12) means that the current distribution J(r) generates the field Φ(r, rt ). Consequently, the current distribution J(r) is able to produce the far field pattern Φ∞ (𝜃 s , rt ). Due to the arbitrariness of both the domain Ω and the function u(r) ∈ C 2 (Ω), so long as u(r) satisfies (5.7), the current distribution J(r) that produces the far field pattern Φ∞ (𝜃 s , rt ) is not necessarily a circularly symmetric source centered at rt or an elementary source (i.e., monopole) located at rt . Next, we consider a current distribution in the scatterer (r ∈ Σ) that is able to produce the far field radiation pattern Φ∞ (𝜃 s , rt ). Let the Ω that has a smooth boundary, as introduced in the previous paragraphs, be infinitely close to Σ. Then following the previous argument, the induced current distribution J(r ∈ Σ) = −∇2 u(r) − k 2 u(r) is not necessarily a circularly symmetric source centered in rt or an elementary source located at rt in order to produce Φ∞ (𝜃 s , rt ). 0 1 x axis (λ) (c) 0.5 0 –20 0 n→ 20 (d) Figure 5.1 Illustration of the current distribution for the sampling point rt = (0, 0) and the proposed multipole-based interpretation. (a) Scatterer profile (relative permittivity); (b) Reconstruction LSM; (c) Current distribution (sampling point (0,0)); (d) Plot of 𝑣n for various n (sampling point (0,0)). Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. 107 108 Electromagnetic Inverse Scattering As an example, let us consider the scatterer shown in Fig. 5.1(a), which is an S-shape dielectric scatterer with uniform relative permittivity 𝜖r = 2. In numerical simulations, 13 detectors and 13 sources, distributed uniformly along Γ with a radius 10 𝜆, have been used for reconstruction. The scattered data is noise free and the LSM reconstruction result thus obtained is shown in Fig. 5.1(b). Here, for visualization purposes, the indicator −log10 ||g(rt , 𝜃 i )|| has been plotted. It is important to note that the values of this new indicator function are higher for points inside the support of the scatterer than outside. Considering the sampling point rt = (0, 0), which LSM detects as belonging to the scatterer, the distribution of induced current is plotted in Fig. 5.1(c). It is noticeable that there is neither a monopole source at rt , nor is the current distribution circularly symmetric. 5.2.2 Multipole Radiation As shown in the previous section, the monopole radiation pattern is not necessarily produced by a point source or a circularly symmetric source distribution. This indicates that instead of investigating current distribution, we should investigate the radiation field itself. The scattered fields received at receivers can be decomposed into various independent terms corresponding to the multipole radiation from a sampling point rt . In fact, solving (5.2) amounts to finding a linear superposition of E∞ (𝜃 i , 𝜃 s ), with g(rt , 𝜃 i ) being the coefficient, such that among all multipoles, the monopole radiation is the only dominant contributor in the resultant total radiation. Let the far field pattern E∞ (𝜃 s , 𝜃 i ) be measured at the point r𝜃s = (r cos 𝜃 s , r sin 𝜃 s ), and the exact scattered field Es (r, 𝜃 s , 𝜃 i ) at this point is related to the far field pattern by (5.1). Scattered field can be interpreted as the reradiation of induced current, Es (r, 𝜃 s , 𝜃 i ) = ∫ ∫Σ J(r′ , 𝜃 i )Φ(r𝜃s , r′ )dr′ (5.13) Using the addition theorem [5] (section 9.1) on Φ(r𝜃s , r′ ), the expression of Es (r, 𝜃 s , 𝜃 i ) can be rewritten in terms of various multipoles corresponding to a sampling point rt as below: Es (r, 𝜃 s , 𝜃 i ) = ∞ ∑ 𝛼 (n) (rt , 𝜃 i )Φ(n) (r𝜃s , rt ) (5.14) n=−∞ where 𝛼 (n) (rt , 𝜃 i ) = t J(r′ , 𝜃 i )Jn (k|r′ − rt |)e−in arg(r −r ) dr′ ∫ ∫Σ t i Φ(n) (r𝜃s , rt ) = Hn(1) (k|r𝜃s − rt |)ein arg(r𝜃s −r ) 4 ′ (5.15) (5.16) Linear Sampling Method It is evident that 𝛼 (n) (rt , 𝜃 i ) represents the nth effective multipole current at rt . From (5.14), the fundamental equation of LSM (5.2) is equivalent to: { 1, if n = 0 (n) t i t i i 𝛼 (r , 𝜃 )g(r , 𝜃 )d𝜃 = (5.17) ∫Γ 0, otherwise For convenience of further use, we define: 𝑣n = ∫Γ 𝛼 (n) (rt , 𝜃 i )g(rt , 𝜃 i )d𝜃 i (5.18) Physically, 𝑣n can be understood as the nth order multipole current induced by the incident fields that are generated by the primary source distribution g(rt , 𝜃 i ). This means that as long as the multipole expansion of the induced current distribution at a sampling point is such that the monopole is the only prominent contributor, the sampling point will be judged to be inside a scatterer. For the example in Section 5.2.1, we use 41 multipoles and consider the same sampling point as before; that is, rt = (0, 0). The values of 𝛼 (n) (rt , 𝜃 i ) are determined analytically using (5.15), where J(r′ , 𝜃 i ) is obtained by solving a forward problem with the primary source distribution being ∑20 g(rt , 𝜃 i ). The error in the multipole expansion || n=−20 𝛼 (n) (rt , 𝜃 i )Φ(n) (r𝜃s , rt ) − −14 s i s i Es (r, 𝜃 , 𝜃 )||∕||Es (r, 𝜃 , 𝜃 )|| is approximately 10 . Thus, the multipole expansion is reasonably correct. The values of 𝑣n , which are calculated from (5.18), are shown in Fig. 5.1(d). It is evident that (5.17) is approximately satisfied, that is, the monopole radiation dominates the scattered field for the sampling point rt = (0, 0) that is indeed inside the scatterer. 5.3 Multipole-Based Linear Sampling Method 5.3.1 Description of the Algorithm Based on the multipole analysis, we present an approach to construct the primary source distribution g(rt , 𝜃 i ). For the ease of reference, especially in figures, we shall call the proposed method the multipole-based linear sampling method (MLSM). Although in principle one needs to consider infinite number of multipoles to fully account for the scattered field in (5.14), in practice a sufficiently large finite number of multipoles is enough to approximate Es (r, 𝜃 s , 𝜃 i ). Considering (2N + 1) number of multipoles, the expression for the far field (5.14) can be rewritten as: N ∑ Es (r, 𝜃 s , 𝜃 i ) ≈ 𝛼 (n) (rt , 𝜃 i )Φ(n) (r𝜃s , rt ) (5.19) n=−N 109 110 Electromagnetic Inverse Scattering Equation (5.19) suggests that the multipole radiation functions Φ(n) (r𝜃s , rt ) can be understood as a mapping from the effective multipole source 𝛼 (n) (rt , 𝜃 i ) at a sampling point rt to the measured scattered electric field Es (r, 𝜃 s , 𝜃 i ). In discrete form, consider a system of Ni transmitters and Ns receivers. For each incidence 𝜃 i , (5.19) can be written as a form of the aforementioned mapping, E = Φ ⋅ A, (5.20) where, E, an Ns -dimensional vector, consists of all the receiver measurements, Φ, a matrix of dimension Ns × (2N + 1), consists of the multipole radiation terms Φ(n) (r𝜃s , rt ), and A, a (2N + 1)-dimensional vector, contains the effective multipole sources 𝛼 (n) (rt , 𝜃 i ). The value of A can be solved uniquely using the least-squares pseudoinverse (see Appendix B), † A = Φ ⋅ E, (5.21) where the superscript † denotes the pseudoinverse of a matrix. If the singular H † ′ value decomposition of Φ is U ⋅ Σ ⋅ V , then the pseudoinverse is Φ = V ⋅ Σ ⋅ H U , where the diagonal element Σ′ii = Σ−1 for Σii ≠ 0 and Σ′ii = 0 for Σii = 0. ii After obtaining A for each of the Ni incidences, a discretized version of (5.17) is written as: A⋅g =D (5.22) where A, of dimension (2N + 1) × Ni , contains the vectors A for all incidences, g is an Ni -dimensional vector that needs to be determined, and D is a vector with all elements except the (N + 1)th element being zero. The (N + 1)th element, which corresponds to a monopole, is equal to one. The value of vector g can be determined from (5.22) by the least-squares pseudoinverse, † gM = A ⋅ D (5.23) where the subscript M denotes the multipole-based LSM. The physical interpretation of the LSM is as follows: for a sampling point outside the support of the scatterer, the indicator function becomes large in the (impossible) attempt of synthesizing a primary source that is able to suppress the radiation of induced dipole and higher-order multipoles. 5.3.2 Choice of the Number of Multipoles The reconstruction method presented here is mathematically equivalent to the standard LSM (i.e., the Tikhonov-regularized LSM) if we consider a large N such that the multipoles of order higher than the considered (2N + 1) multipoles have a negligible contribution to the scattered field. However, from numerical point of view, at least (2N + 1) receivers are needed to uniquely solve (5.20). Further, using a large number of multipoles is expected to increase the computational cost of the problem. Thus, it is interesting to study the effect of choosing a small number of multipoles. Linear Sampling Method To this end, it is worth trying N = 1, which is one plus the order of monopole. Such a choice is based on the fact that monopole term is dominant among all multipole terms in most scattering problems. The use of N = 1 implies the following. To solve (5.20) for A would mean that we seek an optimal combination of the monopole and dipole sources such that the resultant radiation fields match the measured scattered fields as closely as possible. To solve (5.22) for g M means that a linear superposition of monopoles and dipoles leads to a negligible dipole term. We mention in passing that although the monopole term is dominant in most scattering problems, cases indeed exist where other higher order multipoles are dominant. For such cases, a suitable choice of N will be one plus the order of the dominant multipole. Such cases rarely happen in the monofrequency scenario since the operation frequency of the wave has to be carefully chosen so that it is close to the resonance frequencies of higher-order modes. For the sake of illustration and further discussion, we present the reconstruction results for the geometry shown in Fig. 5.1(a). The measurement setup used is as before. We plot the indicator function −log10 ||gM (rt , 𝜃 i )||. Figure 5.2(a) and (b) present the reconstruction results for N = 20 and N = 1, respectively. It is evident that N = 20 gives a reconstruction similar to the result of Tikhonov-regularization LSM. Compared with the case of N = 20, it is noticeable that N = 1 produces a higher value of −log10 ||gM (rt , 𝜃 i )||. This is expected because when N = 1, the strict requirement on gM (rt , 𝜃 i ) of suppressing all the higher order multipoles (N = 2, 3, … , 20) is now significantly eased. The case of N = 1 requires suppression of only the dipole term. 0 1 x axis (λ) (a) y axis (λ) 1 2 1.8 1.6 0 –1 –1 0 1 x axis (λ) (e) 1.4 1.2 –1 –1 2 0 –0.5 –1 –1 1.9 0 1 x axis (λ) (f) –1 –1 1 0 1 x axis (λ) (g) 2 0 1 0 0 1 x axis (λ) (d) 1 2 0 1 –1 –1 0 1 x axis (λ) (c) 1 2.1 0.5 1 0.5 –1 –1 0 1 x axis (λ) (b) 1 0 y axis (λ) 1.9 1.5 y axis (λ) 2 0 2 y axis (λ) –1 –1 1.4 1.2 1 2.1 y axis (λ) 0 1 y axis (λ) 2 1.8 1.6 y axis (λ) y axis (λ) 1 2 0.5 1.5 0 1 –0.5 –1 –1 0 0.5 0 1 x axis (λ) (h) 0 Figure 5.2 Comparison of MLSM (N = 20) and MLSM (N = 1) for noise-free and noisy (10% additive Gaussian noise) scenarios. (a) Reconstruction based on N = 20 multipoles (noise-free); (b) Reconstruction based on N = 1 multipoles (noise-free); (c) Support estimated using (a) (noise-free); (d) Support estimated using (b) (noise-free); (e) Reconstruction based on N = 20 multipoles (10% noise); (f ) Reconstruction based on N = 1 multipoles (10% noise); (g) Support estimated using (e) (10% noise); (h) Support estimated using (f ) (10% noise). Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. 111 Electromagnetic Inverse Scattering An estimate of the scatterer support, denoted as Σ′ , can be determined as below: Σ′ = {rt ∶ −log10 ||gM (rt , 𝜃 i )|| > Min + 𝛽(Max − Min)} (5.24) where Min and Max are minimum and maximum of the value of −log10 ||gM (rt , 𝜃 i )|| for all the test points rt , respectively, and 𝛽 is a user-defined threshold used for estimating the scatterer support. The effect of threshold shall be discussed later. Presently we use 𝛽 = 0.8. The scatterer’s supports estimated for N = 20 and the proposed method (N = 1) are presented in Fig. 5.2(c) and (d), respectively. The results presented are for the noise-free scenario. Results for the noisy situation (10% additive white Gaussian noise) are presented in Fig. 5.2(e)–(h). It is evident that the proposed method (N = 1) yields a better estimation of the scatterer’s shape than the case of N = 20. The choice of N = 1 is also supported by a cross checking via the Tikhonov-regularization LSM. First, we still calculate the value of A from (5.21) for N = 1 and N = 20, respectively. Instead of solving (5.22) for g M , we adopt gT (rt , 𝜃 i ) that is obtained by the Tikhonov regularization method and then compare whether the left-hand sides of the equations, that is, A ⋅ g, are close to each other for N = 1 and N = 20. Since Eq. (5.22) is a discretized version of (5.17), it is clear that the rows of A ⋅ g correspond to 𝑣n , n = −N to N, defined in (5.18). The absolute value of the difference between the effective multipole sources 𝑣n (n = −1 to 1) for N = 20 and N = 1 is plotted in Fig. 5.3. Since 𝑣−1 = 𝑣1 = 0 and 𝑣0 = 1 in the ideal case (N = +∞) for points inside the support of the scatterer, it can be seen that the difference is very small (of the order 10−4 ) for the three multipoles over the complete DOI. Thus, the choice of N = 1 is reasonable. In addition, for the scatterer shown in Fig. 5.1, it is observed in [6], where hundreds of simulations are performed that, compared with other multipoles, the monopole is least affected by noise no matter whether a sampling point is y axis (λ) y axis (λ) ∣υ0(N = 20) – υ0(N = 1)∣ ∣υ1(N = 20) – υ1(N = 1)∣ ∣υ–1(N = 20) – υ–1(N = 1)∣ ×10–4 ×10–4 ×10–4 1 1 1 12 4 4 10 3 8 3 0 0 0 6 2 2 4 1 1 2 –1 –1 –1 1 0 1 –1 0 –1 –1 0 1 x axis (λ) x axis (λ) x axis (λ) Plot of difference between υn(N = 20) and υn(N = 1) y axis (λ) 112 Figure 5.3 Cross checking the effect of reduction of multipoles. The values of 𝑣n are obtained for N = 20 and N = 1, respectively, and the difference between the two sets of 𝑣n is computed. The first, second, and third columns show this absolute value of the difference for n = −1, 0, and 1, respectively. Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. Linear Sampling Method inside or outside the support of the scatterer. For a sampling point inside the support of scatterer, since the monopole radiation is the only dominant multiple and in addition the monopole term is most stable in presence of noise, we conclude that the value of N does not have to be large. This argument partially supports the choice of N = 1. 5.3.3 Comparison with Tikhonov Regularization In the multipole-based LSM, the value of N, the highest order of multipole, can be considered a regularization parameter. On one hand, the larger the value of N, the better the data fitting in (5.20), but the more unstable the recovered g M in presence of noise. On the other hand, the smaller the value of N, the poorer the data fitting but the more stable the solution. Since the monopole term is dominant among all multipole terms in most scattering problems, we have chosen N = 1, which means truncating all higher order multipoles except the dipole and monopole terms. For the uncommon case where a higher order multipole dominates the radiation, a suitable choice of N will be one plus the order of the dominant multipole. Tikhonov regularization chooses the real-valued 𝛼 as the regularization parameter. The smaller the value of 𝛼, the better the data fitting but the more unstable the solution. For a high value of 𝛼, the effect is the opposite. The value of 𝛼 is usually computed using the discrepancy principle for each pixel in the DOI if the level of noise is known a priori [2]. Otherwise, it is chosen empirically. From a practical point of view, the Tikhonov-regularization parameter 𝛼 is not easy to determine since it is a real number. In comparison, the multipole-based regularization parameter N is much easier to choose since it is an integer. In most of numerical simulations the author has implemented, the choice of N = 1 works well. For N = 2, the reconstruction results do not significantly differ from the case of N = 1, though there are some minor differences. If N gradually increases with step one to a large number, say N = 20, then the reconstructed result steadily evolves to a pattern that is comparable to a reconstructed result obtained by standard LSM with a relatively small Tikhonov regularization parameter. To compare the performance of the standard LSM and the multipole-based LSM, we apply them to reconstruct the scatterer shown in Fig. 5.1. The reconstruction for the multipole-based LSM with N = 1 has been shown in Fig. 5.2. For the standard LSM, we choose various values of the regularization parameter 𝛼 = a𝜎1 , where a takes values {0.001, 0.01, 0.1, 1} and 𝜎1 is the largest singular value of the matrix E∞ that is defined in (5.5). The reconstruction results are presented in Fig. 5.4(a). We define an error parameter that can be used to evaluate the quality of reconstruction. The error measure is defined on the convex hull (also known as the “convex envelope”) of the scatterer. The threshold 𝛽 classifies the sampling points as scatterers or nonscatterers. If the number of sampling points inside 113 0 –1 0 –1 1 x axis (λ) 1.2 0 1.5 –1 –1 1 0 x axis (λ) LSM α = 0.1 σ1 1 0 –1 0 –1 1 x axis (λ) 2 1.8 1.6 y axis (λ) 1.6 LSM α = 0.01 σ1 1 2 y axis (λ) LSM α = 0.001 σ1 1 2 y axis (λ) Electromagnetic Inverse Scattering y axis (λ) 1 LSM α = 1 σ1 0 –1 0 –1 1 x axis (λ) 2.15 2.1 2.05 (a) 0.3 0.25 0.2 Error 114 0.15 LSM: (α = 0.001 σ1) LSM: (α = 0.01 σ1) LSM: (α = 0.1 σ1) LSM: (α = 1 σ1) MLSM 0.1 0.05 0 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 β→ (b) Figure 5.4 Comparison of LSM and MLSM. The results are obtained in the presence of 10% noise. (a) Result of the conventional LSM for various values of 𝛼; (b) Plot of Error for various values of threshold. Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. the convex hull that get classified wrongly is Merr(𝛽) , then the error parameter is defined as: Error(𝛽) = Merr(𝛽) ∕M, (5.25) where M is the total number of sampling points inside the convex hull. This error measure is useful to evaluate the accuracy of the reconstruction methods in reconstructing scatterers with complicated supports, such as an annulus. In this numerical example, we vary the threshold 𝛽 in the range [0.6, 0.9] and plot the error measure Error (𝛽) for the conventional LSM (for various values of 𝛼) and the proposed method in Fig. 5.4(b). It should be noted that, in practice, a suitable value of 𝛽 is not known a priori and 𝛽 is chosen heuristically in most cases. It is evident that the proposed method has lower values of Error(𝛽) for most values of 𝛽. 5.3.4 Numerical Examples We consider various examples and compare the performance of the standard LSM and the proposed method. Each of the examples considered here is difficult to reconstruct qualitatively using the conventional LSM on various 2 0 1.5 –1 –1 0 1 x axis (λ) 1 0 –1 –1 1 0 1 x axis (λ) 3.8 3.6 3.4 3.2 3 2.8 1 y axis (λ) 1 y axis (λ) y axis (λ) Linear Sampling Method 4 0 3.9 –1 –1 3.8 0 1 x axis (λ) 2 0 1.5 –1 –1 0 1 x axis (λ) 1 1 0 –1 –1 0 1 x axis (λ) 3.8 3.6 3.4 3.2 y axis (λ) 1 y axis (λ) y axis (λ) (a) 1 4 0 3.9 –1 –1 0 1 x axis (λ) 3.8 (b) –1 –1 1.5 0 1 x axis (λ) 1 y axis (λ) y axis (λ) 2 0 1 3.9 3.8 3.7 3.6 3.5 0 –1 –1 0 1 x axis (λ) 1 y axis (λ) 2.5 1 4 3.9 0 –1 –1 3.8 0 1 x axis (λ) (c) Figure 5.5 Examples of reconstruction of dielectric cylinders. The first column shows the scatterer profile (relative permittivity), the second column shows the reconstruction using the conventional LSM and the third column shows the reconstruction using the proposed MLSM. The results are obtained in the presence of 10% noise. (a) Example 1: Austria profile [31]; (b) Example 2: Obstructed circular cylinders; (c) Example 3: Enclosed circular cylinders. Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. accounts. These include annulus-shape scatterers and multiple scatterers in close proximity (distance being less than half wavelength). All the examples consider a square DOI of size 2 × 2 m2 , where the scatterers are placed in free space. The frequency of the incident wave is 300 MHz (wavelength 𝜆 = 1 m). The measurement setup is the same as described in Section 5.2.1. The measured data is corrupted by 10% additive Gaussian noise. Three examples of dielectric scatterers (Fig. 5.5) and two examples of PEC scatterers (Fig. 5.6) are considered. In Fig. 5.5 and Fig. 5.6, the first column shows the scatterer profile (relative permittivity for dielectric cylinders, the contours for PEC cylinders), the second column shows the reconstruction using the conventional LSM and the third column shows the reconstruction using MLSM. The regularization parameter used in the standard LSM has been computed using the discrepancy principle. The proposed MLSM chooses N = 1. 115 Electromagnetic Inverse Scattering y axis (λ) y axis (λ) 0 –5 0 5 x axis (λ) 2 0 1.8 –1 –1 1.6 0 x axis (λ) 1 1 2 y axis (λ) 1 5 –5 0 1.8 –1 –1 0 x axis (λ) 1 (a) 1 0 –5 –5 0 5 x axis (λ) 0 –1 –1 1 2 1.8 0 x axis (λ) 1 1.6 y axis (λ) y axis (λ) 5 y axis (λ) 116 2 0 –1 –1 1.9 0 x axis (λ) 1 1.8 (b) Figure 5.6 Same as Fig. 5.5 except that scatterers are perfectly conducting cylinders. (a) Example 1: Three cylinders; (b) Example 2: Nine circular cylinders. Source: Agarwal 2010, Opt. Express, 18, 6366–6381. [6] Reproduced with permission of The Optical Society. The reconstruction results presented in Fig. 5.5 and Fig. 5.6 show that the multipole-based LSM outperforms the standard LSM. In particular, for the scatterer in Fig. 5.5(a), there is a central hollow area inside the annulus. As expected from the theory of the LSM, the middle panel in Fig. 5.5(a) shows that the standard LSM cannot detect the presence of the central hollow area. This is because the annulus separates the inner and outer spaces into completely disconnected regions and consequently the scattered field inside the annulus cannot be analytically continued all the way to the far field where measurement is conducted. In comparison, the right panel in Fig. 5.5(a) shows that the multipole-based LSM roughly detects the presence of the central hollow area, although the shape of the reconstructed hollow area is somewhat different from the exact one. 5.4 Factorization Method Although the LSM numerically works well in many numerical examples, it lacks a rigorous justification regarding the regularized solution of the far-field equation. In general, a solution to the far-field equation (5.2) does not exist for noise-free data [3]. Nevertheless, a theory has proven that there exists an “approximate solution” ga to (5.2), such that the corresponding incident i i field onto the scatterer Ei (x, y, rt ) = ∫Γ ei(kx cos 𝜃 +ky sin 𝜃 ) ga (rt , 𝜃 i )d𝜃 i (known as Linear Sampling Method the Herglotz wave function in the mathematical community) converges if and only if rt is inside the support Σ of the scatterer [7] (chapter 7). However, there are two problems associated with the LSM: (1) the convergence property of Ei (x, y, rt ) depends on the support Σ of the scatterer, and unfortunately such a convergence claim cannot be made about the “approximate solution” ga to (5.2); and (2) it is not clear yet whether the Tikhonov regularized solution of (5.2) inherits the same behavior as the “approximate solution” ga of (5.2). The factorization method (FM) as developed by Kirsch [8–10] overcomes the aforementioned questions. Simply speaking, the factorization method is an extension of the MUSIC imaging algorithm to the case of extended objects and infinite-dimensional scattering operators [10, 11]. We first recall some main results of the MUSIC for point-like scatterers that have been presented in Chapter 4. The expression of the multistatic response (MSR) matrix K is K = GS ⋅ Λ ⋅ (I M − Φ ⋅ Λ)−1 ⋅ GI , (5.26) where GS is the scattering matrix, physically representing the radiation of induced source. When primary sources and receivers are both placed in far field, the MSR matrix K is rewritten as F, following the convention adopted in the mathematical community. The matrix F is understood to be the discretized version of the far-field operator F, which is defined as the integral operator in (5.2) with the kernel E∞ (𝜃 s , 𝜃 i ). Standard linear algebra yields that if the the numbers of incidents Ni and measurements Ns are large enough so that the rank of the far-field MSR matrix F is equal to the number M of point-like scatterers, the the ranges (F) and (GS ) of F and GS , respectively, coincide. When applying MUSIC to the far-field MSR matrix F, we have: For any position r, the Ns -dimensional vector Gs (r) = [G(r′1 , r), … , G(r′N , r)]T , which is referred to as the background Green’s function vector s evaluated at r, is in the range (F) of F if and only if r ∈ {r1 , r2 , … , rM }. Next, for the case of extended penetrable scatterers and infinite-dimensional incidences and measurements, the continuous counterparts of GS and F are denoted as Gs and F, respectively. The following theorem is proven in [10]. For any position rt , the far field expression of Green’s function Φ∞ (𝜃 s , rt ) evaluated at rt , which is shown in ( 5.3), is in the range (Gs ) of Gs if and only if rt ∈ Σ. The sufficient condition in fact has been proven in Section 5.2.1, noting that Gs is an integral operator with the kernel Φ(r, r′ ). The necessary condition can be proven by contradiction, which is outlined as follows. The scattered field is an analytical function in the space exterior to the support of scatterer, and thus the far-field information can be analytically continued all the way to the external boundary of the scatterer. For a testing point rt outside the support of scatterer, if its far field expression of Green’s function Φ∞ (𝜃 s , rt ) is in the range of (Gs ) of Gs , say Φ∞ (𝜃 s , rt ) = Gs (𝑤) for a certain function 𝑤 of source distribution, then 117 118 Electromagnetic Inverse Scattering Φ(r, rt ) is singular at rt but Gs (𝑤) is a continuous function at rt . Thus, proving by contradiction, we conclude that if rt is outside the support of scatterer, its Φ∞ (𝜃 s , rt ) cannot be in the range of (Gs ) of Gs . From the proof of the sufficient and necessary conditions, we easily see that for an annulus scatterer, the space interior to the inner boundary is completely separated from that exterior to the outer boundary, so that the far-field information cannot be analytically continued all the way to the space interior to the inner boundary. This is why the LSM and factorization method cannot deal with annulus-shape scatterers. It is important to note that in the infinite-dimensional case, the ranges of Gs and F do not coincide, which is a distinct difference from their finite-dimensional counterparts. This fact can be seen from the physical meaning of Gs and F. The Gs maps the source distribution on the support of scatterer Σ to the scattered field in far-field, whereas the F maps the amplitudes of incident plane waves to the scattered field in far-field. For Gs , the source distribution can be an arbitrary square-integrable function in Σ; that is, the domain of Gs is L2 (Σ). For F, however, the source on Σ is induced and its distribution, obtained by solving the Lippmann–Schwinger equation, is only a subset of L2 (Σ). The factorization method (FM) replaces the far-field operator F in the far-field Equation (5.2) by the operator (F ∗ F)1∕4 [3, 12], where F ∗ is the adjoint operator of F. Since the range ((F ∗ F)1∕4 ) of (F ∗ F)1∕4 coincides with the range (Gs ) of Gs , we conclude that (F ∗ F)1∕4 g = Φ∞ (𝜃 s , rt ) has a solution if and only if rt ∈ Σ. Despite considerable efforts in mathematical community, the FM is still limited to a restricted class of scattering problems. In particular, the method has not been established for the case of limited aperture data, that is, limited angle of incidences or measurements, which is, however, common in real-world applications, such as subsurface sensing [13]. However, when applicable, the factorization method provides a mathematical justification for using the regularized solution of an appropriate far-field equation to determine the support of scatterer. Other versions of the factorization method are beyond the scope of this chapter, and interested readers are referred to [10, 12]. 5.5 Discussions It is worth mentioning that although the LSM involves solving sets of linear equations when calculating the indicator function, it does not assume any linearizing approximation to the original nonlinear scattering operation, such as the Born approximation. The reason why the method is named linear sampling can be found in [3]. The following three comments on the LSM are from the theoretical point of view. First, the mathematical justification of LSM and FM requires that k 2 (the square of the wavenumber) is not an eigenvalue of the interior Dirichlet Linear Sampling Method problem when reconstructing PEC scatterers and k is not a transmission eigen-value of an interior transmission problem when reconstructing dielectric scatterers [3]. Second, the LSM is not limited to far-field data and it can be implemented for near-field data as well (see [14] and section 4.6 of [7]). Third, the LSM is independent of the boundary conditions; that is, the material properties of the scatterer. It works for both PEC and dielectric scatterers, and even a mixture of them. Some practical issues are worth discussing. For limited-aperture data, numerical simulations have shown that the performances of LSM and FM degrade with decreasing aperture angle [15, 16]. The criterion of choosing the cutoff value C to determine the support of scatterers is heuristic, which is even more difficult in presence of noise. Usually, the resolution of the reconstruction image provided by the LSM is limited, especially for concave scatterers. The sampling methods are usually highly sensitive to the level of noise and their performances degrade fast when the noise becomes high. Nevertheless, the information provided by LSM, such as the estimation of the support of the scatterer, helps in improving the performance of other inversion methods [14, 17]. The application of LSM to vectorial wave scattering problems is straightforward [13, 18]. At the same time, due to the fact that the lowest order multipole in vectorial wave case is dipole, choosing an appropriate direction of the test dipole significantly influences the performance of linear sampling [19]. There is an interpretation of the LSM from the angle of induced current [14], which motivates the development of an improved sampling methods in [13]. Along the same line, LSM has been exploited to devise an effective approximation of the scattering phenomenon, which leads to a new quantitative inversion method [20]. There are many other qualitative inversion algorithms, for example, the point source method and the method of singular sources [21–23], the probe method and the enclosure method [24–27]. A direct sampling method that does not perform any matrix operations is proposed in [28], and a direct imaging algorithm based on a physical factorization is proposed in [29]. Other qualitative methods can be found in the survey [30]. References 1 Colton, D. and Kirsch, A. (1996) A simple method for solving inverse scattering problems in the resonance region. Inverse Probl., 12 (4), 383. 2 Colton, D., Piana, M., and Potthast, R. (1997) A simple method using Moro- zov’s discrepancy principle for solving inverse scattering problems. Inverse Probl., 13 (6), 1477. 119 120 Electromagnetic Inverse Scattering 3 Colton, D. and Kress, R. (2006) Using fundamental solutions in inverse scat- tering. Inverse Probl., 22 (3), R49. 4 Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scatter- ing theory, 2nd Edn. Springer-Verlag, Berlin, Germany. 5 Abramowitz, M. and Stegun, I.A. (1972) Handbook of mathematical func- 6 7 8 9 10 11 12 13 14 15 16 17 18 19 tions with formulas, graphs, and mathematical tables, Dover Publications, New York. Agarwal, K., Chen, X., and Zhong, Y. (2010) A multipole-expansion based linear sampling method for solving inverse scattering problems. Opt. Express, 18 (6), 6366–6381. Cakoni, F. and Colton, D.L. (2014) A qualitative approach to inverse scattering theory, Springer. Kirsch, A. (1998) Characterization of the shape of a scattering obstacle using the spectral data of the far field operator. Inverse Probl., 14 (6), 1489. Kirsch, A. (1999) Factorization of the far-field operator for the inhomogeneous medium case and an application in inverse scattering theory. Inverse Probl., 15 (2), 413. Kirsch, A. (2002) The MUSIC-algorithm and the factorization method in inverse scattering theory for inhomogeneous media. Inverse Probl., 18, 1025–1040. Cheney, M. (2001) The linear sampling method and the MUSIC algorithm. Inverse Probl., 17, 591–595. Kirsch, A. and Grinberg, N. (2008) The factorization method for inverse problems, vol. 36, Oxford University Press. Catapano, I., Crocco, L., and Isernia, T. (2008) Improved sampling methods for shape reconstruction of 3-D buried targets. IEEE Transactions on Geoscience and Remote Sensing, 46 (10), 3265–3273. Catapano, I., Crocco, L., and Isernia, T. (2007) On simple methods for shape reconstruction of unknown scatterers. IEEE Transactions on Antennas and Propagation, 55 (5), 1431–1436. Brandfass, M., Lanterman, A.D., and Warnick, K.F. (2001) A comparison of the Colton–Kirsch inverse scattering methods with linearized tomographic inverse scattering. Inverse Probl., 17 (6), 1797. Liseno, A. and Pierri, R. (2004) Shape reconstruction by the spectral data of the far-field operator: analysis and performances. IEEE Transactions on Antennas and Propagation, 52 (3), 899–903. Bao, G., Hou, S., and Li, P. (2007) Inverse scattering by a continuation method with initial guesses from a direct imaging algorithm. J. Comp. Phys., 227 (1), 755–762. Colton, D., Haddar, H., and Piana, M. (2003) The linear sampling method in inverse electromagnetic scattering theory. Inverse Probl., 19 (6), S105. Agarwal, K. (2014) Test dipole selection for linear sampling in transverse electric case. Progress In Electromagnetics Research B, 60, 241–258. Linear Sampling Method 20 Crocco, L., Catapano, I., Donato, L.D., and Isernia, T. (2012) The linear 21 22 23 24 25 26 27 28 29 30 31 sampling method as a way to quantitative inverse scattering. IEEE Transactions on Antennas and Propagation, 60 (4), 1844–1853. Potthast, R. (1996) A fast new method to solve inverse scattering problems. Inverse Probl., 12 (5), 731. Potthast, R. (2001) Point sources and multipoles in inverse scattering theory, CRC Press. Nakamura, G., Potthast, R., and Sini, M. (2006) Unification of the probe and singular sources methods for the inverse boundary value problem by the no-response test. Communications in Partial Differential Equations, 31 (10), 1505–1528. Ikehata, M. (1998) Reconstruction of the shape of the inclusion by boundary measurements. Commun. Part. Diff. Eq., 23 (7–8), 1459–1474. Ikehata, M. (1999) Enclosing a polygonal cavity in a two-dimensional bounded domain from cauchy data. Inverse Probl., 15 (5), 1231. Ikehata, M. (1999) Reconstruction of obstacle from boundary measurements. Wave Motion, 30 (3), 205–223. Nakamura, G. and Potthast, R. (2015) Inverse modeling, IOP Publishing. Ito, K., Jin, B., and Zou, J. (2012) A direct sampling method to an inverse medium scattering problem. Inverse Probl., 28 (2), 025 003. Hou, S., Solna, K., and Zhao, H. (2006) A direct imaging algorithm for extended targets. Inverse Probl., 22 (4), 1151. Potthast, R. (2006) A survey on sampling and probe methods for inverse problems. Inverse Probl., 22 (2), R1. Belkebir, K. and Tijhuis, A.G. (1996) Using multiple frequency information in the iterative solution of a two-dimensional non-linear inverse problem, Proc. PIERS 96: Progress In Electromagnetic Research Symposium, 353, Innsbruck, Austria. 121 123 6 Reconstructing Dielectric Scatterers This chapter is devoted to quantitative reconstruction algorithms that are aimed at retrieving permittivities of dielectric scatterers from the knowledge of measured scattering data. The scatterers are assumed to be nonmagnetic and have dimensions comparable to or larger than the wavelength. This inverse scattering problem is a typical parameter-identification problem, where the coefficients in an integral or differential equation are to be estimated from the measured data. In the framework of the exact scattering model, where the multiple scattering effect exists, to invert the integral equation is highly nonlinear so the nonlinearity becomes the most difficult issue, even compared with instability. Usually, iterative approaches are used to solve such a nonlinear problem, no matter whether one attempts to directly solve the original nonlinear equation or to solve an optimization problem into which the original problem is cast. When compared with qualitative methods, quantitative methods are usually characterized by quite a heavy computational cost, but have the advantage of providing the most complete information on the inspected scatterers. Under some conditions, for example Born-type approximations, quantitative methods can be implemented without iteration and thus are able to provide reconstruction results in a fairly short time period. The organization of the chapter is as follows. Section 6.1 introduces the fundamentals of quantitative reconstruction algorithms. First, the properties of uniqueness, stability, and nonlinearity are discussed. Then the formulation of the forward method is presented, which is followed by casting the inverse problem to an optimization problem. Section 6.2 briefly reviews noniterative inversion methods, of which there are two types. In particular, one type is the well-known Born-type inversion algorithm, which involves a linearization of the original problem. Section 6.3 reviews several iterative inversion methods. In particular, for the inversion methods, their implementation steps are presented and their properties and characteristics are commented on. Section 6.4 details a particular iterative inversion method, that is, the subspace-based optimization method (SOM), for which the implementation Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 124 Electromagnetic Inverse Scattering steps and numerical reconstruction results are presented. Section 6.5 discusses several important issues in the theories and implementations of quantitative reconstruction algorithms. 6.1 Introduction 6.1.1 Uniqueness, Stability, and Nonlinearity The first question to ask about the inverse scattering problem involving dielectric scatterers regards uniqueness. For scalar waves, that is, the acoustic wave, the uniqueness of the inverse scattering problem has been obtained by [1, 2]. Under certain conditions, the refractive index is uniquely determined by a knowledge of the far field pattern in all directions for all incidence angles at a fixed wavenumber. For vectorial waves, that is, electromagnetic waves, [3] proved that under certain conditions, for a fixed wavenumber, all directions of incidence, and all polarizations of the incident electric field, the knowledge about the electric far field pattern for all angles uniquely determines the permittivity. If the magnetic permeability is also a spatially varying unknown, the uniqueness theorem has been given in [4]. The proof of the uniqueness of the inverse scattering problem involving dielectric scatterers is closely related to and strongly motivated by the electric impedance tomography (EIT) problem, also known as Calderón’s problem, which consists of determining the electric conductivity of a medium by measuring voltage and current at the boundary of the medium. Calderón’s pioneering work in 1980, reprinted in [5], motivated many developments in inverse problems, in particular, the construction of complex geometrical optics (CGO) solutions for partial differential equations that are widely used to prove the uniqueness of several inverse problems [6]. It is important to recall what has been presented in Chapter 1: this book concentrates mainly on numerical methods that solve inverse scattering problems that are known a priori to have unique solutions. Inverse scattering problems that do not have unique solution are not considered in this book. In fact, the conditions of nonuniqueness are rather stringent and thus in practice it is rare to encounter such inverse scattering problems. For example, for anisotropic scatterers, if the permittivity and permeability are allowed to be zero or infinite, then it is possible to have infinitely many solutions to an inverse scattering problem. One of the applications of such nonuniqueness is invisibility and cloaking, and the idea of designing such anisotropic scatterers is referred to as transformation optics [7, 8]. The same transformation results for electrostatics was first proposed in [9, 10]. In addition, many inverse scattering methods cannot work reliably when an isotropic scatterer does not scatter off a certain incident wave for certain wavenumbers. In the mathematical community, such a wavenumber is referred to as the transmission eigenvalue of the interior transmission problem [11]. To be specific, this chapter considers dielectric scatterers Reconstructing Dielectric Scatterers that are nonmagnetic, that is, the relative permeability 𝜇r = 1, and have relative permittivity with real and imaginary parts satisfying 1 ≤ (𝜖r ) < ∞ and (𝜖r ) ≥ 0 and in addition all discrete numerical resonance frequencies are avoided [12]. Next, we turn to the question of stability. Inverse scattering problems involving dielectric scatterers cannot be stably solved. In fact, even if the amount of data collected is sufficient to guarantee uniqueness, the unknowns usually do not depend on the measured data in a stable way (mathematically, it is referred to as continuous). An obvious question to ask is how large the error of the solution could be in the worst case if the error in the measured data is at most 𝜏. For an ill-posed problem, the error in solution could be arbitrarily large, which really means instability. In order to recover some kind of stability, we need to restrict the space of admissible unknowns by assuming that they satisfy some a priori conditions. With this a priori information, it is possible to prove that the unknowns depend in a continuous way on the measured data. To determine the modulus of this continuity is referred to as the stability estimate (section 2.2 of [13]). For an inverse scattering problem involving dielectric scatterers, it has been proven that the stability is of the logarithmic type [14, 15]. Roughly speaking, if the error in the measured data is at most 𝜏, then the error of solution in the worst case is on the order of | ln 𝜏|−s (where 0 < s < 1). By the L’Hôpital’s rule, as 𝜏 approaches zero, we see that a small error in measured data leads to a much larger error in the solution. In the mathematical community, an inverse problem is said to be exponentially ill-posed, or severely ill-posed, if stability estimate is of the logarithmic type. It is important to remark that the inverse scattering problem is nonlinear, so it is not appropriate to prove its ill-posedness using methods that are devised for linear problems. For example, the total amount of available data, that is, the product of the number of transmitters and receivers, is less than the number of unknowns or, along the same line, the number of essentially independent equations (i.e., the product of the number of transmitters and the degrees of freedom of the scattering operator) is less than the degrees of freedom of unknowns. It is easy to see from the following numerical example why the aforementioned methods cannot be applied to nonlinear problems. We aim to ∑99 solve a single equation (1 − x1 )2 + i=1 (xi − xi+1 )2 = 0 for 100 real unknowns xi , i = 1, 2, … , 100. Although the number of unknowns is much larger than the number of equation, there is only one solution; xi = 1, i = 1, 2, … , 100. We make two remarks on the ill-posedness of inverse scattering problems. First, its nature of severe ill-posedness cannot be changed no matter what or how many measurements we take. The proof of logarithmic-type stability estimate in fact deals with the ideal case of performing all possible measurements, which in practice means that performing more measurements or different ones does not solve the problem of ill-posedness. Secondly, it has been observed numerically that the stability increases if one increases the frequency [16]. Several rigorous justifications of increasing the stability can be found in [17] and 125 126 Electromagnetic Inverse Scattering [18] and references therein. In other words, the static problem (EIT problem) is most unstable and the optical scattering problem is relatively more stable. In addition to instability, the second main difficulty of inverse scattering problems is the fact that inverse problems are nonlinear, even if the corresponding forward problems are linear ones. As presented in Chapter 1, an inverse scattering problem deals with the relationship between a scatterer’s parameter and scattered field, whereas the forward problem deals with the relationship between the incident and scattered fields. The nonlinearity of inverse problem is obvious by the fact that the scattered field isn’t doubled when the scatterer’s permittivity is doubled. In addition, the nonlinearity is not a convex one. The intrinsic nonlinearity of inverse scattering problem makes the development of effective algorithms a difficult task because a solution procedure can be trapped into false solutions that are different from the exact one. 6.1.2 Formulation of the Forward Problem For convenience of presentation, we consider the two-dimensional TM case, where scalar wave equations are involved. In a homogeneous medium background that has permittivity 𝜖0 and permeability 𝜇0 , nonmagnetic scatterers, characterized by 𝜖r (r), are located in the domain of interest D ⊂ R2 and illuminated from different angles by time-harmonic electromagnetic waves. The incident waves are expressed as Epi (r), p = 1, 2, … , Ni , r ∈ D. For each incidence, the scattered field is measured at a surface S that is usually in the far zone. The forward problem consists of the following two equations. The first one is the Lippmann–Schwinger equation, Et (r) = Ei (r) + i𝜔𝜇0 ∫D g(r, r′ )[−i𝜔𝜖0 (𝜖r (r′ ) − 1)Et (r′ )]dr′ for r ∈ D, (6.1) which describes the wave-scatterer interaction, and the second one describes the scattered field as a re-radiation of the induced contrast current, Es (r) = i𝜔𝜇0 ∫D g(r, r′ )[−i𝜔𝜖0 (𝜖r (r′ ) − 1)Et (r′ )]dr′ for r ∈ S (6.2) The physical meaning of −i𝜔𝜖0 (𝜖r (r) − 1)Et (r) is an induced contrast current density, but in practice it is more convenient to define a normalized contrast current density as J(r) = (𝜖r (r) − 1)Et (r). Then, (6.1) and (6.2) can be rewritten as Et (r) = Ei (r) + k02 ∫D g(r, r′ )J(r′ )dr′ for r ∈ D, (6.3) and Es (r) = k02 ∫D g(r, r′ )J(r′ )dr′ for r ∈ S (6.4) Reconstructing Dielectric Scatterers √ respectively, where k0 = 𝜔 𝜇0 𝜖0 is the wavenumber of the homogeneous medium background. For convenience, we denote 𝜖r (r) − 1 as the contrast 𝜒(r) and introduce the operators GS (⋅) and GD (⋅) as { for r ∈ S GS (J), 2 ′ ′ ′ k0 g(r, r )J(r )dr = (6.5) ∫D for r ∈ D GD (J), Then the governing equations can be written in two different kinds of compact form. The first kind are referred to as field-type equations, Et (r) = Ei (r) + GD (𝜒Et ) for r ∈ D, (6.6) Es (r) = GS (𝜒Et ) (6.7) for r ∈ S where electric field is involved in both equations, and the second type are source-type equations, J(r) = 𝜒(r)[Ei (r) + GD (J)] for r ∈ D, (6.8) s (6.9) E (r) = GS (J) for r ∈ S where induced source is involved in both equations. For convenience, (6.6) and (6.8) are referred to as the state equations, and (6.7) and (6.9) are referred to as data equations. 6.1.3 Optimization Approach to the Inverse Problem In an inverse problem, the scattered fields Eps (r), r ∈ S for all Ni incidences are measured, and then the task is to reconstruct 𝜒(r) for r ∈ D. It is important to clarify that while the notation D means the domain of scatterer in the forward problem, it means the domain of interest (DOI) (i.e., a region somewhere in which the scatterer resides) in the inverse problem. This is because we do not know a priori the boundary of scatterer in inverse problem. Nevertheless, Equation (6.6)–(6.9) can be applied to both forward and inverse problems. The reason is that for a point r ∈ D that is not inside the scatterer, its 𝜒(r) is equal to zero. In the presence of noise, which is unavoidable, the nonlinear equations Eps = F(𝜖r , Epi ) (6.10) do not have a solution of 𝜖r , where F denotes the operator of solving the forward problem. Consequently, instead of solving (6.10), we seek the solution to the optimization problem, Min: f (𝜖r ) = Ni ∑ p=1 ||F(𝜖r , Epi ) − Eps ||2S (6.11) 127 128 Electromagnetic Inverse Scattering where || ⋅ ||S denotes the Euclidian length of a function defined on S. In order to obtain a stable solution, a regularization strategy has to be used so that the objective function becomes, for example, Min: f (𝜖r ) = Ni ∑ ||F(𝜖r , Epi ) − Eps ||2S + 𝛼R(𝜖r ), (6.12) p=1 where R(𝜖r ) is a nonnegative regularization functional. The regularizing term is usually chosen on the basis of some a priori assumptions (or knowledge) of the unknown function. The details of regularization can be found in Appendix A. After discretization, the unknown 𝜖r appears in the diagonal of a matrix, and the objective function involves the inverse of this matrix. Such an objective function is obviously nonlinear and nonconvex, which is known to be difficult to solve due to the presence of local minima. Roughly speaking, algorithms proposed for solving nonlinear optimization problems can be classified into deterministic algorithms and heuristic (or stochastic) ones. Among popular optimization algorithms, steepest descent, conjugate gradient, Gauss–Newton, quasi-Newton methods, Levenberg–Marquardt, and so on, belong to deterministic algorithms [19–23], whereas simulated annealing, genetic algorithms, differential evolution, particle swarm optimization, and so on, belong to heuristic or stochastic algorithms [24–31]. A large number of optimization algorithms are not capable of making a distinction between locally optimal solutions and globally optimal solutions. In practice, no optimization algorithm is guaranteed to reach a global minimum for the discussed nonlinear and nonconvex optimization problem. To evaluate the performance of an optimization algorithm, it is more meaningful to consider this question: out of one hundred simulations starting from different initial guesses, how many times will the optimization algorithm reach a solution that is in the neighborhood of the global minimum? It is important to determine the computational complexity of solving (6.12). Let the domain of interest be discretized into M pixels, and each pixel is so small so that 𝜖r therein is a constant. If the forward problem is evaluated by an iterative solver in each iteration step of an optimization algorithm, the overall computational complexity is Nopt Ninc Nfor M log2 M, (6.13) where Ninc is the number of incidences, Nfor is the number of iterations for solving the forward problem, and Nopt denotes the number of iterations during the optimization procedure. M log2 M is the major computational cost of the forward problem solver; that is, the matrix-vector multiplication by the fast Fourier transform (FFT). To improve the overall computational complexity as formulated in (6.13), three factors should be taken into account. The first factor Nfor M log2 M is determined by the state-of-the-art in computational electromagnetics. The second factor Ninc can be as small as the degrees of freedom of Reconstructing Dielectric Scatterers the radiation operator GS [32–34]. While there is barely room to further reduce the first two factors, the third factor Nopt becomes the bottleneck of inverse scattering problems. Two phenomena are often observed due to nonlinearity of the objective function; that is, either a large Nopt is needed to reach a global minimum or optimization algorithms pre-converge to a local minimum. Thus, the key to solve inverse scattering problems is to reduce the number of iterations Nopt needed for the optimization algorithm to reach a global minimum. One way of reducing Nopt is to try different optimization algorithms, such as the aforementioned deterministic algorithms and heuristic (or stochastic) ones. No matter which optimization algorithm is chosen, the difficulty of the nonlinear problem does not change since the objective function remains the same. As an analogy, when climbing a hill, changing climbing equipment might increase the speed of climbing, but it does not change the steepness of the hill. Thus, in the author’s opinion, a more effective approach to reduce Nopt is to rewrite the objective function such that it depends in a much less nonlinear way on unknowns. A well rewritten objective function increases the chance of all optimization algorithms to find a solution that is close to the exact solution. For this reason, it is not our primary concern to discuss the advantages and limitations of individual optimization algorithms. Instead, the chapter concerns mainly on the modelling of the inversion; that is, the way of rewriting and approximating the original objective function. The theories and implementation details of deterministic and heuristic (or stochastic) optimization algorithms can be found in [19–21, 24–30]. This book mainly applies the conjugate gradient (CG) optimization algorithm and its variants. Appendix C briefly introduces the implementation steps of the conjugate gradient optimization algorithm. 6.2 Noniterative Inversion Methods To solve an inverse scattering problem based on an exact scattering model, one needs to solve it iteratively by optimization methods. Under some conditions, inverse scattering problems can be solved without iteration. Such noniterative inversion algorithms can be either linear or nonlinear in terms of the dependence of the scattered field on unknowns. In the first type, based on certain approximations in scattering models (e.g., those based on Born and Rytov type approximations), the original nonlinear problem becomes a linear one [35]. If we know a priori that the inspected objects fulfill the conditions that make the approximate models valid, then linear inversion methods are able to provide reconstruction results in a fairly short time period. For example, in order to apply the Born approximation, one needs to know that the object is a weak scatterer and its size is not much larger than the wavelength. In the second type, although measured scattered field eventually depends nonlinearly on unknowns, the inverse problem decomposes into several linear equations 129 130 Electromagnetic Inverse Scattering and each linear equation can be solved without iteration. The extended Born approximation method and back-propagation method are examples of this type. Despite their limited applicability, noniterative inversion methods are of significant interest because of their computational efficiency. In addition, reconstruction results provided by noniterative inversion methods can often be used as initial guesses for nonlinear inversion methods. Since there is an abundance of literature on noniterative inversion methods, this section briefly introduces some of those algorithms. 6.2.1 Born Approximation Inversion Method When scatterers are weak ones, that is, when the permittivity of scatterers differs only slightly from that of the background medium, the inverse scattering problem can be solved by the first-order Born approximation or simply referred to as the Born approximation (BA) method. Since the scattering field is very weak compared with the incident field, it is plausible to assume that one will obtain a good approximation if the total field Et (r) for r ∈ D, that is, inside the scatterer, is replaced by the incident field Ei (r). Consequently, (6.7) is approximated by Es (r) ≈ GS (𝜒Ei ) for r ∈ S (6.14) To recover 𝜒 is an ill-posed linear problem. Since in practice the measured Es is definitely noise contaminated, a direct inverse of the linear operator yields meaningless results. In order to balance the accuracy in data fitting and the stability of solution, regularization has to be used. For example, when Tikhonov regularization is used, the original linear equation is cast into an optimization problem Min: f (𝜒) = Ni ∑ ||GS (𝜒Epi ) − Eps ||2S + 𝛼||𝜒||2D , (6.15) p=1 The minimization problem has an analytical solution, which can be found in Appendix B. If the incident wave is a plane wave and the scattered field is measured in the far zone, then BA reconstruction can be interpreted as a low pass filter of contrast in the reciprocal space, which will be discussed in detail in Chapter 10. In addition to weak scattering, the validity of BA requires that the size of scatterer cannot be much larger than the wavelength [36, 37]. We mention in passing that the BA-based inversion method for near-field microscopy is presented in [38]. 6.2.2 Rytov Approximation Inversion Method For weak scatterers, another linearized version of inverse scattering is based on the Rytov approximation (RA). The Rytov approximation is closely related to the Born approximation, but the linearized inverse scattering formula based Reconstructing Dielectric Scatterers on the Rytov approximation employs the complex-valued phase of the total field rather than the scattered field as the measured field quantity. The Rytov procedure expresses the total field Et (r) in the form Et (r) = e𝜓(r) , (6.16) where 𝜓(r) is generally complex-valued. In fact, −i𝜓(r) can be considered as the phase of the total field. Then 𝜓(r) satisfies a nonlinear partial differential equation, referred to as the Riccati equation. The Rytov expansion expands 𝜓(r) in a perturbation series. The first-order Rytov approximation reads Et (r) ≈ E1t(R) (r) = Ei (r)e𝜓1 (r) , (6.17) where the first-order phase 𝜓1 (r) relates to the first-order Born approximation of the scattered field E1s(B) (r) by 𝜓1 (r) = [Ei (r)]−1 E1s(B) (r). (6.18) In inverse scattering problems, the RA treats 𝜓1 (r) = ln[Et (r)∕Ei (r)] as measured data, which is different from the case of the BA in which the scattered field Es (r) is treated as measured data. Since E1s(B) (r) linearly depends on the contrast, (6.18) shows that 𝜓1 (r) consequently depends linearly on the contrast [36, 37]. If the incident wave is a plane wave and the scattered field is measured in the far zone, inverse scattering is regarded as one of the most frequently encountered diffraction tomography (DT) problems. The theory of diffraction tomography resembles the classical theory of computed tomography (CT) that is modelled by Radon transform and reduces to the latter theory in limits where the wavelength approaches zero (section 8.7 of [39]). In solving DT problems, the RA is also able to reconstruct contrast by performing an inverse Fourier transform. This widely used reconstruction procedure can be done in quasi real-time. Rytov and Born approximations are only applicable to weak scatterers, but they have different domains of validity. The Rytov approximation is generally more accurate than the Born approximation if scatterer is large compared with wavelength [36, 37]. 6.2.3 Extended Born Approximation Inversion Method To increase the range of validity of BA, the extended Born approximation (EBA) method is proposed in [40]. To derive the EBA, we first rewrite the state equation (6.1) as Et (r) =Ei (r) + k02 + k02 ∫D ∫D g(r, r′ )𝜒(r′ )Et (r)dr′ g(r, r′ )𝜒(r′ )[Et (r′ ) − Et (r)]dr′ (6.19) 131 132 Electromagnetic Inverse Scattering Based on the fact that the Green’s function g(r, r′ ) is singular when r approaches r′ , the EBA method drops off the second integral in (6.19) via the argument that its integrand is much smaller than the counterpart in the first integral when r approaches r′ . Consequently, the resultant equation yields a localized electric field; that is, an electric field in one position is independent of electric fields at other positions. Indeed, the electric field in the EBA is formulated as Et (r) = M−1 (r)Ei (r) (6.20) M(r) = 1 − k02 g(r, r′ )𝜒(r′ )dr′ (6.21) From (6.7) and the definition of GD , the scattered field is then { } Es = GS 𝜒[1 − GD (𝜒)]−1 Ei (6.22) where ∫D which is a nonlinear equation of 𝜒. To solve the inverse problem, a twostep noniterative procedure has been proposed in [41]. The nonlinear equation (6.22) is rewritten as the following two linear equations via the introduction of an intermediate parameter 𝑤(r) = 𝜒(r)M−1 (r), Es = GS (𝑤Ei ) (6.23) 𝑤[1 − GD (𝜒)] = 𝜒 (6.24) and Equation (6.23) is applicable to all Ni incidences, and the resultant equation system is still linear for the unknown 𝑤. This linear problem is ill-conditioned, so a regularization method should be used. Once 𝑤 is obtained, (6.24) is a well-posed linear equation for the unknown 𝜒. Inspired by the EBA, the quasi-analytical (QA) approximation [42] and diagonal tensor approximation (DTA) [43] models are proposed that have wider ranges of validity than the BA. In these approximations, the total electric field at a position is assumed to be proportional to the incident field at the same position, similar to (6.20) in the EBA case, but the ratio of them depends on the incident wave, which is different from the field-independent ratio M−1 (r) in the EBA. For inverse problems under these two approximations, the original nonlinear equation can also be decomposed into two linear equations by introducing an intermediate parameter. After some modifications, we can apply the EBA inversion procedure outlined in the previous paragraph to QA and DTA inversions as well. However, since the ratio of total field to incident field at a position depends on incidences in QA and DTA, the noniterative approach by solving two linear equations in sequence is seldom explored by the developers of these two approximation models. The EBA can also be interpreted as approximating the Et (r′ ) in the integral of (6.1) by the first order term of a Taylor expansion about the field point r. Reconstructing Dielectric Scatterers We mention in passing inversion methods that are based on a higher-order extended Born approximation will be intrinsically nonlinear. 6.2.4 Back-Propagation Scheme The noniterative inversion algorithm that is based on back-propagation (BP) consists of three steps [44]. The first step is to determine induced current by a BP scheme, where induced current is assumed to be proportional to the BP field. J = 𝛾GS† (Es ) (6.25) where GS† denotes the adjoint of operator GS and maps scattered field measured in the domain S to the induced current in the domain of interest D. In discrete H s † s form, GS (E ) is written as GS ⋅ E , where the superscript H denotes the Hermitian operator. The complex parameter 𝛾 is chosen to minimize the cost function defined as the quadratic error in the scattered field, F(𝛾) = ||Es − GS (𝛾GS† (Es ))||2S . (6.26) The minimum of F(𝛾) requires the derivative with respect to 𝛾 to be zero, which leads to an analytical solution of 𝛾, 𝛾= ⟨Es , GS (GS† (Es ))⟩S ||GS (GS† (Es ))||S2 , (6.27) where ⟨a, b⟩S denotes the inner project of function a and b in the domain S, and ∗ T its discrete form reads a ⋅ b , where the superscripts T and * denote the transpose and complex conjugate, respectively. Equation (6.25) shows that induced current J is obtained once 𝛾 is determined. The second step calculates the total field in the domain D, Et = Ei + GD (J). (6.28) The first and the second steps are applied to each of Ni incidences. The third step obtains the contrast 𝜒(r) by taking all incident waves into account. For the pth incidence, the definition of 𝜒(r) requires Jp (r) = 𝜒(r)Ept (r). (6.29) The enforcement of (6.29) to all incidents leads to a least-squares problem and the solution of 𝜒(r) can be obtained analytically, ∑Ni t ∗ p=1 Jp (r) ⋅ [Ep (r)] 𝜒(r) = (6.30) ∑Ni t 2 p=1 |Ep (r)| If the scatterer is lossless, then the real part of the right-hand side of (6.30) is chosen. 133 Electromagnetic Inverse Scattering This BP scheme works for arbitrary incident fields and for both near and far field measurements, which is different from the filtered back-propagation algorithm of DT [45]. The noniterative inversion algorithms discussed in Sections 6.2.1–6.2.4 have made some approximations or assumptions and thus have somewhat limited ranges of validation. Here, we do not intend to discuss the ranges of their validity, nor to compare their inversion results. Instead, these noniterative inversion algorithms might be useful in providing initial guesses for iterative inversion algorithms that will be discussed in Section 6.3 where no approximation is made in the modeling of ISP. 6.2.5 Numerical Examples This section provides some numerical examples to illustrate the performance of the noniterative inversion algorithms discussed in Sections 6.2.1–6.2.4. The purposes of these numerical examples are threefold. The first is to provide a visualization of the reconstruction results obtained by the four noniterative inversion algorithms. The second is to demonstrate the effect of the Tikhonov regularization parameter on the solution of inverse problems, the theoretical description of which is given in Appendix A. The third is to demonstrate that the four noniterative inversion algorithms fail to reconstruct scatterers that are not weak-scattering. We choose the scatterer to be the “Austria” profile [117]. As shown in Fig. 6.1, it consists of two discs and one ring. The discs of radius 0.2 m are centered at (0.3, 0.6) m and (−0.3, 0.6) m. The ring has an exterior radius 0.6 m and an inner radius 0.3 m, and is centered at (0, −0.2) m. The background is air and the contrast between the scatterers and the background is 1 (i.e., 𝜖r = 2). The domain of interest (DOI) is a 2 × 2 m2 square centered at the origin. Sixteen line 1 2 1.8 0.5 1.6 y(m) 134 0 1.4 –0.5 –1 –1 1.2 –0.5 0 x(m) 0.5 1 1 Figure 6.1 Inverse scattering experiment of the Austria profile: exact profile. The shaded bar shows the value of relative permittivity. Reconstructing Dielectric Scatterers sources and 32 line receivers are evenly placed on circles with radius 6 m and 3 m, respectively, centered at the origin. The operating frequency is 400 MHz, corresponding to the wavelength 𝜆 = 0.75 m in the background medium of air. The scattering data are generated by the full-wave solver in the forward process and are recorded in the format of the multistatic response (MSR) matrix K whose size is Ns × Ni . Then additive white Gaussian noise 𝜅 is added to the MSR matrix, the resultant noisy matrix K + 𝜅 is treated as the measured MSR matrix and is used to reconstruct scatterers. The noise level is quantified as ||𝜅 ||F × 100%, where || ⋅ ||F denotes the Frobenius norm of a matrix, defined as ||K ||F the square root of the sum of the absolute squares of all its elements. In solving the inverse problem, the DOI is discretized into 64 × 64 grid meshes. In order to study a weak-scattering scatterer, we reduce the the contrast between the scatterers and the background to be 0.1 (i.e., 𝜖r = 1.1). When 5% additive white Gaussian noise is present, the reconstruction results by the four noniterative inversion algorithms are shown in Fig. 6.2, where subfigures (a)–(d) correspond to the BP method, BA, EBA, and RA methods, respectively. The results show that the BA, EBA, and RA methods yield comparable results (for this scatterer) that are close the to exact profile. In comparison, the reconstruction result obtained by the BP method exhibits far lower permittivity than the exact one. Next, we instigate the effect of the Tikhonov regularization parameter 𝛼 appearing in (6.15) on the solutions of the BA-based inversion method. The singular values of the discretized version of the GS Epi operator appearing in (6.15) is plotted in Fig. 6.3. The condition number, which is defined as the ratio of the largest to smallest singular values, is larger than 100 in this problem, indicating that the linear equation (6.14) is ill conditioned. We use the Tikhonov regularization method (6.15) to obtain a stable and reasonable approximate solution. As discussed in Appendix A, the role of the regularization parameter 𝛼 is to keep a balance between the accuracy of data-fitting and the stability of the solution. As 𝛼 tends to zero, the data-fitting reaches better accuracy, but the solution becomes more unstable. When 𝛼 becomes large, the effect is just the opposite. In presence of 5% white Gaussian noise, the reconstruction results under different values of 𝛼 (108 , 109 , 1010 , 1012 , 1014 , and 1018 ) are shown in Fig. 6.4. From the visual point of view, 𝛼 = 1012 performs the best among the six results; that is, reaching a better balance between the accuracy of data-fitting and the stability of the solution compared with other values of 𝛼. We define the relative error Re as follows to quantify the reconstruction result, Re = ||𝜖 − 𝜖 R || ||𝜖|| (6.31) 135 Electromagnetic Inverse Scattering 1 1 1.045 1.04 0.5 1.1 0.5 1.025 –0.5 1.02 –1 –0.5 0 x(m) (a) 1 0.5 –1 1.08 1.06 0 1.04 1.02 –0.5 1 –0.5 0 x(m) 0.5 0 x(m) (b) 0.5 1 1.1 0.5 1.05 0 1 –0.5 0.98 –1 –1 –0.5 1 1.12 1.1 1 –1 1 0.5 1.05 0 –0.5 1.015 –1 y(m) y(m) 1.03 0 y(m) y(m) 1.035 –1 –1 1 –0.5 (c) 0 x(m) 0.5 1 (d) Figure 6.2 Application of noniterative inversion algorithms to the reconstruction of a weak-scattering “Austria” profile with 𝜖r = 1.1. (a) BP method; (b) BA method; (c) EBA method; and (d) RA method. 6.5 6 5.5 log10(σj) 136 5 4.5 4 3.5 0 5 10 15 20 25 30 35 Singular value number, j Figure 6.3 The distribution of singular values of the operator GS Epi , where the base 10 logarithm of the singular values is plotted. 0.95 Reconstructing Dielectric Scatterers 1.2 0 1 –0.5 –1 –1 –0.5 0.8 –0.5 1 0.5 0 x(m) (a) –1 –1 1 0.5 0 1.04 –0.5 0 0.5 x(m) (d) 1 0.5 0 x(m) (b) 1 1 1.005 0 1.004 –0.5 –1 –1 –0.5 1.002 1 0.5 0 x(m) (c) 1 1.0000007 1.0000006 1.0000005 0 1 0 0.5 x(m) (e) 1 0.5 1.003 –0.5 –0.5 1.05 0 1.02 –0.5 –1 –1 1.1 0.5 1 1.006 0.5 y(m) 1.06 –0.5 –0.5 1 1.08 –1 –1 0 1.25 1.2 1.15 1.1 1.05 1 0.95 0.9 y(m) 0.5 1.4 y(m) y(m) 0.5 y(m) 1 1.6 y(m) 1 –1 –1 1.0000004 1.0000003 –0.5 0 0.5 x(m) (f) 1 1.0000002 Figure 6.4 BA reconstruction results as a function of regularization parameter 𝛼: (a) 108 ; (b) 109 ; (c) 1010 ; (d) 1012 ; (e) 1014 ; and (f ) 1018 . 0.16 0.14 0.12 Re 0.1 0.08 0.06 0.04 0.02 0 5 10 15 log 10α 20 25 Figure 6.5 The relative error Re of the BA reconstruction as a function of the regularization parameter 𝛼. where 𝜖 R is the reconstructed permittivity. The relative errors Re for the reconstruction results displayed in Fig. 6.4 are shown in Fig. 6.5, where we see that Re reaches its minimum somewhere between 𝛼 = 1010 and 1012 . In practice, any value between 1010 and 1012 is a good candidate for 𝛼 and there is no 137 Electromagnetic Inverse Scattering need to seek the “best” value. As discussed in Appendix A, finding such an interval is often done by trial and error. Other methods used to determine the optimal value of the regularization parameter, such as the discrepancy principle, the generalized cross validation, and the L-curve method, can be found in Appendix A and references therein. Finally, we test the performance of the four noniterative inversion algorithms in reconstructing scatterers that are not weak-scattering. The original “Austria” profile, with the contrast at 1 (i.e., 𝜖r = 2), is considered. The reconstruction results are shown in Fig. 6.6, where none of the four algorithms is able to satisfactorily reconstruct the scatterer. Due to the limitation of the scope of the applicability of noniterative inversion algorithms, it is mandatory to apply full-wave iterative inversion methods to solve such a problem. 1 1 2 1.2 1 0 0.8 –0.5 0.6 –1 –1 0.5 y(m) y(m) 0.5 –0.5 0 x(m) (a) 0.5 –1 –1 0.5 4 0.5 0 2 –0.5 0 0 x(m) (c) 0.5 1 y(m) 1 –0.5 0.5 0 –0.5 1 –2 1 0 6 –1 –1 1.5 –0.5 0.4 1 y(m) 138 –0.5 0 x(m) (b) 0.5 1 –1 5 4 3 2 0 1 0 –0.5 –1 –2 –1 –1 –0.5 0 x(m) (d) 0.5 1 Figure 6.6 Application of noniterative inversion algorithms to the reconstruction of “Austria” profile with 𝜖r = 2. (a) BP method; (b) BA method; (c) EBA method; and (d) RA method. All methods fail to reconstruct a scatterer that is not weak-scattering. Reconstructing Dielectric Scatterers 6.3 Full-Wave Iterative Inversion Methods This section is devoted to full-wave iterative inversion methods that are based on “exact” models, which are theoretically valid for any scatterers, even those with high contrast with respect to the background and large in comparison with wavelength. 6.3.1 Distorted Born Iterative Method The distorted Born iterative method (DBIM) iteratively implements the distorted-wave Born approximation (DWBA). The DBIM starts with the field-type integral equations (6.6) and (6.7). The scattered field is a nonlinear function of contrast, Es = GS 𝜒(I − GD 𝜒)−1 Ei (6.32) We first introduce the distorted-wave Born approximation. Consider the contrast 𝜒(r) to be a small perturbation 𝛿𝜒(r) with respect to background contrast 𝜒0 (r); that is, 𝜒(r) = 𝜒0 (r) + 𝛿𝜒(r). The inhomogeneous Green’s function g 𝜒0 (r, r′ ) for the background medium 𝜒0 (r) is g 𝜒0 (r, r′ ) = (I − GD 𝜒0 )−1 g(r, r′ ) (6.33) The physical meaning is that the total field g 𝜒0 (r, r′ ) consists of the original field g(r, r′ ) in absence of 𝜒0 (r) and the scattered field GD (𝜒0 g 𝜒0 ) due to the presence of 𝜒0 (r). For convenience, we introduce the notation 𝜒 GS 0 (J) = k02 ∫D g 𝜒0 (r, r′ )J(r′ )dr′ for r ∈ S (6.34) The scattered field Es (r) due to the presence of 𝜒(r) consists of two parts, that is, the scattered field E0s (r) due to the background scatterer 𝜒0 (r), and the perturbation field due to the presence of 𝛿𝜒(r) embedded in the inhomogeneous background medium 𝜒0 (r), 𝜒 Es = E0s + GS 0 𝛿𝜒Et (6.35) The data equation (6.35) is exact, but it is a nonlinear integral equation for 𝜒 since the total field Et depends on 𝜒 as well. The DWBA replaces the Et with E0t , which is the total field in the inhomogeneous background medium 𝜒0 (r), 𝜒 Es ≈ E0s + GS 0 𝛿𝜒E0t , (6.36) which introduces an error in the order of (𝛿𝜒)2 , which vanishes as 𝛿𝜒 goes to zero [46]. 139 140 Electromagnetic Inverse Scattering Next, we introduce the DBIM to solve inverse scattering problems. The Es on the left-hand side of (6.35) is the measured data. The DBIM was proposed by Chew and Wang in [47] and is implemented as follows: Step 1: Choose initial guess 𝜒0 , which is usually chosen as zero or the results obtained by noniterative inversion algorithms. Initialize the iteration step n = 0. 𝜒 Step 2: Calculate GS n for the background medium contrast 𝜒n at the nth iteration. For each incident wave Epi , p = 1, 2, ..., Ni , solve the forward probt in the domain of interest (DOI) and lem to determine the total field Ep,n s the scattered field Ep,n at receivers. Solve for 𝛿𝜒 that simultaneously satisfies 𝜒 s t Eps = Ep,n + GS n 𝛿𝜒Ep,n , (6.37) for all incidences. This is a linear equation for 𝛿𝜒. The regularization method should be used in solving this linear problem due to ill-posedness. Update the solution 𝜒n+1 = 𝜒n + 𝛿𝜒. Step 3: If termination condition is satisfied, stop the iteration. Otherwise, update n = n + 1 and go to Step 2. 𝜒 Note that g 𝜒n (r, r′ ) that appears in GS n in Step 2 is obtained by (6.33). In numerical simulations, it is more convenient to use reciprocity theorem g 𝜒n (r, r′ ) = g 𝜒n (r′ , r) since the latter can be efficiently obtained by solving a forward problem using the conjugate-gradient fast Fourier transform (CG-FFT) algorithm, where a point source located at the position of receiver r illuminates the scatterer with contrast 𝜒n [48]. It has been proven that the DBIM method is equivalent to the Newton– Kantorovich (NK) method [49]. The NK method is similar to the DBIM except that it requires that 𝛿𝜒 simultaneously satisfies s t Eps = Ep,n + GS (I − 𝜒n GD )−1 𝛿𝜒Ep,n , (6.38) 𝜒 GS n J for all incidences. In fact, it can be easily seen that the formula = GS J + 𝜒 GS n 𝜒n GD J holds for an arbitrary source J, which means that the radiated field in presence of scatterer 𝜒n consists of the direct radiating field in absence of the scatterer and the perturbation field due to the presence of the scatterer. 𝜒 Thus, we have GS (I − 𝜒n GD )−1 = GS n , which consequently means that (6.37) and (6.38) are same equations. That is, it proves the equivalence of the DBIM method and the NK method. It is worth discussing the equivalence of the DBIM method and the NK method from a different perspective. In 1948, L. V. Kantorovich extended the Newton method for solving nonlinear equations to functional spaces [50]. Consider the nonlinear functional F(𝜒) = Es − GS 𝜒(I − GD 𝜒)−1 Ei (6.39) Reconstructing Dielectric Scatterers which is the residual version of (6.32). The Kantorovich method solves the nonlinear equation F(𝜒) = 0 by iterative methods, 𝜒n+1 = 𝜒n + 𝛿𝜒, where 𝛿𝜒 satisfies F ′ (𝜒n )𝛿𝜒 = −F(𝜒n ) and F ′ (⋅) is the Fréchet derivative, which is the generalization of the concept of gradient to the case of infinite dimensional spaces [51]. Equation (6.38) shows that the NK method explicitly derives the the Fréchet derivative, the details of which can be found in [49], whereas (6.37) shows that the DBIM implicity obtains the Fréchet derivative using the physical concept of an inhomogeneous Green’s function, that is, the perturbation of the scattered field due to a small perturbation 𝛿𝜒 of the contrast 𝜒n t is just the radiation field by the contrast source 𝛿𝜒Ep,n in the inhomogeneous background medium 𝜒n . The NK method (equivalently the DBIM method) solves the inverse scattering problem by finding the roots of the nonlinear functional. A closely related approach is to cast the root-finding problem to an optimization problem, Min: f (𝜒) = Ni ∑ ||Eps − GS 𝜒(I − GD 𝜒)−1 Epi ||2S , (6.40) p=1 which is a nonlinear least-squares problem. To numerically solve (6.40) (or F(𝜒) = 0 for (6.39)), we have to discretize it so that the dimension of unknowns is finite. Consequently, since the NK method deals with functional spaces that are continuous, from here onward we use the term “Newton’s method for solving equations” instead of the NK method. A necessary condition for minimization is Fermat’s condition, ∇f (𝜒) = 0, (6.41) that is, we should find the roots of the nonlinear equation ∇f (𝜒). Using Newton’s method for solving equations, we obtain the iteration scheme, 𝜒n+1 = 𝜒n − [H(f (𝜒n ))]−1 ∇f (𝜒n ), (6.42) where H(⋅) is the Hessian matrix operator that is a square matrix of second-order partial derivatives of a function. The updated scheme (6.42) is referred to as “Newton’s method in optimization.” Since it is computationally costly for calculating the Hessian matrix (or its inverse directly), some modified versions of Newton’s method are often used in practice, such as the Gauss–Newton algorithm, quasi-Newton methods, and Levenberg– Marquardt algorithm. This section deals with solving F(𝜒) = 0 for (6.39) (or equivalently (6.40)) by using the DBIM (equivalently Newton’s method and its variants). Although these methods differ in updating schemes, they share the same property in that they do not change the nonlinearity relationship of the original problem. For example, for (6.40), the dependance of the objective function on the unknown 𝜒 is regardless of the optimization algorithm that one adopts, no matter whether 141 142 Electromagnetic Inverse Scattering it is the Newton’s method, Gauss–Newton algorithm, quasi-Newton methods, or Levenberg–Marquardt. Since the contrast 𝜒 appears in the diagonal of an inversion matrix, (6.40) is not a polynomial function of 𝜒. Though there are barely any theories on such a nonlinear dependance, substantial numerical simulations have shown that there are many local minima in (6.40) and it is quite challenging to obtain the global minimum. The next two subsections will introduce some algorithms that have changed the nonlinear dependance by rewriting the objective function in different but equivalent forms. 6.3.2 Contrast Source Inversion Method The contrast source inversion (CSI) method deals with the source-type integral equations, J(r) = 𝜒(r)[Ei (r) + GD (J)] for r ∈ D, (6.43) s (6.44) E (r) = GS (J) for r ∈ S and treats the contrast source J as an independent parameter instead of eliminating it by solving it from (6.43). The CSI method recasts the inverse problem as a minimization of an objective function that is a linear combination of normalized mismatches in the data equation and the state equation, ∑Ni 2 s p=1 ||Ep − GS (Jp )||S Min: f (J1 , J2 , … , JNi , 𝜒) = ∑Ni s 2 p=1 ||Ep ||S ∑Ni 2 i p=1 ||𝜒Ep + 𝜒GD (Jp ) − Jp ||D + . (6.45) ∑Ni i 2 ||𝜒E || p p=1 D The first term measures the mismatch in the data equation and the second term measures the mismatch in the state equation. This is a quadratic functional in J, but nonlinear in 𝜒. The objective function does not involve solving the forward problem. The CSI method proposes an iterative minimization scheme using an alternating method that first updates Jp and then updates 𝜒. In [52], the CSI method is implemented as follows: Step 1: Calculate GS and GD . Step 2: Initial iteration step, n = 0: Choose initial guesses for J0 and 𝜒0 , for example, using the back propagation inversion method; Initialize the search directions, 𝑣Jp,0 = 0 for the contrast current and 𝑣𝜒0 = 0 for the contrast. Step 3: n = n + 1. Step 3.1: Update Jp,n : Calculate the gradient (Fréchet derivative) J gp,n = ∇Jp f evaluated at Jp,n−1 and 𝜒n−1 ; Determine the Polak–Ribière conjugate gradient search directions Reconstructing Dielectric Scatterers J J J Re[⟨gp,n , gp,n −gp,n−1 ⟩D ] J J 𝑣p,n−1 . Define the scalar dp,n J ||gp,n−1 ||2D J by Jp,n = Jp,n−1 + dp,n 𝑣Jp,n . The objective function becomes J J quadratic in terms of parameter dp,n , and dp,n can be easily J 𝑣Jp,n = gp,n + obtained as done in [52, 53]. (In comparison with the stanJ 𝑣Jp,n should dard CG method presented in Appendix C, dp,n J )(−𝑣Jp,n )) be understood as (−dp,n Step 3.2: Update 𝜒n : Calculate the gradient (Fréchet derivative) gn𝜒 = ∇𝜒 f evaluated at Jp,n and 𝜒n−1 ; Determine the Polak–Ribière 𝜒 conjugate gradient search directions 𝜒 Re[⟨gn , gn𝜒 −gn−1 ⟩D ] 𝜒 𝑣 . Define the scalar dn𝜒 by 𝑣𝜒n = gn𝜒 + n−1 ||g 𝜒 ||2 n−1 D 𝜒n = 𝜒n−1 + dn𝜒 𝑣𝜒n . The value of dn𝜒 can be explicitly obtained by minimizing the objective function, but the result is rather tedious and its details can be found in [52]. Step 4: If a pre-determined termination condition (e.g., no obvious change in objective function or reaching a maximum iteration count) is satisfied, stop iteration. Otherwise, go to Step 3. The CSI method is proposed on the base of both the modified gradient method [54] and the source-type integral equation (STIE) method [55]. The modified gradient method is based on the field-type equations and treats both the contrast (𝜒) and the electric field (Ept ) as independent unknowns. The objective function also contains two normalized mismatches, one for the data equation and the other for the state equation. The two types of unknowns are simultaneously updated in each iteration. The modified gradient method is one of the first few inversion models for solving the ISP that do not solve the corresponding forward problem. One of the advantages of the modified gradient method is that the objective function is a quadratic in both Ept and 𝜒 individually, and consequently it is a quartic function of unknowns Ept and 𝜒 simultaneously. This is because the normalization factors do not involve any unknowns, which is significantly different from the objective function (6.45) of the CSI. To the best knowledge of the author, the modified gradient method is the first inversion model for solving the ISP in which the objective function depends on unknowns in a quartic manner. The STIE method proposed in [55] is closer to the CSI method since it is also based on the source-type integral equation and consequently it treats the contrast and the contrast current as independent unknowns. A key difference is that the STIE method decomposes the contrast source to radiating and nonradiating sources. While the radiating source can be easily obtained, the unknown nonradiating source is expanded with respect to some bases. Two independent objective functions are considered, one for the mismatch in the state equation and the other for the mismatch in the constitutive relationship J = 𝜒Et . The two types of unknown, that is, the contrast and the expansion-coefficient of nonradiating source, are 143 144 Electromagnetic Inverse Scattering updated alternatively by minimizing the two objective functions. One of the advantages of the STIE method is that the analytical expression of both types of unknown can be easily obtained by solving linear equations in the sense of least squares during each iteration. The first version of the CSI method was proposed in [53] in 1997 and then the modified version was developed in [52] in 1999, the latter being more popular nowadays. One of the main improvements is the method of updating 𝜒n in Step 3.2. The first version finds an analytical formula to update 𝜒n by minimizing the numerator of the second mismatch term in the objective function (6.45). However, due to the presence of the unknown 𝜒 in the denominator, the updating scheme may not reduce the objective function. The second version remedies this problem by minimizing the second mismatch term using the conjugate gradient method. As a side note, the scheme of alternately updating two types of unknowns presented in the CSI is what an earlier paper [56] calls an alternating direction implicit method. We mention in passing that there are several variants of the CSI method. For example, [57] uses the EBA-based two-step inversion result rather than BP as the initial solution to speed up the convergence. 6.3.3 Contrast Source Extended Born Method While both the DBIM and the CSI method are based on the original field-type or source-type integral equations, the contrast source extend Born (CS-EB) method, proposed by Isernia et al. [58], deals with a different source-type equation that is nevertheless equivalent to the original source-type equation. The original source-type state equation can be rewritten as { J(r) = 𝜒(r) Ei (r) + k02 g(r, r′ )J(r)dr′ ∫D } + k02 g(r, r′ )[J(r′ ) − J(r)]dr′ (6.46) ∫D If we define the second integral term as a modified integral operator, it can be written as GDM (J) = GD (J) − fD (r)J(r) (6.47) where fD (r) = k02 ∫D g(r, r′ )dr′ . (6.48) If we further define a new parameter of material p(r) = 𝜒(r) , 1 − 𝜒(r)fD (r) (6.49) Reconstructing Dielectric Scatterers then the state equation in the CS-EB reads J(r) = p(r)[Ei (r) + GDM (J)] for r ∈ D. (6.50) The inverse problem of reconstructing 𝜒 is to first reconstruct the new material parameter p from the state equation (6.50) and the data equation (6.9). For example, we can follow the procedure of the CSI model to alternatively update p and J in each iteration of optimization. Once p is reconstructed, the value of 𝜒 is subsequently obtained from (6.49). Some comments on the CS-EB are now in order. First, the state equation (6.50) is exact; that is, no approximation is made therein. In addition, it has the same structure as the original state equation (6.8), where 𝜒 is replaced by p and GD is replaced by GDM . Since the new defined material parameter p and operator GDM lead to different convergence speeds in both forward and inverse problems compared with the case of the original 𝜒 and GD , the CS-EB model provides an important alternative effective tool for scattering problems. The comparison of the original contrast-source model and the CS-EB model is made in [59]. Second, if the second term on the right-hand side of (6.50) is dropped off, based on the same argument made in the EBA method (see Section 6.2.3), then such an approximation exactly coincides with the result one would achieve within the EBA when the scatterers are homogeneous. This is why (6.50) is referred to as the “CS-EB model”: that is, the contrast-source version of the extended Born model. Third, partially motivated by the method of contracting integral equation that is used to solve the forward scattering problem with high contrast [60, 61], Zhong et al. have proposed a new integral equation (NIE) in [62], 𝛽(r)J(r) = R(r)[Ei (r) + GDN (J)] for r ∈ D, (6.51) where 𝛽(r) is an arbitrary function, R(r) = 𝛽(r)𝜒(r)[1 + 𝛽(r)𝜒(r)] parameter of material, and the new operator GDN (⋅) is defined as −1 GDN (J) = GD (J) + 𝛽(r)J(r). is the new (6.52) It is important to note that the NIE (6.51) is derived without approximation. Since the function 𝛽(r) can be arbitrary, it is desirable to choose one so that it helps to reduce the degree of nonlinearity of the inverse problem. Some comments are made on 𝛽(r). 1) Since 𝜒(r) has a positive real part and a nonnegative imaginary part, the magnitude of the new parameter of material R(r) will be definitely smaller than 1 if 𝛽(r) has a positive real part and a nonpositive imaginary part. This is one of the advantages of the NIE model. 2) In [62], R(r) and J(r) are treated as independent parameters in solving the inverse problem and they are updated alternatively. When updating R(r), what is inside the square bracket in (6.51) contains the local-effect term 145 146 Electromagnetic Inverse Scattering Ei (r) + 𝛽(r)J(r) and the global-effect term GD (J) due to multiple scattering. Based on the argument that nonlinearity of the inverse scattering problem is mainly due to the multiple scattering effect, [62] has chosen large values of 𝛽(r) so that the local-effect term dominates the global-effect term, which to a certain degree reduces the degree of nonlinearity of the problem. 3) When 𝛽(r) is chosen as −fD (r), the NIE model reduces to a structure very close to the CS-EB model. Fourth, it is straightforward to see that fD (r) can be chosen as an arbitrary function, not necessarily restricted to the right-hand side of (6.48). The derivation of (6.48) is a consequence of (6.46), with the motivation that the second integral term in (6.46) is much smaller than the first integral term; that is, ideally GDM (J) is negligible. With this motivation, the state equation (6.50) becomes a localized equation if GDM (J) is dropped off. To summarize, the fact that p(r) is chosen as (6.49), with fD (r) being the right-hand side of (6.48), can be understood as an analytical approach to approximately reach a localized effect. In comparison, the diagonalized contrast source inversion (DCSI) presented in [63] can be understood as a numerical approach to obtain p(r) so that the localized equation J(r) = p(r)Ei (r) approximately holds. 6.3.4 Other Iterative Models This section briefly introduces some other iterative inversion methods, all of which involve rewriting the original state equation in alternative forms. The dual space method [64] breaks the inverse scattering problem into two parts: the first part deals with the linear ill-posed problem of looking for the superposition coefficients of incidence waves coming from different angles so that the resulting scattered fields match certain multipole radiation patterns in the far field, and the second part deals with the nonlinear problem of looking for the total electric field Et (r) and the contrast 𝜒(r) inside the domain of interest D so that they satisfy both the field-type state equation (6.6) and the transmission condition on the boundary 𝜕D of the D. The details can be found in [64] and section 10.3 of [65]. In practice, the dual space method for solving the ISP is formulated as an optimization problem, where the objective function is an addition of the mismatches in each of the aforementioned two parts and the unknowns consist of three types of parameter; that is, the contrast, the total electric field, and the superposition coefficient of incident waves coming from different angles. The dual space method is mathematically well justified and it has the advantage of avoiding solving the forward problem. Nevertheless, the method requires full aperture incidence and reception, which is too demanding in practice. Numerical simulations shows that the reconstruction results obtained by this method are not stable in the presence of noise. The research and application of the dual space method are mainly carried out in applied mathematics. Reconstructing Dielectric Scatterers The coupled dipole method (CDM), which is also known as the discrete dipole approximation (DDA), is an alternative method for solving electromagnetic scattering problems [66]. In this method, the volume of the scatterer is divided into small cells and scattered field is considered as the superposition of reradiation of induced dipoles. The dipole moment is derived from the original field-type state equation. It is important to note that the CDM is based on the concept of an exciting field, rather than the actual field. The exciting field for a cell refers to the total field incident upon the cell, consisting of the original incident field coming directly from transmitters and the scattered field coming from all other cells. The exciting field is derived from the original electric-field integral equation by moving the self-contribution term for a cell to the other side of the equation. The dipole moment induced within a cell is the product of the polarization tensor (also known as the depolarization tensor) and the exciting field. To summarize, the state equation for the CDM presents a relationship between the exciting field and the polarization tensor, which is different from the original state equation that presents a relationship between the actual field and the contrast. For an extensive review of the CDM (or equivalently the DDA), including both theoretical and computational aspects, the reader is referred to [67, 68] and references therein. For inverse scattering problems that are based on the CDM model, the task is to first recover the polarization tensor of each cell and then analytically derive the contrast. Numerical inversion based on the CDM model has been implemented to solve ISPs in both two-dimensional (e.g., [69]) and three-dimensional (e.g., [70, 71]) scenarios. It is worth mentioning that [72] has adopted the T-matrix model to solve a two-dimensional problem. Since the first order multipole happens to be the dipole term, the T-matrix model for small circular or spherical cells is in essence the same as the CDM. In another model, [73] has rewritten the field-type state equation by extracting the singularity of the Green’s function, arriving at a so-called the integral equation for strong permittivity fluctuation. This new state equation expresses the relationship between a scaled electric field and a new defined parameter of material. The contrast is an analytical function of the new defined parameter of material. Numerical simulations are performed and the results show that the DBIM for the new state equation converges faster and can obtain better reconstructions for scatterers with larger dimensions and higher contrasts in comparison with the DBIM for the original state equation. Instead of using the traditional complex number formulation, that is, real and imaginary values, [74] proposes a reconstruction algorithm that directly incorporates log-magnitude and phase of the measured electric field data. The process minimizes squared differences between measured and computed electric field log-magnitude and phase by iteratively adjusting the spatial distribution of electromagnetic parameters within the DOI through a regularized least-squares approach. Simulation studies and microwave imaging 147 148 Electromagnetic Inverse Scattering experiments demonstrate that significant image quality enhancements occur with this approach for large high-contrast scatterers. An important approach of rewriting the original state equation is to expand the contrast, electric field, or contrast source in certain orthogonal bases. For example, [75] expands the contrast and electric field in Fourier bases and the state equation is transformed to express the relationship between the Fourier coefficients of the contrast and the electric field. Wavelet bases are used in [76] to expand the contrast and the contrast source. In practice, only a finite number of orthogonal bases are employed so the number of unknowns in the inversion model is usually much less than that when traditional pixel bases are used. In solving the forward problem, many alternative forms of the electric field integral equation have been proposed aimed at accelerating the convergent rate of iterative solvers. For example, [60] proposes the contraction integral equation (CIE) motivated by an alternative form of the electromagnetic integral equation that is based on the modified Green’s operator with a norm less than 1, which has been presented in earlier series papers that can be found in the introduction of [60]. The CIE can be treated as a preconditioned conventional integral equation, where the preconditioners are diagonal operators determined by the contrast distribution. Though these preconditioners have been beneficial to forward problems, their effect on inverse problems is not guaranteed since the preconditioners themselves depend on the contrast that is, however, the sought-after unknown. This is a distinct difference between the preconditioner approach and all other iterative inversion models introduced so far in this chapter. The state equations in various iterative inversion models discussed so far are either exact in the continuous form or of high precision in the discrete form, and thus they have wider ranges of applicability. In comparison, another type of iterative inversion model is based on inexact state equations. For example, there have been attempts to approximate the state equation by local-effect equations. For the field-type state equation, the electric field at a position is assumed to depend on the incident field only in the same position, which means a localized effect. This is a practice used in the quasi-analytical (QA) approximation [42], diagonal tensor approximation (DTA) [43], and quasi-linear (QL) approximation (see [42] and references therein) methods. For the source-type state equation, the contrast source at a position is assumed to be linearly proportional to the incident field at the same position, which is used in the diagonalized contrast source inversion (DCSI) [63]. Due to the approximation made, the inversion methods based on these models are much less challenging compared with the original inverse problem. For a practical inverse scattering problem, if the conditions of those approximations are well satisfied, then the so-obtained reconstruction results are regarded as the final reconstruction results. Otherwise, the obtained results can be treated as initial guesses for other inversion models that are based on the exact state equation. Reconstructing Dielectric Scatterers In addition to the aforementioned models that rewrite the objective function such that it depends on unknowns in a less nonlinear way, there are other models as well. It is not the intention of this section to provide a complete list. Another model, the so-called subspace-based optimization method, is purposely left in the next section, Section 6.4, where the theory, algorithm, implementation issues, and numerical examples are provided in detail. 6.4 Subspace-Based Optimization Method (SOM) As shown in Chapter 4, for discrete point-like scatterers, the inverse scattering problem can be solved by subspace methods in such a way that the corresponding forward problem is not iteratively evaluated. To be specific, the multiple signal classification (MUSIC) algorithm has been applied to locate the positions of scatterers and the two-step least-squares method has been applied to retrieve their scattering strengths. The scattered field is in a subspace spanned by the the singular vectors associated with nonzero singular values of the multistatic response (MSR) matrix, which turns out to be equivalent to the subspace spanned by Green’s functions with sources located at point-like scatterers. As discussed in Chapter 4, the key principle behind the subspace methods lies in the fact that the operator GS , defined in (4.6), which maps the complex amplitude of source induced at point-like scatterers to the scattered fields, is injective. It is natural to think of applying the subspace methods to extended scatterers as well. However, since the induced source inside an extended scatterer is continuous instead of discrete, the corresponding GS operator exhibits different properties from its discrete counterpart. The inversion model developed along this line is referred to as the subspace-based optimization method (SOM). For ease of presentation, the SOM in the case of the two-dimensional scalar wave equation is considered in this section. The SOM for 2D or 3D vector waves can be similarly constructed. 6.4.1 Gs-SOM The early stage of SOM algorithms is directly motivated by the subspace methods developed for discrete point-like scatterers. Since they decompose the space of induced source into subspaces by decomposing the GS operator, they are referred to as the Gs-SOM. All equations presented in this section will be written in discrete form to facilitate presenting the implementation details of the Gs-SOM. The configuration of the inverse scattering problem is first introduced. We consider a two-dimensional setting (the ẑ being the longitudinal direction) under the transverse magnetic (TM) incidence. In a free space background, nonmagnetic scatterers are located in the domain of interest (DOI) D ⊂ R2 149 150 Electromagnetic Inverse Scattering and illuminated by time-harmonic electromagnetic waves. Both the electric field and induced contrast source are in the z direction, and the subscript z is omitted for convenience. A total number of Ni incidences are due to line sources that are located at rip , p = 1, 2, ..., Ni . For each incidence, the scattered electric field is measured by an array of Ns antennas, which are located at rsq , q = 1, 2, ..., Ns . The inverse scattering problem consists of determining the permittivity 𝜖(r), r ∈ D, given a set of Ni Ns scattering data, Eps (rsq ). In practice, the domain D is discretized into a total number of M small square cells whose sizes are much smaller than the wavelength and whose centers are located at r1 , r2 , … , rM . The inverse scattering problem reduces to determining 𝜖(rm ), or equivalently the contrast 𝜒(rm ) = 𝜖(rm )∕𝜖0 − 1, m = 1, 2, ..., M. It is noted that M usually is much larger than Ni and Ns . We apply the method of moment (MOM) to discretize the source-type state equation (6.8), using the pulse basis function and the delta test function. By approximating every square √ cell as a small circle of the same area, that is, with an equivalent radius a = S∕𝜋 where S is the area of the cell, we obtain the following the discrete state equation, i J = 𝜒 ⋅ (E + GD ⋅ J), (6.53) i where J = [J(r1 ), J(r2 ), ..., J(rM )]T is the normalized current density, E = [Ei (r1 ), Ei (r2 ), ..., Ei (rM )]T , and the superscript T denotes the transpose operator. The diagonal matrix 𝜒 consists of 𝜒m and the M × M matrix GD is given by ⎧ ik0 𝜋a (1) if m ≠ m′ ⎪ 2 J1 (k0 a)H0 (k0 |rm − rm′ |), ′ GD (m, m ) = ⎨ (6.54) ′ ⎪ ik0 𝜋a H (1) (k0 a) − 1, if m = m 1 ⎩ 2 where k0 is the wave number in the background medium. Similarly, the discretized data equation (6.9) reads s E = GS ⋅ J, (6.55) s where E = [Es (rs1 ), Es (rs2 ), ..., Es (rsN )]T and the Ns × M matrix GS is given by s GS (q, m) = ik0 𝜋a J (k a)H0(1) (k0 |rsq − rm |). 2 1 0 (6.56) For discrete point-like scatterers, the mapping GS , from the space of current s J to the space of scattered field E , is proven to be injective [77–79]. Following this fundamental principle, Chapter 4 retrieves the current vector J from the data equation in the first step, and then retrieves the scattering strength 𝜏 from the state equation in the second step. For extend scatterers, however, the case is quite different. It is well known that the operator, GS in (6.9) in continuous Reconstructing Dielectric Scatterers form, mapping from the space of induced current in the domain D to the space of scattered field, is compact (simply speaking, the operator has infinitely many small singular values accumulating at zero), and the inverse problem of determining the induced current from the measurement of scattered field is ill-conditioned [55, 77]. As the discrete version of this current-to-field mapping operator, GS in (6.55) shares similar properties, and in practice the induced current J cannot be uniquely determined solely from (6.55). The ambiguity of induced current, due to the presence of non-radiating current (or invisible current [55]), is well known in inverse source problems [55, 80, 81]. Despite the impossibility of recovering the current J from the data equation (6.55), a subspace of J can be obtained thanks to the salient properties of the singular value decomposition (SVD) of GS . The SVD of GS H is represented as GS = U ⋅ Σ ⋅ V , where U is of size Ns × Ns and is composed of orthonormal left singular vectors uq , V is of size M × M and is composed of orthonormal right singular vectors 𝑣m , Σ is of size Ns × M with the diagonal terms being singular values 𝜎m that are placed in nonincreasing order 𝜎1 ≥ 𝜎2 ≥ · · · = 𝜎M = 0, and the superscript H denotes the Hermitian. A basic property of s the SVD is GS ⋅ 𝑣m = 𝜎m um . The vector of scattered field E can be represented as a span of the left singular vectors; that is, the set of Ns unit vectors uq form the orthonormal bases in C Ns . The vector of the induce current J can be written as a span of the right singular vectors; that is, the set of M unit vectors 𝑣m form the orthonormal bases in C M . The salient feature of the singular-vector bases is that orthogonal inputs to GS yield orthogonal outputs; that is, there is no crosstalk among different bases for both the input space and output space of GS . This feature is absent for other bases; for example, Fourier bases. To proceed, we write J = V ⋅ 𝛼, where 𝛼 is an M-dimensional vector. If there is no noise in measured scattered field, the coefficients 𝛼j , j ≤ Ns , can be uniquely determined from (6.55), H 𝛼j = uj ⋅ E 𝜎j s , j ≤ Ns . (6.57) Since noise is inevitable, small singular values lead to tremendously large error in 𝛼j . Since singular values are in nonincreasing order, there must be a certain integer index L0 so that 𝛼j is considered to be within the range of acceptable error for j ≤ L0 . Due to the salient feature of the SVD, the 𝛼j is independent of each other, and consequently we can decompose current J into two comple+ − + − mentary and orthogonal parts, J = J + J . Alternatively, J = V ⋅ 𝛼 + + V ⋅ 𝛼 − , + − where V and V are composed of the first L and the remaining M − L columns of V , respectively, and L is an arbitrary integer no larger than L0 . The superscripts + and − denote major and minor parts, respectively. 151 152 Electromagnetic Inverse Scattering Whereas the 𝛼j+ for the major part of current is reliably determined from (6.57), the 𝛼j− for minor part is unknown yet and has to be obtained in other ways. Due to the truncation of the singular values, a residual in the data equation (6.55) appears and is defined as dat − + s Δdat = ||𝛿 ||2 = ||GS ⋅ V ⋅ 𝛼 − + GS ⋅ J − E ||2 , (6.58) Similarly, the residual in the state equation (6.53) is defined to be sta Δsta = ||𝛿 ||2 = ||A ⋅ 𝛼 − − B||2 . (6.59) where − − A = V − 𝜒 ⋅ (GD ⋅ V ), (6.60) and i + + B = 𝜒 ⋅ (E + GD ⋅ J ) − J . (6.61) The total relative residual is defined to be s + Δtot = Δdat ∕||E ||2 + Δsta ∕||J ||2 . (6.62) For each incidence, the total relative residual can be calculated as Δtot p , p = 1, 2, ..., Ni . The contrast 𝜒 is obtained by minimizing the total relative residuals. It is important to note that 𝛼j− is still undetermined yet. There are two approaches to calculate 𝛼j− , and their objective functions are defined here. − The first approach treats 𝛼 as an intermediate parameter, which is the − practice in the earliest version of Gs-SOM [82]. The value of 𝛼 is chosen H H as (A ⋅ A)−1 ⋅ (A ⋅ B) that minimizes (6.59) in the least-squares sense (in − practice, it is preferable to obtain approximate values of 𝛼 by minimizing (6.59) using iterative solvers since there is no need to waste time inverting a matrix that depends on unknowns being sought). Thus, the total relative residuals depend solely on the contrast 𝜒. Then, a nonlinear least-squares 2 objective function is defined from (Δtot p ) , explicitly ( )2 − s 2 + Ni − ||A ⋅ 𝛼 −p − Bp ||2 1 ∑ ||GS ⋅ V ⋅ 𝛼 p + GS ⋅ J p − Ep || + , f (𝜒) = s + 2 p=1 ||Ep ||2 ||J p ||2 (6.63) where the dependence on the incidence is denoted by the subscript p. Many optimization algorithms can be adopted to minimize (6.63). The Levenberg–Marquardt (LM) algorithm [83], which is a mixture of the Gauss–Newton algorithm and the method of gradient descent, is used in [82]. − The second approach treats 𝛼 as an independent parameter, which is the practice in the second version of Gs-SOM [84]. The objective function is Reconstructing Dielectric Scatterers defined from Δtot p as follows, − − − f (𝛼 1 , 𝛼 2 , … , 𝛼 Ni , 𝜒) = ( − s + Ni ∑ ||GS ⋅ V ⋅ 𝛼 −p + GS ⋅ J p − Ep ||2 + s ||Ep ||2 p=1 ||A ⋅ 𝛼 −p − Bp ||2 + ||J p ||2 ) , (6.64) − where both 𝛼 p and 𝜒 are unknowns. The two approaches are compared in [85], and it turns out that the second approach outperforms the first one. Although the first approach converges in fewer iterations, the computational burden in each iteration is so high due − to the matrix inversion in obtaining 𝛼 that its overall running time is much longer than the second approach needs. In addition, numerical simulations show that the second approach stands a higher chance in converging to the global minimum. For this reason, we will focus the discussion of Gs-SOM mainly on the second approach. Reference [84] adopts the optimization method used in the CSI method − to minimize (6.64); that is, alternatively updating the coefficients 𝛼 p and the contrast 𝜒. The implementation steps are as follows: + Step 1: Calculate GS , GD , and the SVD of GS . Obtain J p from (6.57), p = 1, 2, ..., Ni . − Step 2: Initial step, n = 0: 𝜒 0 is obtained from the BP [52, 53]; 𝛼 p,0 = 0; Initialize the search direction 𝜌p,0 = 0. Step 3: n = n + 1. − Step 3.1: Update 𝛼 p,n : Calculate gradient (Fréchet derivative) g p,n = − ∇𝛼−p f evaluated at 𝛼 p,n−1 and 𝜒 n−1 ; Determine the Polak– Ribière conjugate gradient search directions 𝜌p,n = g p,n + Re[(g p,n −g p,n−1 )H ⋅g p,n ] − 𝛼 p,n ||g p,n−1 ||2 − 𝛼 p,n−1 + 𝜌p,n−1 [52]. Define the scalar dp,n by = dp,n 𝜌p,n . The objective function becomes quadratic in terms of the parameter dp,n , and it is easy to obtain dp,n = Num∕Den, where the numerator and denominator are, respectively, − Num = − dat (GS ⋅ V ⋅ 𝜌p,n )H ⋅ 𝛿 p,n−1 s ||Ep ||2 sta − (An ⋅ 𝜌p,n )H ⋅ 𝛿 p,n−1 − Den = dat sta (6.65) + ||J p ||2 ||GS ⋅ V ⋅ 𝜌p,n ||2 s ||Ep ||2 + ||An ⋅ 𝜌p,n ||2 + ||J p ||2 (6.66) where 𝛿 , 𝛿 , and A have been defined in (6.58)–(6.60). 153 154 Electromagnetic Inverse Scattering Step 3.2: Update 𝜒 n : For the mth cell, m = 1, 2, ..., M, update the − + induced current (J p,n )m = (J p )m + (V ⋅ 𝛼 −p,n )m . Then update t i the total field in the mth cell, (Ep,n )m = (Ep )m + (GD ⋅ J p,n )m . The objective function becomes quadratic in terms of (𝜒 n )m , and the solution is straightforwardly given by t / Ni | t |2 Ni ⎡∑ (Ep,n )∗m (J p,n )m ⎤ ⎡∑ | (Ep,n )m | ⎤ ⎥ ⎢ | | ⎥. (𝜒 n )m = ⎢ ⋅ + ⎢ p=1 ||J + || ⎥ ⎢ p=1 || ||J + || || ⎥ ||J || p p ⎣ ⎦ ⎣ | p |⎦ (6.67) Step 4: If a pre-determined termination condition (e.g., no obvious change in objective function or reaching a maximum iteration count) is satisfied, stop iteration. Otherwise, go to Step 3. Note that in comparison with the standard CG method presented in Appendix C, dp,n 𝜌p,n appearing in the Step 3.1 should be understood as (−dp,n )(−𝜌p,n ). Some comments on the Gs-SOM are made as follows. First, the two versions of objective functions do not make approximations. In particular, the second version, that is, (6.64), does not need to solve the forward problem; that is, no matrix inversion is involved. What is more, it is a quadratic in both 𝛼p− and 𝜒 individually, and consequently it is a quartic function of unknowns 𝛼p− and 𝜒 simultaneously. This quartic-polynomial minimization problem is equivalent to a constrained quadratic minimization problem, where (6.58) is the objective function and the quadratic function A ⋅ 𝛼 − − B = 0 is the constraints. This is a standard quadratically constrained quadratic problem (QCQP). It is well known that solving the general case of a QCQP is NP-hard (non-deterministic polynomial-time hard), which is at least as hard as a large number of other problems that have been proven to be hard in the sense that all known algorithms for solving them have a complexity that grows at a rate higher than polynomial (e.g., exponentially) with problem dimensions. In the optimization community, there has been a handful of methods to solve QCQPs, such as semidefinite relaxation (SDR) [86] and PhaseLift [87]. The SDR technique is a computationally efficient approximation approach in the sense that its complexity is polynomial in problem dimensions. However, there are some difficulties in applying the SDR to solving inverse scattering QCQP. On one hand, the solution provided by the SDR is not compatible with the variables of the original QCQP problem since SDR has relaxed the original problem. Consequently, one needs to extract, from the SDR solution, a feasible solution that is compatible to the original QCQP. On the other hand, the dimension of the SDR is significantly larger than the original problem, which makes it impractical to solve any medium or large scale inverse scattering problems. Second, the total number of unknowns in (6.64) is Ni (M − L) + M. The predetermination of the Ni L-dimensional major part of induced current Reconstructing Dielectric Scatterers significantly speeds up the convergence of optimization iterations, which is due to not only the reduction of the number of unknowns but also the fact that the already-known major part of induced current significantly reduces the relative residual in the data equation. Third, the value of parameter L can be any integral between one and L0 , due to the salient mathematical feature of the singular-vector bases that orthogonal inputs to GS yield orthogonal outputs. In the extreme case of L = 1, the Gs-SOM (6.64) is close in spirit to the CSI model. It worth mentioning that the case of L = 0 is in fact even closer to the CSI model, but this case is not considered here since the denominator is zero in (6.64). The other extreme case L = L0 is close in spirit to a particular STIE method [55, 88]. The STIE method extracts the radiating current by solving the data equation in the minimum norm sense, and then reconstructs nonradiating current (or more precisely speaking, “invisible current” with respect to specific discrete receivers) by minimizing the residual in the state equation. In absence of noise, this method works well. However, in presence of noise, the method performs poorly due to the fact the minimum-norm solution to the data equation produces large errors in the state equation. Even if the radiating current is redefined as the solution to the data equation that satisfies the discrepancy principle, which is widely adopted in inverse problems (see Appendix A), that is, the residual of the data equation is comparable to the noise level, great care has to be paid to choose the best value of L0 . In comparison, the Gs-SOM does not face the problem of choosing the best value of L since any integer between one and L0 is feasible. If the value of L0 cannot be accurately estimated, then the suggestion is to conservatively choose L to be small integers, such as 1 or 2 in extreme cases, so that the noise will not be amplified in (6.57). Fourth, regarding the terminologies, “major and minor parts of induced current” are used here, and they are denoted with the superscripts + and −, respectively. Such terminologies are different from those adopted in the author’s previous publications [82, 84], where “deterministic and ambiguous parts of induced current” are used, which are denoted as superscript the “s” and “n,” respectively, following the “signal subspace” and “noise subspace” widely adopted in the MUSIC algorithm. The change of terminologies is due to some feedback that previous terminologies might be confusing to some readers. Here we present some numerical results to evaluate the performance of the Gs-SOM model. The “Austria” profile, as illustrated in Fig. 6.1, is considered in numerical simulations. All data about the configuration of inverse scattering are the same as those provided for the “Austria” profile in Section 6.2.5, except that the 16 line sources are now evenly placed on a circle with a radius of 3 m. In the forward scattering problem, the data are generated numerically using the MoM method with a 100 × 100 grid mesh, which is much finer than the one used in the inverse process (64 × 64) in order to avoid the inverse crime (section 5.3 of [65]). During the inversion, A priori information is used that the scatterers 155 Electromagnetic Inverse Scattering are lossless and have nonnegative contrasts [53]. Although all numerical results reported in this section are for the “Austria” profile, the proposed algorithm has been tested on various other profiles and all conclusions drawn are the same as the one reported here. One of the key components of the proposed subspace-based optimization model is spectrum analysis. In particular, the value of L is determined from the spectrum. The spectrum of GS for the aforementioned simulation configuration is shown in Fig. 6.7. First, in the absence of noise, the convergence of the objective function is compared for different values of L in the first 50 iterations and the results are shown in Fig. 6.8. It is observed that the increase of the value of L results in a faster convergence. The trajectory of the corresponding relative error of reconstruction Re is shown in Fig. 6.9, where R Re = ||𝜖 − 𝜖 ||F (6.68) ||𝜖||F R and 𝜖 is the reconstructed permittivity. The reconstructed relative permittivity profiles are shown in Fig. 6.10. The cases of L = 10, 15, 20, and 25 produce successful reconstruction results. Numerical simulations show that the cases of L = 1 and 5 also produce successful reconstruction results, however, at the expense of more iterations, especially in the case of L = 1. Figure 6.11 illustrates the result for L = 1 at the 800th iteration. All three results in Figs 6.8–6.10 indicate that there is no noticeable difference between the results for L = 15, 20, and 25. 4.5 4 3.5 log10(σj) 156 3 2.5 2 1.5 0 5 10 15 20 25 Singular value number, j 30 35 Figure 6.7 The spectrum of the operator GS , where the base 10 logarithm of the singular values is plotted. Source: Chen 2010, IEEE Trans. Geosci. Remote Sens., 48, 42–49. [84] Reproduced with permission of IEEE. Reconstructing Dielectric Scatterers 2 1.5 log10f 1 0.5 0 L=1 L=5 L = 10 L = 15 L = 20 L = 25 –0.5 –1 –1.5 0 10 20 30 Number of Iterations 40 50 Figure 6.8 The comparison of convergence trajectories in the first 50 iterations for different values of L, where the base 10 logarithm of the objective function value is plotted. Source: Chen 2010, IEEE Trans. Geosci. Remote Sens., 48, 42–49. [84] Reproduced with permission of IEEE. 0.4 0.35 Re 0.3 0.25 0.2 L=1 L=5 L = 10 L = 15 L = 20 L = 25 0.15 0.1 0 10 20 30 Number of Iterations 40 50 Figure 6.9 The comparison of trajectories of relative error Re in the first 50 iterations for different values of L. It is worth discussing the method of determining the value of integer L. The value of L balances the relative residuals in the data equation and in the state equation. The larger the value of L, the smaller the relative residual in the data equation. However, if L is so large that the relative residual in the data 157 158 Electromagnetic Inverse Scattering 1 2 0.5 1.8 1.6 0 1 2 0.5 1.8 1.6 0 1.4 –0.5 –1 –1 1.2 –0.5 1 0 (a) 0.5 1 1 2.2 2 0.5 1.4 –0.5 –1 –1 1.2 –0.5 1 0 (d) 0.5 1 2 0.5 1.8 1.8 0 1.6 1.4 –0.5 1.6 0 1.4 –0.5 1.2 1.2 –1 –1 –0.5 1 0 (b) 0.5 1 2 1.8 1.6 0 1.4 –0.5 1.2 –0.5 0 (c) –1 –1 –0.5 1 0.5 –1 –1 1 0.5 1 1 1 0 (e) 0.5 1 2 0.5 1.8 1.6 0 1.4 –0.5 –1 –1 1 1.2 –0.5 0 (f) 0.5 1 1 Figure 6.10 Reconstructed relative permittivity profiles at the 50th iteration for different values of L. (a) L = 1. (b) L = 5. (c) L = 10. (d) L = 15. (e) L = 20. (f ) L = 25. Source: Chen 2010, IEEE Trans. Geosci. Remote Sens., 48, 42–49. [84] Reproduced with permission of IEEE. equation is smaller than the noise level, the relative residual in the state equation will be large and cannot be remedied in the subsequent optimization process. On the other hand, a small value of L does not produce a nonremediable large relative residual in the state equation, but the simultaneous minimization of both relative residuals in the data equation and in the state equation takes longer time to converge. The following criteria are used to determine the value of L: Reconstructing Dielectric Scatterers 1 2.2 2 0.5 1.8 y(m) Figure 6.11 Reconstructed relative permittivity profiles at the 800th iteration for L = 1. Source: Chen 2010, IEEE Trans. Geosci. Remote Sens., 48, 42–49. [84] Reproduced with permission of IEEE. 0 1.6 1.4 –0.5 1.2 –1 –1 –0.5 0 x(m) 0.5 1 1 1) First of all and the most important of all, there is a consecutive range of integer L, instead of a single value, that can be chosen, with different L values resulting in different convergence speeds. 2) The noise level affects the value of L. Generally speaking, the value of L in low-noise case is chosen to be larger than that in the high-noise case. 3) An empirical method is that a good candidate for L takes the value where singular values noticeably change the slope in the spectrum; for example, L = 15 in Fig. 6.7. Numerical simulations for various profiles and noise levels show that this empirical method works well, unless the noise is very high. It worth mentioning that this method is practically reliable since the spectrum of GS itself does not depend on the level of additive white Gaussian noise. In addition, this empirical criterion is supported by the spatial band-limitation properties of the field radiated (or scattered) by bounded sources and the details of this systematic work can be found in [32, 33, 89]. Next, the proposed algorithm is tested for noise-contaminated data. The reconstruction results for 10, 30, and 50% additive white Gaussian noise are shown in Fig. 6.12, where L is equal to 15. The optimization iteration is terminated when there is no significant improvement in the objective function for two consecutive iterations. For three noise levels, the numbers of iterations are 59, 31, and 21, respectively. The reconstruction is successful in case of 10% noise. The result in the case of 30% noise is also satisfying, except that more artifacts appear. In a case of 50% noise, artifacts are more prominent, which degrades the reconstruction results. Nevertheless, the positions of the disks and the annulus are correctly determined. In particular, the hole inside the annulus can be easily identified. It is important to realize that the various advantages of Gs-SOM that have been shown in numerical simulations are also accompanied with additional 159 160 Electromagnetic Inverse Scattering 1 2.2 2 0.5 1 2.2 2 0.5 1.8 0 1.6 1.8 0 1.6 1.4 1.4 –0.5 –0.5 1.2 –1 –1 –0.5 0 (a) 0.5 1 1 1.2 –1 –1 –0.5 1 0 (b) 0.5 1 1 2.2 2 0.5 1.8 0 1.6 1.4 –0.5 1.2 –1 –1 –0.5 0 (c) 0.5 1 1 Figure 6.12 Reconstructed relative permittivity profiles for L = 15 at different noise levels. The optimization is terminated when there is no significant improvement in the objective function for two consecutive iterations, which are 59, 31, and 21, respectively, for the three noise levels. (a) 10% noise; (b) 30% noise; and (c) 50% noise. Adapted from: Chen 2010, IEEE Trans. Geosci. Remote Sens., 48, 42–49. [84] Reproduced with permission of IEEE. computational cost, which is a main drawback of early-stage Gs-SOMs. The overhead computational cost consists of the following two aspects: 1) The SVD of GS in Step 1 of the algorithm: The computational complexity is O(MNs2 ) for obtaining the matrix of singular values Σ, and it is O(M2 Ns ) for simultaneously obtaining the Ns × Ns matrix U and M × M matrix V (section 8.6 of [90]). 2) The construction of the minor part of induced current in Step 3.2 of the algo− rithm: The computational complexity is O(M(M − L)) for evaluating V ⋅ 𝛼 −p,n . If SVD bases are not adopted, the main computational cost is the matrix-vector multiplication GD ⋅ J in each iteration, which has a computational complexity of O(M log M) when the FFT is used. Since it is usually Reconstructing Dielectric Scatterers M ≫ Ns , the computation complexity of the two overhead calculations are on the order of O(M2 ), which is higher than the O(M log M). Motivated by circumventing the above two computational burdens, an improved Gs-SOM model is proposed in [70]. The main idea is to compute only the first L right singular vectors, instead of all M ones. Considering the + − notation V = [V , V ] and the fact that the columns of the unitary matrix H + +H − −H V are orthonormal, we have I M = V ⋅ V = V ⋅ V + V ⋅ V , where I M denotes the M-dimensional identity matrix. Such a property allows us to rewrite the minor part of induced current in a different form, − − J = V ⋅ 𝛼− − =V ⋅V −H ⋅𝛽 + = (I M − V ⋅ V + =𝛽−V ⋅V +H +H )⋅𝛽 ⋅𝛽 (6.69) The new form of minor part of induced current has two important consequences: 1) A truncated SVD of GS is calculated, where only the first L singular vectors need to be obtained. Since L ≤ Ns , it is sufficient to check the computational complexity for L = Ns . It is O(MNs2 ) for obtaining the matrix of singular values Σ, and O(MNs2 ) for simultaneously obtaining U and the first Ns columns of V (section 8.6 of [90]). 2) The construction of the minor part of induced current becomes O(ML). To summarize, the improved Gs-SOM that is based on the new scheme of updating minor part of induced current has an overall overhead with computational complexity O(M), considering that fact that M ≫ Ns , which is lower than the original computational complexity O(M log M). In addition, the memory is − saved by avoiding saving the M × (M − L) matrix V . The details of implementing the improved Gs-SOM can be found in [70]. 6.4.2 Twofold SOM The inverse scattering problem is based on two equations; that is, the data equation (6.55) and the state equation (6.53). It is important to realize that both matrixes GS and GD are independent of scatterers, which makes it possible to analyze these two matrixes before reconstructing scatterers. Whereas the Gs-SOM analyzes the GS matrix by using the subspace of the SVD singular vectors, the same idea can be applied the GD as well, which is referred to as the twofold subspace-based optimization method (TSOM). In Gs-SOM, the vector space C M , where the induced current J lies, is decom+ posed into two complementary and orthogonal subspaces. That is, J = J + 161 162 Electromagnetic Inverse Scattering − + − + − J = V S ⋅ 𝛼 + + V S ⋅ 𝛼 − , where V S and V S are composed of the first L and the remaining M − L columns of the matrix V S of the right singular vectors of GS . The C M can also be decomposed into two complementary and orthogonal + − subspaces, that is, the major subspace V D and minor subspace V D that consist of the first M0 and the remaining M − M0 right singular vectors of GD , respectively. Then the whole space C M is decomposed into three orthogonal + subspaces, SS+ , SS−D+ , and SS−D− , which correspond to V S , the intersection of − + − − V S and V D , and the intersection of V S and V D , respectively. In TSOM, it is reasonably assumed that the J that lies in the subspace SS−D− contribute negligibly to the state equation. Since this subspace by its definition − is a subset of V S , the J that lies in the subspace SS−D− automatically contributes little to the data equation. Consequently, the J that lies in the subspace SS−D− , which barely contributes to state equation and data equation, can be dropped off. Thus, we have + J = V S ⋅ 𝛼 + + BS− D+ ⋅ 𝛽 S− D+ , (6.70) where BS− D+ of size M × (M0 − L) is the matrix consisting of the bases of the − + intersection of V S and V D . In solving inverse problems, the coefficient 𝛽 S− D+ is unknown, and its dimension M0 − L is much smaller than the dimension M − L − of the unknown 𝛼 in Gs-SOM. For the purpose of illustrating the concept of TSOM, we consider a special case where M = 3, L = 1, and M0 = 2. As shown in Fig. 6.13, the intersection of two planes is a line. It is obvious that to search a solution along a line is much easier than to search it in a plane, which means that the TSOM outperforms the Gs-SOM. After presenting the general idea of the TSOM, we next discuss some implementation issues. =+ Vs =– =+ Vs ∩ VD =+ VD =– Vs Figure 6.13 Illustration the concept of TSOM, where the special case M = 3, L = 1, and M0 = 2 is considered. The subspace + of V S is a straight line − perpendicular to the V S plane. The intersection of − + two planes V S and V D is a straight line. Reconstructing Dielectric Scatterers First, the method of constructing the matrix of bases BS− D+ can be found in section 4.2.3 of [91]. The method is straightforward, but there is additional heavy computational cost. Second, due to the aforementioned heavy computational cost in constructing the exact bases BS− D+ , an approximate model is proposed in [92] as follows, − −H + BS− D+ ⋅ 𝛽 S− D+ ≈ V S ⋅ V S ⋅ V D ⋅ 𝛽 (6.71) where 𝛽 is an M0 -dimensional vector. It is important to note that this approx+ − imation makes a projection of the subspace V D onto V S , whereas the exact model requires an intersection of these subspaces. Using Fig. 6.13 as an + illustration, this approximation means a projection of the plane V D onto the − plane V S , resulting a plane region that is smaller in size, instead of a line. This is why the vector 𝛽 is of dimension M0 instead of M0 − L. From a theoretical + point of view, this approximation becomes exact when V D is orthogonal to − V S . In practice, numerical simulations show that this approximation performs well in solving inverse scattering problem, especially when receivers cover a full or very large aperture. Third, the value of integer M0 has a different property from the case of L. While L can be chosen as any integer between one and L0 , the value of M0 should be sufficiently large. The reason for this difference is that the Gs-SOM deals with the full vector space C M , that is, it determines the major and minor parts of induced current using analytical and optimization ways, respectively, whereas the TSOM deals with only the major part of induced current by dropping off the minor part. In absence of noise, the larger the value of M0 , the more accurate the model. In presence of noise, since there is noise in the data equation anyway, there is no point in requesting an exact state equation. A useful practical way of choosing M0 is a nested scheme where the result that is obtained for a lower value of M0 is treated as the initial guess for the problem with a higher value of M0 [92]. The highest value of M0 can be chosen as when the M0 th singular value reaches a certain percentage, say 1 or 0.5%, of the largest singular value of GD . It is worth mentioning that although the integral operators GS and GD are both compact, the kernel of GS is smooth whereas the kennel of GD is weakly singular. Consequently, in its discrete form, the singular values of GD decrease much slower than its GS counterpart does. This is why M0 is much larger than L. Fourth, the advantages of the TSOM are accompanied with additional computational cost, which is the main drawback of the first version TSOM. The overhead computational cost consists of two parts: (1) the SVD of GD that has + a computational complexity O(M3 ) and (2) the calculation of V D ⋅ 𝛽 in (6.71) that has a computational complexity O(MM0 ). An improved TSOM, referred to as the FFT-TSOM, is proposed in [93] based on the conclusion drawn in [94] that the Fourier functions present similar properties to the singular functions 163 164 Electromagnetic Inverse Scattering of an integral operator in the sense that the low-frequency Fourier functions correspond to those singular functions with large singular values, while the high-frequency Fourier functions to the singular functions with small singular values. Their discrete forms also follow the same rule. Thus, it is reasonable to + use discrete Fourier bases to approximate the subspace spanned by V D ; that is, + V D ⋅ 𝛽 = [𝑣D1 , 𝑣D2 , … , 𝑣DM0 ] ⋅ 𝛽 ≈ [F 1 , F 2 , … , F M0 ] ⋅ 𝛽 (6.72) It is easy to recognize that the right-hand side of (6.72) is simply the inverse discrete Fourier transform (IDFT) of a new vector that pads 𝛽 with zero, which can be performed by the 2D FFT algorithm. The computational complexity of the FFT is O(M log M), which is much less than O(MM0 ) since log M is much smaller than M0 . Thus, the need to implement the SVD of GD is eliminated. Fifth, two important comments on discrete Fourier bases are worth highlighting. 1) The approximation sign in (6.72) does not mean an individual approximation, 𝑣D1 ≈ F 1 , 𝑣D2 ≈ F 2 , …, but instead it means the subspace spanned by the former set is approximately equal to the subspace spanned by the latter. Roughly speaking, as the singular value decreases, the corresponding singular vector exhibits a trend of fast oscillation. To illustrate this trend, we consider a domain D that is a 2 m × 2 m square and is meshed to 64 × 64 cells. For an operating frequency 400 MHz, the real and imaginary parts of certain singular vectors of GD are shown in Fig. 6.14. We find that Fig. 6.14 provides a visual evidence that low-frequency Fourier bases resemble singular vectors with large singular values and high-frequency Fourier bases resemble singular vectors with small singular values. 2) The matrix GD can be considered a low-pass filter since low-frequency Fourier bases correspond to larger singular values. In signal processing, it is natural to approximate a vector by a span of low frequency Fourier bases. For example, such a low-frequency approximation can be well applied to the induced current J that appears in the left-hand side of the state equation (6.53). However, such a low-frequency approximation deserves a careful check when it is applied to the J that appears in the right-hand side of (6.53) since the it is an input of the GD matrix. Fortunately, the GD works as a low-pass rather than high-pass filter, which validates the drop off of high frequency components. 6.4.3 New Fast Fourier Transform SOM In the Gs-SOM and the improved Gs-SOM, the major part of induced current + + J is first obtained from the subspace spanned by V , and then the minor part − − of induced current J is searched within the subspace spanned by V . There is an opinion in the mathematical community that, whereas it is important to Reconstructing Dielectric Scatterers 0.01 0.02 0 0 –0.02 –0.01 –0.04 (a) 0.02 0.02 0.01 0 0 –0.02 –0.01 –0.02 (b) ×10–3 0.02 5 0 0 –0.02 –5 (c) 0.02 0.01 0.02 0 0 –0.01 –0.02 (d) –0.02 ×10–4 0.02 1 0 0 –0.02 –1 (e) Figure 6.14 The left and right panels, respectively, show the real and imaginary parts of right singular vectors of GD corresponding to: (a) 1st ; (b) 100th ; (c) 200th ; (d) 500th ; and (e) 4096th order. Adapted from Xu, K. et al. (2014) Singular value decomposition of the current-to-field operator in solving inverse scattering problems, IEEE Antennas and Propagation Society International Symposium, Memphis, TN, 659–660. Reproduced with permission of IEEE. 165 166 Electromagnetic Inverse Scattering + + extract the J from the subspace spanned by V , it is not always beneficial to − − restrict the search for J within the subspace spanned by V . On one hand, + when the noise of measured data is high, the J is consequently more or less incorrect that, however, cannot be remedied by later optimization process. On − the other hand, the dimension of the subspace spanned by V is M − L, which is slightly smaller than the full dimension M. The reduction of L dimensions in the searching space indeed somewhat helps to accelerate the convergence of optimization process, but it cannot be a critical factor since L ≪ M. These observations motivate the proposal of new inversion algorithms that recon− − struct the J in the whole space C M , instead of the subspace spanned by V . A new fast Fourier transform SOM (NFFT-SOM) is proposed to reconstruct − the J in the whole space C M with Fourier bases. The NFFT-SOM outperforms the Gs-SOM and the improved Gs-SOM in the high noise case and at the same time it has a computational complexity as low as that of the improved Gs-SOM. The NFFT-SOM also exhibits much similarity to the FFT-TSOM, but has the advantage of ease in implementation. In the NFFT-SOM, the induced current is written in the form + J =J +F ⋅𝛼 + (6.73) where J is still obtained by the first L singular vectors of GS , as done in the Gs-SOM, F of size M × M is the complete Fourier bases, consisting of elements F(m, m′ ) = exp[−i2𝜋(m − 1)(m′ − 1)∕M], and 𝛼 is an M-dimensional vector. In fact, it is more accurate to understand F ⋅ 𝛼 as a residual current, instead of minor part of current. This is because F ⋅ 𝛼 deals with the complete bases, + thus able to compensate the error in J , especially in the high noise case. The objective function is similar to that of Gs-SOM, that is, (6.64), except that the unknowns are now 𝜒 and 𝛼 p , p = 1, 2, … , Ni . The overhead computation cost is O(Ns2 M) for thin-SVD of GS and O(M log M) for the FFT implementation of F ⋅ 𝛼, which are low and comparable to the counterpart of the improved Gs-SOM. The numerical example with the “Austria ring” that appears in Section 6.4.1 is used to compare the performances of the NFFT-SOM and the Gs-SOM. For as high as 30% additive white Gaussian noise, the trajectories of relative error of reconstruction for the NFFT-SOM and the Gs-SOM are shown in Fig. 6.15. Different values of L are chosen, that is, L = 5, 15, and 25, where L = 15 is at the knee of the logarithmic scale of singular values, as shown in Fig. 6.7. We observe that for each L the Gs-SOM always converges slightly faster than the NFFT-SOM at the early stage of iterations, whereas the relative error of reconstruction of NFFT-SOM becomes smaller than that of Gs-SOM when more iterations are implemented. In particular, for L = 25, the relative error of reconstruction of Gs-SOM decreases fast in initial iterations, but it gradually increases after about the 50th iteration, which is a typical phenomenon in Reconstructing Dielectric Scatterers –0.4 SOM:L = 5 SOM:L = 15 SOM:L = 25 NFFT-SOM:L = 5 NFFT-SOM:L = 15 NFFT-SOM:L = 25 log10 (Re) –0.5 –0.6 –0.7 –0.8 –0.9 0 200 400 600 Number of iterations 800 Figure 6.15 The trajectories of the relative error of reconstruction for the NFFT-SOM and the Gs-SOM are compared. inverse problems that the error of reconstruction increases after a certain number of iterations although the objective function monotonically decreases (see Appendix A). In comparison, this phenomenon occurs slightly to the NFFT-SOM after about the 450th iteration. This observation implies that the NFFT-SOM is more robust in choosing the value of L in presence of high noise. Luckily, when scattered field is measured in the far zone, there is a knee in the logarithmic scale of singular values, that is, L = 15 in Fig. 6.7, which provides a good solution of L in the high noise case. However, when the scattered field is measured in the near zone, the aforementioned knee does not exist and, consequently, the NFFT-SOM outperforms the Gs-SOM by providing a wider range of candidate L. It is obvious that if the noise level is extremely high, even if there is a knee of the logarithmic scale of singular values for far-zone measurements, the NFFT-SOM outperforms the Gs-SOM since the latter cannot remedy the − + − severely incorrect J by searching J within the subspace V . The reconstruction results obtained by the NFFT-SOM and the Gs-SOM at the 300th iteration for different choices of L are given in Fig. 6.16. It is obvious as expected that the NFFT-SOM outperforms the Gs-SOM for L = 25. We also notice that the NFFT-SOM seems to obtain visually better reconstruction results than the Gs-SOM does for both L = 5 and L = 15, although Fig. 6.15 shows that the relative errors of reconstruction, defined as (6.68), of the two inversion methods are comparable at the 300th iteration. There might be other definitions of the relative error of reconstruction than (6.68), but discussion of this topic is beyond the scope of this chapter. 167 Electromagnetic Inverse Scattering 1 1 2.5 1 2.5 3.5 1.5 –0.5 –1 –1 –0.5 1 0 x(m) (a) 0.5 1 1 2 y(m) 0 0 1.5 –0.5 –1 –1 –0.5 1 0 x(m) (b) 0.5 1 1.8 0 1.6 –1 –1 0.5 2 1.8 0 1.6 1.4 –0.5 1.2 –0.5 –0.5 0 x(m) (d) 0.5 1 1 2.5 2 –0.5 –1 –1 1.5 –0.5 0 x(m) (c) 0.5 1 –1 –1 2.2 0.5 2 1.8 0 1.6 1.4 –0.5 1.2 –0.5 0 x(m) (e) 0.5 1 1 1 2.4 2.2 y(m) 2 1 3 0 1 2.2 0.5 0.5 y(m) 2 0.5 y(m) y(m) 0.5 y(m) 168 –1 –1 1.4 1.2 –0.5 0 x(m) (f) 0.5 1 1 Figure 6.16 Reconstruction results for the Gs-SOM (upper row) and the NFFT-SOM (lower row) at the 300th iteration for different choices of L: L = 5 for (a) and (d); L = 15 for (b) and (e); L = 25 for (c) and (f ). If only the first M0 Fourier bases, instead of the complete M ones, are used − − to represent J , then the NFFT-SOM is similar to the FFT-TSOM where J is constructed from (6.71) and− (6.72), with the difference that the NFFT-SOM does not project onto the V S subspace. In implementing such a version of NFFT-SOM, we can follow the aforementioned nested scheme; that is, the result that is obtained for a lower value of M0 is treated as the initial guess for the problem with a higher value of M0 . The nested scheme significantly improves the ability of the NFFT-SOM to reconstruct stronger scatterers. For the previous numerical example, that is, the Austria ring, when the relative permittivity is increased to 2.2 with all other parameters unchanged, the comparison is made between the original NFFT-SOM that simultaneously uses the complete Fourier bases and the nested-scheme NFFT-SOM. Figure 6.17(a) shows that the original NFFT-SOM is unable to provide a satisfactory reconstruction result under 30% noise even if the L = 15 is chosen at the knee of the of the logarithmic scale of singular values. The nested-scheme NFFT-SOM gradually increases the number of Fourier bases all the way to complete bases, M0 = 600, 1000, 2000, 4096 at iteration numbers 1, 101, 201, 301, respectively, and it provides quite a good reconstruction result, as shown in Fig. 6.17(b). The trajectories of the relative errors of reconstruction for the original NFFT-SOM and the gradual bases-expansion NFFT-SOM are shown in Fig. 6.17(c). To summarize, the NFFT-SOM has the following two advantages: Reconstructing Dielectric Scatterers y(m) 3 0 2.5 2 –0.5 1.2 –0.5 0 x(m) (a) 0.5 1 1 0.5 y(m) 3.5 0.5 –1 –1 1 4 0 –0.5 –1 –1 –0.5 0 x(m) (b) 0.5 1 2.6 2.4 2.2 2 1.8 1.6 1.4 1.2 1 –0.4 –0.45 –0.5 –0.55 –0.6 –0.65 –0.7 –0.75 –0.8 –0.85 NFFTSOM NFFTSOMg log10 (Re) 1 0 100 200 300 Number of iterations (c) 400 Figure 6.17 Comparisons of performances of the original NFFT-SOM and a gradual bases-expansion NFFT-SOM for 𝜖r = 2.2, 30% noise, and L = 15. (a) Reconstruction results obtained by the original NFFT-SOM at the 400th iteration steps; (b) Reconstruction results obtained by the gradual bases-expansion NFFT-SOM at the 400th iteration steps; and (c) The trajectories of the relative errors of reconstruction for both inversion methods. In the legend, the suffix “g” denotes the “gradual bases expansion”. Firstly, it is much easier to implement. The first reason is that the projection − onto the V S subspace is avoided. The second reason is that, 1D Fourier bases are adopted in NFFT-SOM so that the first M0 bases can be directly determined, whereas the 2D Fourier bases adopted in FFT-TSOM have to be sorted in order to determine the first M0 bases. In addition, when the domain of interest D is not a rectangle, the application of 2D Fourier bases requires the extra work of extending the DOI by zero padding to a rectangle that fully covers D. For the NFFT-SOM, there is no need to extend the DOI to a rectangle. The second advantage is that it performs more robustly with respect to the variation of L in presence of high noise. For the NFFT-SOM, there is a wide range of consecutive integers L that can be chosen no matter the noise is high or low. However, it is admitted that, for the low noise case, this advantage is absent since there is also a wide range of candidate integer L in the Gs-SOM as well. The drawback of the NFFT-SOM, compared with the Gs-SOM, is that the relative error of reconstruction decreases slightly more slowly at the initial stage of the optimization process. 6.4.4 SOM for the Vector Wave The Gs-SOM, TSOM, NFFT-SOM, and their variants can be applied to vector-wave ISPs with no or minor modifications. For example, [69] has applied the Gs-SOM to 2D TE inverse scattering problems. The forward problem is based on the coupled dipole method (CDM). Both transmitters and receivers are placed uniformly in a circle in the far field, with Ni = 20 and Ns = 30 . The domain D is a rectangle of 1.4 𝜆 × 0.7 𝜆 and is discretized into a grid of 40 × 20 cells. Scatterers are chosen as a set of digit patterns with relative permittivity 2, as shown in Fig. 6.18. In the numerical experiment, 10% white Gaussian noise is added to the scattering data. Figure 6.19 shows that 169 170 Electromagnetic Inverse Scattering 2.2 2 Figure 6.18 Exact profile of the relative permittivity of digit patterns. Source: Pan 2009, J. Opt. Soc. Am. A, 26, 1932–1937. [69] Reproduced with permission of The Optical Society. 1.8 1.6 1.4 1.2 1 0.8 the original digits can be easily identified from the reconstructed patterns that are obtained after 20 iterations. For 3D inverse scattering problems, the FFT-TSOM has been used in [93], where the integral equation equation is discretized by a finite difference technique presented in [95]. In the numerical simulation, the scatterer is a coated cube centered at the origin with its inner edge length a = 1 m and outer edge length b = 2 m, as shown in Fig. 6.20. The relative permittivity of the inner layer is 𝜖r1 = 2 + 0.8i while the relative permittivity of the outer layer is 𝜖r2 = 1.5 + 0.3i. The coated cube is illuminated by 60 electric dipole antennas operated at 300 MHz (wavelength in air is 1 m), which are distributed along three circles (with 20 dipole antennas evenly distributed on each circle) with the same radius 3 m. Scattered fields are collected by 60 detectors, which are located at the same positions as the 60 dipole sources. 10% AWGN is added to the exact scattered field. In the inverse problem, the domain D is a cube of length 3 m concentric to the layered cubic scatterer and is discretized into 30 × 30 × 30 cells. Since a cell is parameterized by its real and imaginary parts of relative Reconstructing Dielectric Scatterers Figure 6.19 Reconstructed profile of relative permittivity of digit patterns under 2D TE incidences. Source: Pan 2009, J. Opt. Soc. Am. A, 26, 1932–1937. [69] Reproduced with permission of The Optical Society. 2.2 2 1.8 1.6 1.4 1.2 1 0.8 permittivity, there are in total 54,000 unknowns in the optimization problem. Figure 6.21 shows the reconstruction result by a net-scheme implementation of the FFT-TSOM. The first and second columns are the real and imaginary parts of the reconstruction result after 122 iterations. The first, second, and third rows correspond to the cross sections at z = −0.05 m, y = −0.05 m, and x = −0.05 m, respectively. The concentric squares clearly displayed in three slices indicate that the FFT-TSOM obtains a very satisfactory reconstruction result. 6.5 Discussions Full-wave nonlinear inversion algorithms have been tested by several experimental test databases. For example, the Ipswich database includes three sets of scattering data, the first of which was introduced in [96]. The Institut Fresnel database includes 2D TE and TM data [97, 98] and 3D data [99]. 171 172 Electromagnetic Inverse Scattering εr1 εr2 Figure 6.20 The scatterer is a coated cube with its inner edge length a = 1 m and outer edge length b = 2 m, The relative permittivity of the inner and outer layer is 𝜖r1 = 2 + 0.8i and 𝜖r2 = 1.5 + 0.3i, respectively. Source: Zhong 2011, IEEE Trans. Antennas Propag. 59, 914–927. [93] Reproduced with permission of IEEE. a b 1 1 0 0 –1 –1 –1 0 1 1 1 0 0 –1 0 1 –1 0 1 –1 0 1 –1 –1 –1 0 1 1 1 0 0 –1 –1 –1 0 1 1 1.2 1.4 1.6 1.8 2 2.2 Figure 6.21 Reconstruction results for the coated cube by the FFT-TSOM. The first and second columns are the real and imaginary parts of the reconstruction result after 122 iterations. The first, second, and third rows correspond to the cross sections at z = −0.05 m, y = −0.05 m, and x = −0.05 m, respectively. Source: Zhong 2011, IEEE Trans. Antennas Propag. 59, 914–927. [93] Reproduced with permission of IEEE. 0 0.2 0.4 0.6 0.8 These test databases give researchers an opportunity to test and validate their inversion algorithms against reliable experimental data. In addition, many research groups have built experimental systems to test the performance of full-wave nonlinear inversion algorithms [100–102]. Full-wave nonlinear inversion algorithms have been successfully applied to solve many real world problems. For example, validated by experimental data or anatomically realistic numerical models, they turn out to be effective in breast cancer detection and biological tissue imaging [103–106]. They are widely used in nondestructive evaluation [107] and in geoscience applications [108]. Inverse scattering problems can be categorized into two types, as far as how scatterers are represented is concerned. The first type is a pixel (or voxel) based model, where the DOI is discretized into pixels and the material property at Reconstructing Dielectric Scatterers each pixel will be reconstructed. The second type is a parameterized model, where scatterers are known a priori to be represented by a few parameters describing geometry, location, material, and so on. The full-wave nonlinear inversion algorithms introduced in this chapter apply to a pixel (or voxel) based model. The parameterized model has far fewer unknowns, but it needs a priori information. For example, the distribution of relative permittivity is required to be piecewise constant. The subspace concept used in the SOM can be applied to other inversion methods as well to improve their performances in solving ISPs. For example, it has been applied to the distorted Born iterative method (DBIM) in [109] and to the contrast source extended Born (CSEB) method in [110]. This concept can be also applied to inverse problems that are based on other physical principles, such as the radiative transport equation in [111] and the electric impedance tomography (EIT) problem in [112]. The concept of the degrees of freedom proposed in [32–34, 113] turns out be very helpful in solving ISPs. By analyzing the property of the source-to-field operator (6.5), Bucci et al. proved that electromagnetic fields radiated (or scattered) by bounded sources (or scatterers) can be accurately, up to a prescribed approximation error, represented over a substantially arbitrary surface by a finite and nonredundant number of samples. The concept of the degrees of freedom helps to determine the minimum number of receivers. By the principle of reciprocity, the concept of degrees of freedom also helps in determining the minimum number of required incident waves. When multiple-frequency data are available, the frequency hopping approach is powerful in improving reconstruction results [16, 114, 115]. In this approach, low-frequency data are first used to perform the reconstruction, and the resultant scatterer is used as an initial guess for the next higher-frequency reconstruction. Substantial numerical and experimental results validate that the frequency-hopping approach mitigates the effect of nonlinearity in the optimization procedure so that the chance for an algorithm to be trapped in local minima is significantly reduced. For low frequencies, the incident wave with longer wavelengths interact with scatterers, and consequently the corresponding scattered field mainly contains large-scale information of scatterers; that is, low spatial-frequency information. The nonlinearity of inverse scattering problems is significantly reduced at low frequencies. When frequencies become higher, the scattered field contains more and more higher spatial-frequency information. From this perspective, the frequency hopping approach shows similarity to the nested-scheme implementation of the NFFT-SOM that is presented in Section 6.4.4, with the difference that the former is a physical (or experimental) implementation of the hopping and the latter is a numerical implementation. We mention in passing a relevant but different hopping scheme, that is, the iterative multiscaling method presented in [116], where the hopping is directly applied to the physical spatial space. 173 174 Electromagnetic Inverse Scattering This chapter has not applied or discussed, in an explicit way, regularization techniques yet. Roughly speaking, in order to induce stability and to incorporate a priori information about the desired solution, a regularization functional (also known as the penalty functional) should be added to the original objective function. In a certain sense, the determination of the number L of the leading singular values in the SOM can be considered to be a kind of regularization. If a priori information about the scatterer is available, such as being piece-wise homogenous or lossy, then the total variation (TV) penalty term or the nonnegativeness constraint should be used together with the original objective function. Appendix A and references therein provide detailed theoretical and practical issues on regularization. When numerical synthetic data are used for inversion, the inverse crime should be avoided. When the same numerical procedure is used to generate synthetic data and to reconstruct unknowns, it often yields overoptimistic results, which is called the inverse crime. For example, for an ill-conditioned inverse problem with continuous unknowns, if the discretization mesh is not fine enough so that the nature of ill-condition has not yet appeared, and if the same numerical procedure is used in both the forward solver and inverse solver, then the inversion results are often trivially satisfying. One possibility to avoid the inverse crime is to use different mathematical/numerical models for the forward and the inverse procedures. The other possibility is to use different meshes in the forward and the inverse procedures, although the same numerical model is used for both the forward and the inverse procedures. References 1 Nachman, A.I. (1988) Reconstructions from boundary measurements. Ann. Math., 128 (3), 531–576. 2 Ramm, A.G. (1988) Recovery of the potential from fixed-energy scattering data. Inverse Probl., 4 (3), 877. 3 Colton, D. and Päivärinta, L. (1992) The uniqueness of a solution to an 4 5 6 7 inverse scattering problem for electromagnetic waves. Arch. Ration. Mech. An., 119 (1), 59–70. Ola, P., Paivarinta, L., and Somersalo, E. (1993) An inverse boundary value problem in electrodynamics. Duke Math. J., pp. 617–653. Calderón, A.P. (2006) On an inverse boundary value problem. Comput. Appl. Math., 25, 133–138. Sylvester, J. and Uhlmann, G. (1987) A global uniqueness theorem for an inverse boundary value problem. Ann. Math., 125 (1), 153–169. Pendry, J.B., Schurig, D., and Smith, D.R. (2006) Controlling electromagnetic fields. Science, 312, 1780–1782. Reconstructing Dielectric Scatterers 8 Leonhardt, U. (2006) Optical conformal mapping. Science, 312 (5781), 1777. 9 Greenleaf, A., Lassas, M., and Uhlmann, G. (2003) Anisotropic conductivi- ties that cannot be detected by EIT. Physiol. Meas., 24, 413–419. 10 Greenleaf, A., Lassas, M., and Uhlmann, G. (2003) On nonuniqueness for calderón’s inverse problem. Math. Res. Lett., 10, 685–693. 11 Colton, D. and Kress, R. (2006) Using fundamental solutions in inverse scattering. Inverse Probl., 22, R49–R66. 12 Chew, W.C. and Song, J.M. (2007) Gedanken experiments to understand 13 14 15 16 17 18 19 20 21 22 23 24 25 the internal resonance problems of electromagnetic scattering. Electromagn., 27 (8), 457–471. Isakov, V. (2006) Inverse problems for partial differential equations, vol. 127, Springer Science and Business Media. Stefanov, P. (1990) Stability of the inverse problem in potential scattering at fixed energy. Annales De L’Institut Fourier, 40 (4), 867–884. Caro, P. (2010) Stable determination of the electromagnetic coefficients by boundary measurements. Inverse Probl., 26 (10). Bao, G., Li, P., Lin, J., and Triki, F. (2015) Inverse scattering problems with multi-frequencies. Inverse Probl., 31 (9), 093 001. Nagayasu, S., Uhlmann, G., and Wang, J.N. (2013) Increasing stability in an inverse problem for the acoustic equation. Inverse Probl., 29 (2). Isakov, V., Lai, R.Y., and Wang, J.N. (2016) Increasing stability for the conductivity and attenuation coefficients. SIAM J. Math. Anal., 48 (1), 569–594. Dennis, J. and Schnabel, R. (1996) Numerical methods for unconstrained optimization and nonlinear equations, Classics in Applied Mathematics, Society for Industrial and Applied Mathematics. Gill, P.E., Murray, W., and Wright, M.H. (1981) Practical optimization, Academic Press. Habashy, T.M. and Abubakar, A. (2004) A general framework for constraint minimization for the inversion of electromagnetic measurements. Prog. Electromagn. Res., 46, 265–312. Harada, H., Wall, D.J.N., Takenaka, T., and Tanaka, M. (1995) Conjugate gradient method applied to inverse scattering problem. IEEE Transactions on Antennas and Propagation, 43 (8), 784–792. Joachimowicz, N., Pichot, C., and Hugonin, J.P. (1991) Inverse scattering: an iterative numerical method for electromagnetic imaging. IEEE Transactions on Antennas and Propagation, 39 (12), 1742–1753. Rahmat-Samii, Y. and Michielssen, E. (1999) Electromagnetic optimization by genetic algorithms, John Wiley & Sons, Inc., New York. Haupt, R.L. and Werner, D.H. (2007) Genetic algorithms in electromagnetics, John Wiley & Sons, Inc. 175 176 Electromagnetic Inverse Scattering 26 Boeringer, D.W. and Werner, D.H. (2004) Particle swarm optimization 27 28 29 30 31 32 33 34 35 36 37 38 39 40 versus genetic algorithms for phased array synthesis. IEEE Transactions on Antennas and Propagation, 52 (3), 771–779. Rocca, P., Benedetti, M., Donelli, M., Franceschini, D., and Massa, A. (2009) Evolutionary optimization as applied to inverse scattering problems. Inverse Probl., 25 (12). Rocca, P., Oliveri, G., and Massa, A. (2011) Differential evolution as applied to electromagnetics. IEEE Antennas and Propagation Magazine, 53 (1), 38–49. Garnero, L., Franchois, A., Hugonin, J.P., Pichot, C., and Joachimowicz, N. (1991) Microwave imaging-complex permittivity reconstruction-by simulated annealing. IEEE Transactions on Microwave Theory and Techniques, 39 (11), 1801–1807. Pastorino, M. (2007) Stochastic optimization methods applied to microwave imaging: A review. IEEE Transactions on Antennas and Propagation, 55 (3), 538–548. Weile, D.S. and Michielssen, E. (1997) Genetic algorithm optimization applied to electromagnetics: a review. IEEE Transactions on Antennas and Propagation, 45 (3), 343–353. Bucci, O.M. and Franceschetti, G. (1989) On the degrees of freedom of scattered fields. IEEE Trans. Antennas Propag., 37, 918–926. Bucci, O.M. and Isernia, T. (1997) Electromagnetic inverse scattering: Retrievable information and measurement strategies. Radio Sci., 32, 2123–2138. Bucci, O.M., Gennarelli, C., and Savarese, C. (1998) Representation of electromagnetic fields over arbitrary surfaces by a finite and nonredundant number of samples. IEEE Transactions on Antennas and Propagation, 46 (3), 351–359. Langenberg, K. (1989) Introduction to the special issue on inverse problems. Wave Motion, 11 (2), 99–112. Slaney, M., Kak, A.C., and Larsen, L.E. (1984) Limitations of imaging with 1st-order diffraction tomography. IEEE Transactions on Microwave Theory and Techniques, 32 (8), 860–874. Devaney, A.J. (1981) Inverse-scattering theory within the Rytov approximation. Optics Lett., 6 (8), 374–376. Carney, P.S. and Schotland, J.C. (2000) Inverse scattering for near-field microscopy. Applied Phys. Lett., 77 (18), 2798–2800. Devaney, A.J. (2012) Mathematical foundations of imaging, tomography and wavefield inversion, Cambridge University Press. Habashy, T.M., Groom, R.W., and Spies, B.R. (1993) Beyond the Born and Rytov approximations – a nonlinear approach to electromagnetic scattering. J. Geophys. Res.-Solid Earth, 98 (B2), 1759–1775. Reconstructing Dielectric Scatterers 41 Torres-Verdin, C. and Habashy, T.M. (1995) A two-step linear inversion 42 43 44 45 46 47 48 49 50 51 52 53 54 55 of two-dimensional electrical conductivity. IEEE Transactions on Antennas and Propagation, 43 (4), 405–415. Zhdanov, M.S., Dmitriev, V.I., Fang, S., and Hursán, G. (2000) Quasianalytical approximations and series in electromagnetic modeling. Geophys., 65 (6), 1746–1757. Song, L.P. and Liu, Q.H. (2004) Fast three-dimensional electromagnetic nonlinear inversion in layered media with a novel scattering approximation. Inverse Probl., 20 (6), S171. Belkebir, K., Chaumet, P.C., and Sentenac, A. (2005) Superresolution in total internal reflection tomography. J. Opt. Soc. Am. A, 22, 1889–1897. Devaney, A.J. (1982) A filtered backpropagation algorithm for diffraction tomography. Ultrasonic Imag., 4 (4), 336–350. Tijhuis, A.G., Belkebir, K., Litman, A.C.S., and de Hon, B.P. (2001) Theoretical and computational aspects of 2-D inverse profiling. IEEE Transactions on Geoscience and Remote Sensing, 39 (6), 1316–1330. Chew, W.C. and Wang, Y.M. (1990) Reconstruction of two-dimensional permittivity distribution using the distorted Born iterative method. IEEE Trans. Med. Imag., 9 (2), 218–225. Cui, T.J., Chew, W.C., Yin, X.X., and Hong, W. (2004) Study of resolution and super resolution in electromagnetic imaging for half-space problems. IEEE Transactions on Antennas and Propagation, 52 (6), 1398–1411. Remis, R.F. and Van den Berg, P. (2000) On the equivalence of the Newton–Kantorovich and distorted Born methods. Inverse Probl., 16 (1), L1. Kantorovich, L.V. (1948) On Newton’s method for functional equations. Dokl. Akad. Nauk SSSR, 59, 1237–1240. Roger, A. (1981) Newton-Kantorovitch algorithm applied to an electromagnetic inverse problem. IEEE Transactions on Antennas and Propagation, 29 (2), 232–238. van den Berg, P.M., van Broekhoven, A.L., and Abubakar, A. (1999) Extended contrast source inversion. Inverse Probl., 15, 1325–1344. van den Berg, P.M. and Kleinman, R.E. (1997) A contrast source inversion method. Inverse Probl., 13, 1607–1620. Kleinman, R. and Van den Berg, P. (1992) A modified gradient method for two-dimensional problems in tomography. J. Comput. Appl. Math., 42 (1), 17–35. Habashy, T.M., Oristaglio, M.L., and Hoop, A.T.D. (1994) Simultaneous nonlinear reconstruction of twodimensional permittivity and conductivity. Radio Sci., 29, 1101–1118. 177 178 Electromagnetic Inverse Scattering 56 Kohn, R.V. and McKenney, A. (1990) Numerical implementation of a vari- 57 58 59 60 61 62 63 64 65 66 67 68 69 ational method for electrical impedance tomography. Inverse Probl., 6 (3), 389. Liu, Q.H., Zhang, Z.Q., Wang, T.T., Bryan, J.A., Ybarra, G.A., Nolte, L.W., and Joines, W.T. (2002) Active microwave imaging. I. 2-D forward and inverse scattering methods. IEEE Transactions on Microwave Theory and Techniques, 50 (1), 123–133. Isernia, T., Crocco, L., and D’Urso, M. (2004) New tools and series for forward and inverse scattering problems in lossy media. IEEE Geosci. Remote Sens. Lett., 1, 327–331. D’Urso, M., Isernia, T., and Morabito, A.F. (2010) On the solution of 2-D inverse scattering problems via source-type integral equations. IEEE Transactions on Geoscience and Remote Sensing, 48 (3), 1186–1198. Hursan, G. and Zhdanov, M.S. (2002) Contraction integral equation method in three-dimensional electromagnetic modeling. Radio Sci., 37 (6). Pankratov, O., Avdeyev, D., and Kuvshinov, A. (1995) Electromagnetic field scattering in a heterogeneous earth: A solution to the forward problem. Phys. Solid Earth, 31, 201–209. Zhong, Y., Lambert, M., Lesselier, D., and Chen, X. (2016) A new integral equation method to solve highly nonlinear inverse scattering problems. IEEE Transactions on Antennas and Propagation, 64 (5), 1788–1799. Abubakar, A., Habashy, T.M., van den Berg, P.M., and Gisolf, D. (2005) The diagonalized contrast source approach: an inversion method beyond the Born approximation. Inverse Probl., 21, 685–702. Colton, D. and Monk, P. (1988) The inverse scattering problem for time-harmonic acoustic waves in an inhomogeneous medium. Quart. J. Mech. Appl. Math., 41 (1), 97–125. Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scattering theory, 2nd Edn., Springer-Verlag, Berlin, Germany. Purcell, E.M. and Pennypacker, C.R. (1973) Scattering and absorption of light by nonspherical dielectric grains. Astrophys. J., 186, 705–714. Yurkin, M.A. and Hoekstra, A.G. (2007) The discrete dipole approximation: an overview and recent developments. J. Quant. Spectrosc. Ra., 106 (1), 558–589. Lakhtakia, A. (1992) Strong and weak forms of the method of moments and the coupled dipole method for scattering of time-harmonic electromagnetics fields. Int. J. Mod. Phys. C, 3, 583–603. Pan, L., Agarwal, K., Zhong, Y., Yeo, S.P., and Chen, X. (2009) Subspace-based optimization method for reconstructing extended scatterers: transverse electric case. J. Opt. Soc. Am. A, 26 (9), 1932–1937. Reconstructing Dielectric Scatterers 70 Zhong, Y., Chen, X., and Agarwal, K. (2010) An improved subspace-based 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 optimization method and its implementation in solving three-dimensional inverse problems. IEEE Transactions on Geoscience and Remote Sensing, 48 (10), 3763–3768. Belkebir, K., Chaumet, P.C., and Sentenac, A. (2005) Superresolution in total internal reflection tomography. J. Opt. Soc. Am. A, 22, 1889–1897. Otto, G.P. and Chew, W.C. (1994) Inverse scattering of Hz waves using local shape-function imaging: A T-matrix formulation. Inter. J. Imag. Syst. Tech., 5 (1), 22–27. Ma, J., Chew, W.C., Lu, C.C., and Song, J. (2000) Image reconstruction from TE scattering data using equation of strong permittivity fluctuation. IEEE Transactions on Antennas and Propagation, 48 (6), 860–867. Meaney, P.M., Paulsen, K.D., Pogue, B.W., and Miga, M.I. (2001) Microwave image reconstruction utilizing log-magnitude and unwrapped phase to improve high-contrast object recovery. IEEE Transactions on Medical Imaging, 20 (2), 104–116. Isernia, T., Pascazio, V., and Pierri, R. (1997) A nonlinear estimation method in tomographic imaging. IEEE Transactions on Geoscience and Remote Sensing, 35 (4), 910–923. Li, M., Semerci, O., and Abubakar, A. (2013) A contrast source inversion method in the wavelet domain. Inverse Prob., 29 (2), 025 015. Kirsch, A. (2002) The MUSIC-algorithm and the factorization method in inverse scattering theory for inhomogeneous media. Inverse Probl., 18, 1025–1040. Ammari, H., Iakovleva, E., Lesselier, D., and Perruson, G. (2007) MUSICtype electromagnetic imaging of a collection of small three-dimensional bounded inclusions. SIAM J. Sci. Comput., 29 (2), 674–709. Chen, X. and Zhong, Y. (2009) MUSIC electromagnetic imaging with enhanced resolution for small inclusions. Inverse Probl., 25, 015 008. Devaney, A.J. and Wolf, E. (1973) Radiating and nonradiating classical current distributions and the field they generate. Phys. Rev. D, 8, 1044–1047. Chew, W.C., Wang, Y.M., Otto, G., Lesselier, D., and Bolomey, J.C. (1994) On the inverse source method of solving inverse scattering problems. Inverse Probl., 10 (3), 547. Chen, X. (2009) Application of signal-subspace and optimization methods in reconstructing extended scatterers. J. Opt. Soc. Am. A, 26, 1022–1026. Franchois, A. and Pichot, C. (1997) Microwave imaging-complex permittivity reconstruction with a Levenberg-Marquardt method. IEEE Transactions on Antennas and Propagation, 45 (2), 203–215. Chen, X. (2010) Subspace-based optimization method for solving inverse scattering problems. IEEE Trans. Geosci. Remote Sens., 48, 42–49. Pan, L., Chen, X., Zhong, Y., and Yeo, S.P. (2010) Comparison among the variants of subspace-based optimization method for addressing inverse 179 180 Electromagnetic Inverse Scattering 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 scattering problems: transverse electric case. J. Opt. Soc. Am. A, 27 (10), 2208–2215. Luo, Z.Q., Ma, W.K., So, A.M.C., Ye, Y., and Zhang, S. (2010) Semidefinite relaxation of quadratic optimization problems. IEEE Signal Processing Magazine, 27 (3), 20–34. Candès, E.J., Eldar, Y.C., Strohmer, T., and Voroninski, V. (2013) Phase retrieval via matrix completion. SIAM J. Imaging Sci., 6 (1), 199–225. Caorsi, S. and Gragnani, G.L. (1999) Inverse-scattering method for dielectric objects based on the reconstruction of the nonmeasurable equivalent current density. Radio Sci., 34 (1), 1–8. Bucci, O.M., Crocco, L., and Isernia, T. (1999) Improving the reconstruction capabilities in inverse scattering problems by exploitation of close-proximity setups. J. Opt. Soc. Am. A, 16, 1788–1798. Golub, G.H. and van Loan, C.F. (2013) Matrix computations, 4th Edn., JHU Press. Zhong, Y. (2010) Subspace-based inversion methods for solving electromagnetic inverse scattering problems, Ph.D. dissertation, Nat. Univ. Singapore, Singapore. Zhong, Y. and Chen, X. (2009) Twofold subspace-based optimization method for solving inverse scattering problems. Inverse Probl., 25, 085 003. Zhong, Y. and Chen, X. (2011) An FFT twofold subspace-based optimization method for solving electromagnetic inverse scattering problems. IEEE Transactions on Antennas and Propagation, 59 (3), 914–927. Hansen, P.C., Kilmer, M.E., and Kjeldsen, R.H. (2006) Exploiting residual information in the parameter choice for discrete ill-posed problems. BIT Numerical Math., 46 (1), 41–59. Abubakar, A. and van den Berg, P.M. (2004) Iterative forward and inverse algorithms based on domain integral equations for three-dimensional electric and magnetic objects. J. Comp. Phys., 195 (1), 236–262. McCahan, R.W. and Kleinman, R.E. (1996) Special session on image reconstruction using real data. IEEE Antennas and Propagation Magazine, 38 (3), 39–40. Belkebir, K. and Saillard, M. (2001) Special section: Testing inversion algorithms against experimental data. Inverse Probl., 17 (6), 1565–1571. Belkebir, K. and Saillard, M. (2005) Testing inversion algorithms against experimental data: inhomogeneous targets. Inverse Probl., 21 (6), S1–S3. Litman, A. and Crocco, L. (2009) Testing inversion algorithms against experimental data: 3D targets. Inverse Probl., 25 (2), 020 201. Chen, F.C. and Chew, W.C. (1998) Experimental verifiction of super resolution in nonlinear inverse scattering. Appl. Phys. Lett., 72, 3080–3082. Gilmore, C., Mojabi, P., Zakaria, A., Pistorius, S., and LoVetri, J. (2010) On super-resolution with an experimental microwave tomography system. IEEE Antennas and Wireless Propagation Letters, 9, 393–396. Reconstructing Dielectric Scatterers 102 Franchois, A., Joisel, A., Pichot, C., and Bolomey, J.C. (1998) Quantita- 103 104 105 106 107 108 109 110 111 112 113 114 tive microwave imaging with a 2.45-Ghz planar microwave camera. IEEE Transactions on Medical Imaging, 17 (4), 550–561. Mojabi, P. and LoVetri, J. (2009) Microwave biomedical imaging using the multiplicative regularized Gauss–Newton inversion. IEEE Antennas and Wireless Propagation Letters, 8, 645–648. Rubaek, T., Meaney, P.M., Meincke, P., and Paulsen, K.D. (2007) Nonlinear microwave imaging for breast-cancer screening using Gauss-Newton’s method and the CGLS inversion algorithm. IEEE Transactions on Antennas and Propagation, 55, 2320–2331. Grzegorczyk, T.M., Meaney, P.M., Kaufman, P.A., diFlorio Alexander, R.M., and Paulsen, K.D. (2012) Fast 3-D tomographic microwave imaging for breast cancer detection. IEEE Transactions on Medical Imaging, 31, 1584–1592. Shea, J.D., Kosmas, P., Veen, B.D.V., and Hagness, S.C. (2010) Contrast-enhanced microwave imaging of breast tumors: a computational study using 3D realistic numerical phantoms. Inverse Probl., 26 (7), 074 009. Marklein, R., Mayer, K., Hannemann, R., Krylow, T., Balasubramanian, K., Langenberg, K.J., and Schmitz, V. (2002) Linear and nonlinear inversion algorithms applied in nondestructive evaluation. Inverse Probl., 18 (6), 1733. Zhdanov, M.S. (2002) Geophysical inverse theory and regularization problems, Elsevier, San Diego, CA. Ye, X. and Chen, X. (2016) A distorted Born subspace based optimization method, in 2016 Progress in Electromagnetic Research Symposium (PIERS), pp. 939–939. Agarwal, K., Song, R., D’Urso, M., and Chen, X. (2013) Improving the performances of the contrast source extended Born inversion method by subspace techniques. IEEE Geoscience and Remote Sensing Letters, 10 (2), 391–395. Ding, T. and Ren, K. (2014) Inverse transport calculations in optical imaging with subspace optimization algorithms. J. Comput. Phys., 273, 212–226. Chen, X. (2009) Subspace-based optimization method in electric impedance tomography. J. Electromagn. Wave., 23 (11–12), 1397–1406. Pierri, R. and Soldovieri, F. (1998) On the information content of the radiated fields in the near zone over bounded domains. Inverse Probl., 14 (2), 321. Chew, W.C. and Lin, J.H. (1995) A frequency-hopping approach for microwave imaging of large inhomogeneous bodies. IEEE Microwave and Guided Wave Letters, 5 (12), 439–441. 181 182 Electromagnetic Inverse Scattering 115 Bucci, O.M., Crocco, L., Isernia, T., and Pascazio, V. (2000) Inverse scat- tering problems with multifrequency data: reconstruction capabilities and solution strategies. IEEE Transactions on Geoscience and Remote Sensing, 38 (4), 1749–1756. 116 Caorsi, S., Donelli, M., Franceschini, D., and Massa, A. (2003) A new methodology based on an iterative multiscaling for microwave imaging. IEEE Transactions on Microwave Theory and Techniques, 51 (4), 1162–1173. 117 Belkebir, K. and Tijhuis, A.G. (1996) Using multiple frequency information in the iterative solution of a two-dimensional non-linear inverse problem, Proc. PIERS 96: Progress In Electromagnetic Research Symposium, 353, Innsbruck, Austria. 183 7 Reconstructing Perfect Electric Conductors This chapter deals with reconstructing perfectly electrically conducting (PEC) scatterers where the boundary of PEC scatterers is reconstructed from measured scattered data. Since the boundary condition requires that the tangential electric field vanishes at the boundary of PEC scatterers, the electric-field integral equation (EFIE) is only applicable to the boundary of the PEC scatterer, which is, however, unknown in an inverse problem. Consequently, the ISP problem involving PEC scatterers is quite different from its dielectric counterpart discussed in Chapter 6. The organization of this chapter is as follows. Section 7.1 first briefly introduces the forward problem, followed by a review of fundamental properties of the inverse problem. Section 7.2 provides a survey of inversion models that require knowledge of prior information about PEC scatterers. Section 7.3 focuses on inversion models that do not require prior information. Both TM and TE modes are dealt with. Section 7.4 presents a method to reconstruct a mixture of PEC and dielectric scatterers. Section 7.5 discusses a few issues on the reconstruction of PEC scatterers. 7.1 Introduction 7.1.1 Formulation of the Forward Problem The inverse scattering problem (ISP) under investigation is in a two-dimensional setting with time-harmonic illuminations. In other words, the whole domain of interest, including the unknown scatterers, as well as the incident electrical field, is invariant along the z-axis. The background medium is free space and its permittivity and permeability are denoted as 𝜖0 and 𝜇0 , respectively. Consider a PEC scatterer, occupying a space D, with the boundary 𝜕D. For the transverse magnetic (TM) mode, both the electric field E and the induced electric current density J are in the z-axis direction, where Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 184 Electromagnetic Inverse Scattering the subscript z is omitted for convenience. The scalar electric-field integral equation (EFIE) reads Ei (r) + i𝜔𝜇0 ∫𝜕D g(r, r′ )J(r′ )dr′ = 0, r ∈ 𝜕D (7.1) For the transverse electric (TE) mode, both the electric field E and the induced electric current density J are in the transverse plane, and the vector EFIE reads { } i ′ ′ ′ ̂ × E (r) + i𝜔𝜇0 n(r) G(r, r ) ⋅ J(r )dr = 0, r ∈ 𝜕D (7.2) ∫𝜕D where the two-dimensional dyadic Green’s function is ] [ 1 ′ G(r, r ) = I 2 + 2 ∇t ∇t g(r, r′ ) k0 where the subscript t means “transverse,” and k0 is the wavenumber. In the forward scattering problem, the induced surface current density J and J can be solved from (7.1) and (7.2), respectively. The scattered field is then calculated as the convolution of the induced surface current density and the Green’s function, Es (rs ) = i𝜔𝜇0 ∫𝜕D g(rs , r′ )J(r′ )dr′ (7.3) G(rs , r′ ) ⋅ J(r′ )dr′ (7.4) for the TM case and Es (rs ) = i𝜔𝜇0 ∫𝜕D for the TE case, where rs is the position of measurement antenna. 7.1.2 Uniqueness and Stability The first question to ask about the inverse scattering problem regards uniqueness. Since the proof is mainly given by mathematicians, this section introduces the terminologies that are used in applied mathematical communities. Impenetrable scatterers are referred to as obstacles. For a scalar wave, impenetrable scatterers that require the total field to be equal to zero at the boundaries are known as sound-soft scatterers. For ISPs involving sound-soft scatterers, the first proof, due to Schiffer, was described in the book of Lax and Phillips [1]. For a fixed wavenumber, measurement of scattered far field in all directions for all incidence directions uniquely determines the sound-soft scatterer. For polyhedral sound-soft scatterers, [2, 3] established uniqueness for only a single incident plane wave. For electromagnetic waves, the uniqueness theorem can be found in section 7.1 of [4], which states the following two theorems. First, for a fixed wavenumber, the electric far field pattern for all incident directions and all polarizations uniquely determines the PEC scatterer. Second, for one fixed incidence direction and polarization, the electric far field pattern Reconstructing Perfect Electric Conductors for all wavenumbers contained in some interval uniquely determines the PEC scatterer. For polyhedral-type PEC scatterers, [5] established uniqueness for only two incident plane waves given at a fixed wavenumber and a fixed incident direction, along with two different polarizations. The next question is whether the solution of inverse scattering problem is stable. The stability estimates for the determination of a sound-soft scatterer turns out to be of logarithmic type [6–8], that is, as introduced in Section 6.1.1, if the error in the measured data is at most 𝜏, then the error of solution in the worst case is on the order of | ln 𝜏|−s (where 0 < s < 1), which is severely ill-posed. This issue of ill-posedness will be handled using regularization techniques. This chapter mainly presents numerical methods to solve two-dimensional ISPs involving PEC scatterers. Here, we categorize inversion models by whether or not they need to know a priori the number of scatterers and their topologies. 7.2 Inversion Models Requiring Prior Information Many inversion models require parameterization of the boundary of PEC using local polar coordinates. Usually, a point inside a scatterer is chosen as the origin of the local polar coordinate system and then the boundary 𝜕Ω of scatterer is parameterized as an angular-dependant distance function. Spline functions or Fourier series under local coordinate are most commonly used [9, 10]. Obviously, this parameterization method requires a priori information about the number and the approximate locations of the scatterers. The ISP is then cast into an optimization problem, where the parameters of shape function are looked for so that the mismatch between the calculated and measured scattered fields is minimized. An optimization algorithm can be either deterministic, such as the Newton–Kantorovich (NK) method in [11], where the Fréchet derivative is calculated, or stochastic, such as the differential evolution (DE) in [10] and the genetic algorithm (GA) in [9], where there is no need to calculate the Fréchet derivative. Such methods require the solution of the corresponding forward problem at each iteration step, which is often time consuming. It is worth mentioning that two inversion models developed in applied mathematics do not need the solution of the forward problem ([12] and sections 5.4 and 5.5 of [4]). The principal idea of these methods is to break the ISP into a linear ill-posed part and a nonlinear part [13]. The first algorithm, referred to as the dual space method, adopts an approach of linear superposition of incident fields [14, 15]. The first step looks for superpositions of incident fields with different directions so that the resulting scattered fields match certain multipole radiation patterns in far field and the second step solves a nonlinear minimization problem where the unknown boundary 𝜕Ω of the scatterer is determined as the locations of the zeros of the total electric field. The second algorithm first solves a linear 185 186 Electromagnetic Inverse Scattering ill-posed problem of constructing a near-field scattered field from measured far-field counterpart and then deals with the nonlinearity by determining the unknown boundary 𝜕Ω of the scatterer as the location of the zeros of the total field [16]. Though the two algorithms are mathematically elegant, they have not been widely used in the engineering community yet due to some practical constraints. For example, the first algorithm requires full-aperture incidences and receptions and the second algorithm requires a reasonable auxiliary closed contour contained inside the unknown scatterer. When a priori information about the number and the approximate locations of the scatterers is absent, the parameterization method cannot work. In addition, for scatterers with complex shapes, such as 𝔽 and 𝕊 that exhibit several concave parts, it is impossible to parameterize them using local polar coordinates. Thus, it is necessary to develop inversion models that do not need the aforementioned a priori information. 7.3 Inversion Models Without Prior Information The absence of a priori knowledge of the number and the approximate locations of the scatterers poses two significant difficulties; that is, representing the geometry of scatterers and constructing the objective function. While the first is obvious, the second deserves further discussion. Due to the boundary condition on the PEC scatterer, the methods for solving the PEC inverse scattering problems are significantly different from those for dielectric scatterers. In the case of dielectric scatterers, both the background medium and the scatterers can be parameterized by the permittivity such that the EFIE can be applied to the whole domain of interest (DOI). Therefore, the objective function can be constructed as a function of the unknown permittivity. In the case of PEC, the EFIE is only applicable to the boundary of the PEC scatterer, which is, however, unknown in inverse problem. A physical parameter to represent both the PEC scatterers and the background medium does not exist. Therefore, the objective function for the PEC case is quite different from the one for the dielectric case. In the following, we briefly review four inversion models that do not require the aforementioned a priori information. Qualitative methods, such as the linear sampling method [17], multiple signal classification (MUSIC) algorithm [18], and factorization method [19], are able to locate PEC scatters in the absence of a priori knowledge of their number and approximate locations. Nevertheless, no exact criteria exist in identifying the boundaries of scatterers from the indicator of qualitative methods. In addition, the reconstruction results are very sensitive to measurement noise. The local shape function (LSF) imaging seeks to reconstruct arbitrary number of PEC scatterers distributed in the DOI [20–22]. LSF imaging provides a complete basis for PEC scatterers by discretizing the DOI into small cells (which are usually squares) and then assigning to each cell a binary local shape Reconstructing Perfect Electric Conductors function that is zero in free-space regions and unity in regions where PEC scatterers are present. Hence, the LSF is more versatile in representing multiple scatterers. It is easy to see that this technique does not require a priori knowledge about the number of scatterers and their approximate locations. However, when dealing with line-shape PEC scatterers (such as the “L” shape), one has to use very small squares in order to give a good approximation, which may significantly increase the computational cost. PEC scatterers can also be reconstructed by treating them as lossy dielectric scatterers with high loss [23]. The reconstruction algorithm is, in principle, the same as that used for reconstructing the conductivity of a penetrable scatterer. Considering the fact that, for high conductivity, the skin depth of the scatterer is small, the only meaningful information produced by the reconstruction algorithm is the boundary of the scatterer. The level set method, devised by Osher and Sethian [24], was first applied to solve ISPs in [25]. The key idea is to define the boundary of the scatterer as the level set of a function of higher dimension. A level set of a real-valued function is a set where the function takes a given constant value. For example, for a two-variable function, a level set is a curve, called a level curve, isoline, or contour line. For a three-variable function, a level set is called a level surface or isosurface. The advantage of the level set model is that one can perform numerical computations involving curves and surfaces without having to parameterize these objects. Also, the level set method makes it easy to follow shapes that change topology, such as splitting, merging, and developing holes. Although the level set method is versatile in representing scatterers of arbitrary number and shape [26], inverse-problem solvers that are based on this representation require the solution of the corresponding forward problem at each iteration step, which is often time consuming. In the following, we present a model that is able to reconstruct both closedcontour and line-shape PEC objects and does not need to solve the forward problem at each iteration step. In practice, an alternative method for providing a complete bases for PEC scatterers is to use the line-element representation. The domain of interest is discretized into small square cells and then side edges of square rather than the square itself are used as the basic elements to represent scatterers, which is a significant difference from the aforementioned LSF method. It is obvious that the line-element representation method is able to reconstruct both closed-contour and line-shape objects, in the absence of a priori information about the number and the approximate locations of the scatterers. Based on the line-element representation, an inversion model is proposed to solve two-dimensional ISP under both TM and TE cases, where the forward problem is not solved at each iteration step. 7.3.1 Transverse-Magnetic Case Suppose that the unknown PEC scatterers are located in a given DOI D ⊂ R2 . There are Ni incident waves Eip (r) = ẑ Epi illuminating D, p = 1, 2, ..., Ni . For each 187 188 Electromagnetic Inverse Scattering incidence, the scattered electric field is measured by an array of Ns antennas, which are located at rsq , q = 1, 2, ..., Ns . The domain of interest is discretized into small square cells and the side edges of the square are used as the elements to represent PEC scatterers. Assume that there are M line elements in total in the domain D and the center of each line-element is located at rm , m = 1, 2, ..., M. After such a discretization, the method of moments (MoM), employing the pulse basis function and the delta test function, can be used to solve the forward problem (see Section 2.9.2). Define the following three M-dimensional vectors: the vector of induced current density J = [J(r1 ), J(r2 ), ..., J(rM )]T , the vector of incident field i t E = [Ei (r1 ), ..., Ei (rM )]T , and the vector of total field E = [Et (r1 ), ..., Et (rM )]T , where the superscript T denotes the transpose operator. The relationship between them is given in a compact form, t i E = E + GD ⋅ J, where the M × M matrix (7.5) k 𝜂𝑤 GD has the entries GD (m, m′ ) = − 04 H0(1) (k0 |rm − { [ ( ]} k 𝜂𝑤 𝛾k 𝑤 ) 1 + i 𝜋2 ln 40 − 1 GD (m, m′ ) = − 04 when rm′ |) when m ≠ m′ , and m = m′ . Here k0 is the free space wavenumber, 𝜂 is the impedance of the free space, 𝑤 is the length of the line element, and 𝛾 ≈ 1.781. The physical meaning of (7.5) is that the total field is equal to the incident wave coming directly from transmitters plus the radiation of induced current. The scattered field received by the antennas is given by s E = GS ⋅ J, where E s (7.6) = [E (rs1 ), Es (rs2 ), ..., Es (rsN )]T s k 𝜂𝑤 = − 04 H0(1) (k0 |rsq − rm |). s and the Ns × M matrix GS is given by GS (q, m) For the forward problem, the requirement that the total electric field at the boundary of a PEC scatterer vanishes enables us to solve for the induced current J from (7.5). For an inverse problem, however, the PEC boundaries are unknown yet so that we cannot simply let (7.5) to be zero. Consequently, it is difficult to build up the objective function. To overcome this difficulty, we define an M-dimensional vector P, which consists of only 1 or 0, as an indicator of whether an edge belongs to the PEC boundary. In other words, the dimension of the vector P is equal to the total number of line elements in D, where a “1” element represents the PEC element and a “0” element represents the background (air) element. Because of the property of PEC, the total electric t field E should vanish in the PEC scatterer, while the induced current J should only exist on the elements that belong to the PEC boundary. Noticing such a physical fact, we are able to define the relative residual, Δsta = ||(I − P) ⋅ J||2 + ||J ||2 t + ||P ⋅ E ||2 + ||E ||2 (7.7) Reconstructing Perfect Electric Conductors where || ⋅ || is the Euclidean length of a vector, P is the diagonal matrix with P in the diagonal, and I is an M-dimensional identity matrix. For a physical J, it can be easily checked that both terms in (7.7) are equal to zero no matter the element of P is equal to “1” (PEC boundary) or “0” (air). Since the fact that the electric field is zero at the PEC and the current exists on the PEC boundary describes a physical state, (7.7) quantifies a violation of the physical state and therefore it is referred to as the relative residual in the state equation. The + + denominators J and E , which will be introduced later, have the same unit as t J and E , respectively, so that the two terms in (7.7) are both dimensionless. Following the subspace-based optimization method (SOM) that is proposed in Chapter 6, we decompose the current J into two complementary and orthog+ − onal parts, J = J + J . The key step is the singular value decomposition (SVD) H of GS , which reads GS = U ⋅ Σ ⋅ V , where U is of size Ns × Ns and is composed of orthonormal left singular vectors uq , V is of size M × M and is composed of orthonormal right singular vectors 𝑣m , Σ is of size Ns × M with the diagonal terms being singular values 𝜎m that are placed in a nonincreasing order + 𝜎1 ≥ 𝜎2 ≥ · · ·, and the superscript H denotes the Hermitian. Explicitly, J = V ⋅ − + − 𝛼 + + V ⋅ 𝛼 − , where V and V are composed of the first L and the remaining M − L columns of V , respectively, and L is the number of the total singular values that are above a predefined noise-dependent threshold. The superscripts + + and − denote major and minor parts, respectively. The major part of current J + is straightforwardly determined from V ⋅ 𝛼 + where 𝛼j+ = uH ⋅E j 𝜎j s , j≤L (7.8) + + The corresponding radiation field in the DOI D is calculated as E = GD ⋅ J . + + We recall that J and E are used as denominators in (7.7). The relative residual due to the mismatch of the scattering data can be expressed as − dat + s ||Gs ⋅ V ⋅ 𝛼 − + Gs ⋅ J − E ||2 (7.9) s ||E ||2 which is referred to as the relative residual in the data equation. The total relative residual is defined to be Δ = Δtot = Δdat + Δsta . (7.10) i For each of the incidence Ep , the total relative residual can be calculated as Δtot p , p = 1, 2, ..., Ni . Similar to the case of Gs-SOM for dielectric scatterers that has been presented in Section 6.4.1, there are two approaches to build up the objective function. The first approach treats 𝛼 − as an intermediate parameter, and it can be expressed as a function of P by solving a least-squares problem. Thus, the 189 190 Electromagnetic Inverse Scattering total relative residual depends solely on the binary variable P. This approach is adopted in [27], where the discrete descent optimization method is chosen to minimize the objective function. However, numerical simulations show that this approach exhibits two weaknesses: (1) the computational cost is large since there is matrix inversion in each step of iteration; (2) the method is not robust in the sense that the performance of the algorithm depends, in a noncontinuous manner, on the number L of leading singular values. The second approach treats 𝛼 − as an independent parameter, which is the practice in [28]. Another important ingredient is to replace the binary indicator function P by a smooth function of another unknown x that is continuous. Mathematically speaking, the Heaviside step function (or the unit step function) can be approximated by several smooth functions, for example, P= 1 1 + e−ax (7.11) where a is a large positive number, such that for each element xm , m = 1, 2, ..., M, if xm > 0, Pm ≈ 1 and if xm < 0, Pm ≈ 0. The replacement of P by a function of x enables us to apply various continuous-parameter optimization methods to minimize the objective function. The objective function is given by f (𝛼 −1 , 𝛼 −2 , … , 𝛼 −Ni , x) = − + s Ni ∑ ||Gs ⋅ V ⋅ 𝛼 −p + Gs ⋅ J p − Ep ||2 s p=1 ||Ep ||2 + ||(I − P) ⋅ J p ||2 + ||J p ||2 t + ||P ⋅ Ep ||2 + ||Ep ||2 (7.12) Reference [28] adopts the optimization method used in Gs-SOM (see Section 6.4.1) to minimize (7.12); that is, alternatively updating 𝛼 −p and x. The implementation steps are as follows: + Step 1: Calculate GS , GD , and the SVD of GS . Obtain J p from (7.8), p = 1, 2, ..., Ni . Step 2: Initialization: iteration number n = 0, set x0 = 0, 𝛼 −p,0 = 0 (alternatively, it is obtained from (7) of [27]); Initialize the search direction 𝜌p,0 = 0. Step 3: n = n + 1. Step 3.1: Update 𝛼 −p,n : Calculate gradient (Frechet derivative) g p,n = ∇𝛼 −p f evaluated at 𝛼 −p,n−1 and xn−1 ; Determine the Polak–Ribière conjugate gradient search directions 𝜌p,n = Re[(g p,n −g p,n−1 )H ⋅g p,n ] g p,n + 𝜌p,n−1 . Plug 𝛼 −p,n = 𝛼 −p,n−1 + dp,n 𝜌p,n ||g p,n−1 ||2 into the objective function, which is quadratic in terms of the parameter dp,n , and obtain the value of dp,n by solving a least-squares problem (see Appendix B). Then update 𝛼 −p,n = 𝛼 −p,n−1 + dp,n 𝜌p,n . Reconstructing Perfect Electric Conductors Step 3.2: Update xn : for the mth line element, m = 1, 2, ..., M, − + update induced current (J p,n )m = (J p )m + (V ⋅ 𝛼 −p,n )m . Then update the total field in the mth line element, t i (Ep,n )m = (Ep )m + (GD ⋅ J p,n )m . The objective function has an analytical derivative with respect to (xn )m and the solution (xn )m is given by ] [ N t / Ni ∑i |(Ep,n )m |2 ∑ |(J p,n )m |2 1 (xn )m = − ln + 2 + 2 a p=1 ||E p || p=1 ||J p || (7.13) Step 4: Stop iteration if there is no obvious change in the objective function for continuous three iterations. Otherwise, go to step 3. Step 5. Determine the binary result P from x: for each element m = 1, 2, ..., M, if xm > 0, then set Pm = 1; otherwise, Pm = 0. The following numerical simulation is presented to demonstrate the performance of the proposed algorithm. The DOI D is 2𝜆 × 2𝜆, which is discretized into 20 × 20 cells when solving the inverse problem. The scatterers are a combination of a closed-contour scatterer and a line-shape scatterer. A square and an L-shaped PEC scatterer are located in the domain as shown in Fig. 7.1(a), where the units for the coordinates in the figure are 𝜆. The line elements are represented by thin line elements. The contour of the PEC objects is represented by thick line elements. A total number of Ni = 10 plane waves are incident from directions evenly distributed on [0, 2𝜋). Ns = 30 receivers are equally distributed along a circle with radius 5𝜆. The forward scattering problem is solved by the MoM, with a 40 × 40-cell discretization, denser than is used in the inverse problem to avoid the inverse crime. Figure 7.1 (b) shows the reconstructed result by using noise-free data and choosing L = 12, while Fig. 7.1 (c) applies to the case with 10% white Gaussian noise and L = 10. The reconstructed pattern is represented by the line elements marked with triangles at their ends. The numbers of iteration steps are 384 and 410, respectively. From the reconstructed results we clearly see that there is an “L” shaped scatterer and a square scatterer in the domain and their sizes and positions approximately match the exact ones. In some other numerical simulations, occasionally some internal edges of a closed-contour PEC scatterer are “incorrectly” identified as air. In fact, since the PEC scatterer is impenetrable, it does not matter whether internal edges are detected as PEC or air as long as the boundary is correctly detected as PEC. From a practical point of view, many properties of Gs-SOM that are presented in Section 6.4.1 for dielectric scatterers are applicable to PEC scatterers as well. For example, there are good guidelines in choosing the integer L; the overhead computational cost can be reduced by implementing a truncated SVD. 191 192 Electromagnetic Inverse Scattering 1 0.5 0 –0.5 –1 –1 0 (a) 1 1 0.5 0.5 0 0 –0.5 –0.5 –1 –1 0 (b) 1 –1 –1 1 0 (c) 1 Figure 7.1 Reconstruction of a combination of closed-contour and line-shape PEC scatterers. (a) Exact contour, (b) reconstructed contour with noise-free data, and (c) reconstructed contour under 10% white Gaussian noise. Source: Ye 2011, Inverse Problems, 27, 055011. [28] Reproduced with permission of IOP Publishing. 7.3.2 Transverse-Electric Case This section intends to reconstruct PEC scatterers with TE illumination, without requiring a priori information about the location and quantity of scatterers. The PEC scatterer can be a closed-contour or line-shape scatterer. We still use the line-element model to represent scatterers. It is worth stressing that the TE case ISP is more demanding than the TM case. The reasons are threefold. (1) The induced electric current for the TM case is in the longitudinal direction, which is in fact a scalar source for a two-dimensional problem. In comparison, the TE case involves a vector source since the induced current flows in the transverse plane. Thus, the TE case is more complex in terms of both mathematics and physics. (2) The vector property of the induced current requires careful numerical implementation, especially in the following two Reconstructing Perfect Electric Conductors aspects. The first is that the basis function for the current cannot be chosen as the simple pulse function as in the TM case, because the discontinuous distribution current will cause fictitious charge accumulation at the junctions of adjacent elements. The triangular basis function is usually used in solving the integral equation in the TE case. The second is that the strong effect of current orientation on the radiation field requires a more accurate model than the staircase that consists of only horizontal and vertical line elements. To better represent current that flows in oblique directions, 45-degree and 135-degree oblique line elements have to be added, which will be shown in later numerical simulations. (3) Although the MFIE is very convenient in solving the forward problem since only a single component of the magnetic field H is present, it brings difficulties in imposing boundary conditions in inverse problems. We do not know which side of a line element is the inner side of a closed-contour PEC scatterer since the PEC scatterer is as yet unknown. In addition, the MFIE cannot be applied to a line-shape scatterer, even in the forward problem [29] (section 1.7). The above factors make it necessary to use the more complex EFIE, which is, however, convenient in dealing with the boundary condition in inverse problems. We use the same notations as in the TM case. A minor difference is that a total number of M line elements consists of not only horizontal and vertical line elements, but also 45-degree and 135-degree oblique line elements. The total electric field on each line element is denoted as Etp and is composed of the incident field from the sources and the scattered field due to the induced currents on the PEC scatterers. The relationship between the total field Etp , the incident field Eip and the induced current on the elements Jp can be written in an alternative way to (7.4), Etp (rn ) = Eip (rn ) [ M ∑ k0 𝜂0 (1) H0 (k0 |rn − r′m |)Jp (r′m ) 4 m=1 element m ] 𝜂0 (1) ′ ′ ′ + ∇H0 (k0 |rn − rm |)∇ ⋅ Jp (rm ) dr′m 4k0 − ∫ (7.14) where Jp (r′m ) = Jp (r′m )t̂m and t̂m denotes the tangential direction of the mth line element, m = 1, 2, … , M. Similarly, the scattered field received by the receiving antennas Esp (rsq ) is given by [ M ∑ k0 𝜂0 (1) H0 (k0 |rsq − r′m |)Jp (r′m ) Esp (rsq ) = − ∫ 4 m=1 element m ] 𝜂0 (1) s ′ ′ ′ + ∇H0 (k0 |rq − rm |)∇ ⋅ Jp (rm ) dr′m (7.15) 4k0 193 194 Electromagnetic Inverse Scattering To avoid fictitious charge accumulation at the junctions of adjacent line elements that is caused by discontinuous current distribution, we choose the triangle basis function to represent the current [29] (section 2.4). After simple algebraic manipulations, (7.14) and (7.15) can be written in compact forms: t i E = E + GD ⋅ J, (7.16) s E = GS ⋅ J, t (7.17) i s where E and E are 2M-dimensional vectors, E is 2Ns -dimensional vector, J is an M-dimensional vector, and GD and GS are of size 2M × M and 2Ns × M, respectively. The objective function can be written in a way similar to the TM case, f (𝛼 −1 , 𝛼 −2 , … , 𝛼 −Ni , P) ⎧ − s 2 + Ni − ∑ ⎪ ||Gs ⋅ V ⋅ 𝛼 p + Gs ⋅ J p − Ep || = ⎨ s ||Ep ||2 p=1 ⎪ ⎩ 1 + ||(I − P) 2 ⋅ J p ||2 + ||J p ||2 1 ⎫ t ||P 2 ⋅ (n̂ × Ep )||2 ⎪ + ⎬ + ||Ep ||2 ⎪ ⎭ (7.18) where n̂ = ẑ × t̂ is the normal direction of the line element. There are two important differences from the TM objective function (7.12). The first is t that the transverse tangential component of total electric field n̂ × Ep , rather than the z component, vanishes at the PEC line element. The second is that 1 1 (I − P) 2 and P 2 , rather than (I − P) and P, are used in the relative residual in the state equation. It is easy to see that the derivative of (7.18) with respect + to Pm , m = 1, 2, … , M, equals to −Am + Bm , where Am = |J p,m |2 ∕||J p ||2 and t + Bm = |(n̂ × Ep,m )|2 ∕||Ep ||2 , which is a constant. Then the objective function (7.18) is linear with respect to Pm in the region [0, 1] so that the minimum of (7.18) occurs at either Pm = 0 or Pm = 1. A simple criterion of choosing the value of Pm is { 0, if Am ≤ Bm Pm = (7.19) 1, if Am > Bm Thus, the auxiliary function xm as defined in the TM case is no longer needed. The implementation steps of minimizing (7.18) are almost the same as the TM case; that is, alternatively updating 𝛼 −p and P. Some numerical simulations are performed to test the proposed algorithm. The DOI D is a 2𝜆 × 2𝜆 square, where 𝜆 is the wavelength. A group of 15 transmitting antennas and 30 receiving 1 1 0.5 0.5 y (λ) y (λ) Reconstructing Perfect Electric Conductors 0 –0.5 –1 –1 0 –0.5 –0.5 0 x (λ) (a) 0.5 1 –1 –1 –0.5 0 x (λ) 0.5 1 (b) Figure 7.2 Reconstruction results of rotated line-shape PEC scatterer. (a) 24∘ and (b) 45∘ . Source: Shen 2013, IEEE Trans. Antennas Propag., 61, 4713–4721. [50] Reproduced with permission of IEEE. antennas are evenly distributed on [0, 2𝜋], with a distance of 5𝜆 from the center of D. Both the x and y components of scattered field are measured. In addition, 10% white Gaussian noise is added. The first numerical example deals with a line-shape scatterer. The domain D is discretized to 20 × 20 horizontal line elements, 20 × 20 vertical line elements, 2 × 20 × 20 line elements in the 45∘ direction and 2 × 20 × 20 line elements in the 135∘ direction. In solving inverse problems, unknown scatterers are not necessarily aligned with the mesh lines. To challenge the proposed method, we rotate the line-shape scatterer by 24∘ counterclockwise, as shown by the thick line in Fig. 7.2(a). In the reconstruction result, it is noticed that although the real object does not parallel with any mesh line, the algorithm still obtains the correct location, length, and angle of inclination of the scatterer, though there are some artifacts. The mesh strategy, including four kinds of line elements, favors the reconstruction of unaligned scatterers. Next, for a line with 45∘ counterclockwise rotation that is aligned with the mesh, the reconstruction result shown as the thick line in Fig. 7.2(b) clearly presents fewer artifacts compared with the unaligned case. In the second numerical example, in order to challenge the propped method in solving multiple scatterers, two circular PEC cylinders are investigated. Shown as the thick lines depicted in Fig. 7.3, one circle has a 0.3𝜆 radius and is centered at (−0.45𝜆, 0) and the other one with 0.1𝜆 radius centered at (0.25𝜆, 0). The reconstruction result by adopting a TSOM scheme (Section 6.4.2) is shown in Fig. 7.3. Though the problem is very challenging, with different radii and sub-wavelength gap, the reconstruction result shown in Fig. 7.3 is satisfactory. 195 Electromagnetic Inverse Scattering 1 Figure 7.3 Reconstruction results of multiple circular PEC scatterers. Source: Shen 2013, IEEE Trans. Antennas Propag., 61, 4713–4721. [50] Reproduced with permission of IEEE. 0.5 y (λ) 196 0 –0.5 –1 –1 –0.5 0 x (λ) 0.5 1 7.4 Mixture of PEC and Dielectric Scatterers This section considers a mixed boundary condition inverse scattering problem where PEC and dielectric scatterers are simultaneously present inside the DOI. The number of scatterers and their approximate positions not known a priori. Regarding the uniqueness theorem of such a mixed boundary condition ISP, [30] provides an explicit and constructive proof under certain conditions. The mixed boundary condition ISP is obviously more challenging than the single boundary condition case; that is, to reconstruct PEC scatterers alone or dielectric scatterers alone. Existing inversion methods to solve mixed boundary condition ISP can be categorized as qualitative and quantitative. Qualitative reconstruction methods, such as the linear sampling method [17] and factorization method [19], are, in general, independent of the boundary conditions. This salient feature makes them good candidates to solve the mixed boundary ISP. Nevertheless, qualitative methods inherently present two weaknesses. The first is that although they are able to retrieve the shapes and locations of scatterers, they cannot distinguish the types of boundary conditions. The second is that they do not provide the values of relative permittivity of dielectric scatterers. Quantitative reconstruction methods not only identify the shapes of PEC scatterers but also at the same time provide the spatial distribution of the relative permittivity of dielectric scatterers. A natural idea to represent both dielectric and PEC scatterers is to use complex permittivity considering the fact that for high conductivity the skin depth of the scatterer is small so that the only meaningful information produced by the algorithm is the boundary of the scatterer [31, 32]. Then both the forward and inverse scattering problems can be modeled by the standard EFIE, involving a spatial distribution of complex permittivity. The PEC is distinguished from dielectric scatterers by Reconstructing Perfect Electric Conductors a higher value of the imaginary part of complex permittivity. However, this classification criterion may fail in the case when both high-loss dielectric scatterers and PEC are simultaneously present, especially when measured scattered fields are contaminated with considerable noise. Another approach to tackle the mixed boundary condition problem is the T-matrix method. The T-matrix method [33] is an important computational technique for solving wave scattering problems. For any given scatterer, no matter whether it is PEC or dielectric, the scattered and incident fields are firstly expanded as functions of multipoles and then multipole coefficients of scattered field are related to the multipole coefficients of incident field by the so-called T-matrix. Scatterers with different materials, shapes, and sizes have different T-matrix values. Thus, the T-matrix method provides a possibility of modeling the mixed boundary problem for both forward and inverse scattering problems. We consider a 2D TM mixed boundary condition inverse scattering problem. The DOI is discretized into a total number of M square meshes and each square is small enough so that it can be well approximated by a circle of the same area. We have k0 R ≪ 1, where R is the radius of approximation circle. The T-matrix model for the scattering problem consists of two steps, that is, to first study the scattering property of a single cell that is referred to as the subscatterer and then to study the scattering property of all subscatterers as a whole. In the following, we present the two steps in sequence. First, consider a single subscatterer, the center of which is located at C0 = (r0 , 𝜃0 ) in the cylindrical coordinate system. It is illuminated by an incident field, which can be represented by the multipole expansion as i E (r) = P ∑ T Rg[Ψ(k0 , r′ )]p ⋅ [e0 ]p = RgΨ (k0 , r′ ) ⋅ e0 , (7.20) p=−P and the scattered field is represented by s E (r) = P ∑ T [Ψ(k0 , r′ )]p ⋅ [a0 ]p = Ψ (k0 , r′ ) ⋅ a0 (7.21) p=−P where r′ = r − C0 = (𝜌0 , 𝜙0 ) is under the local coordinate of the subscatterer at C0 . Here [Ψ(k0 , r′ )]p = Hp(1) (k0 𝜌0 )eip𝜙0 , p = −P, … , P, where P is the truncation number of multipoles. The Rg indicates the regular part of Hankel function; that is, Rg[Ψ(k0 , r′ )]p = Jp (k0 𝜌0 )eip𝜙0 . The vectors e0 and a0 are the multiple expansion coefficients of the incident and scattered field, respectively. Ψ, e0 , and a0 are all (2P + 1)-dimensional vectors. The superscript T denotes the transpose. The scattering ability of the subscatterer is represented by Tp , p = −P, … , P, which is defined as the ratio of the multipole-expansion coefficients of the scattered field to those of its incident field; that is, [a0 ]p = Tp ⋅ [e0 ]p . The values of Tp depend on the material, size, and shape of the subscatterer. The T-matrix of the subscatterer is defined as T = diag(Tp ); that is, a diagonal 197 198 Electromagnetic Inverse Scattering matrix with Tp placed in order on the diagonal. To conclude, for a subscatterer, we have a0 = T ⋅ e0 (7.22) Next, the scattering of the original scatterer can be considered as the superposition of the scattered field due to all subscatterers. Assume that the center of each subscatterer is at Cm = (rm , 𝜃m ), m = 1, 2, … , M. The vectors em and am , m = 1, 2, … , M, denote the multiple expansion coefficients of the incident and scattered field, respectively, for the mth subscatterer. The scattered field is given by s E (r) = M ∑ T Ψ (k0 , r′m ) ⋅ am (7.23) m=1 where r′m = r − Cm = (𝜌m , 𝜙m ), m = 1, 2, … , M, is the local coordinate with respect to the mth subscatterer. For the mth subscatterer, the total incidence field upon it consists of the incidence wave that directly comes from the transmitter (em ) and the scattered wave off other subscatterers (Es (rm )). The latter needs some manipulations to shift the expansion center to Cm before the definition of T m for the mth subscatterer can be used. This is achieved by the translational addition theorem, T T Ψ (k0 , r′m′ ) = RgΨ (k0 , r′m ) ⋅ 𝛼 mm′ , m ≠ m′ (7.24) where 𝛼 mm′ , of size (2P + 1) × (2P + 1), is the translational matrix, which can be derived from Appendix D of [34]. Thus, using the definition of the T-matrix for the mth subscatterer and using (7.23) and (7.24), we obtain ] [ M ∑ (7.25) am = T m ⋅ e m + 𝛼 mm′ ⋅ am′ m′ =1, m′ ≠m Note that (7.25) is applied to all M subscatterers, which eventually generates a linear system, a = O ⋅ [e + AD ⋅ a] (7.26) where O has a dimension M(2P + 1) × M(2P + 1), and it is a block-wise diagonal matrix with block entries [O]mm = T m . AD has a dimension M(2P + 1) × M(2P + 1), with block element [AD ]mm′ = 𝛼 mm′ for m ≠ m′ and zero otherwise, and a and e are both M(2P + 1)-dimensional vectors, with block element [a]m = am and [e]m = em , respectively. Note that for a plane wave, em has an explicit analytical form that can be found in [35]. The scattered field Es (rsq ) at the receiver position rsq , q = 1, 2, ...Ns can be obtained by (7.23). They can be written into a compact form, s E = AS ⋅ a. (7.27) where the dimension of AS is Ns × (M(2P + 1)). Equations (7.26) and (7.27) are referred to as the state equation and the data equation, respectively. It is easy Reconstructing Perfect Electric Conductors to see that these two equations have the same mathematical structure as their counterparts in Chapter 6, that is, a replaces the role of J, O replaces the role of 𝜒, and in addition neither AS nor AD depends on the scatterers’ materials. These properties motive us to use the inversion models developed in Chapter 6, such as Gs-SOM, TSOM, and NFFT-SOM, to reconstruct O, and the details will not be repeated in this section. It is worth discussing the choice of truncation number P. The number of unknowns in the EFIE model is the number of subscatterers (M), while the number of unknowns in the T-matrix model is the number of subscatterers multiplied by 2P + 1. Under the fine meshing assumption (k0 R ≪ 1), the second and above orders can be dropped off since they are much smaller than the zeroth and first orders. The small-term asymptotic approximations for the zeroth and first order of T-matrices for both dielectric and PEC subscatterers are summarized in Table 7.1. We see that the monopole element is the leading term in T-matrices for either PEC or dielectric scatterers. That is, M = 0 is sufficient to represent the scattering effects of either dielectric or PEC subscatterers. However, the dipole element in the T-matrix for PEC subscatterer is on the same order of k0 R as the monopole element for a dielectric subscatterer. Therefore, when PEC and dielectric scatterers are simultaneously present, M = 1 should be chosen as the minimum truncation number of multipoles, so as to accurately represent the scattering effects of both PEC and dielectric scatterers. It is worth mentioning that because of the property of symmetry, the two dipole elements [T]1 and [T]−1 are equal to each other. Thus the number of unknowns in O is reduced by one third. Next, the classification criterion of differentiating PEC from dielectric subscatterers is discussed. After O is retrieved by the optimization process, the retrieved T-matrix T m for the mth cell, m = 1, 2, … , M, includes the dipole elements [T]±1 and the monopole element [T]0 . We examine the property of the monopole element [T]0 to determine whether the subscatterer is made of PEC or dielectric material. For dielectric scatterers, we assume that the real part of relative permittivity ℜ(𝜖r ) ≥ 1, which is true for most dielectric materials. From Table 7.1, we conclude that the imaginary part of [T]0 for dielectric scatterer is positive. For PEC scatterers, the formula of [T]0 shown in Table 7.1 shows Table 7.1 The small-term (k0 R) asymptotic expansions of T0 and T1 for both PEC and dielectric small circular scatterers. Source: Ye 2013, IEEE Trans. Antennas Propag., 61, 3774–3781. [35] Reproduced with permission of IEEE. Material T0 PEC i𝜋 2 ln(k0 R) Dielectric i𝜋(k0 R)2 (𝜖r 4 T1 − − 1) i𝜋(k0 R)2 4 i𝜋(k0 R)4 (𝜖r 32 − 1) 199 200 Electromagnetic Inverse Scattering that the imaginary part of [T]0 is negative since k0 R ≪ 1. Therefore, PEC and dielectric scatterers can be distinguished by the sign of the imaginary part of [T]0 . For those subscatterers identified as dielectric scatterers, the relative permittivity can be retrieved due to the fact that it is in a linear relationship with the retrieved [T]0 under small term assumption, 4i[T]0 (7.28) 𝜖r = 1 − 𝜋(k0 R)2 For PEC scatterers, (7.28) has no physical meaning, but it can serve as a mathematical indictor since the real part of 𝜖r evaluated in (7.28) is much less than zero. In summary, a convenient way to realize both differentiating PEC from dielectric scatterers and retrieving the relative permittivities of dielectric scatterers is to calculate 𝜖r from (7.28) and classify subscatterers with negative real part of 𝜖r as PEC. The advantage of the proposed method is that it works well no matter the dielectric scatterer is lossy or not. We present two numerical examples to demonstrate the performance of the T-matrix inversion model. A total number of 10 plane wave incidences come from angles evenly distributed in [0, 2𝜋), and 10 receiving antennas are evenly distributed in a circle with a radius 5𝜆 that shares the center with the DOI D, then 10% white Gaussian noise is added. The inversion model adopted here is the standard Gs-SOM, in the framework of the state equation (7.26) and the data equation (7.27). In the first numerical example, as shown in Fig. 7.4(a), a small square PEC scatterer is placed on the upper right corner of D, and the dielectric ring with 𝜖r = 4 is placed in the lower left corner. The domain D is a square of size 𝜆 × 𝜆, which is discretized into 45 × 45 square cells. The ring has an outer radius 0.25𝜆 and an inner radius 0.15𝜆. To visually distinguish PEC from dielectric scatterers, we use 𝜖r = 0 to mark the shape and location of PEC scatterers. The reconstruction result displayed in Fig. 7.4(b) shows that both the dielectric ring and PEC square are correctly identified. In addition, the hole of the ring is clearly seen. In the second numerical example, as shown in Fig. 7.5(a) and (b), two circular scatterers with radius 0.1𝜆 are placed inside the domain D. The PEC circular 4 –0.5 4 –0.5 2 0 0 2 0 0 –2 0.5 –0.5 0 (a) 0.5 –4 –2 0.5 –0.5 0 (b) 0.5 –4 Figure 7.4 A ring dielectric scatterer and a square PEC scatterer: (a) original pattern and (b) reconstructed pattern. Source: Ye 2013, IEEE Trans. Antennas Propag., 61, 3774–3781. [35] Reproduced with permission of IEEE. Reconstructing Perfect Electric Conductors –0.2 0 0.2 –0.5 0 (a) 0.5 –0.2 0 0.2 –0.5 0 (c) 0.5 6 4 2 0 –2 6 4 2 0 –2 –0.2 0 0.2 –0.5 0 (b) 0.5 –0.2 0 0.2 –0.5 0 (d) 0.5 6 4 2 0 –2 6 4 2 0 –2 Figure 7.5 Two circular scatterers: One PEC scatterer and one lossy dielectric scatterer. (a) Original pattern of the real part of 𝜖r . (b) Original pattern of the imaginary part of 𝜖r . (c) Reconstructed pattern of the real part of 𝜖r . (d) Reconstructed pattern of the imaginary part of 𝜖r . Source: Ye 2013, IEEE Trans. Antennas Propag., 61, 3774–3781. [35] Reproduced with permission of IEEE. Figure 7.6 Configuration of the scatterers that are used in the data set “FoamMetExt,” which is the experimental data collected by the Institut Fresnel. Adapted from: Geffrin 2005, Inverse Problems, 21, S117, IOP Publishing. [36] y 54.25mm 150mm scatterer is on the right side and is marked as 𝜖r = 0 for visual purpose. The dielectric circular scatterer is a lossy one with 𝜖r = 4 + 6i and is placed on the left-hand side. The original patterns for real and imaginary parts of relative permittivity are depicted in Fig. 7.5(a) and (b), respectively. The DOI D is of size 𝜆 × 0.5𝜆 and is discretized into 60 × 30 square cells. From the reconstructed patterns shown in Fig. 7.5(c) and (d), we observe that both the lossy dielectric scatterer and PEC object are clearly identified, with the PEC on the right and dielectric on the left. The numerical example shows that the T-matrix method can differentiate lossy dielectric scatterer from PEC scatterer. In the last example, in order to verify the validity of T-matrix method for experimental data, we adopt the experimental data collected by the Institut Fresnel. The details of the experimental configuration can be found in [36]. Here the data set “FoamMetExt” is tested, where a metal and a foam are simultaneously present in the domain of interest. The configuration is a two-dimensional x 150mm 201 202 Electromagnetic Inverse Scattering –0.05 1 0 0 –1 0.05 –0.05 0 (a) 0.05 –0.05 0 –1 0.05 –0.05 0 (d) 0.05 –2 1 0 0 –1 0.05 –2 1 0 –0.05 –0.05 0 (b) 0.05 –0.05 0 –1 0.05 –0.05 0 (e) 0.05 –2 1 0 0 –1 0.05 –2 1 0 –0.05 –0.05 0 (c) 0.05 –0.05 –2 1 0 0 –1 0.05 –0.05 0 (f) 0.05 –2 Figure 7.7 Frequency-hopping reconstruction at 2–12 GHz using the T-matrix Gs-SOM for the “FoamMetExt” experimental data. Real part of relative permittivity: (a) 2 GHz, (b) 4 GHz, (c) 6 GHz, (d) 8 GHz, (e) 10 GHz, and (f ) 12 GHz. Source: Ye 2013, IEEE Trans. Antennas Propag., 61, 3774–3781. [35] Reproduced with permission of IEEE. TM problem. As depicted in Fig. 7.6, the DOI is of size 150 × 150 mm2 . A foam cylinder with a diameter 80 mm and 𝜖r = 1.45 ± 0.15 is centered at the origin, and a copper tube with a diameter 28.5 mm is located in touch with the foam. The data are collected at multiple frequencies. We solve the inverse problem by using the frequency hopping within the range of 2–12 GHz in steps of 2 GHz. That is, the reconstruction result obtained at a frequency is used as the initial guess for the inversion at the next higher frequency. The DOI is discretized into a grid of 45 × 45 cells. The reconstruction results are shown in Fig. 7.7, where the unit of length is meters (m). We see that the result is quite satisfactory. The PEC and dielectric scatterers are clearly seen in Fig. 7.7(f ), which is obtained for the highest frequency. 7.5 Discussions Several experimental test databases are available to test the performance of inversion algorithms for the shape reconstruction of highly conducting scatterers. Note that perfect electric conductor is defined as the limiting case of highly conducting scatterers. The Institut Fresnel database introduced in Section 7.4 has been used to test several inversion algorithms [37]. In [38], measured data are collected in a controlled environment in the Second University of Naples and are used to test the performance of an inversion algorithm that is based on the Kirchhoff approximation. In addition, many real-world applications need to detect highly conducting scatterers. For example, [39] Reconstructing Perfect Electric Conductors presents nondestructive testing of concrete with electromagnetic waves, where the tendon duct and the reinforcement grid are both modeled with infinite electrical conductivity embedded in homogeneous cement. Reference [40] demonstrates the disbond detection in strengthened concrete bridge members retrofitted with composite laminates, which contain carbon that is highly conductive at microwave frequencies. For 2D TM inverse scattering problems involving PEC scatterers, if just a closed-contour scatterer is present; that is, there is no line-shape scatterer, then the model that treats PEC as a dielectric scatterer with a high imaginary part of relative permittivity is preferable to the line-element model. The former has only about half of the unknowns of the latter. Numerical simulations also show that the former performs more robust than the latter does in presence of noise. The problem of reconstructing PEC scatterers is closely related to that of reconstructing piecewise-constant dielectric scatterers. When the relative permittivity of homogeneous dielectric scatterer is known a priori, the ISP problem reduces to a boundary identification problem, which is analogous to the PEC reconstruction problem [41–44]. The only difference between these two boundary identification problems is the boundary condition. For mixed boundary condition ISPs, compared with the model that treats PEC as a dielectric scatterer with high imaginary part of relative permittivity, the T-matrix formula has a better ability to distinguish PEC from dielectric scatterers, but has the weakness of involving much more unknowns since one cell correspond to several multipole coefficients. We mention in passing that the T-matrix formula has been applied to ISPs involving only one type scatterer, that is, PEC or dielectric scatterer alone: PEC scatterers for the 2D TM incidence [21], dielectric scatterers for the 2D TE incidence [45], and the 3D case [46]. The ISPs that reconstruct a mixture of PEC and dielectric scatterers address mixed boundary conditions; that is, the Dirichlet boundary and transmission boundary. The T-matrix formula presented in Section 7.4 can be generalized, under some mild assumption, to simultaneously reconstruct scatterers with different boundary conditions such as Dirichlet, Neumann, Robin, and transmission boundaries without a priori information on their locations, shapes, or physical properties [47]. For scatterers with a mixture of Dirichlet boundary and impedance boundary, theories and reconstruction algorithms can be found in [48, 49]. References 1 Lax, P. and Phillips, R. (1967) Scattering theory, Academic Press. 2 Cheng, J. and Yamamoto, M. (2003) Uniqueness in an inverse scatter- ing problem within non-trapping polygonal obstacles with at most two incoming waves. Inverse Probl., 19 (6), 1361. 203 204 Electromagnetic Inverse Scattering 3 Liu, H. and Zou, J. (2006) Uniqueness in an inverse acoustic obstacle 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 scattering problem for both sound-hard and sound-soft polyhedral scatterers. Inverse Probl., 22 (2), 515. Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scattering theory (2nd Edn), Springer-Verlag, Berlin, Germanys. Liu, H., Yamamoto, M., and Zou, J. (2007) Reflection principle for the Maxwell equations and its application to inverse electromagnetic scattering. Inverse Probl., 23 (6), 2357. Isakov, V. (1992) Stability estimates for obstacles in inverse scattering. J. Comput. Appl. Math., 42 (1), 79–88. Isakov, V. (1993) New stability results for soft obstacles in inverse scattering. Inverse Probl., 9 (5), 535. Potthast, R. (2000) Stability estimates and reconstructions in inverse acoustic scattering using singular sources. J. Comput. Appl. Math., 114 (2), 247–274. Chiu, C.C. and Liu, P.T. (1996) Image reconstruction of a perfectly conducting cylinder by the genetic algorithm. IEE Proceedings – Microwaves, Antennas and Propagation, 143, 249–253. Qing, A. (2003) Electromagnetic inverse scattering of multiple two-dimensional perfectly conducting objects by the differential evolution strategy. IEEE Transactions on Antennas and Propagation, 51 (6), 1251–1262. Roger, A. (1981) Newton–Kantorovitch algorithm applied to an electromagnetic inverse problem. IEEE Transactions on Antennas and Propagation, 29 (2), 232–238. Colton, D. and Kress, R. (2006) Using fundamental solutions in inverse scattering. Inverse Probl., 22 (3), R49. Kirsch, A. and Kress, R. (1988) Two methods for solving the inverse acoustic scattering problem. Inverse Probl., 4 (3), 749. Colton, D. and Monk, P. (1985) A novel method for solving the inverse scattering problem for time-harmonic acoustic waves in the resonance region. SIAM J. Applied Math., 45 (6), 1039–1053. Colton, D. and Monk, P. (1986) A novel method for solving the inverse scattering problem for time-harmonic acoustic waves in the resonance region ii. SIAM J. Applied Math., 46 (3), 506–523. Kirsch, A. and Kress, R. (1986) On an integral equation of the first kind in inverse acoustic scattering, Birkhäuser Basel, Basel, pp. 93–102. Colton, D. and Kirsch, A. (1996) A simple method for solving inverse scattering problems in the resonance region. Inverse Probl., 12 (4), 383. Schmidt, R.O. (1986) Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag., 34, 276–280. Kirsch, A. (1998) Characterization of the shape of a scattering obstacle using the spectral data of the far field operator. Inverse Probl., 14 (6), 1489. Reconstructing Perfect Electric Conductors 20 Chew, W.C. and Otto, G.P. (1992) Microwave imaging of multiple 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 conducting cylinders using local shape functions. IEEE Microwave and Guided Wave Letters, 2 (7), 284–286. Otto, G.P. and Chew, W.C. (1994) Microwave inverse scattering – local shape function imaging for improved resolution of strong scatterers. IEEE Transactions on Microwave Theory and Techniques, 42 (1), 137–141. Takenaka, T., Meng, Z.Q., Tanaka, T., and Chew, W.C. (1997) Local shape function combined with genetic algorithm applied to inverse scattering for strips. Microwave Optical Technol. Lett., 16 (6), 337–341. Kleinman, R.E. and van den Berg, P.M. (1994) Two-dimensional location and shape reconstruction. Radio Sci., 29 (4), 1157–1169. Osher, S. and Sethian, J.A. (1988) Fronts propagating with curvature-dependent speed: Algorithms based on Hamilton-Jacobi formulations. J. Comput. Phys., 79 (1), 12–49. Santosa, F. (1996) A level-set approach for inverse problems involving obstacles. ESAIM: Contr. Op. Ca. Va., 1, 17–33. Dorn, O. and Lesselier, D. (2006) Level set methods for inverse scattering. Inverse Probl., 22 (4), R67. Ye, X., Chen, X., Zhong, Y., and Agarwal, K. (2010) Subspace-based optimization method for reconstructing perfectly electric conductors. Prog. Electromagn. Res., 100, 119–128. Ye, X., Zhong, Y., and Chen, X. (2011) Reconstructing perfectly electric conductors by the subspace-based optimization method with continuous variables. Inverse Probl., 27 (5), 055 011. Peterson, A.F., Ray, S.L., and Mittra, R. (1998) Computational methods for electromagnetics, IEEE Press, New York. Kirsch, A. and Liu, X. (2013) Direct and inverse acoustic scattering by a mixed-type scatterer. Inverse Probl., 29 (6), 065 005. Féron, O., Duchêne, B., and Mohammad-Djafari, A. (2005) Microwave imaging of inhomogeneous objects made of a finite number of dielectric and conductive materials from experimental data. Inverse Probl., 21 (6), S95. Crocco, L., D’Urso, M., and Isernia, T. (2005) Testing the contrast source extended Born inversion method against real data: the tm case. Inverse Probl., 21 (6), S33. Waterman, P.C. (1965) Matrix formulation of electromagnetic scattering. Proceedings of the IEEE, 53 (8), 805–812. Chew, W.C. (1995) Waves and fields in inhomogeneous media, IEEE Press. Ye, X., Chen, X., Zhong, Y., and Song, R. (2013) Simultaneous reconstruction of dielectric and perfectly conducting scatterers via T-matrix method. IEEE Transactions on Antennas and Propagation, 61 (7), 3774–3781. Geffrin, J.M., Sabouroux, P., and Eyraud, C. (2005) Free space experimental scattering database continuation: experimental set-up and measurement precision. Inverse Probl., 21 (6), S117. 205 206 Electromagnetic Inverse Scattering 37 Belkebir, K. and Saillard, M. (2005) Testing inversion algorithms against experimental data: inhomogeneous targets. Inverse Probl., 21 (6), S1–S3. 38 Soldovieri, F., Brancaccio, A., Leone, G., and Pierri, R. (2005) Shape recon- 39 40 41 42 43 44 45 46 47 48 49 50 struction of perfectly conducting objects by multiview experimental data. IEEE Transactions on Geoscience and Remote Sensing, 43 (1), 65–71. Langenberg, K.J., Mayer, K., and Marklein, R. (2006) Nondestructive testing of concrete with electromagnetic and elastic waves: Modeling and imaging. Cement & Concrete Comps., 28, 370–383. Kharkovsky, S. and Zoughi, R. (2007) Microwave and millimeter wave nondestructive testing and evaluation. IEEE Instrumentation & Measurement Magazine, 10, 26–38. Litman, A., Lesselier, D., and Santosa, F. (1998) Reconstruction of a two-dimensional binary obstacle by controlled evolution of a level-set. Inverse Probl., 14 (3), 685. Abubakar, A. and van den Berg, P.M. (2002) The contrast source inversion method for location and shape reconstructions. Inverse Probl., 18, 495–510. Dorn, O., Miller, E.L., and Rappaport, C.M. (2000) A shape reconstruction method for electromagnetic tomography using adjoint fields and level sets. Inverse Probl., 16 (5), 1119. Belkebir, K., Kleinman, R.E., and Pichot, C. (1997) Microwave imaging-location and shape reconstruction from multifrequency scattering data. IEEE Transactions on Microwave Theory and Techniques, 45 (4), 469–476. Otto, G.P. and Chew, W.C. (1994) Inverse scattering of Hz waves using local shape-function imaging: A T-matrix formulation. Int. J. Imaging Syst. Technol., 5 (1), 22–27. Lin, J.H. and Chew, W.C. (1997) Solution of the three-dimensional electromagnetic inverse problem by the local shape function and the conjugate gradient fast fourier transform methods. J. Opt. Soc. Am. A, 14 (11), 3037–3045. Song, R., Ye, X., and Chen, X. (2015) Reconstruction of scatterers with four different boundary conditions by T-matrix method. Inverse Probl. Sci. Engin., 23 (4), 601–616. Liu, J.J., Nakamura, G., and Sini, M. (2007) Reconstruction of the shape and surface impedance from acoustic scattering data for an arbitrary cylinder. SIAM J. Applied Math., 67 (4), 1124–1146. Cakoni, F., Colton, D., and Monk, P. (2001) The direct and inverse scattering problems for partially coated obstacles. Inverse Probl., 17 (6), 1997. Shen, J., Zhong, Y., Chen, X., and Ran, L. (2013) Inverse scattering problems of reconstructing perfectly electric conductors with TE illumination, IEEE Trans. Antennas Propag., 61 (9), 4713–4721. 207 8 Inversion for Phaseless Data This chapter deals with inverse scattering problems where the phase information of electromagnetic field is not available. It is generally known that the accuracy of phase measurements cannot be guaranteed for operating frequencies approaching the millimeter-wave band and beyond. An accurate knowledge of the phase distribution involves sophisticated measurement equipment, which is increasingly expensive as the working frequency grows, so phaseless measurements are often necessary at millimeter-wave band and beyond, and actually mandatory at optical frequencies. In this case, it is important to develop inversion algorithms to solve phaseless inverse scattering problems. The organization of the chapter is as follows. Section 8.1 outlines the basic properties of phaseless ISPs and the main approaches to solving them. Section 8.2 reconstructs point-like scatterers by subspace methods, which is a generalization of the subspace method introduced in Chapter 4. Section 8.3 reconstructs point-like scatterers by compressive sensing, which simultaneously locates scatterers and determines their scattering strengths. Section 8.4 reconstructs extended dielectric scatterers, which is far more difficult than its phase-available counterpart presented in Chapter 6. 8.1 Introduction When the working frequency is high, it requires sophisticated and expensive measurement equipment to obtain the phase information. Instead, solving inverse scattering problems with intensity-only data should lead to simpler and cost-effective experimental setups. In other words, the complexity and cost have been shifted from hardware to algorithms. Thus, it is important to develop inversion models and algorithms for phaseless inverse scattering problems. We first look at the uniqueness of the phaseless ISPs. For plane wave incidences and far field measurements, no results on uniqueness are available since the modulus of the far-field pattern is invariant under translations [1]. Indeed, Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 208 Electromagnetic Inverse Scattering for plane wave incidences, a translation of scatterer leads to only a phase shift in far-zone scattered field. For point source incidences, however, results on uniqueness have been established in [2, 3] for the inverse scattering problem of determining a nonnegative real-valued potential of a finite-size scatterer from the phaseless near-field data corresponding to all incident point sources placed on a surface enclosing the scatterer for all wave numbers in a finite interval. Next, regarding stability, it is obvious that the phaseless reconstruction is far more ill-posed than the phase-available reconstruction, the stability estimate of which is of a logarithmic type as presented in Chapter 6, since a measured signal contains less information. Reference [4] has made some progress in stability analysis of phaseless reconstruction. It is worth mentioning that the actual quantity measured in scattering problems is the total field, instead of the scattered field, in most applications. Unlike the usual phase-available measurement, where the scattered field is easily obtained by subtracting the incident wave from the measured total field, the phaseless measurement cannot yield a modulus square of the scattered field by subtracting the modulus square of the incident field from the measured modulus square of the total field. In only a few special cases can the modulus of the scattered field be directly measured. For example, when the incident wave is a highly spatially confined beam and the measurements are made at an appreciable distance from the incidence beam. Most of existing phaseless inversion algorithms utilize the modulus (or its square) of scattered field, such as [5–7], and only a small fraction of papers utilize the modulus (or its square) of the total field [8–10]. There are several methods for solving ISPs with phaseless data [7, 8, 11–13], and they are essentially categorized into two conceptual approaches. The first approach splits the problem into two steps [5, 8]. The first step consists of estimating the phase of scattered field from the measurement of modulus (or its square) of electric field, while the second step reconstructs the unknown dielectric properties from the full-data scattered field. In summary, the first step allows us to estimate the unknown dielectric properties from the second step, where the second step is a traditional inverse scattering problem. The second approach is a single step where the unknown dielectric properties are directly reconstructed by solving a nonlinear optimization problem where the objective function is defined as the residual between the measured modulus data and the computed modulus data [6, 9, 12, 14]. In the first approach, phase retrieval (PR) can be realized by two techniques. The first is the traditional phase retrieval technique that reconstructs the complex-valued field in the spatial domain or, equivalently, the phase in the spatial frequency domain from the knowledge of the absolute value of its spatial Fourier transform and certain constraints in the spatial domain [15–18]. This reconstruction problem has a long history and arises in many areas of engineering and applied physics, such as optics, X-ray crystallography, astronomical Inversion for Phaseless Data imaging, and transmission electron microscopy. It is also an important question in mathematical society, where both uniqueness theorems and computational algorithms are provided. The traditional PR is obviously applicable to only far-field measurement. The second PR technique does not require far-field measurement, but instead measures richer information on the absolute value of the field in the spatial domain and reconstructs the phase based on the fact that the phase is implicitly constrained by electromagnetic propagation theory. This technique includes phase shift or time delay interferometry, two-probe scanning, and measuring the field amplitude across two parallel planes [19]. The performances of the two-step approach is compared with the single-step approach in [5, 14], and it has been found that the former outperforms the latter, since the separation of the problem into two steps allows better control of the overall nonlinearity with respect to single-step procedures. On the other hand, it is important to note that the two-step approach can be actually applied when only some conditions on the measurement setup are satisfied. When these conditions do not hold true, the measurement data do not provide enough independent data to accurately pursue phase retrieval. Consequently, the error in phase occurring in the first step will propagate to the second step. In this case, the single-step approach has to be preferable. This chapter deals with the phaseless ISPs that do not require stringent measurement conditions. For example, measurement can be conducted in both near or far zones, and measurement does not have to be very dense in the spatial domain to ensure a reliable phase retrieval. Thus, the single-step approach will be adopted. Section 8.2 reconstructs point-like scatterers from the modulus of the scattered field, Section 8.3 reconstructs point-like scatterers from the modulus of the total field, and Section 8.4 reconstructs extended scatterers from the modulus of the total field. 8.2 Reconstructing Point-Like Scatterers by Subspace Methods For point-like scatterers, that is, the sizes of scatterers are much smaller than the wavelength, as presented in Chapter 4, the subspace method can be used to locate the positions of scatterers and to noniteratively retrieve the polarization tensors of scatterers when both the intensity and phase of the scattered field are measured. For phaseless data, although the mapping from the induced sources to the intensities of scattered fields is nonlinear, a new set of bases can be constructed that are mapped linearly to the intensity-only scattering data. This linear map makes it possible to apply the subspace methods to solve phaseless ISPs involving point-like scatterers. The configuration of the scattering problem is first introduced. Suppose there are M three-dimensional objects illuminated by time-harmonic 209 210 Electromagnetic Inverse Scattering electromagnetic waves radiated by an array of Ni antenna units. The transmitting antenna units are located at ri1 , ri2 , … , riN , each of which consists i of three small electric dipole antennas oriented in the x, y, and z directions. For each incidence, the intensities of scattered electric field are measured by an array of Ns antenna units that have the same configuration as the transmitting antennas and their locations are rs1 , rs2 , … , rsN . The size of each s of the M objects is much smaller than the wavelength so that they can be effectively treated as point-like targets. These scatterers can be of any shape and material, but we consider only anisotropic spherical objects for ease of presentation. The centers of the scatterers are located at r1 , r2 , … , rM . As introduced in Section 4.4.1, the polarization tenor 𝜉 m (𝜁 m ), relates the induced electric (magnetic) current dipole Il(rm ) (Kl(rm )) inside the object to the total in in incident electric field Ein t (rm ) (magnetic field Ht (rm )) by Il(rm ) = 𝜉 m ⋅ Et (rm ) (and Kl(rm ) = 𝜁 m ⋅ Hin t (rm )), m = 1, 2, … , M. The analytical expression of 𝜉 m (𝜁 m ) for anisotropic spheres can be found in Section 2.8.1. 8.2.1 Converting a Nonlinear Problem to a Linear One Before deriving the intensity of scattered field, it is important to examine the relationship between scattered electric fields and induced sources. The dyadic Green’s functions corresponding to electric and magnetic dipoles are given by G0 (r, r′ ) = [(G0 (r, r′ ))x , (G0 (r, r′ ))y , (G0 (r, r′ ))z ] (8.1) and −∇ × G0 (r, r′ ) = −[(∇ × G0 (r, r′ ))x , (∇ × G0 (r, r′ ))y , (∇ × G0 (r, r′ ))z ] (8.2) ′ respectively. The closed-form elements of the 3 × 3 matrix G0 (r, r ) is provided in (2.40), which is repeated here, ) ( )] [( Ru R𝑣 3i i 1 3 ′ ′ Gu𝑣 (r, r ) = g(r, r ) 1 + 𝛿u,𝑣 − 2 1+ − − k0 R k02 R2 R k0 R k02 R2 (8.3) ik0 |r−r′ | where u, 𝑣 = 1, 2, 3, R = r − r , R = |R|, and g(r, r ) = e ∕(4𝜋|r − r |) is the scalar Green’s function. The closed-form elements of the 3 × 3 matrix ∇ × G0 (r, r′ ) is provided in (2.42), which is repeated here, ( ) 0 −(z − z′ ) (y − y′ ) ⎤ ⎡ ik0 1 ′ ′ ⎢ 0 −(x − x′ ) ⎥ g(r, r′ ) ∇ × G(r, r ) = (z − z ) − 2 ⎥ ⎢ R R ′ ′ 0 ⎦ ⎣ −(y − y ) (x − x ) (8.4) ′ ′ ′ For a certain incidence, denote the induced electric and magnetic current dipoles inside the mth scatterer as [Ilx (rm ), Ily (rm ), Ilz (rm )]T and Inversion for Phaseless Data [Klx (rm ), Kly (rm ), Klz (rm )]T , respectively, where the superscript T denotes the transpose. For m = 1, 2, … , M, L = E, M, and l = x, y, z, define { if L = E ik0 (G0 (r, rm ))l (8.5) G(m,L,l) (r) = −(∇ × G0 (r, rm ))l if L = M, { 𝜂0 Ill (rm ) if L = E Q(m, L, l) = (8.6) if L = M, Kll (rm ) where k0 is the wavenumber and 𝜂0 is the impedance of the background medium. Define the index s of the dipole source (m, L, l), which runs from 1 to 6M, so that it sorts all possible combinations of m, L, and l. The dipole source with a smaller value of m has a lower index. For a given m, the electric dipole source (L = E) has a lower index than the magnetic source (L = M). For a given m and L, the x-oriented source (l = x) has the lowest index and the z-oriented source (l = z) has the highest. It is easy to find that the scattered electric field is given by s E (r) = 6M ∑ (8.7) Gs (r)Q(s). s=1 By dropping off the (r), we define a 3Ns × 1 vector Gs = [Gs (rs1 )T , Gs (rs2 )T , … , s Gs (rsN )T ]T . The 3Ns × 1 vector E is defined similarly. The definition of vector s G(r, L, l) is similar to that of Gs except that the position of the source is located at r. Now we are in a position to define the vector of intensity of scattered field, s s I = (E )∗ ∘E , where ∘ denotes the Hadamard product (or Schur product) that is an element-wise product. The superscript * denotes a complex conjugate. The intensity vector I is expanded as I= 6M ∑ ∑ Q(s1 , s2 , 1)U (s1 ,s2 ) + s1 =1 s2 ≥s1 6M ∑ ∑ U V (s1 ,s2 ) = = ∗ [G(m1 ,L1 ,l1 ) ∘ ∗ [G(m1 ,L1 ,l1 ) ∘ (s1 ,s2 ) , (8.8) s1 =1 s2 >s1 where the 3Ns × 1 propagator vectors U (s1 ,s2 ) Q(s1 , s2 , 2)V G(m2 ,L2 ,l2 ) ] (s1 ,s2 ) and V (s1 ,s2 ) are defined by (8.9) (8.10) G(m2 ,L2 ,l2 ) ] , where (⋅) and (⋅) denotes the real part and imaginary part operators, respectively. The scalar Q(s1 , s2 , j) is defined as { ) ( j=1 2Q (s1 , s2 ) 1 − 12 𝛿s1 ,s2 Q(s1 , s2 , j) = (8.11) −2Q (s1 , s2 ) j = 2, where 𝛿s1 ,s2 = 1 when s1 = s2 and is 0 otherwise, and Q(s1 , s2 ) = Q∗ (s1 )Q(s2 ). (8.12) 211 212 Electromagnetic Inverse Scattering Using the subscript p to denote the pth incidence, we obtain the 3Ns × 3Ni MSR matrix K = [I 1 , I 2 , … , I 3Ni ]. It can be seen from Eq. (8.8) that the range of (s ,s ) (s ,s ) K is the span of a set of bases U 1 2 and V 1 2 . It is important to note that Eq. (8.8) provides a linear mapping under these bases. 8.2.2 Rank of the Multistatic Response Matrix When applying the subspace method, it is important to determine the rank of the MSR matrix. Equation (8.8) shows that the rank of the MSR matrix K is at most (6M)2 . However, due to the polarization of electromagnetic fields, the rank of the MSR matrix is less than (6M)2 . The first case happens when more than one magnetic dipoles are induced within a scatterer. From the expression, 0 ⎤ | 1 dg |2 ⎡ ⎥, | ⎢ 0 (∇ × G0 )∗x ∘(∇ × G0 )y = || | | R dR | ⎢⎣ −(x − x′ )(y − y′ ) ⎥⎦ (8.13) we conclude that (∇ × G0 )∗x ∘(∇ × G0 )y is purely real, so as (∇ × G0 )∗x ∘(∇ × G0 )z and (∇ × G0 )∗y ∘(∇ × G0 )z . The second case happens when three electric dipoles and three magnetic dipoles are induced within a scatterer. The expression (G0 )∗x ∘(∇ × G0 )x = where 𝜗(R) = 1 d2 g ∗ ( R3 dR2 − 0 ⎤ ⎡ i 𝜗(R) ⎢ (x − x′ )(y − y′ )(z − z′ ) ⎥ , ⎢ k0 ′ ′ ′ ⎥ ⎣ −(x − x )(y − y )(z − z ) ⎦ 1 dg ∗ dg ) , R dR dR (8.14) indicates that (G0 )∗x ∘(∇ × G0 )x + (G0 )∗y ∘(∇ × G0 )y + (G0 )∗z ∘(∇ × G0 )z = 0 (8.15) Thus, (G0 )∗x ∘(∇ × G0 )x , (G0 )∗y ∘(∇ × G0 )y , and (G0 )∗z ∘(∇ × G0 )z are linearly dependent. Considering the above two cases, we obtain the rank of K to be rK = 𝛼 2 − 𝛽 − 3𝛾 − 5𝜏, (8.16) where 𝛼 is the total number of induced dipole components, 𝛽 is the number of scatterers in which two components of magnetic dipoles are induced, 𝛾 denotes the number of scatterers in which three components of magnetic dipoles are induced but less than three components of electric dipoles are induced, and 𝜏 represents the number of scatterers in which three electric dipoles and three magnetic dipoles are induced. The rank given by (8.16) has been tested by many numerical simulations and all of simulation results agree with Eq. (8.16). Here, two numerical examples are shown to support the validity of it. The arrays of transmitting and receiving antennas are chosen to be coincident, and they are located on a spherical surface centered at the origin, with radius of one wavelength (𝜆). In a spherical coordinate system, the angles of antennas are given by 𝜃 = (𝜋∕2)j∕N𝜃 , j = 1, 2, … , N𝜃 and 𝜙 = 2𝜋k∕N𝜙 , k = 1, 2, … , N𝜙 . In the following two numerical simulations, N𝜃 and N𝜙 are chosen to be 5 and 10, respectively. 5 5 0 0 −5 #73 −10 −15 0 50 100 Singular value number, j (a) log10(σj) log10(σj) Inversion for Phaseless Data −5 #77 −10 150 −15 0 50 100 Singular value number, j (b) 150 Figure 8.1 Singular values of the MSR matrix in the first (a) and the second (b) example. Source: Chen 2008, J. Opt. Soc. Am. A, 25, 2018–2024. [21] Reproduced with permission of The Optical Society. Two spheres with radius 𝜆∕30 are located at [0.2𝜆, 0.1𝜆, 0.1𝜆]T and [−0.3𝜆, −0.1𝜆, −0.2𝜆]T , respectively. In the first example, the permittivity and permeability tensors are given by 𝜖 1 = 5𝜖0 I 3 , 𝜇1 = 5𝜇0 I 3 , 𝜖 2 = 𝜖0 I 3 , 𝜇2 = 5𝜇0 I 3 , where I 3 is an identity matrix of dimension three. For these scatterers, 𝛼 = 9, 𝛽 = 0, 𝛾 = 1, and 𝜏 = 1. Equation (8.16) indicates that the rank rk is equal to 73. The numerical results of singular values of the MSR matrix K are shown Fig. 8.1(a). The figure shows that there are 73 dominant singular values and this agrees with Eq. (8.16). In the second example, 𝜖 1 = 5𝜖0 I 3 , 𝜇1 = diag{5𝜇0 , 5𝜇0 , 𝜇0 }, 𝜖 2 = diag{𝜖0 , 𝜖0 , 5𝜖0 }, 𝜇2 = 5𝜇0 I 3 . For these scatterers, 𝛼 = 9, 𝛽 = 1, 𝛾 = 1, and 𝜏 = 0. The rank rk is expected to be 77. The numerical results of singular values of the MSR matrix K are shown Fig. 8.1(b), where we see 77 dominant singular values, once again consistent with Eq. (8.16). 8.2.3 MUSIC Localization and Noniterative Retrieval (s ,s ) (s ,s ) Since the range of K is the span of a set of bases U 1 2 and V 1 2 , we can apply the Multiple Signal Classification (MUSIC) method to locate the positions, provided that the number of rows 3Ns and the number of columns 3Ni are both larger than the rank of K. However, the high rank of the MSR makes it difficult to distinguish the signal subspace from the noise subspace when the measurement is contaminated with noise. Thus, the MUSIC method is hardly practical in locating point-like scatterers for phaseless 3D electromagnetic ISPs. From the two numerical examples presented in Section 8.2.2, we see that the rank of the MSR matrix is too high already for just two scatterers. As additional examples, consider the following two most frequently encountered cases: two small isotropic nonmagnetic dielectric spherical scatterers lead to a rank rK = 36 (𝛼 = 6, 𝛽 = 𝛾 = 𝜏 = 0), and two small PEC spherical scatterers lead to a rank rK = 134 (𝛼 = 12, 𝛽 = 𝛾 = 0, 𝜏 = 2). All these data show that 213 214 Electromagnetic Inverse Scattering the rank of the MSR matrix for phaseless 3D electromagnetic ISPs is too high. In comparison, for phaseless 3D scalar-wave ISPs, MUSIC is a good candidate for locating a small number of point-like scatterers since the rank of the MSR matrix is the square of the number of scatterers. The first paper along this direction is given by [20], where the theoretical analysis, algorithms, and numerical simulations are provided. After obtaining the locations of point-like scatterers, the polarization tensors of scatterers can be obtained by a noniterative retrieval algorithm, though the problem is nonlinear when the multiple scattering effect is taken into account. The noniterative retrieval algorithm contains three steps. The first and third steps are similar to the two-step least-squares method presented in Sections 4.4.3 for the case of full data (both phase and intensity) of scattered field, whereas the second step, that is, determining the phase of induced current, is unique to intensity-only data retrieval. The details are a little bit complex and can be found in [21]. 8.3 Reconstructing Point-Like Scatterers by Compressive Sensing To apply the MUSIC method to locate the positions of point-like scatterers, the numbers of both incidences and receivers must be larger than the maximum possible number of independent bases; that is, the rank of MSR matrix. Thus, MUSIC is not applicable when the number of incidences is few, as encountered in many real-world applications. In these cases, compressed sensing is a good candidate for tackling ISPs involving point-like scatterers. 8.3.1 Introduction to Compressive Sensing The compressive sensing or compressed sensing (CS) is a signal processing technique that allows one to recover certain signals from far fewer samples than required by the Shannon–Nyquist sampling theorem. There are two conditions that the CS relies on. The first one is sparsity that pertains to the signal of interest, and the second one is incoherence that pertains to the sensing modality. While sparsity requires the signal of interest to be sparse in a proper basis, incoherence requires that the sampling/sensing waveforms have an extremely dense representation in the same basis [22]. This section briefly introduces the basic principle of CS. For mathematical details, readers are referred to the monograph [23]. The applications of CS in electromagnetics are reviewed in [24]. Consider a signal f ∈ ℝn and a linear measurement system records the data y = S ⋅ f ∈ ℝm , where S denotes the m × n sensing matrix. Let the signal f be Inversion for Phaseless Data sparse with respect to the basis Φ ∈ ℝn×n , so that it can be expressed as f = Φx. Then the abstract problem of recovering f ∈ ℝn from data y=A⋅x+𝜖 (8.17) is generally underdetermined when m ≪ n, where A = S ⋅ Φ ∈ ℝm×n is the sensing matrix with respect to the basis Φ and 𝜖 ∈ ℝm denotes the measurement noise. If we know that the solution to (8.17) is sparse in the sense that nonzero entries occupy only a small fraction, then under certain conditions the solution to the underdetermined linear system (8.17) can be obtained by solving the following constrained optimization problem min||x||𝓁0 subject to ||y − A ⋅ x||𝓁2 ≤ 𝜖 (8.18) where the 𝓁0 norm of a vector is the number of nonzero entries. Equation (8.18) is, however, an NP-hard (non-deterministic polynomial-time hard) problem, and consequently its solution is computationally intractable. Nevertheless, [25] and [26] have proven that under certain conditions on A, for example, satisfying the restricted isometry property (RIP), together with the sparsity of x, problem (8.18) is equivalent to the following problem, min||x||𝓁1 subject to ||y − A ⋅ x||𝓁2 ≤ 𝜖, (8.19) where 𝓁1 norm of a vector is the sum of the absolute values of its entries. Equation (8.19) is a convex problem, known as the second-order cone programming, for which efficient solution methods already exist [22]. A result that establishes CS as a practical and reliable sensing mechanism asserts that the solution to (8.19) is robust in presence of noise. The bound of the reconstruction error is given in [22] as a linear function of the noise level 𝜖. Then the original ill-conditioned linear problem is cast into a well-posed problem, provided that the two conditions, that is, sparsity and incoherence, are satisfied. The CS formulas (8.18) and (8.19) fall into the deterministic strategies and there is another important category of CS recovery algorithm, the Bayesian approach. The theory of Bayesian CS is presented in [27] and its application in solving ISPs can be found in [28]. 8.3.2 Solving Phase-Available Inverse Problems by CS When both the magnitude and phase of scattered field are available, many publications in both engineering and mathematical communities have applied CS to solve inverse scattering problems involving point-like scatterers. The first example is a single-incidence case where the multiple scattering effect is taken into account. In fact, a single-incidence inverse scattering problem is equivalent to an inverse source problem. The DOI can be discretized into Q points that are sufficiently dense such that all M point-like scatterers are located at those 215 216 Electromagnetic Inverse Scattering points. We use 𝜆 ∈ ℂQ , the vector of complex Q-tuples, to denote the amplitude of source at Q points. Since the amplitude of the source at points unoccupied by scatterers is zero, the vector 𝜆 is sparse due to M ≪ Q. The radiated field is measured at discrete positions r′1 , r′2 , … , r′N , where N ≪ Q. The single-incidence inverse scattering problem of determining the locations and amplitudes of induced sources consists of solving the following linear equation system, E(r′n ) = Q ∑ G(r′n , rq )𝜆q , n = 1, 2, … , N (8.20) q=1 where G(r′n , rq ) denotes the Green’s function and 𝜆q is the amplitude of induced source at the qth point. It is worth mentioning that multiple scattering effect has been taken into account here. Obviously (8.20) is a linear equation with a sparsity constraint. The second example is the multiple-incidence case under the Born approximation; that is, the effect of multiple scattering is neglected. In this case, a linear equation with a sparsity constraint can be established, where the unknowns are the scattering strengths of point-like scatterers. Before applying CS to solve these two underdetermined linear equations, we should first check the two conditions that CS relies on. While the sparsity of unknown vector is obvious for point-like scatterers, the incoherence of measurement, or equivalently the RIP condition of the sensing matrix A in (8.17) is, in practice, not straightforward. Reference [29] has provided an extensive analysis on this topic for inverse scattering problems. At the same time, it should be noted that publications of related problems largely take the compressed sensing theory for granted and assume, either explicitly or implicitly, either the incoherence or the RIP property without proof. For these two problems, [30] has concluded that in the absence of noise, CS theory recovers exactly the target of sparsity up to the dimension of the data. Stability with respect to noisy data is proved for weak or widely separated scatterers. Unlike the subspace methods presented in Section 8.2 where multiple incidences are mandatory and the solution of induced current is available only after the positions of scatterers have to be first determined by the MUSIC method, the compressed sensing approach requires only a single incidence and the positions of point-like scatterers are automatically identified as entries with nonzero amplitude. After introducing the application of CS to phase-available ISPs, we are in a position to discuss the application of CS to phaseless ISPs. 8.3.3 Solving Phaseless Inverse Problems by CS We consider a two-dimensional scattering problem (̂z is the longitudinal direction) under time-harmonic transverse magnetic (TM) electromagnetic wave illumination. The background medium is free space. Since it is a scalar wave problem, we will henceforth conveniently suppress the unit vector ẑ , wherever we refer to the electric field and the induced current. Inversion for Phaseless Data A total number of M point-like scatterers are embedded in a DOI D, which is discretized into a total number of Q cells, with the centers of the cells located at rn (n = 1, 2, · · · , Q), and the area and relative permittivity of the nth cell are denoted by An and 𝜖r (rn ), respectively. We assume each point-like scatterer just occupies a cell with good approximation. The contrast, denoted by 𝜒(rn ) (n = 1, 2, · · · , Q), is defined as { 𝜖r (rn ) − 1, if the cell is a point-like scatterer, 𝜒(rn ) = 0, otherwise. In our problem, we assume the point-like scatterers are made of lossless dielectric material, and consequently the value of contrast is a real number. Outside the DOI D, a total number of Ni transmitters (TX) are located at rip (p = 1, 2, · · · , Ni ), and a total number of Ns receivers (RX) are located at rsq (q = 1, 2, · · · , Ns ). The received field Erec (rsq , rip ) consists of two portions, Erec (rsq , rip ) = Ei (rsq , rip ) + Es (rsq , rip ), (8.21) where the first portion is the incident field directly coming from the TX, Ei (rsq , rip ), and the second portion represents the field scattered off the point-like scatterers, which is expressed by Es (rsq , rip ) = Q ∑ k02 ⋅ An ⋅ g(rsq , rn ) ⋅ Et (rn , rip ) ⋅ 𝜒(rn ). (8.22) n=1 where the total incident electric field onto the nth cell at rn satisfies the Foldy–Lax equation, Et (rn , rip ) = Ei (rn , rip ) + Q ∑ k02 ⋅ An′ ⋅ g(rn , rn′ ) ⋅ Et (rn′ , rip ) ⋅ 𝜒(rn′ ), (8.23) n′ =1 n′ ≠n Under the Born approximation, which is valid when point scatterers have weak contrasts or are sufficiently separated, (8.22) can be approximated by Es (rsq , rip ) ≈ Q ∑ k02 ⋅ An ⋅ g(rsq , rn ) ⋅ Ei (rn , rip ) ⋅ 𝜒(rn ) (8.24) n=1 qp For convenience, we introduce yn = k02 ⋅ An ⋅ g(rsq , rn ) ⋅ Ei (rn , rip ) to simplify the expression. In phaseless problem, the square of the modulus of the total received electric field F rec (rsq , rtp ) can be expressed by I(rsq , rip ) = Erec (rsq , rip )Erec (rsq , rip )∗ = Ei (rsq , rip )Ei (rsq , rip )∗ + Es (rsq , rip )Es (rsq , rip )∗ + 2Re{E i (rsq , rip )Es (rsq , rip )∗ } (8.25) 217 218 Electromagnetic Inverse Scattering where the notation Re(⋅) stands for the real-part operator. Since Ei (rsq , rip )Ei (rsq , rip )∗ is known, we treat I(rsq , rip ) − Ei (rsq , rip )Ei (rsq , rip )∗ as the measured data, denoted as y. Substitution with Eq. (8.24) yields y(rsq , rip ) = Q ∑ qp∗ 2Re{Ei (rsq , rip )yn } ⋅ 𝜒(rn ) n=1 + Q Q ∑ ∑ qp qp∗ yn′ ⋅ yn ⋅ 𝜒(rn′ ) ⋅ 𝜒(rn ) (8.26) n′ =1 n=1 For convenience of description, we simplify y(rsq , rip ) and 𝜒(rn ) to succinct notations yq,p and 𝜒n . The data y for all TX and RX pairs can be written as a column vector of length Ns Ni , y = [y1,1 , y2,1 , · · · , yNs ,1 , y1,2 , y2,2 , · · · , yNs ,2 , · · · , y1,Ni , y2,Ni , · · · , yNs ,Ni ]T The contrast information can be recast as a column vector of length Q in the form 𝜒 = [𝜒1 , 𝜒2 , · · · , 𝜒Q ]T . We also build a vector of length Q(Q + 1)∕2 to record the information of the products of contrast, which is written in a column vector as follows [31]. 𝜆 = [𝜒1 𝜒1 , 𝜒1 𝜒2 , 𝜒1 𝜒3 , 𝜒1 𝜒4 · · · , 𝜒1 𝜒Q , 𝜒2 𝜒2 , 𝜒2 𝜒3 , 𝜒2 𝜒4 , · · · , 𝜒2 𝜒Q , 𝜒3 𝜒3 , 𝜒3 𝜒4 , · · · , 𝜒3 𝜒Q , 𝜒4 𝜒4 , · · · , 𝜒4 𝜒Q , · · · , · · · , · · ·, 𝜒Q 𝜒Q ]T Combining 𝜒 and 𝜆, we define a vector x of length Q(Q + 1)∕2 + Q as follows: T x = [𝜒 T , 𝜆 ]T . Now Eq. (8.26) can be expressed in a compact form: y=A⋅x (8.27) where A is a [Ns Ni ] × [Q(Q + 1)∕2 + Q] matrix, whose elements can be determined by the coefficients in Eq. (8.26). Now the phaseless imaging problem is reduced to finding the contrast vector 𝜒 given y. 8.3.4 Applicability of CS We know from (8.27) and the definition of vector x that the problem of recovering 𝜒 from y is intrinsically nonlinear and therefore the framework of compressive sensing does not seem applicable to this problem. However, if we simply ignore the nonlinear relationship between 𝜒 and 𝜆 and treat each entry of x as Inversion for Phaseless Data an independent variable, then (8.27) can be regarded now as a linear equation. This idea provides the possibility of modeling the phaseless ISPs in the framework of compressive sensing. In order to evaluate the applicability of compressive sensing, we also examine the two principles on which the compressive sensing relies. These two principles are sparsity and incoherence. In this phaseless ISP, the unknown is represented by vector x. Since M of the Q cells are occupied by the point-like scatterers (M << Q), then the number of nonzero elements in vector x is M + M(M + 1)∕2, thus x can be regarded as a rather sparse signal, in view of the fact that the length of x is Q + Q(Q + 1)∕2. Regarding the incoherence condition, a closely relevant paper [32], where the received phaseless data is the square of the modulus of scattered field rather than total field, has proven that the sensing matrix satisfies the RIP condition under certain conditions; that is, the CS recovers the locations and the contrasts of the scatterers exactly. Numerical simulations show that the CS reconstruction result is robust for noisy data provided that multiple illuminations are used, although the theoretical justification is still an ongoing effort [32]. Here, we assume, without proof, that the conclusions of [32] can be extended to the problem (8.27) and consequently we directly apply CS to solve it. 8.3.5 Numerical Examples One numerical example is given in this section. As depicted in Fig. 8.2(a), five point-like scatterers are placed at (0.85𝜆, −0.55𝜆), (−0.6𝜆, 0.55𝜆), (0.15𝜆, −0.1𝜆), (0.7𝜆, 0.7𝜆), and (−0.7𝜆, −0.45𝜆), with their relative permittivities being 1.8, 2.0, 1.6, 1.7, and 1.9, respectively, in the DOI D, which is a square of 2.0𝜆 on each side and has been discretized into a grid of 12 × 12 cells. The data acquisition scheme has the following properties: (1) a single TX antenna (Ni = 1) is placed at a position randomly chosen outside D; (2) a total number of Ns = 50 RX antennas are placed at random positions outside D; and (3) overlap between these antennas should be avoided. In numerical simulations, we have chosen an open-source solver, the “𝓁1-MAGIC” solver [33], which is based on standard interior-point methods and is suitable for large-scale problems. In this open-source solver, we have chosen a CS model, referred to as the Dantzig selector, which is made slightly T different from (8.19) by replacing the constraint by ||A ⋅ (y − A ⋅ x)||∞ ≤ 𝜖. Figure 8.2(b) shows the retrieved image in the absence of noise, where we see a perfect match with the exact pattern Fig. 8.2(a). Figure 8.2(c) exhibits the retrieved image in presence of additive white Gaussian noise with SN R = 20 dB, where locations of the five small scatterers are exactly recovered and their permittivities only have slight errors. For a noise that is too high, as shown in Fig. 8.2(d) where SN R = 10 dB, our method cannot robustly reconstruct the exact image. 219 Electromagnetic Inverse Scattering 2 1 1.5 –0.5 y(λ) y(λ) 0.5 0 –1 –1 –0.5 1.5 0 –0.5 0 0.5 1 1 –1 –1 –0.5 x(λ) (a) 0 0.5 1 1 x(λ) (b) 2 1 2 1 0.5 1.5 0 y(λ) 0.5 1.5 0 –0.5 –0.5 –1 –1 –0.5 2 1 0.5 y(λ) 220 0 x(λ) (c) 0.5 1 1 –1 –1 –0.5 0 0.5 1 1 x(λ) (d) Figure 8.2 The pattern consisting of five point-like objects. (a) Exact pattern of relative permittivity. (b) Reconstructed pattern with no noise added into measurement. (c) Reconstructed pattern with Gaussian white noise added into measurement (SNR = 20 dB). (d) Reconstructed pattern with Gaussian white noise added into measurement (SNR = 10 dB). Source: Pan 2012, IEEE Trans. Antennas Propag., 60, 5472–5475. [31] Reproduced with permission of IEEE. At the end of the section, it is worth mentioning that [32] has solved phaseless ISPs in which data are the square of scattered field. Different from the approach used this section, that is, to define a long vector so that the original nonlinear problem is reformulated into a linear vector equation, [32] directly solves for a matrix. The sparsity condition requires that the matrix has a minimum rank (the number of its nonzero singular values). It has been proven that under certain conditions on the array imaging configuration and on the scatterers, the rank minimization problem is equivalent to the minimization of the nuclear norm (the sum of its singular values) of the decision matrix, which makes the problem convex and solvable in polynomial time. 8.4 Reconstructing Extended Dielectric Scatterers This section deals with reconstructing extended dielectric scatterers from the knowledge of measured magnitude of total electric field. We consider a two-dimensional configuration under TE incidence, where the system is invariant in the z direction. Dielectric cylindrical scatterers are Inversion for Phaseless Data located in the DOI D ⊂ ℝ2 in the x-y plane. There are Ni magnetic-current line sources and Ns receivers that measure both the x or y components of the total field. The total number of scattering data is 2Ni Ns . The DOI D is discretized into a total number of M cells. For the pth incidence, p = 1, 2, … , Ni , we have the following two equations to solve the forward scattering problem, i J p = 𝜉 ⋅ (Ep + GD ⋅ J p ). s Ep (8.28) = GS ⋅ J p . (8.29) where J p is 2M-dimensional column vector denoting the induced contrast displacement current due to the pth incidence. The 2M × 2M diagonal matrix 𝜉 consists of scattering strength, which depends on the relative permittivity 𝜖 r . As shown in (2.81), for a circular cylinder, 𝜉 = (−i2𝜋k0 a2 ∕𝜂0 )(𝜖r − 𝜖0 )∕(𝜖r + 𝜖0 ). The phaseless data may conveniently be taken to be the square of the intensity of the total received field. For the pth transmitting antenna, the measured phaseless data can be written as a column vector of size 2Ns . i s i s F p = (Ep + Ep )∗ ∘(Ep + Ep ), (8.30) where ∘ denotes the Hadamard product (or Schur product), which is an element-wise product, and the superscript ∗ denotes the complex conjugate. Equations (8.28) and (8.30) are referred to as the state equation and the data equation, respectively. It is easy to see that the state equation remains the same for both phase-available and phaseless problems, whereas the data equations are different. In solving phaseless IPSs, a straightforward way is to define an objective function that quantifies the mismatch between measured and calculated phaseless data, where the unknown parameter 𝜉 is obtained by optimization process. However, the performance of this approach is not stable in presence of measurement noise and depends very much on the initial guess. In addition, a direct optimization process is like a black box, which does not provide us with much insight. Instead, the subspace-based optimization method (SOM) presented in Chapter 6 provides far better and more stable reconstruction results. H The SVD of GS can be expressed as GS = U ⋅ Σ ⋅ V . The induced currents (J p ) on scatterers due to the pth incidence are partitioned into two orthogonally + − complementary portions (namely, the major part J p and the minor part J p ): + − + − + − J p = J p + J p = V ⋅ 𝛼 +p + V ⋅ 𝛼 −p , where V and V comprise the first L and the remaining 2M − L columns of the V matrix. Note that L is the total number of singular values in the Σ matrix that are above a predefined noise-dependent threshold. Since phaseless data do not linearly depend on the induced current, the straightforward truncated-SVD inversion of the data equation cannot be 221 222 Electromagnetic Inverse Scattering applied to obtain the major part of induced current. On the other hand, since the scattered electric field is mainly due to the major part of induced current, it naturally follows that the dominant contribution to the intensity of the total i field is due to the Ep and the major part of induced current. This inference + paves the way to estimating the major part of induced current J p by solving a nonlinear optimization problem. On basis of this idea, an objective function is proposed as follows, + i + i 𝛼 +p = arg min ||F p − (Ep + GS ⋅ V ⋅ 𝛼 +p )∗ ∘(Ep + GS ⋅ V ⋅ 𝛼 +p )||2 , (8.31) 𝛼 +p where “arg min” means the value of the argument for which the function reaches its minimum. The objective function is a quartic polynomial and the gradient of the function can be computed in a straightforward manner. The Levenberg–Marquardt (LM) algorithm, which is a mixture of the Gauss–Newton algorithm and the method of gradient descent, is employed to minimize the objective function. Numerical simulations show that the convergence is fast, which will be shown in later numerical examples. After the major part of induced current is determined, the 𝜉 of the scatterers can be obtained by minimizing the sum of relative mismatches in both the state equation and the data equation. The relative residual in the state equation is defined to be Δsta = Ni ∑ ||A ⋅ 𝛼 −p − Bp ||2 + p=1 ||J p ||2 − , (8.32) − i + + where A = V − 𝜉 ⋅ GD ⋅ V , and Bp = 𝜉 ⋅ (Ep + GD ⋅ J p ) − J p . Due to the truncation of the singular values, the relative residual in the data equation can be defined as ∗ dat Δ = Ni ∑ ||F p − C p ∘C p ||2 p=1 i ||F p ||2 + , (8.33) − where C p = Ep + GS ⋅ J p + GS ⋅ V ⋅ 𝛼 −p . Here we treat 𝜉 as the only independent parameter. Consequently, 𝛼 −p is an intermediate parameter that can be obtained as the least-squares solution (see Appendix B) of (8.32); that is, 𝛼 −p = H H (A ⋅ A)−1 ⋅ (A ⋅ Bp ). The scattering strength 𝜉, and consequently the relative permittivity 𝜖r , is obtained by minimizing the following objective function. 𝜉 = arg min (Δsta + Δdat ). 𝜉 (8.34) We apply the Levenberg–Marquardt algorithm again to minimize this objective function. 0.8 2 0.8 2 0.4 1.5 0.4 1.5 1 0 y(λ) y(λ) Inversion for Phaseless Data 1 0 –0.4 0.5 –0.4 0.5 –0.8 –0.8 –0.4 0 0.4 0.8 x(λ) 0 –0.8 –0.8 –0.4 0 0.4 0.8 x(λ) 0 (a) (b) Figure 8.3 The pattern consisting of a circle and an annulus. (a) Exact relative permittivity. (b) Reconstructed relative permittivity with 31.6% Gaussian white noise. Source: Pan 2011, IEEE Trans. Geosci. Remote Sens., 49, 981–87. [34] Reproduced with permission of IEEE. The performance of the proposed method is tested in the following numerical example. A total number Ni = 14 transmitting antennas are evenly distributed on a circle of radius 5𝜆, with their locations given by , 5𝜆 ⋅ sin 2𝜋p ) p = 1, 2, ..., Ni . A total number of Ns = 30 receivers (5𝜆 ⋅ cos 2𝜋p Ni Ni are evenly distributed on a circle of radius 5.5𝜆, with their locations given by , 5.5𝜆 ⋅ sin 2𝜋q ) q = 1, 2, ..., Ns . As depicted in Fig. 8.3(a), a circle (5.5𝜆 ⋅ cos 2𝜋q Ns Ns (with relative permittivity of 2 and radius of 0.15𝜆) is placed in the central hole of a concentric annulus (with relative permittivity of 1.6 and inner and outer radii of 0.4𝜆 and 0.6𝜆, respectively). For the DOI, we have chosen a square region (with width of 1.6𝜆), which is discretized into a grid of 30 × 30 cells. The measured intensity is contaminated with 31.6% additive white Gaussian noise. It takes the Levenberg–Marquardt optimization algorithm 20 and 10 iterations to converge for finding 𝛼 +p and 𝜉, respectively. The reconstructed relative permittivity is reproduced in Fig. 8.3(b), where we see that all the main features of the scatterer’s structure (including the gap with a width of 0.25𝜆 between the central circle and the concentric annulus) can be identified clearly. Phaseless ISPs are difficult to solve due to the missing phase information, and many publications have cautioned that choosing a proper starting point is crucial for their algorithms to eventually yield satisfactory reconstructed results. Numerical simulations presented in [34] show that the extraction of the first L major part of induced current significantly reduces the dependence on initial guesses. 8.5 Discussions For point-like scatterers, the two inversion methods for phase-available data, that is, the subspace method and the compressive sensing, can be modified to solve phaseless problems. Although the phaseless data depend nonlinearly on 223 224 Electromagnetic Inverse Scattering the unknowns, new bases are constructed so that the phaseless ISP becomes a linear one. The new bases inherit the property of the original bases of the phase-available problem. For the subspace method, the singularity of the Green’s function is the key, and the new bases exhibit the same spatial position for which singularity occurs as the original bases do. For CS, the sparsity of the unknown is the key, and the new bases make it possible that the corresponding new unknown is still sparse. For extended scatterers, the subspace-based optimization method for phase-available ISPs can be adopted, after some modifications, to solve phaseless problems, as discussed in Section 8.4, therefore it is helpful to acquire in advance a good understanding of the methods for phase-available ISPs. Finally, we mention in passing that, in this chapter, the background medium is homogeneous so that wave propagation is fully coherent. The reason why phase information is unavailable is the high frequency of the electromagnetic wave. This type of imaging is therefore different from diffuse optical tomography where wave propagation is incoherent (i.e., the phase information cannot be measured) because of strong multiple scattering [35]. References 1 Kress, R. and Rundell, W. (1997) Inverse obstacle scattering with modulus of the far field pattern as data, Springer Vienna, Vienna, pp. 75–92. 2 Klibanov, M.V. (2014) On the first solution of a long standing problem: 3 4 5 6 7 8 9 Uniqueness of the phaseless quantum inverse scattering problem in 3-D. Appl. Math. Lett., 37, 82–85. Klibanov, M.V. (2014) Phaseless inverse scattering problems in three dimensions. SIAM J. Appl. Math., 74 (2), 392–410. Ammari, H., Chow, Y.T., and Zou, J. (2016) Phased and phaseless domain reconstructions in the inverse scattering problem via scattering coefficients. SIAM J. Appl. Math., 76 (3), 1000–1030. Maleki, M.H. and Devaney, A.J. (1993) Phase-retrieval and intensity-only reconstruction algorithms for optical diffraction tomography. J. Opt. Soc. Am. A, 10 (5), 1086–1092. Litman, A. and Belkebir, K. (2006) Two-dimensional inverse profiling problem using phaseless data. J. Opt. Soc. Am. A, 23 (11), 2737–2746. Gbur, G. and Wolf, E. (2002) Diffraction tomography without phase information. Opt. Lett., 27 (21), 1890–1892. Crocco, L., D’Urso, M., and Isernia, T. (2004) Inverse scattering from phaseless measurements of the total field on a closed curve. J. Opt. Soc. Am. A, 21 (4), 622–631. Caorsi, S., Massa, A., Pastorino, M., and Randazzo, A. (2003) Electromagnetic detection of dielectric scatterers using phaseless synthetic and real Inversion for Phaseless Data 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 data and the memetic algorithm. IEEE Transactions on Geoscience and Remote Sensing, 41 (12), 2745–2753. Takenaka, T., Wall, D.J.N., Harada, H., and Tanaka, M. (1997) Reconstruction algorithm of the refractive index of a cylindrical object from the intensity measurements of the total field. Microwave Opti. Technol. Lett., 14 (3), 182–188. Li, L., Zheng, H., and Li, F. (2009) Two-dimensional contrast source inversion method with phaseless data: TM case. IEEE Transactions on Geoscience and Remote Sensing, 47 (6), 1719–1736. Carney, P.S., Markel, V.A., and Schotland, J.C. (2001) Near-field tomography without phase retrieval. Phys. Rev. Lett., 86, 5874–5877. Bao, G., Li, P., and Lv, J. (2013) Numerical solution of an inverse diffraction grating problem from phaseless data. J. Opt. Soc. Am. A, 30 (3), 293–299. D’Urso, M., Belkebir, K., Crocco, L., Isernia, T., and Litman, A. (2008) Phaseless imaging with experimental data: facts and challenges. J. Opt. Soc. Am. A, 25 (1), 271–281. Fienup, J.R. (1982) Phase retrieval algorithms: a comparison. Appl. Opt., 21 (15), 2758–2769. Klibanov, M.V., Sacks, P.E., and Tikhonravov, A.V. (1995) The phase retrieval problem. Inverse Probl., 11 (1), 1. Fiddy, M.A., Brames, B.J., and Dainty, J.C. (1983) Enforcing irreducibility for phase retrieval in two dimensions. Opt. Lett., 8 (2), 96–98. Candès, E.J., Strohmer, T., and Voroninski, V. (2013) Phaselift: Exact and stable signal recovery from magnitude measurements via convex programming. Commun. Pur. Appl. Math., 66 (8), 1241–1274. Hislop, G., James, G.C., and Hellicar, A. (2007) Phase retrieval of scattered fields. IEEE Transactions on Antennas and Propagation, 55 (8), 2332–2341. Marengo, E.A., Hernandez, R.D., and Lev-Ari, H. (2007) Intensity-only signal-subspace-based imaging. J. Opt. Soc. Am. A, 24, 3619–3635. Chen, X. (2008) Signal-subspace method approach to the intensity-only electromagnetic inverse scattering problem. J. Opt. Soc. Am. A, 25 (8), 2018–2024. Candes, E.J. and Wakin, M.B. (2008) An introduction to compressive sampling. IEEE Signal Processing Magazine, 25 (2), 21–30. Foucart, S. and Rauhut, H. (2013) A mathematical introduction to compressive sensing, Birkhäuser, Basel. Massa, A., Rocca, P., and Oliveri, G. (2015) Compressive sensing in electromagnetics – a review. IEEE Antennas and Propagation Magazine, 57 (1), 224–238. Candes, E.J. and Tao, T. (2005) Decoding by linear programming. IEEE Transactions on Information Theory, 51 (12), 4203–4215. Donoho, D.L. (2006) Compressed sensing. IEEE Transactions on Information Theory, 52 (4), 1289–1306. 225 226 Electromagnetic Inverse Scattering 27 Ji, S., Xue, Y., and Carin, L. (2008) Bayesian compressive sensing. IEEE Transactions on Signal Processing, 56 (6), 2346–2356. 28 Oliveri, G., Rocca, P., and Massa, A. (2011) A Bayesian-compressive- 29 30 31 32 33 34 35 sampling-based inversion for imaging sparse scatterers. IEEE Transactions on Geoscience and Remote Sensing, 49 (10), 3993–4006. Fannjiang, A.C. (2011) The MUSIC algorithm for sparse objects: a compressed sensing analysis. Inverse Probl., 27 (3), 035 013. Fannjiang, A.C. (2010) Compressive inverse scattering: I. high-frequency SIMO/MISO and MIMO measurements. Inverse Probl., 26 (3), 035 008. Pan, L., Chen, X., and Yeo, S.P. (2012) A compressive-sensing-based phaseless imaging method for point-like dielectric objects. IEEE Transactions on Antennas and Propagation, 60 (11), 5472–5475. Chai, A., Moscoso, M., and Papanicolaou, G. (2011) Array imaging using intensity-only measurements. Inverse Probl., 27 (1), 015 005. L1 MAGIC website. Available at: https://statweb.stanford.edu/~candes/ l1magic/. (accessed September 2017). Pan, L., Zhong, Y., Chen, X., and Yeo, S.P. (2011) Subspace-based optimization method for inverse scattering problems utilizing phaseless data. IEEE Transactions on Geoscience and Remote Sensing, 49 (3), 981–987. Arridge, S.R. (1999) Optical tomography in medical imaging. Inverse Probl., 15 (2), R41. 227 9 Inversion with an Inhomogeneous Background Medium Previous chapters dealt with inverse scattering problems with a homogeneous background medium. This chapter deals with reconstructing dielectric scatterers embedded in an inhomogeneous background. Such inverse scattering problems have important practical applications in nondestructive evaluation, biomedical imaging, through wall imaging, geophysical inversion, and so on. The organization of the chapter is as follows. Section 9.1 outlines the main methods for solving inhomogeneous background ISPs. When a (semi-)closed-form expression of the inhomogeneous background Green’s function is not available, there are mainly three approaches, which are discussed in Sections 9.2–9.4 for two-dimensional problems. Section 9.2 introduces an approach that numerically obtains an inhomogeneous background Green’s function by solving differential equations (DE) and then applies integral-equational based inversion algorithms to solve ISPs. Section 9.3 presents an approach that directly solves differential equations without calculating a numerical Green’s function. Section 9.4 introduces an approach that treats the known inhomogeneous background medium as a known scatterer rather than part of the background. Section 9.5 presents the models and reconstruction results for two practical imaging modalities. Section 9.6 briefly discusses several topics on inhomogeneous background ISPs. 9.1 Introduction If an inhomogeneous background medium is so simple that a (semi-) closed-form expression of the corresponding Green’s function is available, then the integral-equational (IE) based inversion algorithms introduced in Chapter 6 can be used directly to solve the ISPs. For example, a half-space background medium ISP is solved in [1–3], a through-wall-imaging (TWI) problem is solved in [4, 5], and an ISP in presence of a conducting circular cylinder is solved in [6]. The first two examples are typical multiple-planary-layer ISPs [7, 8]. IE-based inversion algorithms are preferred in these cases since Green’s Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 228 Electromagnetic Inverse Scattering function provides long-range interactions between two spatial points and in addition the inducted contrast current, as an intermediate parameter, exhibits important physical meanings and provides much mathematical flexibility to manipulate. When a (semi-)closed-form expression of the inhomogeneous background Green’s function is not available, there are three main approaches to reconstruct dielectric scatterers. The first approach is to numerically obtain an inhomogeneous background Green’s function by solving differential equations (DE), and then apply IE-based inversion algorithms introduced in Chapter 6 to solve ISPs. For example, [9] applies the finite difference (FD) method to obtain the Green’s function and then adopts the contrast source inversion (CSI) method for inversion; [10] and [11] apply the finite element method (FEM) to obtain the Green’s function and then, respectively, adopt the subspace-based optimization method (SOM) and the CSI for the inversion. The second approach directly solves differential equations without calculating a numerical Green’s function. For example, the FD is used in [12, 13] and the FEM is used in [14, 15]. The third approach treats the known inhomogeneous background medium as a known scatterer rather than part of the background. Thus, the background is simply homogeneous and then the original inhomogeneous-background ISP can be solved by the IE-based inversion algorithms introduced in Chapter 6. For example, [16] adopts the SOM for the inversion. We mention in passing that these three approaches do not assume dielectric scatterers to be homogenous. For homogenous scatterers both the forward and inverse models will be different from their inhomogeneous-scatterer counterparts. For example, [17] presents an inversion method for subsurface sensing of homogeneous dielectric objects embedded in a dispersive lossy ground with an unknown rough surface. The topic of homogenous scatterer is beyond the scope of this chapter. This chapter will discuss all three approaches. The first and second involve truncating the FEM or FD computational domain, and it is very important to choose the truncation boundary so that the computation domain is as small as possible during each iteration step of the optimization process. There are three kinds of boundaries in inhomogeneous background ISPs, which are shown in Fig. 9.1. The boundary B1 encloses all scatterers, that is, any contrast with respect to the inhomogeneous background medium, the boundary B2 encloses all inhomogeneities, that is, the region exterior to B2 is homogenous, and the boundary B3 requires reflectionlessness for all outgoing waves. It is obvious that B1 ⊆ B2 ⊆ B3, as far as the domains that they enclose are concerned. If the domain of scatterers is not known a priori, then we have to choose B1 = B2. For B3, the reflectionlessness can be realized by adding the perfectly matching layer (PML) or applying mathematical exact or approximate radiation boundary condition (RBC). In order to ensure high accuracy and at the same time keep computational size at a minimum, boundary integral (BI) Inversion: Inhomogeneous Background Medium Figure 9.1 The illustration of three kinds of boundaries for an inhomogeneous background ISP where some scatterers are located inside a square annulus background. The boundary B1 encloses all scatterers, i.e., anything that is different from the inhomogeneous background medium, the B2 encloses all inhomogeneities, i.e., the region exterior to B2 is homogenous, and the B3 requires reflectionlessness for all outgoing waves. B3 B2 B1 equation is a good candidate. In this case, the boundary B3 can be chosen to be conformal to the B2, and very close to it in practice. In some references, the BI equation method is referred to as the boundary element method (BEM). An important result for inhomogeneous background ISPs is that when B1 is known a priori, the BI equation can be formulated on B1 rather than B3, which has the advantage of limiting the computational domain within B1 at each iteration during the optimization process. The details will be given in Section 9.5. We mention in passing that this chapter deals with full-wave inversion, and thus inversion algorithms that are based on Born-type approximations will not be discussed, such as the distorted wave Born approximation method [18] and the FDFD-based (finite-difference frequency-domain) Born inversion method [19]. 9.2 Integral Equation Approach via Numerical Green’s Function Consider a two-dimensional (2D) acoustic or electromagnetic transverse magnetic (TM) scattering problem, in which the field satisfies the scalar Helmholtz equation. Some known objects are distributed in an otherwise homogeneous background medium (the wavenumber of which is k0 ). The known objects and the otherwise homogeneous background are together referred to as the known inhomogeneous background, and the distribution of the wavenumber is denoted as kb (r), where r = (x, y) represents the spatial coordinate. Some unknown scatterers are embedded in the inhomogeneous background. The distribution of wavenumber of the scattering system, including the unknown scatterers and the known inhomogeneous background, is denoted k(r). To 229 230 Electromagnetic Inverse Scattering reconstruct the unknown scatterers, the test domain is successively illuminated by a number of incident waves and the scattered waves are measured at an array of receivers. A total number of Ni transmitters (also known as the primary source) are located at rip , p = 1, 2, ..., Ni , and a total number of Ns receivers are located at rsq , q = 1, 2, ..., Ns . The problem considered here does not know a priori within which part of B2 the scatterers locate, then we have to choose B1 = B2. The boundary B3 is chosen to be conformal to the B2 and very close to it. Let’s denote the region interior to B3 to be the domain of interest (DOI) D, and for convenience the B3 is conventionally denoted the boundary 𝜕D of D, ̂ Transmitters and receivers the outward normal direction of which is denoted n. are located outside D, and the medium outside D is homogeneous. The relative refractive index is introduced as n(r) = k(r)∕k0 . In electromagnetic problems, the refractive n(r) is equal to the square root of the relative permittivity √ 𝜖r (r). The relative refractive index of the known inhomogeneous background medium is denoted as nb (r). We first let one of the transmitters to illuminate the DOI. In D, the background field ub (r) and the total field u(r) satisfy the following Helmholtz equations, respectively: [∇2 + k02 n2 (r)]u(r) = 0, (9.1) [∇2 + k02 n2b (r)]ub (r) = 0. (9.2) The combination of (9.2) and (9.1) yields [∇2 + k02 n2b (r)](u(r) − ub (r)) = −k02 [n2 (r) − n2b (r)] u(r). (9.3) The right-hand side is written in shorthand as −J con (r), which is interpreted as the contrast source (also known as the secondary source). The contrast field u(r) − ub (r) is denoted as uc (r). It is easy to see that the contrast field can be understood as the reradiated field by the contrast source in the inhomogeneous background. (9.3) can be converted to the “weak” form by multiplying both sides with a testing function T(r) and performing an integration over D, ∫ ∫D (∇T(r) ⋅ ∇uc (r) − k02 n2b (r)T(r)uc (r))ds = ∫ ∫D T(r)J con (r)ds + ∮𝜕D T(r) 𝜕uc (r(t)) dt 𝜕n(t) (9.4) 𝜕 means the where t is a parametric variable along the boundary 𝜕D and 𝜕n derivative along the normal direction of 𝜕D. In the exterior of 𝜕D, the contrast field can be formulated by the Green’s theorem, [ ] 𝜕u (r′ (t ′ )) 𝜕G(r, r′ (t ′ )) − c ′ G(r, r′ (t ′ )) + uc (r′ (t ′ )) dt ′ , (9.5) uc (r) = ∮𝜕D 𝜕n(t ) 𝜕n(t ′ ) where G denotes the Green’s function for the homogeneous medium, the wavenumber of which is k0 , as discussed at the beginning of this section. Inversion: Inhomogeneous Background Medium When (9.5) is evaluated at the boundary 𝜕D (approaching the boundary from outside), the boundary condition yields [ ] ′ ′ 𝜕uc (r′ (t ′ )) ′ ′ ′ ′ 𝜕G(r(t), r (t )) uc (r(t)) + G(r(t), r (t )) − uc (r (t )) dt ′ =0. ∮𝜕D 𝜕n(t ′ ) 𝜕n(t ′ ) (9.6) Once the contrast field on the boundary and its normal derivative are obtained from Eqs. (9.4) and (9.6), the scattered field is subsequently obtained from (9.5) by choosing r to be the position of receiver. In this section, the two-dimensional inhomogeneous background scattering problem is solved by the FEM method (see chapter 3 of [20] and section 10.2 of [21]). The domain D is discretized into a total number of Ncell rectangular-cell meshes. The number of interior nodes is denoted as Nint and the the number of nodes located on the boundary 𝜕D is denoted as Nbou . The mesh size is so small that the relative refractive index is treated as a constant nl within the lth cell, l = 1, 2, ..., Ncell . The interior contrast field is expanded in basis functions uc (r) ≅ Nint ∑ ∑ Nint +Nbou uint n Bn (r) + n=1 ubou n Bn (r), (9.7) n=Nint +1 bou where Bn (r) denotes the basis function centered at node n, and uint n and un con represent the value of contrast field at that node. The contrast source J (r) is expanded on the same basis. Here we adopt the bilinear basis function for rectangular cells (see section 9.3 of [20]). The contrast field at the boundary 𝜕D is automatically given by ∑ Nint +Nbou uc (r(t)) ≅ ubou n Bn (t), (9.8) n=Nint +1 where Bn (t) is the projection of Bn (r) onto the boundary. Note that the approximate sign in (9.7) and (9.8) is due to numerical discretization, and the same applies to (9.9). The notation J bou (t) is introduced as a shorthand for 𝜕uc (r(t))∕𝜕n(t) and it is interpreted as the equivalent surface source. The J bou (t) can also be expanded in basis functions as J bou (t) ≅ Nbou ∑ Jnbou B̃ n (t), (9.9) n=1 where B̃ n (t) denotes the basis function for the equivalent boundary source and is chosen as the piecewise-constant function. For a boundary point with parameter t that is located in the n-th boundary line element, the value of J bou (t) is given by Jnbou . 231 232 Electromagnetic Inverse Scattering If Eqs. (9.7) and (9.9) are substituted into to (9.4), a total number of Nint + Nbou linearly independent equations can be generated, where the testing functions are chosen as the basis functions, n = 1, 2, ..., Nint + Nbou . T(r) = Bn (r), (9.10) This method is the well known Galerkin FEM. The resulting matrix equation has the form ] [ [ ] int cros, A X X uint c ⋅ cros, B bou ubou c X X ] [ [ ] int cros, A 0 Z Z con ⋅J + = (9.11) bou cros, B bou Y ⋅J Z Z int con where J is an (Nint + Nbou )-dimensional vector, X , X have the common form X mn = int cros, A ∫ ∫D ∇Bm ⋅ ∇Bn − k02 n2b Bm Bn ds, cros, B cros, A ,X cros, B , and X bou (9.12) bou Z ,Z ,Z , and Z have the common form Zmn = ∫ ∫D Bm Bn ds, and the entries of Y are given by Y mn = ∮𝜕D Bm B̃ n dt. If Eqs (9.8) and (9.9) are substituted into (9.6) and in the meanwhile testing functions are chosen as the Dirac delta function located in the center of each line element around the boundary 𝜕D, a total number of Nbou linearly independent equations are generated, which are expressed in the matrix form as L ⋅ ubou +M⋅J c bou = 0, (9.13) where the matrices L and M are calculated as integrals over the line element of the boundary 𝜕D, the detail of which can be found in [20] (section 3.10). The substitution of (9.13) into (9.11) yields ] [ [ ] [ int cros, A ] int cros, A X X uint Z Z con c ⋅J , ⋅ = cros, B bou −1 cros, B bou bou u c X X +Y ⋅M ⋅L Z Z (9.14) For convenience, the matrices on the left- and right-hand sides are denoted as A and B, respectively. From (9.14), the contrast field is obtained by uc = GD ⋅ J −1 con , (9.15) where GD = A ⋅ B has a size of (Nint + Nbou ) × (Nint + Nbou ). The ordering of the nodes presented in this paper yields a dense matrix only at the bottom right-hand corner of the matrix A. Considering the fact that Nbou is usually much smaller than Nint , the inversion of (9.14) can be implemented Inversion: Inhomogeneous Background Medium by the matrix-partitioning method. The overall computational complexity is O ((Nint + Nbou )1.5 ), noting that the number of nodes on one side of square-shape 𝜕D is roughly (Nint + Nbou )0.5 . The M is a square matrix of size −1 Nbou . Since the size of M is much smaller than the size of A, the value of M ⋅ L can be obtained by solving a linear equation using the LU decomposition and the computational cost is much smaller compared with the one used in solving −1 A ⋅ B. It is noted that the operator GD obtained by the FEM defines a mapping from the source at the nodes of cells to the field evaluated also at the nodes of cells. It is different from its counterpart in earlier versions of SOM with homogeneous background, where the mapping is from the source at the centers of cells to the field evaluated also at the centers of cells. Furthermore, define the matrix P, which picks up the boundary nodes out of all nodes, as [0Nbou ×Nint , I Nbou ×Nbou ], where I denotes an identity matrix. Thus, the contrast field at the boundary is obtained from (9.15), ubou = P ⋅ GD ⋅ J c con . (9.16) The scattered fields at all receivers can be obtained from (9.5) and can be written in an Ns -dimensional vector, bou usca − Ms ⋅ J c = −Ls ⋅ uc bou , (9.17) where Ls and Ms are similar to L and M, respectively, with only minor differences. Upon the substitution of Eqs (9.13) and (9.16), the scattered fields can be written in a compact form as, usca c = (−Ls + M s ⋅ M −1 ⋅ L) ⋅ P ⋅ GD ⋅ J con , (9.18) con which is written in shorthand as usca , where the dimension of GS is c = GS ⋅ J Ns × (Nint + Nbou ). Once again, the operator GS obtained by the FEM defines a mapping from the source at the nodes of cells to the scattered field measured at receivers. It is different from its counterpart with an homogeneous background, where the mapping is from the source at the centers of cells to the scattered field measured at receivers. The definitions of J con (r) and uc (r) imply the following equation, J con (r) = k02 [n2 (r) − n2b (r)](ub (r) + uc (r)). (9.19) When this equation is evaluated at the centers of the cells, it can be written in a compact form, C⋅J con con = k02 𝜉 ⋅ (ub + C ⋅ GD ⋅ J con ), (9.20) where J , evaluated at the nodes of cells, has been defined earlier, C is a matrix of dimension Ncell × (Nint + Nbou ) that assigns the value to the center of a cell 233 Electromagnetic Inverse Scattering by averaging the values at its four nodes, and 𝜉, which is referred to as the contrast matrix, is a diagonal matrix of dimension Ncell × Ncell with diagonal elements being [n2 (r) − n2b (r)]. It is noted that ub is an Ncell -dimensional vector evaluated directly at the centers of cells, which is readily available for the given inhomogeneous background. Equations (9.18) and (9.20) are referred to as the data equation and the state equation, respectively. They are the inhomogeneous background counterpart of the data equation and the state equation that are presented in Chapter 6, and thus the IE-based inversion algorithms can be adopted to solve the inhomogeneous background ISPs. In the following numerical example, the subspace-based optimization method (SOM) is adopted to solve the inhomogeneous background ISP. The DOI D is a square of side length 2𝜆, where 𝜆 is the wavelength in air, and D is discretized into 44 × 44 square cells in the inverse problem. The number of transmitters is 30 and the number of receivers is 40, and they are uniformly distributed on a circle of radius 3𝜆. The FEM is employed as the forward problem solver. To avoid the inverse crime, the forward problem uses a 60 × 60 discretization, which is finer than the one used in the inverse problem. Then 10% additive white Gaussian noise is added to the exact data, and the resultant noisy data is treated as the measured scattering data. The inhomogeneous background medium, as shown in Fig. 9.2, is a square wall, with an outer√side length 1.6𝜆 and inner side length 1.1𝜆, and its relative refractive index is 1.5. There are three scatterers, as illustrated in Fig. 9.3(a). The first scatterer is an annulus, with inner√and outer radii 0.25𝜆 and 0.4𝜆, respectively, and its relative refractive index is 2. The second scatterer is a square inhomogeneity located inside the wall. Its side length is 0.2𝜆 and is centered at (0.65𝜆, −0.3𝜆). Its rel√ ative refractive index is 2.5. The third scatterer is an extra rectangle attached to the wall, and it has the same relative refractive index as that of the wall. The rectangle is located at (−0.2𝜆, 0.875𝜆) and its size is 0.4𝜆 × 0.15𝜆. After 1 2.5 0.5 2 y (λ) 234 0 1.5 –0.5 –1 –1 –0.5 0 x (λ) 0.5 1 1 Figure 9.2 The configuration of the inhomogeneous background medium. It is a square wall with an outer side length 1.6𝜆 and inner side length 1.1𝜆, and its refractive index is √ 1.5. The shaded bar represents the value of the square of refractive index, i.e., n2 . Source: Chen 2010, Inverse Problems, 26, 074007. [10] Reproduced with permission of IOP Publishing. Inversion: Inhomogeneous Background Medium 1 2 0 1.5 –0.5 –1 –1 0 1 1 2.5 0.5 y (λ) 0.5 y (λ) 1 2.5 2 0 1.5 –0.5 –1 –1 0 x (λ) x (λ) (a) (b) 1 1 Figure 9.3 The configuration of the scatterer. (a) Exact profile, where three scatterers are present, i.e., an annulus, a square inside the wall, and a rectangle attached to the wall. (b) Reconstructed profile at the 50th iteration. Source: Chen 2010, Inverse Problems, 26, 074007. [10] Reproduced with permission of IOP Publishing. 50 iterations, the FEM-based SOM obtains the reconstructed result shown in Fig. 9.3(b). The annulus and the square inside the wall are obviously well reconstructed. The reconstruction of the extra rectangle attached to the wall is a little poor. The reason for this is that the extra rectangle has a weaker contrast with the background medium. Nevertheless, Fig. 9.3(b) clearly shows that there is a weak scatterer present in the correct position. The reconstruction can also be quantitatively evaluated by the relative error, which is defined as ∑Ncell |n2ret (ri ) − n2 (ri )| i=1 n2 (ri ) , 𝛿r = Ncell (9.21) where nret (ri ) denotes the “retrieved” refractive index of the ith cell. The relative error of this numerical simulation is equal to 3.7%. 9.3 Differential Equation Approach This section directly solves differential equations without calculating numerical Green’s function. The presented inversion model, based on the finite difference, does not need to solve the forward problem in each iteration of the optimization process. We consider a two-dimensional (2D) acoustic or TM electromagnetic inverse scattering scattering problem. The configuration of the ISP is the same as that in Section 9.2, except that the boundary B3 (that is also 𝜕D) is chosen to be the smallest rectangle enclosing the B2 for the purpose of using the FD. Once again, we do not know a priori within which part of B2 the scatterers locate and consequently we set B1 = B2. 235 236 Electromagnetic Inverse Scattering We use the FD method to discretize the DE. We first discretize the rectangular D into Mx × My small cells. The contrast is spatially uniform within each cell. We assume that contrast fields are linearly changing from cell to cell, and we denote the contrast fields at the centers of cells as (uc )m,n with 1 ≤ m ≤ Mx and 1 ≤ n ≤ My , which is different from the method in Section 9.2 where the contrast fields at the corners of cells are sampled. Since there is a Laplace operator in (9.3), we apply the finite difference scheme and define an operator as, ′ Pm,n ≡ (∇2 uc )m,n = (uc )m+1,n + (uc )m−1,n − 2(uc )m,n + Δx2 (uc )m,n+1 + (uc )m,n−1 − 2(uc )m,n Δy2 (9.22) for m ∈ [1, Mx ] and n ∈ [1, My ], where Δx and Δy are the dimensions of the small cells along the x and y directions, respectively. It is obvious that the finite difference scheme requires to extend the computational domain to the −x, +x, −y, and +y directions with one additional cells. The contrast fields at the centers of these extended cells are denoted as (uc )m,n , where m = 0 or Mx + 1, n = 1, … , My are for vertical cells and m = 1, … , Mx , n = 0 or My + 1 are for horizontal cells, as shown in Fig. 9.4. However, the extension introduces 2(Mx + My ) additional unknowns at the centers of extended cells. On the other hand, these 2(Mx + My ) additional unknowns are related to the field inside the domain D by the Huygens’ surface equivalence principle. The integral path in (9.5) is chosen as 𝜕D that is shown in Fig. 9.4. For the contrast fields that appear in the integrand of (9.5), we use the fields on both sides of the boundary to approximate them, such as [(uc )0,n + (uc )1,n ]∕2 with n ∈ [1, My ] on one of the boundaries. For the normal derivative of the field, we apply the finite difference rule, such as ∆y ∂D ∆x Figure 9.4 The FD scheme requires extension of the computational domain with one additional cell outward. The cells that are exterior to the boundary 𝜕D are the extended cells. Their centers are marked with crosses. The cells marked with solid dots are referred to as the boundary cells and the cells marked with circles are referred to as interior cells. Inversion: Inhomogeneous Background Medium [(uc )0,n − (uc )1,n ]∕Δx with n ∈ [1, My ] on one of the boundaries. If we place the observation point of (9.5) at the centers of the extended cells, meaning that the left-hand side of the equation are the fields at the centers of those extended cells, then we obtain a total number of 2(Mx + My ) linear equations, which can be written as bou uext + B ⋅ uext c = A ⋅ uc c (9.23) is a [2(Mx + My ) − 4]-dimensional vector, representing the contrast where ubou c field at the center of boundary cells (marked with solid dots in Fig. 9.4), uext c is a [2(Mx + My )]-dimensional vector, representing the contrast field at the center of extended cells, and A and B are matrices involving both the Green’s function and its normal derivative. With the help of (9.23), the contrast fields at the extended cells can be expressed as a linear superposition of the contrast fields at the boundary cells, −1 uext ⋅ A ⋅ ubou c = (I − B) c (9.24) which consequently means that the unknown field variables now consist of only those in the domain D. The contrast field in D, denoted as an Mx My -dimensional vector uc , consists of two parts: a total number of (Mx − 2)(My − 2) fields at the centers of interior cells (marked with circles in Fig. 9.4) and a total number of [2(Mx + My ) − 4] fields at the centers of boundary cells. The latter has been denoted as ubou and the former is now c int T bou T T defined as uint c . That is, uc = [(uc ) , (uc ) ] , where the superscript T denotes the transpose. The Helmholtz equation (9.3) can be written into the FD format, [P + k02 n2b ] ⋅ uc = −k02 𝜉 ⋅ (ub + uc ). (9.25) where 𝜉, which is referred to as the contrast matrix, is a diagonal matrix with the dimensions Mx My × Mx My with the diagonal elements being [n2 (r) − n2b (r)], and the matrix n2b of the same size is defined similarly. The Mx My × Mx My -dimensional matrix P is defined with the help of the definition of FD Laplace operator P′ in (9.22) and the relationship between the fields at the centers of extended and boundary cells (9.24). From (9.5) and (9.23), we write the scattered fields measured at receivers as −1 usca ⋅ A] ⋅ ubou c = [As + Bs ⋅ (I − B) c , (9.26) where As and Bs are defined in a way similar to A and B, respectively, with the only minor difference that the observation positions are shifted. Equation (9.26) can be written in shorthand as bou usca c = GS ⋅ uc (9.27) where the dimension of GS is Ns × [2(Mx + My ) − 4], which maps from the contrast electric field at the center of boundary cells to the scattered field measured 237 238 Electromagnetic Inverse Scattering at receivers. Equation (9.25) and (9.27) are the state equation and data equation, respectively. In solving the inverse problem, motivated by the modified gradient method [22], we treat the contrast and the contrast field as independent unknowns, which has the merit of avoiding solving the forward problem. The objective function consists of two parts, that is, the relative residual in the state equation Δsta (uc , 𝜉) = ‖(P + k02 n2b ) ⋅ uc + k02 𝜉 ⋅ (ub + uc )‖2 ∕‖k02 ub ‖2 (9.28) and the relative residual in the data equation, bou 2 sca 2 Δdat (uc ) = ‖usca c − GS ⋅ uc ‖ ∕‖uc ‖ (9.29) Then the objective function accounts for the total relative residuals for all incidences, f (uc1 , uc2 , … , ucNi , 𝜉) = Ni ∑ dat Δsta p + Δp (9.30) p=1 It is easy to see that the objective function is a quadratic in both uc and 𝜉 individually, and consequently it is a quartic function of the unknowns uc and 𝜉 simultaneously. The objective function (9.30) can be minimized by updating the contrast and the contrast field alternatively during the optimization process. Nevertheless, the performance can be improved by incorporating the subspace technique. As practiced in Gs-SOM in Chapter 6, we are able to first determine the major part at boundary cells by using the singular value decomof the contrast fields ubou c position (SVD) of GS , and then obtain the minor part of the contrast fields by ∑ , solving an optimization problem. Denoting the SVD formula as GS = j uj 𝜎j 𝑣H j where the superscript H denotes the Hermitian, the major part and the minor part of the contrast field at boundary cells can be, respectively, expressed as ) ( ⋅ usca ∑ uH ∑ c j bou+ bou− H uc = 𝑣j , uc = I 2(Mx +My )−4 − 𝑣j 𝑣j ⋅ 𝛼, (9.31) 𝜎j 𝜎 ≥𝜎 𝜎 ≥𝜎 j L j L where 𝜎L is a chosen singular value that is above a certain noise level and the method of choosing the cutoff integer L can be found in Chapter 6. I 2(Mx +My )−4 is a 2(Mx + My ) − 4 dimensional identity matrix, and 𝛼 is a 2(Mx + My ) − 4 dimensional unknown vector, which is to be reconstructed via optimization. The objective function (9.30) now depends on uint cp , 𝛼 p , p = 1, 2, … , Ni , and 𝜉. In implementing the alternative update scheme in each iteration of the inversion, when updating the contrast fields (uint cp and 𝛼 p ), the contrast 𝜉 is treated to be known, and likewise for updating the contrast. The update of the scattered fields uses the Polak–Ribière conjugate gradient (CG) method (see Section 6.4.1). Since the DE is used to describe the field behaviors, the scope of such a description is a local one; that is, there is no long-distance interaction Inversion: Inhomogeneous Background Medium that has been displayed by the Green’s function in the integral equation method. Therefore, when updating the scattered fields, we will increase the number of iterations of the CG algorithm in every inversion iteration, such that the fields can be updated in a large domain instead of the local updating. The number of the CG iterations should be at the level of the largest number of cells in one direction of the DOI. The contrast 𝜉 is updated by solving a least squares problem in every iteration of the optimization, which is ∑Ni 2 2 2 ∗ p=1 [−k0 (ub(m) + uc(m) )]p [[P ⋅ uc ](m) + [k0 nb ⋅ uc ](m) ]p (9.32) 𝜉(m) = ∑Ni 2 2 p=1 |−k0 (ub(m) + uc(m) )|p where the superscript ∗ denotes the complex conjugate and the subscript m denotes the mth cell, m = 1, 2, … , Mx My . To summarize, in each iteration of the inversion, there are a number of iterations of the CG method for the update of the contrast fields, followed by one update for the contrast function. The performance of the proposed DE-based inversion algorithm is tested for the well-known Austria profile, with relative permittivity 𝜖r = 2.0, that is, n2 = 2.0. Other parameters in the system setup can be found in Section 6.2.5. The background medium is chosen to be air; that is, n2b = 1.0. The measured scattered field is contaminated with 10% additive white Gaussian noise. In solving the inverse problem, the domain is discretized into 60 × 60 meshes, the parameter L in the Gs-SOM is chosen as 15. The number of CG iterations is chosen to be 50 in every iteration of the inversion to update the contrast fields. The inversion results after 100 iterations are shown in Fig. 9.5, where we see that the DE inversion method successfully reconstructs the scatterer profile. 0.5 0.5 0 0 –0.5 –0.5 –0.5 1 0 1.5 0.5 2 –0.5 –0.1 0 0 0.5 0.1 Figure 9.5 Reconstruction results by the finite-difference inversion method: Left and right panels show the real and imaginary parts of relative permittivity, respectively. Source: Zhong 2014, Differential equation based inversion method for solving inverse scattering problems, Inverse Problems – from Theory to Applications (IPTA 2014), 90–94. [35] Reproduced with permission of IOP Publishing. 239 240 Electromagnetic Inverse Scattering 9.4 Homogeneous Background Approach This section presents an approach that treats the known inhomogeneous background medium as a known scatterer rather than part of the background. Thus, the background is simply homogeneous and then the ISPs can be solved by IE-based inversion algorithms. The advantages of this approach are that numerical evaluation of Green’s function is avoided, the homogenous background Green’s function provides long-range interactions, and the induced contrast current, as an intermediate parameter, exhibits important physical meanings and provides much mathematical flexibility to manipulate. The known objects and the otherwise homogeneous background (with the permittivity 𝜖h ) are together referred to as the known inhomogeneous background, and its permittivity distribution is denoted as 𝜖b (r). When some unknown scatterers are embedded in the inhomogeneous background medium, the final distribution of the permittivity is denoted as 𝜖(r). In terms of the contrast with the homogeneous background medium, we have 𝜒(r) = 𝜒s (r) + 𝜒b (r), where 𝜒s (r) = [𝜖(r) − 𝜖b (r)]∕𝜖h denotes the normalized contrast of unknown scatterer and 𝜒b (r) = [𝜖b (r) − 𝜖h ]∕𝜖h is the normalized contrast of known background scatterer. Inversion algorithms that treat the known inhomogeneous background medium as a known scatterer can be categorized into two types. The first type deals with the case that unknown scatterers do not overlap with the known inhomogeneous background scatterer, that is, for any spatial point r, if 𝜒s (r) is nonzero, then 𝜒b (r) must be zero. Simply speaking, the unknown scatterers are separable from the known background scatterers that are, for convenience, referred to as the obstacle. For convenience, this type of problem is denoted an SOP; a separable obstacle problem. Many real-world problems fall into this type, such as inspecting the contents of closed parcels in standard shipment packages. The second type allows unknown scatterers to be overlapped with the obstacle, which is denoted as OP; an obstacle problem. Since an homogeneous background is used, the inversion algorithms that solve these two kinds of ISPs are referred to as the SOP- and OP-homo scheme, respectively. An SOP is solved in [16] where the IE-based inversion method, the SOM, is adopted to reconstruct 𝜒s (r) after a minor modification that restricts the domain of updating the contrast to only those spatial points where 𝜒b (r) = 0. Numerical simulations show that although there are various advantages for the SOP-homo scheme, such as avoiding the computational time and numerical inaccuracies in evaluating inhomogeneous background Green’s functions, a trade-off is also involved. In the SOP-homo scheme, although we have excluded the obstacle from the process of updating unknowns, the induced contrast currents exist in both the known obstacle and the unknown scatterers. That is, the contrast current occurs wheresoever 𝜒s (r) ≠ 0 or 𝜒b (r) ≠ 0. The multiple scattering between unknown scatterers and the known obstacle increases the nonlinearity of the problem formulated as the SOP-homo scheme. In com- Inversion: Inhomogeneous Background Medium parison, in OP-inhomo or SOP-inhomo schemes, inhomogeneous background Green’s functions are numerically evaluated and consequently the contrast currents occur only at positions with 𝜒s (r) ≠ 0. This is because the multiple scattering effect between the scatterers and the obstacles has already been accounted for in the inhomogeneous background Green’s function. As a consequence, the SOP-homo has a higher nonlinearity compared to OP/SOP-inhomo and thus may reduce the quality of reconstruction; for example, in cases where the known obstacle has a higher permittivity than the unknown scatterer. The OP/SOP-homo schemes are tested by experimental data and are compared with the OP/SOP-inhomo schemes. A two-dimensional through-wall-imaging (TWI) experiment has been conducted at Zhejiang University [23]. The experimental setup is of the transverse magnetic (TM) type. Figure 9.6(a) and (b) show the schematic diagram and the actual experimental setup. The system is designed to work at 2.4 GHz. Twenty-four regular patch antennas linearly polarized along the vertical direction are evenly distributed on a circle with a diameter of 113 cm. Figure 9.6(c) and (d) show the configuration of the scatterer and the inhomogeneous background. Four Teflon boards with the same length of 100 cm and a relative permittivity of wall (target inside) imaging domain receiver microwave switches emitter target emitter receiver trun table (a) (b) 3.5 cm foam cylinder 5 cm 21 cm wall 1 cm (c) (d) Figure 9.6 Experimental setup of the through-wall-imaging problem: (a) 2D schematic diagram of the experimental setup; (b) photograph of the experimental setup; (c) cylindrical scatterer is at the center; and (d) cylindrical scatterer is off center. Source: Meng 2016, Electronics Letters, 52, 1933–1935. [23] Reproduced with permission of Institution of Engineering and Technology (IET). 241 242 Electromagnetic Inverse Scattering –λ 3 –λ 3 0 2 0 2 1 λ –λ λ –λ 0 (a) λ 0 (b) λ 1 –λ 3 –λ 3 0 2 0 2 1 λ –λ λ –λ 0 (c) λ 0 (d) λ 1 Figure 9.7 Comparison of inversion results for the off-center cylinder. Inversion result by (a) OP-homo; (b) SOP-homo; (c) OP-inhomo; and (d) SOP-inhomo. Source: Meng 2016, Electronics Letters, 52, 1933–1935. [23] Reproduced with permission of Institution of Engineering and Technology (IET). around 2.1 are used to construct the wall, which is known a priori and treated as the background medium. A 100-cm-long organic glass cylinder is used as the scatterer, whose relative permittivity is around 3.0. The cylinder is placed at the center of the wall in Fig. 9.6(c) and it is moved to an off-center place 3.5 cm from one side of the wall in Fig. 9.6(d). For the given background wall, by subtracting the incident fields from the total fields, we obtain a 12 × 23 matrix recording the scattered fields. These scattering data are further calibrated using the “incidence calibration” method [23]. The inversion results for the centered-cylinder (Fig. 9.6(c)) are presented [23]. The inversion results for the more challenging off-center case (Fig. 9.6(d)), obtained by the OP/SOP-homo and OP/SOP-inhomo schemes, are shown in Fig. 9.7. Note that the standard twofold subspace-based optimization method (TSOM) described in Section 6.4.2 is used to solve the OP-homo scheme. It can be Inversion: Inhomogeneous Background Medium seen that the inversions based on the inhomogeneous-background Green’s function (Fig. 9.7(c) and (d)) produce better reconstruction results than their homogenous-background counterparts (Fig. 9.7(a) and (b)). The gap between the cylinder and the wall is more sharply distinguished. When we directly apply the SOM or TSOM to solve inhomogeneous background ISPs under the OP/SOP-homo schemes, usually we use the background’s information 𝜒b (r) as the initial guess. At the first sight, it seems hard to incorporate other information about the known background obstacle under the OP/SOP-homo schemes. Recently, [24] provided a detailed analysis of the induced contrast current to improve the performance of OP/SOP-homo schemes. It explicitly used the knowledge of the field Eb (r) generated when only the known background obstacle exists. The total field is written as E(r) = Eb (r) + Es (r), where Es (r) is the scattered field due to the presence of unknown scatterer. The contrast current is then J(r) = [𝜒s (r) + 𝜒b (r)] ⋅ [Eb (r) + Es (r)], which radiates in the homogeneous background. The details of the method can be found in [24]. It is worth noting that these OP/SOP-homo schemes are exact models; that is, there is no approximation made. When certain approximations are made, alternative OP/SOP-homo schemes can be proposed. For example, in solving an SOP, [25] assumes that the scattered field Es (r) is much smaller than the background field Eb (r) in the domain of the scatterer, which can be considered as a Born approximation with respect to an inhomogeneous background medium. In [25], the “normal medium” is a horizontally layered medium. The so-called “normal medium”, a terminology from [25], is a more general concept than the homogenous background medium since it covers all cases where an analytical Green’s function is available. 9.5 Examples of Three-Dimensional Problems In many real-world inhomogeneous background ISPs, it is known that the scatterers are located within a certain region; that is, the B1 in Fig. 9.1 is known a priori. In this case, the BI equation can be formulated on the B1, instead of conventionally on the B3, which has the tremendous advantage of limiting the computational domain within B1 at each iteration during the optimization process. This section focuses on three-dimensional inhomogeneous background ISPs where B1 is interior to B2. In the region of scatterer, that is, B1 and its interior region, we apply the three-dimensional FEM-BI method (see section 10.5 of [21]). We label the interior region as V and its boundary B1 as S. The outward normal direction is ̂ The field in V satisfies the vector wave equation denoted as n. ∇ × ∇ × E(r) − k02 𝜖r (r)E(r) = 0 (9.33) 243 244 Electromagnetic Inverse Scattering which is in fact (2.114) for nonmagnetic materials. Using a test function T to dot multiply (9.33), integrating it over the domain V , and using the divergence theorem, we obtain the weak-form equation, ∫ ∫ ∫V (∇ × T) ⋅ (∇ × E) − k02 𝜖r T ⋅ EdV + i𝜔𝜇0 ∯ T ⋅ (n̂ × H)dS = 0 S (9.34) where E is the electric field in the domain V and H is the magnetic field on the boundary S. In the exterior region, that is, the region outside of B1, the electric field is given by the Huygens’ principle introduced in Section 2.12, E(r) = Ei (r) + ∯S ̂ ′ ) × H(r′ )] i𝜔𝜇0 GE (r, r′ ) ⋅ [n(r ̂ ′ )]dS(r′ ) + GEM (r, r′ ) ⋅ [E(r′ ) × n(r (9.35) ̂ (9.35) leads to For an r that approaches the boundary S, n× n̂ × E = n̂ × Ei + n̂ × ∯S ̂ i𝜔𝜇0 GE ⋅ [n̂ × H] + GEM ⋅ [E × n]dS (9.36) If we discretize the rectangular cuboid domain V into rectangular brick elements, the boundary S is consequently discretized into rectangular patch elements. We choose the rectangular brick edge-based vector elements Nei , which is curl-conforming, as the expansion bases for the electric field Ee in the eth brick element, e = 1, 2, … , M, where M is the total number of brick elements. ∑12 We have Ee = i=1 𝛼ie Nei , where 12 is the total number of expansion bases in the rectangular brick element. We choose the rectangle edge element Ssj = n̂ × Nsj to expand the boundary field n̂ × Hs in the sth rectangular patch element, s = 1, 2, … , Ms , where Ms denotes the total number of rectangular patch elements. ∑4 We have n̂ × Hs = j=1 𝛽js Ssj , where 4 is the total number of expansion bases in the rectangular patch elements. Since a rectangular patch element is one of the six facets of an outermost brick element, the expansion of n̂ × E on the boundary S automatically follows from the expansion of E in the brick elements. We apply Galerkin’s technique to (9.34), that is, the test function T is chosen as the basis function Nei , use a global numbering of all edges, and eventually yield a linear equation system, K ⋅𝛼+B⋅𝛽 =0 (9.37) We apply the test function T = Nsj (using a global numbering of all edges) to (9.36), integrate it over the surface S, and obtain P⋅𝛼+Q⋅𝛽 =b (9.38) Inversion: Inhomogeneous Background Medium In the forward problem, the vector b on the right-hand side of (9.38) is given and the unknown coefficients 𝛼 and 𝛽 are solved from (9.37) and (9.38). Then the scattered field can be calculated by the integral that appears in (9.35), s s s E = P ⋅ 𝛼b + Q ⋅ 𝛽 where 𝛼 b s (9.39) denotes extracting the values of 𝛼 for the edges located on the boundary S. P is slightly different from P, with the observation points shifted to the s positions of receivers. The same applies to Q and Q. When we apply the above procedure to solve the forward or inverse problem, we first need to numerically obtain the dyadic Green’s functions GE (r, r′ ) and GEM (r, r′ ) since their analytical formulas usually do not exist. In such computations, we place on the boundary S the electric dipole and magnetic dipole that are tangent to the surface. Electric fields are evaluated at both the boundary S and at the receivers. Such computations can be implemented in commercial software. It is obvious that the computation of dyadic Green’s functions can be implemented in parallel. For the inverse problem, the objective function can be constructed as a standard one that quantifies the mismatch between measured and calculated scattered fields. The unknown parameters, which are the relative permittivities of brick elements inside the boundary B1, are updated during the optimization process. It is worth mentioning that at each iteration of optimization, the matris s ces P , Q , P, Q, and B are unchanged since they are independent of scatterers. Thus, the numerical evaluation of dyadic Green’s functions is implemented only once and the data are stored in a library for later use. It is stressed that the computational domain is always restricted to the boundary B1 and its interior region during the optimization process. There are two important issues to note when dealing with numerical dyadic Green’s functions. The first is the choice of medium in the region V , which is interior to B1. As discussed in Section 2.12 when applying the Huygens’ principle to express the scattered field outside of the boundary B1, we have the freedom to choose the medium that is interior to B1. In principle, the medium interior to B1 can be chosen to be an arbitrary isotropic medium, but care should be taken of the region in the near neighborhood of B1. For the sake of simplifying the evaluation of the integrals appearing in P and Q, it is desirable to choose the medium at the interior side of B1 to be the same as the medium on the other side. That is, we expect that the electric/magnetic dipoles placed at the center of rectangular patch elements on B1 are surrounded by a homogenous medium within a finite region. The second issue concerns with the evaluation of the integrals appearing in P and Q. When the source cell (with coordinate r′ ) is different from the field cell (with coordinate r), the integral can be evaluated numerically 245 246 Electromagnetic Inverse Scattering using the mid-point integration or more accurate three-point Gauss–Legendre quadrature. When the source cell coincides with the field cell, care should to taken to deal with the singularity. We decompose the Green’s function into the homogeneous Green’s function and the perturbation dyadic Green’s function. The homogeneous Green’s function has an analytical form and the corresponding integral can be calculated by the standard method in FEM (see section 10.3 of [21]). The perturbation dyadic Green’s function is a smooth function and its integral can be numerically evaluated using two sets of integration points that do not coincide. This procedure has been applied to two real-world applications, which will be introduced in the next two subsections. 9.5.1 Confocal Laser Scanning Microscope Confocal laser scanning microscopy (CLSM) is a valuable tool for obtaining high resolution images and has been applied in many scientific disciplines, ranging from biology to semiconductor industry. Figure 9.8 illustrates the schematic of a confocal optical microscope. Its imaging model consists of three subsystems: focusing of incident light, interaction of focal field with the sample, and detection of the scattered light [26] (section 4.3). For a scanning system, the sample is scanned relative to the optical system and for each scanning point the total intensity of the light passing through a finite-sized detector pinhole is collected at the detector. The laser light with a wavelength of 405 nm is focused by the objective lens and the focal field illuminates object structures attached to the substrate, which Huygens’ surface Laser Beam (405 nm) PMT PH TL BS OL Structure on the substrate Figure 9.8 Schematic diagram of a confocal optical microscopy system. The modeling consists of three subsystems: focusing of incident light, interaction of focal field with the object structures, and the detection of the scattered light. OL, Objective lens; TL, Tube lens; BS, Beam splitter; PH, pinhole; PMT, Photomultiplier tube. The inset shows the focal spot and computational domain (the line box with the arrow) used in the subsystem II. The laser light of 405 nm wavelength is focused by 150× NA0.9 objective lens and the intensity is recorded by a PMT with a pinhole of 20 μm diameter. The sample is expanded and shown on the left-hand side. Source: Chen 2016, Optica, 3, 1339–1347. [28] Reproduced with permission of The Optical Society. Inversion: Inhomogeneous Background Medium is referred to as the sample. The interaction of the focal field with the sample is treated as an electromagnetic scattering problem in an inhomogeneous back√ ground, where the refractive index nr (r), which is equal to 𝜖r (r), of both the background medium and the sample are spatially varying. The scattered light from the sample is refracted by the objective lens and then focused by the tube lens, and eventually the intensity of light is collected by the detector pinhole. For each scanning point, that is, each relative position of the microscopy with respect to the sample, we obtain one intensity signal I. After the scanning process is finished, we obtain a vector I by stacking all measurements. The numerical method to solve the forward problem is as follows. The vector diffraction theory is used to analyze the first and third subsystems. The second subsystem (interaction of the focal field with the sample) is dealt with by the FE-BI method. As shown in the inset of Fig. 9.8, the closed boundary S of the domain V divides the problem into an interior and an exterior region. The BI is applied to the S and consequently electric/magnetic dipoles should be placed on S to numerically evaluate the Green’s function. For a given object with the refractive index nr (r), we denote the simulated intensity distribution vector as I sim (nr ), where nr denotes the discretized version of nr (r). The inverse reconstruction is to estimate the unknown refractive index distribution so as to minimize the discrepancy between the computed image and experimental image. The cost function with a regularization term is defined as ‖ I (n ) − I (n ) ‖2 ‖ mea r ‖ (9.40) f (nr ) = ‖ sim r ‖ + 𝛾Δ(nr ) ‖ ‖ I (n mea r ) ‖ ‖ where I mea is the calibrated image data from the experimental CLSM image data I exp . In the cost function, the first term is a fidelity term measuring the discrepancy between the estimated and the measured data and the second term is a regularization term, which enforces a priori knowledge to stabilize the ill-posed problems. The regularization parameter 𝛾 is chosen empirically to balance the accuracy and stability. Here the total variation regularization term is chosen to enforce the sparsity on the gradient of refractive index distribution [27] √ |∇nr |2 + 𝜁 2 d𝑣 (9.41) Δ(nr ) = ∫V The main advantages of the total variation regularization are to preserve the edges in the image and to smooth homogeneous areas. Thus, such a choice is suitable here since the sample is often piecewise constant. A small constant 𝜁 > 0 in (9.41) makes the objective function differentiable at nr = 0 and 𝜁 = 1 × 10−10 is taken in the computation. For the initial guess of the optimization, we choose a homogeneous refractive index distribution that is simply the value of the substrate. The image reconstruction (unconstrained optimization problem) is solved by the conjugate gradient method. To demonstrate the capability of the proposed approach, the four-square and four-disk patterns are fabricated and then imaged by the CLSM system at 247 248 Electromagnetic Inverse Scattering 160 nm (a) 160 nm (b) (c) (e) (f) 40 nm 40 nm (d) (g) (h) Figure 9.9 Inverse reconstruction using four-square and four-disk patterns with 160 nm center-to-center and 40 nm edge-to-edge distances: (a) and (b) SEM images of four-square and four-disk patterns; (c) and (d) The simulated images of four-square and four-disk patterns using the proposed optical model; (e) and (f ) The calibrated images from experimental images of four-square and four-disk patterns using the CLSM setup; (g) and (h) Inverse reconstruction images based on images in (e) and (f ) using the proposed inversion approach with 56 iterations. Scale bars in (a) and (b) are 80 nm. Source: Chen 2016, Optica, 3, 1339–1347. [28] Reproduced with permission of The Optical Society. the National University of Singapore [28]. The scanning electron microscopy (SEM) images of them are shown in the Fig. 9.9(a) and (b), where the fabricated patterns show 160 nm center-to-center and 40 nm edge-to-edge distances. It is obvious from Fig. 9.9(e) and (f ) that the calibrated images from experimental images that are obtained by the CLSM cannot resolve the four squares or disks. In comparison, the four squares or disks can be easily identified in Fig. 9.9(g) and (h), which are reconstructed images from the images in (e) and (f ), respectively. The reconstructed image (Fig. 9.9(g)) for four-square pattern provides four separated spots with artifacts. This is because the CLSM image in Fig. 9.9(e) has some distortions due to the contamination of noises compared to the simulated images in Fig. 9.9(c). In contrast, the simulated and CLSM images (Fig. 9.9(d) and Fig. 9.1(f )) for the four-disk pattern are much similar and thus the reconstructed image of the four-disk pattern is much better, as shown in Fig. 9.9(h). Inversion: Inhomogeneous Background Medium 9.5.2 Near-Field Scanning Microwave Impedance Microscopy Near-field scanning microwave impedance microscopy (MIM) has attracted intense scientific and industrial interests in the past decade due to its considerable abilities to determine the composition and physics of nanoscale materials and devices. A schematic of the MIM is shown in Fig. 9.10. In an MIM measurement, GHz voltage modulation is delivered to the tip of a metallic probe, usually of pyramid or cone shape with a base length of several μm and an apex diameter of the order of tens of nm. When the tip is brought close to and scanned across the surface of a sample, variations of tip-sample-ground admittance are recorded, the real and imaginary parts of which are denoted as MIM-Re and MIM-Im signals, respectively. Thus, the MIM-Re and MIM-Im signals depend on the property of the sample, and the problem of inferring the property of the sample from the MIM signals is a typical inverse problem. We mention in passing that the MIM technique is closely related to the modulated scatterer technique [29], the application of which to microwave diffraction tomography can be found in [30]. In the near-field region, the sizes of tip and sample, as well as their gap, are much smaller than the wavelength and, consequently, the probe-sample interaction is actually in the electro-quasistatic regime. In this regime, the electric surface charges located on the surface of metallic probe have short action distances due to the absence of spatial phase oscillation. Numerical simulations have shown that only a limited region beneath the probe, referred to as the effective window, contributes to the measured signal [31]. We decompose the whole 3D simulation domain into two regions: the effective window and the Detector Reflected Signal Laser Coupler Source Mixer and Amplifiers ΔY MIM-Re MIM-Im Figure 9.10 A schematic of the MIM. GHz voltage modulation is delivered to the tip of a metallic probe. When the tip of the probe is brought close to and scanned across the surface of a sample, variations of tip-sample-ground admittance are recorded, the real and imaginary parts of which are denoted as MIM-Re and MIM-Im signals, respectively. Source: Wei 2016, IEEE Trans. Microw. Theory Techn., 64, 1402–1408. [31] Reproduced with permission of IEEE. 249 Electromagnetic Inverse Scattering region outside of it. The FEM is used in the effective window and the BI is applied to the closed boundary of the effective window. To apply the BI, we numerically evaluate and then store the inhomogeneous background Green’s function, which accounts for the tip structure and the material property outside of the boundary. Thus, the FEM-BI model applies to arbitrary tip structures. The detailed information on the forward problem solver can be found in [31]. The MIM image obtained by scanning over the sample records the contrast capacitance, but does not directly show the permittivity of sample. In addition, when the MIM tip scans a point of sample, the received signal comes from not only the single point that is directly beneath the tip, but instead all other points inside the effective window. Thus, the measured MIM signal is in fact a complex function of the permittivity of sample. Therefore, we need to solve an inverse problem to reconstruct the permittivity of sample from the measured data. Here, we formulate the inverse problem as an optimization problem, where the difference between calculated and measured contrast capacitance 16 Ws 0.1 14 0.2 Ws1 ε1 Ws2 Ws hp hs1 hp1 y (um) Ls2 εb 0.3 12 0.4 10 0.5 0.8 0.1 0.2 5 0.2 4 0.4 3.5 0.5 3 0.6 2.5 0.8 (c) 0.6 0.8 0.6 0.8 4 16 14 0.3 12 0.4 10 0.5 8 0.6 6 1.5 0.7 4 1 0.8 2 0.7 y (um) 4.5 0.3 0.4 x (um) (b) 5.5 0.4 x (um) 0.2 F× 10–12 0.1 0.2 6 0.7 hs (a) 8 0.6 εb y (um) 250 0.2 0.4 x (um) 0.6 0.8 2 (d) Figure 9.11 (a) A three-dimensional sample with a “51” shape perturbation presented. The substrate provides a background relative permittivity 𝜖b = 3.9 and the perturbation has 𝜖1 = 16; (b) top view of exact distribution of relative permittivity in (a); (c) the simulated MIM signal, where 5% white Gaussian noise is added; and (d) reconstruction of relative permittivity from the signal in (c). Inversion: Inhomogeneous Background Medium is minimized. The conjugate gradient (CG) algorithm is used to minimize the objective function. In solving the inverse problem for the near-field scanning MIM, the fact that only a limited region beneath the probe contributes to the measured signal is of great importance since it saves much computational time during the raster-scanning process. Figure 9.11(a) presents a three-dimensional “51” shape perturbation sample [36]. The total sample size is Ws × Ws × hs with Ws = 6 μm and hs = 1 μm. As illustrated in Fig. 9.11(a), a “51” shape perturbation is distributed in a top layer of the sample with the thickness hp = 0.4 μm, width Ws1 = 100 nm, Ws2 = 250 nm, and length Ls1 = 600 nm, Ls2 = 150 nm. Figure 9.11(b) presents the top view of exact distribution of relative permittivity for a “51” shape perturbation sample. Figure 9.11(c) presents the simulated MIM signal with 5% Gaussian noise. Note that only one channel of the MIM signals is present since the other channel is zero for lossless samples. The reconstructed permittivity profile from the received noisy signal is shown in Fig. 9.11(d), which shows that the proposed method is able to reconstruct the properties of samples and at the same time provide improved resolution than the measured MIM signal. What is more interesting is that, in addition to providing an improved lateral resolution, near-field scanning MIM is also able to provide depth information. Figure 9.12 shows a two-layer structure. The substrate provides a background relative permittivity 𝜖b = 3.9. Two vertical bars with 𝜖2 = 6 are located on the top layer and one horizontal bar with 𝜖1 = 16 is located in the lower layer. Ls Ws (a) 0.2 0.1 0.2 12 0.2 10 0.3 8 0.4 0.5 F/m × 10–12 5 0.1 4.5 4 0.2 3.5 3 0.3 2.5 2 0.4 1.5 1 0.5 0.3 0.4 0.5 0.1 0.2 0.3 0.4 0.5 x (um) (d) y (um) 14 0.1 0.2 0.3 x (um) 0.4 0.5 5.5 5 0.3 4.5 0.4 6 0.5 4 0.1 (b) 0.1 0.2 0.3 0.4 x (um) (e) 0.2 0.3 x (um) 0.4 0.5 4 (c) 7.5 7 6.5 6 5.5 5 4.5 4 3.5 y (um) y (um) 0.1 0.1 0.5 y (um) ε2 ε1 y (um) Ls ε2 6 16 Si02 Ws 0.1 7 0.2 6 0.3 5 0.4 4 0.5 0.1 0.2 0.3 0.4 x (um) 0.5 (f) Figure 9.12 (a) Three-dimensional view of a two-layer medium with Ws = 100 nm, Ls = 400 nm, 𝜖1 = 16, and 𝜖2 = 6. Top view of the exact distribution of relative permittivity for the (b) bottom layer and (c) top layer. (d) The simulated received MIM with 1% additive white Gaussian noise. Reconstructed distribution of relative permittivity for the (e) bottom layer and (f ) top layer. 3 251 252 Electromagnetic Inverse Scattering The simulated received MIM data with 1% additive white Gaussian noise is shown in Fig. 9.12(d), where a single 2D image cannot distinguish the two-layer structure. By solving a 3D inverse problem, we obtain the distribution of reconstructed relative permittivity. Figure 9.12(e) and (f ) shows the reconstructed sectional image for the bottom and top layers, respectively. Although the reconstructed relative permittivity of the lower bar is much lower than the exact value, the position, size, and shape of the bar are satisfactorily reconstructed. It is worth commenting that it is the nature of the inverse problem that the lower-layer structure is difficult to reconstruct since its interaction with the probe is much weaker than that of the top layer. In other words, a lack of information cannot be remedied by mathematical calculations. 9.6 Discussions Three methods for solving inhomogeneous-background ISPs are presented in this chapter. The first two methods, introduced in Sections 9.2 and 9.3, require use of the truncation boundary B3. In order to ensure high accuracy and at the same time keep computational domain to a minimum, the BI equation approach is a good candidate. In this case, the boundary B3 can be chosen to be conformal to and very close to the B2. Section 9.2 introduces an approach that numerically obtains an inhomogeneous background Green’s function for every point in the DOI and then applies IE-based inversion algorithms to solve ISPs. The advantage of this approach is that it inherits the desirable properties of IE-based inversion algorithms, such as long-range interaction and good physical and mathematical properties of the induced current. The weakness of this approach is the high computational and storage overhead in numerical evaluation of the Green’s function GD and GS . Nevertheless, such computations are conducted only once during the whole inversion process since GD and GS are independent of the property of scatterers. Section 9.3 presents an approach that directly solves differential equations without calculating the numerical Green’s function. Compared with the first approach, the method has much lower computational and storage overheads and but it needs more iterations to converge due to the local-range interaction of FD methods. The third approach, introduced in Section 9.4, treats the known inhomogeneous background as a known scatterer rather than part of the background. The advantages of this approach are mainly little or no computational and storage overheads and the availability of existing fast forward problem solver, such as the conjugate gradient fast Fourier transform (CG-FFT) method. Nevertheless, the approach has a higher degree of nonlinearity and thus might perform poorly when the known background obstacle has a higher permittivity than the unknown scatterer. Inversion: Inhomogeneous Background Medium If it is known that the scatterers are located within a certain region, that is, the B1 in Fig. 9.1 is known a priori, then the BI equation can be formulated on the B1, instead of conventionally on the B3, which has the tremendous advantage of limiting the computational domain within B1 at each iteration during the optimization process. Section 9.5 uses this approach to solve 3D ISPs. Numerical evaluation of Green’s functions is needed, but the test electric/magnetic dipoles are placed only on the boundary B1, instead of in the whole DOI, which should be distinguished from the method presented in Section 9.2. In the FEM implementations presented in this chapter, the finite element is chosen to be a square element in 2D or a rectangular brick element in 3D, for the sake of ease of mesh-generation and visualization. Note that for ISPs involving dielectric scatterers, such elements are greatly desirable for the following two reasons. First, although other elements, such as triangular or tetrahedral element, are more flexible and accurate in representing the geometry of scatterers, they are advantageous in the forward problem, but not necessarily in the inverse problem. Since scatterers are unknown in ISPs, the triangle or tetrahedral element has to be applied to the whole domain of interest, which inevitably increases the number of unknowns, resulting in not only an increased difficulty for the inversion, but also a heavy computational cost at each iteration of the optimization process. What is more significant is that the fine features of the scatterer, such as sharp corners, cannot be reconstructed anyway in solving IPSs. In practice, sharp corners are usually reconstructed to be smooth round corners, unless special regularization methods that incorporate a priori information about sharp corners are used. Second, the induced current inside dielectric scatterers is volumetric, which does not have a strict requirement on the directionality, which is quite different from the scattering of perfect electric conductors (PECs). Considering these two reasons, a square element in 2D and a rectangular brick element in 3D are good candidates for elements in solving ISPs involving dielectric scatterers. In many real-world inhomogeneous background ISPs, the experimental environment is controllable and the background Green’s function can be experimentally obtained. For example, [32] experimentally determines the point spread function (PSF), which is a simple function of the Green’s function, via a calibration measurement of a known electrically very small (point) scatterer, which is placed in the known environment formed by the background medium and the acquisition system. As far as the application of differential equation solver to ISPs is concerned, a promising direction in solving large-scale 3D electromagnetic ISPs involving penetrable scatterers is to apply the domain decomposition methods. Recently, [33] adopts the finite-element tearing and interconnecting full-dual-primal (FETI-FDP2) method as the forward problem solver in solving 3D electromagnetic ISPs. The idea is to split the computational domain into smaller nonover- 253 254 Electromagnetic Inverse Scattering lapping subdomains in order to simultaneously solve local subproblems. The FETI-FDP2 method is efficiently coupled with the inversion algorithm, keeping the memory requirement and the computational time as low as possible. Finally, we briefly mention that when the scatterers are known to be small scatterers, much smaller than the wavelength, that are imbedded in the known inhomogeneous background medium, the multiple signal classification (MUSIC) that has been introduced in Chapter 4 can be used to locate small scatterers [34]. The applicability of MUSIC is supported by the fact that the singularity property of the homogeneous-background Green’s function that is used in Section 4.2 is also applicable to an inhomogeneous-background Green’s function when the observation position approaches the source point. References 1 Cui, T.J., Chew, W.C., Yin, X.X., and Hong, W. (2004) Study of resolution 2 3 4 5 6 7 8 9 10 and super resolution in electromagnetic imaging for half-space problems. IEEE Transactions on Antennas and Propagation, 52 (6), 1398–1411. Carney, P.S. and Schotland, J.C. (2001) Three-dimensional total internal reflection microscopy. Opt. Lett., 26 (14), 1072–1074. Lesselier, D. and Chew, W.C. (2004) Foreword: Special section on electromagnetic characterization of buried obstacles. Inverse Probl., 20 (6). Song, L.P., Yu, C., and Liu, Q.H. (2005) Through-wall imaging (TWI) by radar: 2D tomographic results and analyses. IEEE Trans. Geosci. Remote Sens., 43, 2793–2798. Solimene, R., Soldovieri, F., Prisco, G., and Pierri, R. (2009) Three-dimensional through-wall imaging under ambiguous wall parameters. IEEE Transactions on Geoscience and Remote Sensing, 47 (5), 1310–1317. Shen, J., Chen, X., Zhong, Y., and Ran, L. (2011) Inverse scattering problem in presence of a conducting cylinder. Opt. Express, 19 (11), 10 698–10 706. Lesselier, D. and Duchêne, B. (1996) Wavefield inversion of objects in stratified environments. From backpropagation schemes to full solutions, in Review of radio science (ed. R. Stone), Oxford University Press, pp. 235–268. Li, F., Liu, Q.H., and Song, L.P. (2004) Three-dimensional reconstruction of objects buried in layered media using Born and distorted Born iterative methods. IEEE Geoscience and Remote Sensing Letters, 1 (2), 107–111. Abubakar, A., Hu, W., van den Berg, P.M., and Habashy, T.M. (2008) A finite-difference contrast source inversion method. Inverse Probl., 24, 065 004. Chen, X. (2010) Subspace-based optimization method for inverse scattering problems with an inhomogeneous background medium. Inverse Probl., 26 (7), 074 007. Inversion: Inhomogeneous Background Medium 11 Zakaria, A., Gilmore, C., and LoVetri, J. (2010) Finite-element contrast 12 13 14 15 16 17 18 19 20 21 22 23 24 25 source inversion method for microwave imaging. Inverse Probl., 26 (11), 115 010. Bulyshev, A.E., Souvorov, A.E., Semenov, S.Y., Posukh, V.G., and Sizov, Y.E. (2004) Three-dimensional vector microwave tomography: theory and computational experiments. Inverse Probl., 20 (4), 1239. Zainud-Deen, S.H., Hassen, W.M., Ali, E.M., Awadalla, K.H., and Sharshar, H.A. (2008) Breast cancer detection using a hybrid finite difference frequency domain and particle swarm optimization techniques, in 2008 National Radio Science Conference, pp. 1–8. Meaney, P.M., Paulsen, K.D., and Ryan, T.P. (1995) Two-dimensional hybrid element image reconstruction for TM illumination. IEEE Transactions on Antennas and Propagation, 43 (3), 239–247. Rekanos, I.T., Yioultsis, T.V., and Tsiboukis, T.D. (1999) Inverse scattering using the finite-element method and a nonlinear optimization technique. IEEE Transactions on Microwave Theory and Techniques, 47 (3), 336–344. Ye, X., Song, R., Agarwal, K., and Chen, X. (2012) Electromagnetic imaging of separable obstacle problem. Opt. Express, 20 (3), 2206–2219. Firoozabadi, R., Miller, E.L., Rappaport, C.M., and Morgenthaler, A.W. (2007) Subsurface sensing of buried objects under a randomly rough surface using scattered electromagnetic field data. IEEE Transactions on Geoscience and Remote Sensing, 45 (1), 104–117. Devaney, A.J. and Dennison, M. (2003) Inverse scattering in inhomogeneous background media. Inverse Probl., 19 (4), 855. Dong, Q. and Rappaport, C.M. (2009) Microwave subsurface imaging using direct finite-difference frequency-domain-based inversion. IEEE Transactions on Geoscience and Remote Sensing, 47 (11), 3664–3670. Peterson, A.F., Ray, S.L., and Mittra, R. (1998) Computational methods for electromagnetics, IEEE Press, New York. Jin, J.M. (2015) The finite element method in electromagnetics, John Wiley & Sons, Inc. Kleinman, R. and Van den Berg, P. (1992) A modified gradient method for two-dimensional problems in tomography. Journal of Computational and Applied Mathematics, 42 (1), 17–35. Meng, Q., Ye, D., Huangfu, J., Li, C., and Ran, L. (2016) Experimental investigation on through-wall imaging based on non-linear inversions. Electron. Lett., 52 (23), 1933–1935. Xu, K., Zhong, Y., Chen, X., and Lesselier, D. (2017, Submitted) A fast integral equation based method for solving electromagnetic inverse scattering problems with inhomogeneous background. IEEE Trans. Antennas Propag. Zhdanov, M.S., Lee, S.K., and Yoshioka, K. (2006) Integral equation method for 3D modeling of electromagnetic fields in complex structures with inhomogeneous background conductivity. Geophys., 71 (6), G333–G345. 255 256 Electromagnetic Inverse Scattering 26 Novotny, L. and Hecht, B. (2006) Principles of nano-optics, Cambridge Uni- versity Press. 27 Rudin, L.I., Osher, S., and Fatemi, E. (1992) Nonlinear total variation 28 29 30 31 32 33 34 35 36 based noise removal algorithms. Physica D: Nonlinear Phenomena, 60 (1), 259–268. Chen, R., Wu, M., Ling, J., Wei, Z., Chen, Z., Hong, M., and Chen, X. (2016) Superresolution microscopy imaging based on full-wave modeling and image reconstruction. Optica, 3 (12), 1339–1347. Bolomey, J.C. and Gardiol, F.E. (2001) Engineering applications of the modulated scatterer technique, Artech House. Bolomey, J.C., Izadnegahdar, A., Jofre, L., Pichot, C., Peronnet, G., and Solaimani, M. (1982) Microwave diffraction tomography for biomedical applications. IEEE Transactions on Microwave Theory and Techniques, 30 (11), 1998–2000. Wei, Z., Cui, Y.T., Ma, E.Y., Johnston, S., Yang, Y., Chen, R., Kelly, M., Shen, Z.X., and Chen, X. (2016) Quantitative theory for probe-sample interaction with inhomogeneous perturbation in near-field scanning microwave microscopy. IEEE Transactions on Microwave Theory and Techniques, 64 (5), 1402–1408. Tu, S., McCombe, J.J., Shumakov, D.S., and Nikolova, N.K. (2015) Fast quantitative microwave imaging with resolvent kernel extracted from measurements. Inverse Probl., 31 (4), 045 007. Voznyuk, I., Litman, A., and Tortel, H. (2015) Efficient combination of a 3D quasi-newton inversion algorithm and a vector dual-primal finite element tearing and interconnecting method. Inverse Probl., 31 (8), 085 005. Chen, X. (2010) Multiple signal classification method for detecting point-like scatterers embedded in an inhomogeneous background medium. J. Acousti. Soc. Am., 127 (4), 2392–2397. Zhong, Y. and Chen, X. (2014). Differential equation based inversion method for solving inverse scattering problems, in Inverse Problems – from Theory to Applications (IPTA2014), 90–94, IOP Publishing. Wei, Z. (2016) Modeling and inversion in near-field microwave microscopy and electrical impedance tomography, Ph.D. dissertation, National University of Singapore, Singapore. 257 10 Resolution of Computational Imaging The purpose of this chapter is to discuss the resolution of an image that is obtained by solving inverse scattering problems, rather than to provide a comprehensive review of super-resolution imaging theories and schemes. An important conclusion is that the classical half-wavelength resolution widely used in traditional optical microscopy is not applicable to inverse scattering problems. The reason is that instrumental imaging and computational imaging are two different imaging strategies. The organization of the chapter is as follows. Section 10.1 discusses the resolution of a traditional optical microscopy, which is a kind of instrumental imaging. Section 10.2 introduces computational imaging, where images are generated by numerical reconstruction. Both the inverse source problem and inverse scattering problem are discussed. Section 10.3 introduces the Cramér–Rao bound (CRB), which quantifies a lower bound on the variance of any unbiased estimator. The accuracy of computational imaging is quantified by the CRB. Section 10.4 presents the resolution of image obtained by the Born Approximation (BA) that is applicable to weak scatterers. The analytical tool for the BA-based imaging provides a deep insight into the resolution of computational imaging. Section 10.5 discusses several other topics on resolution. 10.1 Diffraction-Limited Imaging System It is well known that the resolution of traditional optical microscopy is limited by diffraction due to the wave nature of light. A point source will be imaged into a finite-sized spot. Thus, when two identical point sources are in close proximity, the microscopy cannot resolve them as two distinct points. The minimum resolvable distance is defined as the spatial resolution. The theory of resolution was formulated by Abbe and Rayleigh in the nineteenth century. Since then there have been several criteria defining spatial resolution, such as Rayleigh’s criterion, Abbe’s criterion, and Sparrow’s criterion [1]. Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 258 Electromagnetic Inverse Scattering Rayleigh’s criterion states that two incoherent point sources are barely resolved when the center of the intensity pattern generated by one point source falls exactly on the first zero of the intensity pattern generated by the second [2] (section 6.5.2). The spatial resolution under Rayleigh’s criterion is given by 𝜆 , (10.1) n sin 𝜃 where 𝜆 is the wavelength of light in air, n is the refractive index of the object space, and 𝜃 is the angular semi-aperture, as depicted in Fig. 10.1(a). The resolutions defined under other criteria are slightly different from (10.1), but they are all close to Δ = 0.5𝜆∕(n sin 𝜃). When the angular semi-aperture is large enough so that sin 𝜃 ≈ 1, the spatial resolution is expressed as ΔR = 0.61 Δ = 0.5𝜆0 , (10.2) where 𝜆0 = 𝜆∕n is the wavelength in the object space. Equation (10.2) shows the well-known loosely adopted statement that the spatial resolution of the traditional optical microscopy is limited by the half wavelength due to diffraction. The resolution discussed in this chapter is mainly for coherent waves. The theory of resolution lies in how a single point source, as shown in Fig. 10.1(a), is mapped to a spreading spot in the image plane, as shown in Fig. 10.1(b). The intensity distribution in the image plane is referred to as the point spread function. For a traditional optical microscopy as shown in Fig. 10.1(a), we analyze how the point spread function is generated. Note that the single lens depicted inside the dashed box in Fig. 10.1(a) is only a schematic diagram of the lens system. In fact, all imaging elements are lumped into a single “black box,” which might be composed of several lenses with various distances between them. The passage of light inside the black box is adequately described by geometrical optics, and the imaging system is aberration-free in the sense that a diverging spherical wave incident upon the black box in the object space is converted by the system into a converging spherical wave in the image space. To avoid relying Image plane Point spread function y O 2θ z (a) (b) Figure 10.1 A single point source, located at the origin, is mapped to a spreading spot in a traditional optical microscopy. (a) A schematic diagram of the lens system, where the dashed box might be composed of several lenses, with various distances between them. (b) Distribution of intensity in the image plane. Resolution of Computational Imaging on the knowledge in optical microscopy, such as the magnification and the sine condition, we consider a simple case, where the object and image spaces have the same focal lengths and are both air filled; that is, the black box lens system that is placed in air presents left-right symmetry. We place a point source at the focus in the object space, which is defined as the origin of the coordinate system, as shown in Fig. 10.1(a). The field distribution in the object space is a well-known Green’s function G(r) = eikr ∕(4𝜋r). From the Weyl identity, for any point r, the spherical wave can be expressed in terms of plane waves (section 2.2.2 of [3]): i eikx x+iky y+ikz |z| eikr dkx dky = 4𝜋r 8𝜋 2 ∫−∞ ∫−∞ kz ∞ ∞ (10.3) where the wavenumber along the longitudinal direction (i.e., the z direction) is defined as ⎧ √ 2 k − kx2 − ky2 k 2 − kx2 − ky2 > 0 ⎪ kz = ⎨ √ (10.4) ⎪ i kx2 + ky2 − k 2 k 2 − kx2 − ky2 < 0 ⎩ This definition assures outgoing waves and a finite energy density at infinity. It can be seen that for each pair of kx and ky , the complex amplitude of the plane wave is given by i∕(8𝜋 2 kz ). From the definition of 2D Fourier transform, we find that the Fourier transform of Green’s function in object space is given by ̃ x , ky ) = G(k i eikz |z| 8𝜋 2 kz (10.5) where ∼ denotes the Fourier transform of a function. Since the focal length of the optical lens is often much larger than the wavelength, evanescent waves (k 2 − kx2 − ky2 < 0) decay to a negligible level before it reaches the lens system. Due to the finite size of the lens system, it receives only a fraction of the travelling waves (k 2 − kx2 − ky2 > 0). This portion of travelling waves, after passing through the lens system, converges to the focal point in the image space. If we define a local coordinate system in image space and the origin is located at the focus, then the converging property in image space, in contrast to the diverging property in object space, yields a field distribution that is in some sense reflected as a flip of signs of kx and ky in (10.3); that is, the (kx , ky , kz ) plane wave in object space conjugates with the (−kx , −ky , kz ) wave in image space. Consequently, due to the left–right symmetry of the lens system, for point pairs r′ and r with x′ = x, y = y′ , and z′ = −z, we find that the field distribution in the image space is an inverse Fourier transform of windowed Fourier components of field distribution in object space. ̃ x , ky )] P(r′ ) = IFT[LF (kx , ky )G(k (10.6) 259 260 Electromagnetic Inverse Scattering where the LF (kx , ky ) is a windowed low-pass filter defined as { 1, kx2 + ky2 ≤ k 2 sin 𝜃 2 LF (kx , ky ) = 0, Otherwise (10.7) We see from (10.6) that the field distribution in object space, which is singular at the point source, is mapped into a continuous field distribution in image space, which is an inverse Fourier transform of windowed Fourier components of the field distribution in object space. This interpretation is referred to as the field–field mapping. If interpreted from the source-field mapping point of view, the point source that is a delta-function distribution in object space is mapped into a spreading continuous field distribution, as shown on the right-hand side of (10.6) in image space. Consequently, (10.6) is defined as the point spread function. This spreading is a direct consequence of spatial-frequency filtering; that is, evanescent waves are lost and only a fraction of travelling waves are collected by the lens system. This analysis is for a unit point source at the focus. For a general source distribution S(r) near the focus in object space, the application of the convolution theorem yields ̃ x , ky )S(k ̃ x , ky )] FI (r′ ) = (P ∗ S)(r′ ) = IFT[LF (kx , ky )G(k (10.8) The spatial resolution of traditional optical microscopy can be understood as a hardware implementation of the inverse Fourier transform of windowed Fourier components. The image is physically formed on the film or charge-coupled device (CCD) sensor placed in the focal plane. This imaging modality is referred to as instrumental imaging. The hardware implementation of the inverse Fourier transform can be equally successfully replaced by the software implementation. That is, if the lens system inside the black box in Fig. 10.1(a) is replaced by sensors that read the windowed Fourier components and then pass the data to a computer, then a numerical implementation of the inverse Fourier transform in the computer is able to generate in a display a digital image that is, in principle, the same as the physical image formed on the film. This imaging modality is referred to as computational imaging. Naturally, a question is raised about computational imaging: if the computer, upon receiving the windowed Fourier components, implements an algorithm that is different from the inverse Fourier transform, is it possible to achieve a better spatial resolution? The answer is confirmative, which will be the topic in Section 10.2. To summarize, computational imaging is different from instrumental imaging and thus the spatial resolution of traditional optical microscopy is not applicable to computational imaging [4]. Before moving to the next section, we’d like to discuss two issues. First, the previous analysis on imaging is for a coherent wave and, in addition, both the magnitude and the phase of the field in the focal plane is studied. In many cases, an imaging system might work in different ways. For example, sources emit Resolution of Computational Imaging incoherent waves; only the intensity at the focal plane can be measured without the access to the phase information. The spatial resolution for those imaging modalities might exhibit different values from the one presented in this section, but the angular spectrum framework presented here still plays an important role in other imaging systems. Second, this section presents the result for scalar waves. For a vectorial wave case, the derivation of point spread function can be found in [5] and section 4.1 of [6]. In this case, the dyadic Green’s function is a 3 × 3 matrix, and the resolution depends on the orientation of the dipole source. Consequently, it is not easy to define a simple and well-accepted criterion of resolution. Thus, we will mainly discuss the resolution of scalar waves in the remaining sections. 10.2 Computational Imaging Computational imaging problems are categorized into two types. The first type is the inverse source problem, where the distribution of source amplitude is reconstructed from the measured field distribution in image space [7]. The source can be either an active source that radiates by itself or an induced source that is due to illumination by active sources. This topic will be detailed in Section 10.2.1. The second type is the inverse scattering problem, where the distribution of permittivity of the scatterer placed in object space is reconstructed from the measured scattered fields [8]. The scatterer has to be illuminated by an array of active sources. For each incidence, scattered fields are captured by an array of detectors. This topic will be detailed in Section 10.2.2. For a single incidence, the inverse scattering problem reduces to the inverse source problem. 10.2.1 Inverse Source Problem For a general source distribution S(r) in object space, where the source can be either an active or induced source, the field distribution in image space is given by (10.8); that is, FI (r′ ) = (P ∗ S)(r′ ) (10.9) The inverse source problem involves recovery of the distribution of source S(r) from the measured field distribution in image space FI (r′ ). In the spatial domain, the inverse source problem is about recovering the source distribution by deconvolving the measured field distribution in image space. If viewed from the spatial frequency domain, Section 10.1 shows that traditional optical microscopy actually conducts a hardware implementation of the inverse Fourier transform of windowed Fourier components. In computational imaging, algorithms indeed exist that, different from a direct inverse Fourier transform, are able to achieve a better spatial resolution. 261 262 Electromagnetic Inverse Scattering A natural idea is to first extrapolate the Fourier components that are outside of the window from the Fourier components that are inside the window, and then implement the inverse Fourier transform. Mathematically, it is written as ̃ x , ky ) → S(k ̃ x , ky ) ⇒ S(r) = IFT[S(k ̃ x , ky )] (10.10) LF (kx , ky )S(k For spatially bounded objects, in the absence of noise it is, in principle, possible to resolve infinitesimally small details of the object. Resolution beyond the classical diffraction limit is often referred to as super resolution. The fundamental reasons lie in the following basic mathematical principles (section 6.6 of [2] and [9]). The two-dimensional Fourier transform of a spatially bounded function is an analytic function and once an analytic function is known exactly in an arbitrarily small but finite region, then the entire function can be uniquely found by means of analytic continuation. In other words, although evanescent waves cannot be directly measured in the far field, they are mathematically linked to propagation waves and thus can be numerically recovered from propagation waves. Once the entire object spectrum is exactly found, then the exact object can be reconstructed with arbitrary precision by the inverse Fourier transform. However, in practice, only a very limited range of spectrum extrapolation is achievable due to the effects of noise in the measured data [10] (section 13.1). In addition to the aforementioned extrapolation method, one can also directly solve (10.9) for the S(r) in the spatial domain, taking some a priori information of the source. For example, [11] presents the mathematical theory of super-resolution by directly solving (10.9) for discrete point sources. The method can recover such sources precisely, that is, determining the exact locations and amplitudes by solving a convex optimization problem, provided that the distance between sources is above a certain threshold. There are many other algorithms that are able to achieve super resolutions. For example, an iterative extrapolation method works by iterating between the source domain and the spectral domain, making changes in each domain to reinforce prior knowledge of the source (such as located in a certain finite domain) or measured data [12]. Many other algorithms can be found in [10] (section 13.1) and [2] (section 6.6). One topic worth discussing is the nonradiating source. Since nonradiating sources contribute zero within the windowed spatial frequency, the entire spectrum will be automatically zero by analytical continuation. The inverse Fourier transform of the zero function yields a zero source. Thus, when no prior information about the source is available, the inverse source problem does not have a unique solution due to the presence of nonradiating sources [13]. 10.2.2 Inverse Scattering Problem Consider a distribution of relative permittivity 𝜖r (r) of an object placed in the domain of interest (DOI) D. The inverse scattering problem consists of Resolution of Computational Imaging determining the values of 𝜖r (r) from multiple incidence-scattering pairs (̂ri , r̂ s ), where r̂ i and r̂ s are the directions of incident and scattered fields, respectively. Here the incident wave are plane waves and the measurements are carried out in the far field. The contrast, also known as the scattering potential, is defined as O(r) = 𝜖r (r) − 1. For each incident-scattering pair (̂ri , r̂ s ), we have the following two equations. Inside D, the field satisfies the Lippmann–Schwinger equation, 𝜓(r, k̂ri ) = eik̂r ⋅r + k 2 i ∫D G(r, r′ )O(r′ )𝜓(r′ , k̂ri )d3 r′ , r ∈ D (10.11) ik|r−r′ | e where the G(r, r′ ) is the free-space Green’s function G(r, r′ ) = 4𝜋|r−r and ′| i i 𝜓(r, k̂r ) is the total field at r for the incidence direction r̂ . The far-field scattered field reads 𝜓 s (k̂rs , k̂ri ) = s eikr e−ik̂r ⋅r O(r)𝜓(r, k̂ri )d3 r 4𝜋r ∫D (10.12) where O(r)𝜓(r, k̂ri ) has a physical meaning of induced source and the phase s factor e−ik̂r ⋅r is the same as the one appearing in (2.101) due to the far-field approximation. For any incident wave, 𝜓(r, k̂ri ) can be obtained from (10.11) and then is substituted to (10.12). We obtain the relationship, 𝜓 s (k̂rs , k̂ri ) = P[̂rs ,O(r)] (eik̂r ⋅r ) i (10.13) where P is an operator that maps the incident field to the scattered field. Obviously, the P depends on the direction of scattered field r̂ s and the contrast O(r). When solving inverse scattering problems, continuous equations have to be discretized. We assume that there are Ni incidence directions and scattered fields are measured in Ns directions. The DOI is divided into a total number of M cells. The inverse scattering problem consists of reconstructing the value of O(rm ), m = 1, 2, ..., M from a total number of Ni Ns measured scattered fields, 𝜓 s (k̂rsq , k̂rip ), p = 1, 2, ..., Ni and q = 1, 2, ..., Ns . For any given candidate of O(rm ), m = 1, 2, ..., M, the corresponding operator P can be calculated and consequently we are able to calculate the scattered field from (10.13). Next, we check whether the calculated scattered fields match measured ones for all incidence-scattering pairs (̂rip , r̂ sq ), p = 1, 2, ..., Ni and q = 1, 2, ..., Ns . If we are extremely lucky and the first trial O(rm ) satisfies the match condition, then this trial O(rm ) is identified as the solution to the inverse scattering problem. If we are extremely unlucky and have to conduct brute-force trials, that is, enumerating all possible candidates for the solution and checking whether each candidate satisfies the match condition, then the computational time will be exceedingly long. In practice, it is unlikely that we are so lucky to have only one attempt, and we cannot wait long enough for brute-force checking either. Instead, a more practical approach is to convert the inverse problem to an 263 264 Electromagnetic Inverse Scattering optimization problem, min O(rm ) Ni Ns ∑ ∑ p=1 q=1 |𝜓 s (k̂rsq , k̂rip ) − P[̂rsq ,O(rm )] (eik̂rp ⋅r )|2 i (10.14) The process of searching for the solution among all candidates is guided by optimization algorithms. If there is only a single incidence, the inverse scattering problem reduces to an inverse source problem. In this case, the source O(r)𝜓(r, k̂ri ) is the induced contrast current, which is a secondary source. When there are multiple incidences, the inverse scattering problem, in which the contrast O(r) is to be determined, is different from the inverse source problem, where the amplitude of source is to be recovered. The former is a nonlinear problem, whereas the latter is a linear problem. Consequently, the diffraction-limited resolution, that is, half wavelength as a rule of thumb, as discussed in Section 10.1, does not apply to inverse scattering problems. It can be easily seen that, in absence of noise, if the trial O(r) happens to be chosen as the exact contrast, by either good luck, brute-force checking, or optimization algorithms, then the objective function (10.14) is equal to zero. In this case, the resolution of the reconstructed contrast is in principle unlimited. When measured data are contaminated with noise, we need to determine the fundamental limits of the accuracy of the reconstructed contrast. In fact, an inverse scattering problem can be treated as a parameter estimation problem, where the contrast is estimated, based on measured scattering data that are contaminated with noise. The use of the CRB approach, which is widely used in estimation theory and statistics, quantifies the best precision with which parameters of interest can be estimated in the statistical framework of unbiased estimation under given noise models. The CRB will be discussed in the next section. 10.3 Cramér–Rao Bound The CRB quantifies a lower bound on the variance of any unbiased estimator. Consider a model function that is capable of fitting the measurement data perfectly in the absence of noise. In the presence of noise, fitting is imperfect causing statistical errors in the parameter estimates. Thus, when a measurement is repeated many times, the resulting model parameters exhibit a spread. The minimal attainable values of variance corresponding to these spreads are called the CRBs. The smaller the value of CRB, the better the precision. Different estimators usually have different precision, but the CRB is independent of estimators (in terms of inverse scattering, the CRB is inversion-algorithm independent). There exist unbiased estimators, including the maximum likelihood (ML) estimator, that achieve the CRB asymptotically [14] (chapter 3). Resolution of Computational Imaging The CRB theory is based on the likelihood function. Suppose that the measured complex-valued data X have N components, X1 , X2 , …, XN . In presence of noise, the measured data are expressed as, X = X̂ + B (10.15) where X̂ = [X̂ 1 , X̂ 2 , ..., X̂ N ]T denotes the noiseless data and B = [B1 , B2 , ..., BN ]T is noise. In the following, we assume additive independent, identically distributed complex white Gaussian noise, though it is technically feasible to derive the CRB under other noise models. For complex-valued noise, we further assume that the real part is independent of the imaginary part, each having a Gaussian distribution (0, 𝜎 2 ∕2). The joint probability function of the measurement data X, also known as the likelihood function, equals the product of the probability function of all sample components, ) ( N ∑ 1 1 2 exp − |Xi − X̂ i | P(X) = 2 𝜋 N ΠNi=1 𝜎i2 i=1 𝜎i ) ( N ∑ 1 1 2 ̂ = exp − |X − Xi | 𝜎2 i (𝜋𝜎 2 )N i=1 ) ( 1 1 ̂ 2 (10.16) = exp − |X − X| 𝜎2 (𝜋𝜎 2 )N It is a common practice to use the log-likelihood function, L(X) = ln[P(X)] (10.17) Fisher information essentially describes the amount of information that data carry about unknown parameters. If the measured data X depends on the real-valued model parameter vector 𝜃 = (𝜃1 , 𝜃2 , ..., 𝜃M )T , the Fisher information matrix (FIM) F takes the form of an M × M matrix, with element ] [ 𝜕L(X) 𝜕L(X) F(𝜃)i,j = E (10.18) 𝜕𝜃i 𝜕𝜃j where E stands for expectation value. An algebraic calculation shows that the FIM can be expressed as H 2 F(𝜃) = 2 ℜ{D ⋅ D} (10.19) 𝜎 where ℜ{⋅} denotes the real part operator, the superscript H represents the conjugate transpose, and D is a matrix of size N × M, with element Dij = 𝜕 X̂ i ∕𝜕𝜃j . The CRB, which sets the lower bound of variance of the estimated parameters 𝜃, is obtained by inverting the FIM and taking the diagonal elements, −1 Var{𝜃i } ≥ CRB(𝜃i ) = [F (𝜃)]ii , i = 1, 2, ..., M (10.20) 265 266 Electromagnetic Inverse Scattering Inverse scattering problems can be categorized into two types, as far as how scatterers are represented is concerned. The first type is a parameterized model, where scatterers are known a priori to be represented by a few parameters describing geometry, location, material, and so on. The second type is a pixel (or voxel) based model, where the domain of interest is discretized into pixels and the material property at each pixel will be reconstructed. In the inverse scattering problem, the CRB is usually calculated for parameterized models. For example, [15] analyzes the precision of contrast estimators with the CRB when the target is homogeneous, infinitely-long, and has a circular cross section; [16] calculates the CRB for ideal point scatterers; [17, 18] consider the CRB for spherical or circularly cylindrical scatterers of finite size. Study [19] evaluates the CRB on shape estimation accuracy using the domain derivative technique from nonlinear inverse scattering theory, where the true shape is described by the parametric model. In comparison, due to large number of unknowns and the corresponding large size FIM, it is not common to calculate the CRB in inverse scattering problems for pixel (or voxel) based model. In [20], the two-dimensional electromagnetic inverse problem of imaging an isotropic dielectric scatterer is considered, where an optimum trade-off between the accuracy of reconstruction and the resolution (defined as the size of pixel) is defined by virtue of the CRB. Here we consider a numerical example of calculating the CRB for an inverse scattering problem. The purposes of the numerical example are twofold. Firstly we illustrate the numerical procedure of evaluating the CRB, and secondly we show that the errors in estimating the positions of two point-like scatterers from far-field data can be much smaller than half wavelength. Consider a 2D problem where ẑ is the longitudinal direction, and the system is invariant in this direction. The wave number k in air is equal 2𝜋; that is, the wavelength is equal to 1. Two nonmagnetic scatterers with circular cross section are placed at (x1 , y1 ) = (−1∕16, 0) and (x2 , y2 ) = (3∕16, 0), respectively. The radii of both scatterers are R = 0.02, which is much smaller than the wavelength. The relative permittivity 𝜖r of two scatterers is equal to 10. In this condition, the two scatterers can be effectively treated as point-like (in the xy plane) scatterers. Under the TM illumination, the scattering strength of the circular small√ scatterer is mainly √ √ due to the monopole scattering, that is, 𝜉 = 𝜖r J0 (kR)J0′ ( 𝜖r kR)−J0 ( 𝜖r kR)J0′ (kR) −4 , √ √ √ (1)′ k𝜂0 H0 (kR)J0 ( 𝜖r kR)− 𝜖r J0′ ( 𝜖r kR)H0(1) (kR) where 𝜂0 is the intrinsic impedance of the air. Ni transmitting and Ns receiving antennas are uniformly distributed on a circle with a radius of 20. In the forward scattering problem, the scattered z-component electric field is stored in the multistatic response (MSR) matrix K with size Ns × Ni [16]. The forward problem solver is based on the Foldy–Lax equation and can be found in [16]. We assume that Y , the measurement of MSR matrix, deviates from the model by additive independent, identically distributed complex white Gaussian noise with variance 𝜎 2 ; that is, Y = K + W . The noise level is defined to Resolution of Computational Imaging be the signal-to-noise ratio (SNR) in dB, that is 20log10 (||K||F ∕||W ||F ), where || ⋅ ||F denotes the Frobenius norm of a matrix. Due to the property of the noise W , the SNR is found to be just 10log10 (||K||2F ∕(Ns Ni 𝜎 2 )). The eight real parameters to be estimated are represented by a vector 𝜃, which is defined as (x1 , x2 , y1 , y2 , 𝜉1R , 𝜉2R , 𝜉1I , 𝜉2I )T . The Fisher information matrix (FIM), F(𝜃) has the element, )H ( ⎤ ⎡ 𝜕K(𝜃) ⎥ 2 ⎢ 𝜕K(𝜃) Fi,j (𝜃) = 2 ℜ ⋅ , i, j = 1, 2, … , 8, (10.21) ⎢ 𝜎 𝜕𝜃i 𝜕𝜃j ⎥ ⎦ ⎣ where K is the vectorized version of K by stacking columns sequentially. Since the CRB involves inverting the 8 × 8 FIM, there is obviously no analytical solution and we can only numerically calculate the CRBs of the eight real parameters. For the FIM, we calculate the derivative 𝜕K(𝜃)∕𝜕𝜃i either analytically or by finite differences. Two cases are considered. The first one deals with a single transmitter that is located at angle 0.2𝜋 with respect to the x-axis, whereas the second case has 10 transmitters uniformly distributed on the circle with a radius of 20. In both cases, 10 receivers are uniformly distributed on the aforementioned circle. The CRBs for the positions x1 and x2 , under different noise levels, are plotted in Fig. 10.2. As expected, the CRBs are much smaller for 10-incidence case than single-incidence case. It is worth mentioning that although the two small scatterers are separated by a quarter wavelength along the x-axis, the CRBs of the positions x1 and x2 are in the order of 10−4 wavelength for the case of 10 incidences. Noting that the wavelength is equal to 1, the result means that super-resolution reconstruction can be achieved, though the measurements 4 × 10–3 x1 x2 3 1.5 × 10–4 x1 x2 CRB CRB 1 2 0.5 1 0 10 15 20 SNR (dB) (a) 25 30 0 10 15 20 SNR (dB) (b) 25 Figure 10.2 The CRBs of x1 and x2 for (a) a single incidence and (b) 10 incidences. The wavelength is equal to 1. 30 267 268 Electromagnetic Inverse Scattering are conducted in far-field zone. It is important to emphasize that the number of scatterers is equal to the rank of the MSR matrix, as discussed in Chapter 4, and this information can be directly used by inversion algorithms without requiring to know a priori the number of scatterers. 10.4 Resolution under the Born Approximation When scatterers are weak ones, that is, when the permittivity of scatterer differs only slightly from that of the background medium, the inverse scattering problem can be solved by the first-order Born approximation, which is sometimes simply referred to as the Born Approximation (BA) method. In this case, the inverse scattering problem is linear and there exists a special relationship between scatterer’s contrast and scattered fields, which provides a rough insight into the resolution of reconstructed image. The BA method has been introduced in Section 6.2.1 for general incident waves and measurement positions. This section focuses on plane wave incidences and far-field measurements. A three-dimensional scalar wave and vectorial wave are discussed in sequence, followed by the twodimensional case. First, we consider the 3D scalar wave inverse scattering problem. Under a plane wave incidence, 𝜓 i (r) = exp(ik̂ri ⋅ r), the far-field scattered field in the direction r̂ s is s ′ eikr e−ik̂r ⋅r O(r′ )𝜓(r′ )d3 r′ (10.22) 𝜓 s (̂rs ) = 4𝜋r ∫D where 𝜓(r) = exp(ik̂ri ⋅ r) + 𝜓 s (r) is the total field. By dropping off the factor expikr ∕(4𝜋r), we define the scattering amplitude f (̂rs , r̂ i ) = e−ik̂r ⋅r O(r′ )𝜓(r′ )d3 r′ s ∫D ′ (10.23) which plays an important role in scattering theory. Consider a scatterer that occupies a finite domain in air and its relative permittivity is only slightly different from unity. Since the scattered field is very weak compared with the incident field, it is plausible to assume that one will obtain a good approximation to the total field if 𝜓(r) is replaced by the incident field exp(ik̂ri ⋅ r). Under these circumstances, the scattering amplitude is found to be f (̂rs , r̂ i ) = e−ik̂r ⋅r O(r′ )eik̂r ⋅r d3 r′ s ∫D i ′ ′ (10.24) Recalling the definition of Fourier transform, ̃ O(K) = ′ ∫D O(r′ )e−iK⋅r d3 r′ (10.25) Resolution of Computational Imaging we see that (10.24) implies ̃ rs − r̂ i )] f (̂rs , r̂ i ) = O[k(̂ (10.26) It implies that within the accuracy of the first-order Born approximation, the scattering amplitude, where the incident direction is r̂ i and the measurement direction in the far zone is r̂ s , depends entirely on one and only one Fourier component of the scattering potential, K = k(̂rs − r̂ i ). Let us examine the totality of all Fourier components of the scattering potential that can be deduced from such experiments. The following geometric construction gives us the answer. In the first step, we consider the incident wavevector ki = k̂ri = O1 A (as shown in Fig. 10.3(a)), and the measurement is made in the far field in all directions r̂ s . It is easy to see that one obtains all those Fourier components ̃ O(K) of the scattering potential, which are labeled by K vectors whose end points lie on a sphere 𝜎1 , of radius k, centered at O1 . We refer to 𝜎1 as the Ewald’s sphere of reflection, as shown in Fig. 10.3(a). Next, let us suppose that the object is illuminated in a different direction of incidence and that the scattered field is measured in the far zone in all possible directions. For each incidence, one obtains those Fourier components, which are labeled by K-vectors whose end points lie on another Ewald’s sphere of reflection, say 𝜎2 . ΣL σ1 σ2 Σ0 B2 B1 A O1 σ1 B1 ks O1 K ki ki = kri, ks = krs (a) O2 A k 2k (b) Figure 10.3 (a) Ewald’s sphere of 𝜎1 , associated with the incident wavevector ki = k̂ri = O1 A. (b) Ewald’s limiting sphere ΣL . It is the envelope of the spheres 𝜎1 , 𝜎2 , …, associated with all possible wavevectors O1 A, O2 A, …of the incident fields. Adapted from: Born and Wolf 1999, figure 13.4, p. 701. [10] Reproduced with permission of Cambridge University Press. 269 270 Electromagnetic Inverse Scattering For all possible directions of incidence, one obtains Fourier components that are labeled by K-vectors whose end points are the interior of a sphere ΣL of radius 2k, which is called the Ewald limiting sphere as shown in Fig. 10.3(b). In the first-order Born approximation, if one were to measure the scattered field in the far zone for all possible directions of incidence and all possible direc̃ tions of scatterings, one could determine all those Fourier components O(K) of the scattering potential labeled by K-vectors of magnitude |K| ≤ 2k (10.27) Thus, the low-pass filtered approximation OLP (r) to the scattering potential O(r) is found to be 1 iK⋅r 3 ̃ d K (10.28) OLP (r) = O(K)e (2𝜋)3 ∫|K|≤2k The scattering potential itself contains all the Fourier components, being given in the inverse of (10.25), namely: O(r) = 1 iK⋅r 3 ̃ O(K)e d K (2𝜋)3 ∫ (10.29) where the integration extends over the whole K-space. Alternatively, ̃ LP (K) can be expressed as the low-pass filtered Fourier components O ̃ LP (K) = H(K)O(K), ̃ O where { 1, for |K| ≤ 2k H(K) = (10.30) 0, for |K| > 2k The low-pass filtered approximation OLP (r) to the scattering potential O(r) can be obtained by the convolution theorem, OLP (r) = ∫ h(r − r′ )O(r′ )d3 r′ (10.31) One can prove that the inverse Fourier transform of the filter H(K), which is referred to as the point spread function, is given by [ ] 4k 3 j (2k|r|) h(r) = 2 1 (10.32) 𝜋 2k|r| where j1 (⋅) is the spherical Bessel function of the first order. If we define the imaging resolution as the distance between the main lobe and the first zero of the point spread function, then the resolution of the reconstructed results under the Born approximation is given by 2kΔr ≈ 4.493; that is, Δr ≈ 0.357𝜆. Next, we consider 3D electromagnetic wave inverse scattering. Under a plane ̂ where the polarization direction p̂ is perwave incidence, Ei (r) = exp(ik̂ri ⋅ r)p, pendicular to the incidence direction r̂ i , the far-zone scattered electric field in Resolution of Computational Imaging the direction r̂ s is s ′ −k 2 eikr Es (̂rs ) = e−ik̂r ⋅r r̂ s × r̂ s × O(r′ )E(r′ )d3 r′ 4𝜋r ∫D (10.33) which can be derived from (2.101). For weak scatterers, the Born approximation applies and it is plausible to replace E(r) by Ei (r), Es (̂rs ) = s i ′ −k 2 eikr ̂ 3 r′ e−ik(̂r −̂r )⋅r O(r′ )̂rs × r̂ s × pd 4𝜋r ∫D (10.34) If we denote the polarization direction and the amplitude of Es (̂rs ) as ês (̂rs ) and ̂ rs × r̂ s × p| ̂ and Es (̂rs ), respectively, then it is clear that ês (̂rs ) = r̂ s × r̂ s × p∕|̂ Es (̂rs ) = s i ′ −k 2 eikr ̂ 3 r′ e−ik(̂r −̂r )⋅r O(r′ ) sin 𝜃(̂rs , p)d 4𝜋r ∫D (10.35) ̂ is the angle between the directions r̂ s and p. ̂ For measured Es (̂rs ) where 𝜃(̂rs , p) data, we define the normalized amplitude of the scattered field as 4𝜋r . (10.36) Ens (̂rs ) = Es (̂rs ) 2 ikr ̂ −k e sin 𝜃(̂rs , p) Consequently, Ens (̂rs ) is the same as the scattering amplitude (10.24) that is presented for scalar wave case. For a given incident direction r̂ i of an electromagnetic wave, although we have the freedom of choosing the polarization direction p̂ so long as it is perpendicular to r̂ i , the diversity of p̂ actually does not increase the diversity of scattered field, which can be inferred from the normalized amplitude of the scattered field. Consequently, the resolution of reconstructed scatterer under the Born approximation for an electromagnetic wave remains the same as that for a scalar wave. This analysis in the 3D case applies to the 2D case as well. Under the Born approximation, if one were to measure the scattered field in the far zone for all possible directions of incidence and all possible directions of scattering, one ̃ could determine all those Fourier components O(K) of the scattering potential labeled by K-vectors of the magnitude K ≤ 2k. The inverse Fourier transform of the low-pass filter H2D (K) is given by [ ] 2k 2 J1 (2k|r|) h2D (r) = , (10.37) 𝜋 2k|r| J (x) which is referred to as the point spread function. Since the first zero of 1 x occurs at x = 3.832 and its main lobe locates at x = 0, the resolution of the reconstructed results under the Born approximation is given by 2kΔr ≈ 3.832; that is, Δr ≈ 0.305𝜆. In fact, (10.32) and (10.37) can be obtained from the following inverse Fourier transform of the indicator of an n-dimensional ball of radius a, an Jn∕2 (a|r|) 1 iK⋅r n e d K = , (10.38) (2𝜋)n ∫|K|≤a (2𝜋a|r|)n∕2 271 272 Electromagnetic Inverse Scattering 𝜈 𝜋 where the identity J𝜈 (z) = √ (z∕2) ∫0 cos(z cos 𝜃)sin2𝜈 𝜃d𝜃 is used (9.1.20 𝜋Γ(𝜈+0.5) of [21]). In obtaining (10.32) and (10.37), the inverse Fourier transform of a lower-pass filter is used. If higher spatial resolution is to be obtained, as mentioned in Section 10.2.1, analytical continuation will be used before implementing the IFT. However, in practice, only a very limited range of spectrum extrapolation is achievable due to the effects of noise in measured data. 10.5 Discussions Four miscellaneous topics on resolution will be briefly discussed in this section. The first topic is mainly for instrumental imaging of a point source and the other three are for inverse scattering problems. The purpose of this section is not to provide tools to solve imaging problems, but instead to comment on some existing interpretations of super-resolution imaging. First, in many far-field imaging systems, the observed super-resolution imaging is claimed to be due to the conversion of evanescent wave to propagating wave. However, in many cases, such a qualitative conclusion alone, without further quantitative evidence, is barely convincing. For example, consider that we aim to instrumentally obtain an image of a point source. The angular spectrum (or Fourier spectrum) representation of the point source is formulated by the Weyl identity, (10.3), which reads, eikr i eikx x+iky y+ikz |z| dkx dky = 2 4𝜋r 8𝜋 ∫−∞ ∫−∞ kz ∞ ∞ (10.39) If we analyze resolution in terms of Fourier spectrum, the ultimate criterion is that, during the image generation process, either instrumentally or numerically, the linear superposition of the Fourier spectrum must keep the original coefficient ieikz |z| ∕(8𝜋 2 kz ) of the Fourier spectrum radiated by the source. Consequently, if the measured far field data contain a wider Fourier spectrum, it does not automatically mean a better resolution. To convert evanescent waves to propagating waves, the point source has to be placed in the vicinity of another object, such as a sphere [22], a grating [23], the surfaces of special materials [24], and so on. Regarding the conversion of evanescent wave to propagating wave, the following two comments are made. (1) Although these objects convert evanescent waves into propagating waves, they destroy the original propagating waves as well. Consequently, in the far field, evanescent waves are still not measured and at the same time propagating waves are altered. (2) If the argument of the conversion of evanescent waves to propagating waves is used, then a convincing quantitative approach is to extract the evanescent wave spectrum from the measured propagating wave spectrum and in addition show that Resolution of Computational Imaging the extracted coefficients of the evanescent wave spectrum are the same as the original ones radiated by the point source. However, due to complex scattering mechanisms, such an extraction is not an easy task and consequently there has barely been any research into it. To conclude, a qualitative argument that evanescent waves are converted to propagating waves, without further quantitative evidence, is not convincing enough to explain super-resolution imaging. Second, in discussing the resolution of reconstructed scatterer by solving inverse scattering problems, the Fourier spectrum of the contrast distribution is often analyzed. When the multiple scattering effect cannot be ignored, measured data contain a spectrum that is outside of the Ewald limiting sphere. It is stressed that containing a spectrum outside the Ewald limiting sphere does not automatically lead to super resolution, since the scattered field depends on the spectrum in a nonlinear way. To exactly retrieve the coefficients of spectrum outside the Ewald limiting sphere, a nonlinear equation should be solved. Multiplying the Lippmann–Schwinger equation 𝜓(r, k̂ri ) = eik̂r ⋅r + k 2 i ∫D G(r, r′ )O(r′ )𝜓(r′ , k̂ri )d3 r′ (10.40) by O(r), we obtain the source-type integral equation, O(r)𝜓(r, k̂ri ) = O(r)eik̂r ⋅r + k 2 i ∫D O(r)G(r, r′ )O(r′ )𝜓(r′ , k̂ri )d3 r′ The Fourier transform of Eq. (10.41) yields ∞ ̃ 2 O(𝜷 − 𝜶)T(𝜶, k̂ri ) 3 ̃ − k̂ri ) − k T(𝜷, k̂ri ) = O(𝜷 d 𝜶 3 8𝜋 ∫−∞ k 2 − 𝛼 2 + i𝜖 (10.41) (10.42) with T(𝜷, k̂ri ) = ∫D e−i𝜷⋅r O(r)𝜓(r, k̂ri )d3 r (10.43) where the eigen-function expansion of Green’s function G(r, r′ ) has been used (section 2.2.2 of [3]) ∞ exp[i𝜶 ⋅ (r − r′ )] 3 −1 G(r, r′ ) = (10.44) d 𝜶 8𝜋 3 ∫−∞ k 2 − 𝛼 2 + i𝜖 The quantity 𝜖 is an infinitely small positive value, representing loss, introduced to remove the singularity when 𝛼 2 = k 2 . The far-field scattered field, given by (10.12), now can be written as eikr (10.45) T(k̂rs , k̂ri ), 4𝜋r ̃ Once the whole which, from (10.42), obviously contains the whole spectrum O. spectrum is obtained, the application of IFT yields super-resolution imaging. However, it is a challenging task to retrieve those spectra, since it involves solving a nonlinear equation system (10.42) for several incidences. Thus, the fact 𝜓 s (̂rs , r̂ i ) = 273 274 Electromagnetic Inverse Scattering that the scattered field contains a spectrum outside the Ewald limiting sphere does not automatically lead to super resolution. Third, generally speaking, the higher the contrast of scatterer, the stronger the multiple scattering effect. In solving inverse scattering problems, for any specific inversion method, the role of multiple scattering does not always guarantee an improved resolution. The reason is as follows. For a scalar wave scattering problem, the scattered field is formulated as s i E = GS ⋅ [(I − 𝜉 ⋅ GD )−1 ⋅ 𝜉 ⋅ E ] (10.46) The degree of nonlinearity of (10.46) as a function of 𝜉, a matrix with diagonal term being the contrast, is categorized as • If ||𝜉 ⋅ GD || ≪ 1, where || ⋅ || denotes the norm of an operator [25] (section s i 15.1), (10.46) is linear, E ≈ GS ⋅ [𝜉 ⋅ E ], which is in fact the first-order Born approximation. • If ||𝜉 ⋅ GD || < 1, the matrix inversion can be expanded into a Neumann series, s ∑∞ i E = GS ⋅ [(I + n=1 [𝜉 ⋅ GD ]n ) ⋅ 𝜉 ⋅ E ]. The truncation of the series yields a polynomial relationship. • If ||𝜉 ⋅ GD || > 1, the relationship is nonpolynomial. We make the following comments on these three conditions. • For weak scatterers, the multiple scattering effect can be ignored and scattered fields depend linearly on the contrast. Since the matrix GS is ill-conditioned, the reconstruction result is unstable in the presence of noise. • For moderate scatterers, a multiple scattering effect provides a lower-degree polynomial dependance. For example, when the dependence is the second-order polynomial, the scattered field is formulated as s i E ≈ GS ⋅ [(I + 𝜉 ⋅ GD ) ⋅ 𝜉 ⋅ E ] (10.47) Converting the equation to an optimization problem, where the mismatch between the left- and right-hand sides is minimized, we have the following objective function, s i s i min ∶ ||E − GS ⋅ 𝜉 ⋅ E ||2 − 2ℜ{(E )H ⋅ GS ⋅ 𝜉 ⋅ GD ⋅ 𝜉 ⋅ E } 𝜉 (10.48) where the terms involving the third and fourth order of 𝜉 have been ommitted. The superscript H denotes the Hermitian operator. The minimum occurs when the derivatives of objective function with respect to the elements of 𝜉 are equal to zero. If the term −2ℜ{⋅} was absent, the problem would reduce to the case of weak scatterers, which is unstable. Due to the presence of the term −2ℜ{⋅}, which is a quadratic function of 𝜉, the stability of the solution to (10.48) is improved in the presence of measurement noise. Resolution of Computational Imaging • For strong scatterers, a multiple scattering effect is intensive, which provides a higher degree of polynomial or even nonpolynomial dependance. The high degree of nonlinearity makes it challenging to obtain the solution even in the absence of noise; that is, stability is not the primary concern anymore. The following numerical example provides validation of the aforementioned conclusions. We consider a two-dimensional transverse magnetic (TM) configuration. In order to test the effect of multiple scattering, we choose the well-known “Austria” profile [27]. As shown in Fig. 10.4, it consists of an annular and two disks, with the background being air. The discs of radius 0.2 m are centered at (0.3, 0.6) m and (−0.3, 0.6) m. The ring has an exterior radius of 0.6 m and an inner radius of 0.3 m, and is centered at (0, −0.2) m. The domain of interest is a 2 × 2 m2 square centered at the origin. The relative permittivity 𝜖r of the “Austria” profile is chosen to be the following six values, 1.01, 1.05, 1.1, 1.3, 2, and 3.5. The scatterers are illuminated with 20 plane waves at 400 MHz from different angles that are evenly distributed in [0, 2𝜋). The scattered waves are collected by an antenna array with 40 antennas uniformly placed on a circle centered at the origin with the radius 5𝜆 (𝜆 = 0.75 m is the wavelength in the background medium of air). White Gaussian noise e is added to the exacts scattered field and the noise level is defined to be the s SNR in dB 20log10 (||E ||∕||e||), where E is the exact scattered field. We apply the subspace-based optimization method that is introduced in Chapter 6 to reconstruct scatterers. The reconstructed results for 20 dB and 10 dB cases are shown in Fig. 10.5 and Fig. 10.6, respectively, which demonstrate that (1) inversion is unstable for weak scatterers, especially when noise is high; (2) for strong scatterers, the optimization method is unable to find a solution that is close to the exact one, regardless of the level of noise; and (3) for moderate 1 Figure 10.4 Inverse experiment of the Austria profile: exact profile. y(m) 0.5 0 –0.5 –1 –1 –0.5 0 x(m) 0.5 1 275 276 Electromagnetic Inverse Scattering 1.01 0.5 1 0 –0.5 0.99 1.03 1.02 0.5 0 1.01 0 –0.5 1 –0.5 0 0.5 (b) –0.5 0 0.5 (a) 1.3 0.5 1.2 0.5 0 1.1 0 –0.5 1 1.1 0.5 –0.5 –0.5 0.99 1.8 1.6 1.4 1.2 1 0.8 1 –0.5 0 0.5 (c) 2 0.5 1.5 0 1 –0.5 –0.5 0 0.5 (e) –0.5 0 0.5 (d) 1.05 0.5 –0.5 0 0.5 (f) Figure 10.5 Reconstruction results of an Austria profile for 𝜖r = (a) 1.01, (b) 1.05, (c) 1.1, (d) 1.3, (e) 2, and (f ) 3.5 with SNR = 20 dB, respectively. 0.5 0 1.02 1.04 1.01 0.5 1.02 1 1 0 0.98 0.99 –0.5 –0.5 0.96 1.3 0.5 1.2 0 1.1 –0.5 1 –0.5 0 0.5 (d) 0.5 0 –0.5 –0.5 0 0.5 (e) 1.05 0 1 –0.5 –0.5 0 0.5 (b) –0.5 0 0.5 (a) 1.1 0.5 0.95 –0.5 0 0.5 (c) 1.8 1.6 1.4 1.2 1 0.8 0.6 2 0.5 1.5 0 1 –0.5 0.5 –0.5 0 0.5 (f) Figure 10.6 Reconstruction results of an Austria profile for 𝜖r = (a) 1.01, (b) 1.05, (c) 1.1, (d) 1.3, (e) 2, and (f ) 3.5 with SNR = 10 dB, respectively. scatterers, the optimization method is able to find a solution that is close to the exact one and the inversion is relatively stable in the presence of noise. Fourth, we mention in passing two items regarding the effect of multiple scattering on solving ISPs: • The multiple scattering effect may be either constructive or destructive. A closed-form analytical design rule is proposed in [18] to construct a scattering system in which the multiple scattering model is definitely destructive. Even if the interaction is constructive, in which multiple scattering is able to Resolution of Computational Imaging transfer more information of scatterers into the far field, the inversion process is also more complex. • In some literature, comparisons are made between a full-wave nonlinear inversion method that includes the multiple scattering effect and the BA inversion that excludes the multiple scattering effect, given an experimental setup in which multiple scattering does exist in nature and cannot be neglected [26]. Thus the full-wave nonlinear inversion model is an exact inversion model. However, the BA inversion model neglects multiple scattering and this approximation inevitably introduces deterministic errors, thus degrading the quality of the reconstructed results. Thus, [26] perfectly illustrates that an exact inversion model performs better than an approximate inversion model. However, it is not proper to cite this reference as an experimental proof that the multiple scattering effect helps in enhancing the reconstruction result. 10.6 Summary The definition and reporting of spatial resolution for coherent imaging methods vary widely in the imaging community. There is an abundance of literature on the mathematics and physics of imaging principles. This chapter has focused on discussing the resolution of imaging that is obtained by solving inverse scattering problems, rather than providing a comprehensive review of super-resolution imaging theories and schemes. Various topics have been discussed in this chapter and the main conclusions are summarized as follows. It is important to note that instrumental imaging and computational imaging are two different imaging strategies. For any instrumental imaging system, its imaging mechanism can be formulated as a certain imaging algorithm, and instrumental imaging is in fact just a hardware implementation of such an algorithm. In comparison, computational imaging is implemented in computers, where various imaging algorithms, including the one corresponding to the instrumental imaging, can be implemented. Thus, the classical half-wavelength resolution widely used in traditional optical microscopy is not applicable to inverse scattering problems. Computational imaging problems are categorized into inverse source and inverse scattering problems. The former deals with active objects that radiate by themselves, whereas the latter deals with passive objects that are illuminated by other primary sources. The accuracy of computational imaging depends on the noise level of measured data. In a noise-free case, it might be possible to achieve perfect reconstruction, that is, unlimited resolution, for certain computational imaging problems, such as for point-like sources/scatterers. Computational imaging problems can be treated as parameter identification problems, and the accuracy of computational imaging is quantified by the Cramér–Rao 277 278 Electromagnetic Inverse Scattering bound (CRB), which quantifies a lower bound on the variance of any unbiased estimator. The Born Approximation (BA) is an important concept in wave-imaging theory, which is applicable to weak scatterers. For plane wave incidences and far-field measurements, BA reconstruction can be understood as a low-pass filter. The analytical tool for the BA-based imaging provides a deep insight into the resolution of computational imaging. The imaging resolution are analytically derived for both two- and three-dimensional cases. When we analyze the resolution in terms of the Fourier spectrum, the ultimate criterion is that during the image generation process, either instrumentally or numerically, the linear superposition of Fourier spectrum must keep the original coefficient of Fourier spectrum radiated by the source. Consequently, unless quantitative evidences are provided, qualitative arguments (such as the improved resolution being due to the conversion of evanescent waves to propagating waves or the fact that the measured data contain a spectrum that is outside of the Ewald limiting sphere) alone are not convincing enough to explain the super-resolution imaging results that are observed in many experiments. References 1 Heintzmann, R. and Ficz, G. (2006) Breaking the resolution limit in light microscopy. Briefings in Functional Genomics, 5 (4), 289–301. 2 Goodman, J.W. (2005) Introduction to Fourier optics (3rd Edn.), Roberts & Co, Englewood, CO. 3 Chew, W.C. (1995) Waves and fields in inhomogeneous media, Van Nos- trand Reinhold, New York. 4 Horstmeyer, R., Heintzmann, R., Popescu, G., Waller, L., and Yang, C. 5 6 7 8 (2016) Standardizing the resolution claims for coherent microscopy. Nature Photonics, 10 (2), 68. Sheppard, C.J.R. and Wilson, T. (1982) The image of a single point in microscopes of large numerical aperture. Proceedings of the Royal Society of London Series a-Mathematical Physical and Engineering Sciences, 379 (1776), 145–158. Novotny, L. and Hecht, B. (2012) Principles of nano-optics, Cambridge University Press, Cambridge. Marengo, E.A. and Devaney, A.J. (1999) The inverse source problem of electromagnetics: linear inversion formulation and minimum energy solution. IEEE Transactions on Antennas and Propagation, 47 (2), 410–412. Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scattering theory, 2nd Edn. Springer-Verlag, Berlin, Germany. Resolution of Computational Imaging 9 Habashy, T. and Wolf, E. (1994) Reconstruction of scattering potentials from incomplete data. J. Mod. Optics, 41 (9), 1679–1685. 10 Born, M. and Wolf, E. (1999) Principles of optics: electromagnetic theory 11 12 13 14 15 16 17 18 19 20 21 22 23 of propagation, interference and diffraction of light, 7th Edn. Cambridge University Press, Cambridge/New York. Candès, E.J. and Fernandez-Granda, C. (2014) Towards a mathematical theory of super-resolution. Commun Pure Appl Math, 67 (6), 906–956. Gerchberg, R.W. (1974) Super-resolution through error energy reduction. Optica Acta, 21 (9), 709–720. Chew, W.C., Wang, Y.M., Otto, G., Lesselier, D., and Bolomey, J.C. (1994) On the inverse source method of solving inverse scattering problems. Inverse Probl., 10 (3), 547. Kay, S.M. (1993) Fundamentals of statistical signal processing: Estimation theory, Prentice-Hall, Upper Saddle River. Diong, M.L., Roueff, A., Lasaygues, P., and Litman, A. (2015) Precision analysis based on Cramer-Rao bound for 2D acoustics and electromagnetic inverse scattering. Inverse Probl., 31 (7), 075 003. Marengo, E.A. and Gruber, F.K. (2007) Subspace-based localization and inverse scattering of multiply scattering point targets. EURASIP J. Adv. Signal Proc., 2007, 17 342. Sentenac, A., Guerin, C.A., Chaumet, P.C., Drsek, F., Giovannini, H., Bertaux, N., and Holschneider, M. (2007) Influence of multiple scattering on the resolution of an imaging system: a Cramér Rao analysis. Opt. Express, 15, 1340–1347. Chen, X. and Zhong, Y. (2010) Influence of multiple scattering on subwavelength imaging: transverse electric case. J. Optic. Soc. Am. A, 27 (2), 245–250. Ye, J.C., Bresler, Y., and Moulin, P. (2001) Cramer-Rao bounds for 2-D target shape estimation in nonlinear inverse scattering problems with application to passive radar. IEEE Transactions on Antennas and Propagation, 49 (5), 771–783. Nordebo, S., Gustafsson, M., and Nilsson, B. (2007) Fisher information analysis for two-dimensional microwave tomography. Inverse Probl., 23 (3), 859. Abramowitz, M. and Stegun, I.A. (1972) Handbook of mathematical functions with formulas, graphs, and mathematical tables, Dover Publications, New York. Li, L., Guo, W., Yan, Y., Lee, S., and Wang, T. (2013) Label-free super-resolution imaging of adenoviruses by submerged microsphere optical nanoscopy. Light Sci Appl, 2, e104. Liu, Z., Durant, S., Lee, H., Pikus, Y., Fang, N., Xiong, Y., Sun, C., and Zhang, X. (2007) Far-field optical superlens. Nano Lett., 7 (2), 403–408. 279 280 Electromagnetic Inverse Scattering 24 Liu, Z., Lee, H., Xiong, Y., Sun, C., and Zhang, X. (2007) Far-field optical hyperlens magnifying sub-diffraction-limited objects. Science, 315 (5819), 1686. 25 Lax, P.D. (2002) Functional analysis, John Wiley & Sons, Inc., New York. 26 Chen, F.C. and Chew, W.C. (1998) Experimental verifiction of super resolution in nonlinear inverse scattering. Appl. Phys. Lett., 72, 3080–3082. 27 Belkebir, K. and Tijhuis, A.G. (1996) Using multiple frequency information in the iterative solution of a two-dimensional non-linear inverse problem, Proc. PIERS 96: Progress In Electromagnetic Research Symposium, 353, Innsbruck, Austria. 281 A Ill-Posed Problems and Regularization This appendix introduces some of the basic definitions and theorems of ill-posed problems and regularization. The materials presented are accessible to engineering researchers, with a focus on practical problem solving. Readers do not have to be familiar with functional analysis. For a rigorous treatment of ill-posed problems and regularization, literature in mathematical communities is abundant, such as [1–8]. Regularization methods used in solving inverse scattering problems can be referred to [9, 10] and references therein. Four questions are discussed in this appendix. The first is, what are the properties of ill-posed problems? Out of the three properties, instability is of most practical concern. The second is, what is the regularization theory? In order to construct a stable approximate solution of an ill-posed problem, a process called regularization is needed. The third is, what are commonly used regularization schemes? Three schemes will be introduced. The fourth is, how do we select the regularization parameter that is used in regularization schemes? Four selection methods will be introduced. A.1 Ill-Posed Problems The concept of a well-posed problem stems from a definition given by Hadamard [11]. Let K be a linear or nonlinear mapping from the space X to Y . The equation Kx = y (A.1) is said to be well-posed (or properly posed) if the following three conditions are satisfied 1) Existence: For each y ∈ Y there is x ∈ X such that Kx = y. 2) Uniqueness: For each y ∈ Y there is at most one x ∈ X such that Kx = y. 3) Stability: The solution x depends continuously on y, that is, if Kx∗ = y∗ and Kx = y, then x → x∗ whenever y → y∗ . Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 282 Electromagnetic Inverse Scattering Equations for which one or more of these conditions do not hold are said to be ill-posed. We note that the above three conditions are, in general, not independent of each other. For example, when K is a bounded linear operator, if the existence and uniqueness conditions are satisfied, then the stability condition is automatically satisfied due to theorems in functional analysis. For many physical and engineering problems, the existence and uniqueness have been well studied. Thus, the instability is often the primary concern in the study of ill-posed problems. For example, in linear algebra, let x ∈ ℂn , y ∈ ℂm , and K ∈ ℂm×n be a full-rank ill-conditioned matrix, that is, its condition number, which is defined as the ratio of the largest to smallest singular values, is much larger than one. When solving an overdetermined linear equation system (A.1), where m>n, the solution is practically unstable since a small error in y, which is often unavoidable due to measurement error, will completely destroy the solution. In general, for an ill-posed problem, for which the stability condition does not hold, a straightforward application of standard inversion usually generates numerical nonsense. There is no way to overcome this difficulty unless additional information about the solution is available. It is worthwhile recalling the remark of Lanczos: “A lack of information cannot be remedied by any mathematical trickery.” A.2 Regularization Theory In order to obtain a reasonable stable solution to an ill-posed problem (A.1), the basic idea is to replace the original equation by a close equation involving a small parameter 𝛼, such that the changed equation can be solved in a stable way and at the same time its solution is close the solution of the original problem when 𝛼 approaches zero. This process of constructing a stable approximate solution of an ill-posed problem is called regularization. Mathematically speaking, regularization replaces the inverse K −1 by a family R𝛼 (where 𝛼 > 0) of approximate inverse of K in such a way that 1) R𝛼 is a continuous operator for each 𝛼 > 0, which means stability. 2) lim𝛼→0 R𝛼 Kx = x for all x ∈ X. The family of R𝛼 is called a regularization scheme and the parameter 𝛼 is called the regularization parameter. From here onward, we consider K to be a linear operator. A linear ill-posed problem is of particular interest since it appears in a variety of important applications in science and industry. For example, many deconvolution problems are ill-posed since they have smooth or weakly singular kernels, where a Fredholm integral equation of the first kind has to be inverted. In addition, linear ill-conditioned problems frequently arise in the iterative solution of nonlinear systems or optimization problems. Ill-Posed Problems and Regularization The notion of regularization scheme is based on unperturbed data, that is, R𝛼 y converges, as 𝛼 → 0, to x for the exact right-hand side y(= Kx). Let y𝛿 be the measured right-hand side with a known error level ||y − y𝛿 || ≤ 𝛿 (A.2) where || ⋅ || denotes the norm defined in the space Y . For example, if Y is ℝm or ℂm , then its norm is the Euclidean norm, which is also known as the 𝓁 2 norm. The regularization scheme approximates the solution x by x𝛿𝛼 = R𝛼 y𝛿 (A.3) The error of the approximation splits into two parts by the triangle inequality, ||x𝛿𝛼 − x|| ≤ ||R𝛼 y𝛿 − R𝛼 y|| + ||R𝛼 y − x|| ≤ ||R𝛼 ||||y𝛿 − y|| + ||R𝛼 Kx − x|| ≤ 𝛿||R𝛼 || + ||R𝛼 Kx − x|| (A.4) The error consists of two parts: the first term describes the error in the data multiplied by ||R𝛼 || and the second term denotes the approximation error between R𝛼 and K −1 . When 𝛼 tends to zero, the first tends to infinity due to the ill-posed nature of the problem, whereas the second term tends to zero by the definition of regularization scheme. Every regularization scheme requires a strategy to choose regularization parameter 𝛼 = 𝛼(𝛿) that is dependent on measurement error 𝛿 in order to keep the total error as small as possible. The corresponding parameter reflects a compromise between accuracy and stability. For a regularization scheme, we naturally expect the regularized solution to converge to the exact solution when the measurement error 𝛿 tends to zero. If this condition is satisfied, the regularization scheme is said to be regular or admissible. The next two sections discuss specific regularization schemes and regularization parameter selection methods. A.3 Regularization Schemes This section introduces three regularization schemes that are frequently used in solving linear ill-posed problems: spectral cutoff, Tikhonov regularization, and iterative regularization. These regularization schemes have been proven to be regular (or admissible) for linear ill-posed problems. For purpose of practical applications, we consider a discrete linear equation system, K ⋅x=y where x ∈ ℂN , y ∈ ℂM , and K ∈ ℂM×N . (A.5) 283 284 Electromagnetic Inverse Scattering A.3.1 Spectral Cutoff In linear algebra, the singular value decomposition (SVD) is a factorization of a matrix, which is the generalization of the eigen-decomposition of a positive semidefinite normal matrix to any M × N matrix. The SVD of K is represented as K =U ⋅Σ⋅V H (A.6) where the superscript H denotes the Hermitian, that is, transpose complex conjugate, and • U is of size M × M and is composed of the left singular vectors um , which are orthogonal and unit vectors. • V is of size N × N and is composed of the right singular vectors 𝑣n , which are orthogonal and unit vectors. • Σ is of size M × N with the diagonal terms being singular values 𝜎i that are real and placed in nonincreasing order 𝜎1 ≥ 𝜎2 ≥ · · · ≥ 0 A basic property of SVD is K ⋅ 𝑣m = 𝜎m um , which enables us to write the solution to (A.5) as ∑ 1 H † x=K ⋅y= (u ⋅ y)𝑣i (A.7) 𝜎 i 𝜎 ≠0 i i where † † K =V ⋅Σ ⋅U H (A.8) is defined as the pseudoinverse of the matrix K. Since the noise in y is inevitable, division by small singular values leads to tremendously large errors. Thus, a natural regularization scheme is to drop off terms corresponding to small singular values. Consequently, an approximation to the exact x reads ∑ 1 H x1 = R1y = (u ⋅ y)𝑣i (A.9) m m 𝜎i i 𝜎 ≥𝜎 i m The so-defined regularization scheme R 1 is called the spectral cutoff, for which m 1∕m is the regularization parameter. The so-obtained solution is referred to as the truncated SVD (TSVD) solution. It is obvious that accuracy of the approximation to the pseudoinverse requires the integer m to be large whereas stability requires it to be small. A plot of singular values is highly useful to study the influence of measurement error in y on the accuracy of the TSVD solution. If singular values decay slowly to zero, the equation is said to be mildly ill-posed. If they decay very rapidly to zero, the equation is severely ill-posed. However, the SVD method is restricted to small and medium sized problems, since it becomes impractical for large-scale problems due to heavy computational cost. In this case, we need to resort to other regularization schemes. Ill-Posed Problems and Regularization A.3.2 Tikhonov Regularization Tikhonov regularization is possibly the most commonly used method of regularization of ill-posed problems. A common approach to solve a linear equation (A.5) is to determine the best fit in the sense that the defect ||K ⋅ x − y|| is minimized. If K is ill-conditioned, then the minimization problem is also ill-posed. In order to obtain a stable solution, the following Tikhonov functional is minimized over ℂN , J𝛼 (x) = ||K ⋅ x − y||2 + 𝛼||x||2 (A.10) It is worth mentioning that some references use 𝛼 2 , instead of 𝛼, in the last term 𝛼 of (A.10). The Tikhonov functional has a unique minimum x , which is also the unique solution of the equation of zero gradient, ∇x J𝛼 = 0. The gradient of (A.10) can be derived from the Appendix B and we eventually arrive at H H K ⋅ K ⋅ x𝛼 + 𝛼x𝛼 = K ⋅ y (A.11) 𝛼 The explicit expression of x is given by 𝛼 H H x = (K ⋅ K + 𝛼I)−1 ⋅ K ⋅ y (A.12) H where I is an identity matrix of the same size as K ⋅ K. The regularization H H scheme R𝛼 = (K ⋅ K + 𝛼I)−1 ⋅ K is called the Tikhonov regularization, for which 𝛼 is the regularization parameter. As 𝛼 tends to zero, the approximate † inverse R𝛼 converge to the pseudoinverse K , whereas the solution becomes unstable. In this sense, the solution provided by the Tikhonov regularization scheme, as a minimizer of the Tikhonov functional, keeps the residual ||K ⋅ x − y||2 small and is stabilized through the penalty term 𝛼||x||2 . 𝛼 We mention in passing that the solution x of the Tikhonov regularization scheme has a representation through the SVD (A.6) system, ∑ 𝜎i H R𝛼 y = (A.13) (ui ⋅ y)𝑣i 2 𝜎 + 𝛼 i i In this sense, the Tikhonov regularization and the spectral cutoff (A.9) can be both categorized as regularization by filtering, and they differ only in filtering functions. A.3.3 Iterative Regularization This section introduces the concept that the iteration count can play the role of regularization parameter when iterative methods are used to solve an ill-posed problem. We apply the following iterative method to solve the linear equation 285 286 Electromagnetic Inverse Scattering (A.5), or equivalently, the optimization problem of minimizing ||K ⋅ x − y||2 0 x =0 m x =x m−1 H − 𝜏K ⋅ (K ⋅ xm−1 − y), m = 1, 2, … (A.14) For a certain range of positive 𝜏, the iteration scheme is known as Landweber m iteration [1] (section 2.3). The explicit form of x can be obtained from the recursion formula (A.14). ∑ m−1 m x =R y=𝜏 1 m H H (I − 𝜏K ⋅ K)i ⋅ K ⋅ y (A.15) i=0 The operator R 1 defines the Landweber iteration regularization scheme, for m which 1∕m is the regularization parameter. We observe that high precision (in absence of measurement noise) requires a large iteration count m whereas stability requires a small m. This observation, together with the definition of regularization, ensures 1∕m, instead of m, to be the regularization parameter. In the presence of noise, both the objective function and the error of reconstruction decrease during the initial iterations, but the error of reconstruction increases after a certain number of iterations, although the objective function monotonically decreases. This phenomena is called semi-convergence. We mention briefly that the Landweber iteration regularization scheme can be also categorized as the regularization by filtering, with a more complex filtering function compared with those of Tikhonov regularization and spectral cutoff. A.4 Regularization Parameter Selection Methods It is important to select the regularization parameter properly. With too little regularization, reconstructions are unstable due to noise amplification. With too much regularization, the accuracy of solution is often poor although it is stable. There are two types of regularization parameter selection methods: a priori and a posteriori methods [2] (section 4.2). An a priori selection method requires, in addition to data noise level, a priori information about the exact solution, such as its norm or smoothness properties that, however, will generally not be available in practical problems. This type of regularization parameter selection method is mainly of interest to the mathematical community [12]. Thus, a posteriori selection methods are more practical since they depend on the data noise level but not on a priori information about the exact solution. All the following regularization parameter selection methods are a posteriori methods. Ill-Posed Problems and Regularization A.4.1 Discrepancy Principle The discrepancy principle states that for erroneous data the residual ||K ⋅ x − y|| should not be smaller than the noise level of measurement data y [1] (section 2.5). That is, the regularization parameter 𝛼(𝛿) is chosen such that ||K ⋅ R𝛼 y − y|| = 𝛾𝛿 (A.16) for some fixed parameter 𝛾 ≥ 1. Newton’s method can be applied to solve for 𝛼. In case of a regularization scheme R 1 , where the regularization parameter m is discrete, with m = 1, 2, …, the integer m should be chosen as the smallest integer satisfying ||K ⋅ R𝛼 y − y|| ≤ 𝛾𝛿 A.4.2 (A.17) Generalized Cross Validation The discrepancy principle is based on a deterministic model, which requires prior knowledge of the noise level. In comparison, the generalized cross validation (GCV) is based on a stochastic framework in which it is possible to select a proper regularization parameter in the absence of prior information about the noise level. In this method, the regularization parameter 𝛼 is chosen as the minimizer of the GCV formula [7] (section 7.2): GCV (𝛼) = [ 1 ||(I M − K ⋅ R𝛼 )y||2 1 Trace(I M − K ⋅ R𝛼 ) ]2 (A.18) where M is the dimension of y. A.4.3 L-Curve Method The discrepancy principle and the generalized cross validation methods can be understood as predictive methods that seek to provide a regularized solution that predicts the unperturbed right-hand side as accurate as possible. A different approach is provided by the L-curve method, which seeks to balance the norms of the regularized solution ||R𝛼 y|| and the corresponding residual ||K ⋅ R𝛼 y − y|| [6] (section 4.6). The L-curve is a log-log plot of ||R𝛼 y|| against ||K ⋅ R𝛼 y − y|| for a range of values of regularization parameter 𝛼. This curve typically exhibits an L shape. The L-curve criterion for regularization parameter selection is to choose the parameter value corresponding to the corner of the L-curve [13]. 287 288 Electromagnetic Inverse Scattering A.4.4 Trial and Error It is quite usual to select regularization parameter by trial and error where a few different parameters 𝛼 are used and then one of them is picked as the most reasonable result based on appropriate information on the expected solution. In practice, before solving an inversion problem, we need to first practice on a training set where the exact solution is known. For a given level of noise, a finite range of regularization parameter 𝛼, which yields a solution close to the exact one, is identified. It is of practical importance to identify a range of candidate regularization parameters, and there is no need to identify the “best” regularization parameter. Indeed, in many inverse problems, in particular nonlinear problems, the criteria of selecting regularization parameter themselves are not necessarily optimal yet, and consequently there is no need to work very hard to find a highly accurate solution. A.5 Discussions For a nonlinear ill-posed problem (A.1), a generalized Tikhonov functional takes the form F𝛼 (x, y) = 𝜌(Kx, y) + 𝛼J(x) (A.19) where 𝛼 is the regularization parameter, 𝜌(⋅, ⋅) is the data discrepancy functional or fit-to-data functional, and J(⋅) is the penalty functional or regularization functional. The data discrepancy functional quantifies how well the prediction Kx matches the observed data y. Perhaps the most familiar example is the squared norm in the space where y is in; that is, 𝜌(Kx, y) = ||Kx − y||2 . The role of the penalty functional is to induce stability and to incorporate a priori information about the desired solution x. There are many choices in the penalty functional. The standard Tikhonov penalty function is the square of Euclidean norm in the space of the square-integrable function. For piece-wise constant functions, a total variation (TV) penalty functional is usually adopted [14], which reads in two-dimensional space, TV (x) = ∫ ∫ |∇x|dt1 dt2 , where x(t1 , t2 ) depends on two parameters t1 and t2 and ∇ denotes the gradient operator. The TV penalty functional penalizes highly oscillatory solutions while allowing jumps in the regularized solution [7] (chapter 8), which is widely used in image restoration problems in order to obtain edge-preserved images. As a side note, there is another regularization strategy, known as multiplicative regularization, for which the functional reads F(x, y) = 𝜌(Kx, y)M(x) (A.20) where the regularization parameter 𝛼 is not required. The multiplicative function M(x) depends on the unknown x and is automatically controlled Ill-Posed Problems and Regularization by the optimization process itself; that is, M(x) contains tuning parameters that depend on iteration count. An example of multiplicative regularization is given in [10] and references therein. Finally, we briefly mention numerical examples of solving ill-posed problems. In this book, a numerical example of solving a linear ill-posed problem is illustrated in Section 6.2.5, where Tikhonov regularization has been used to obtain stable solutions. Section 6.4.3 shows a numerical example where iteration count plays the role of regularization parameter. More tutorial exercises can be found in [15], which give readers hands-on experience in the treatment of inverse problems. 289 291 B Least Squares The method of least squares is a form of mathematical regression analysis that finds the approximate solution of overdetermined systems. The least-squares method provides the best fit to data in the sense that the overall solution minimizes the sum of the squares of the residuals made in the results of every single equation. This appendix covers two topics of the linear least-squares method: the geometric interpretation of least squares and the formula of the gradient of squared residuals. These two concepts are frequently used in this book. B.1 Geometric Interpretation of Least Squares B.1.1 Real Space First, we consider the case when the unknown x is a real-valued scalar and we will solve the following linear equation, (B.1) ax = b where a and b are M-tuple real-valued vectors. The pair ai and bi denotes the ith experiment, i = 1, 2, … , M. When there are errors in a or b, the vectors a and b are not aligned and, consequently, there is no exact solution x to (B.1). The least-squares method provides a solution that minimizes ||ax − b||2 , the sum of the squares of the residuals made in the results of every single equation. We observe that, by changing the real number x, the vector ax is either stretched or contracted, but it is always in the same line. From geometry, it is obvious that the minimum of ||ax − b||2 occurs when ax − b is perpendicular to a, which can be rigorously proven by the Pythagorean theorem. Thus, we have T a ⋅ (ax − b) = 0 (B.2) where the superscript T denotes the transpose. The solution is given simply by T x = (||a||2 )−1 a ⋅ b Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. (B.3) 292 Electromagnetic Inverse Scattering Next, we consider the case when the unknown x is an N-tuple real-valued vector and we will solve the following linear equation, A⋅x=b (B.4) where A is an M × N matrix. Along the same lines as for the case of a scalar unknown, we easily see that the geometric interpretation states that the minimum of ||A ⋅ x − b||2 occurs when the vector A ⋅ x − b is perpendicular to the space spanned by the columns of A, i.e., A1 , A2 , …, AN . Thus, we have T Ai ⋅ (A ⋅ x − b) = 0 i = 1, 2, … , N (B.5) Combining them together, we obtain T A ⋅ (A ⋅ x − b) = 0 (B.6) The least-squares solution is given by T T x = (A ⋅ A)−1 ⋅ A ⋅ b (B.7) † T T which defines the pseudoinverse A = (A ⋅ A)−1 ⋅ A . B.1.2 Complex Space In the complex domain, the orthogonality of vectors a and b is understood as H their inner product a ⋅ b = 0, where the superscript H denotes the Hermitian; that is, complex conjugate transpose. Thus, the least-squares solution occurs when the orthogonality condition (B.6) is replaced by H A ⋅ (A ⋅ x − b) = 0 (B.8) and consequently, the least-squares solution is given by H H x = (A ⋅ A)−1 ⋅ A ⋅ b (B.9) † H H which defines the pseudoinverse A = (A ⋅ A)−1 ⋅ A . B.2 Gradient of Squared Residuals For an N-tuple complex-valued vector x, define the function of squared residuals, f (x) = ||A ⋅ x − b||2 = ΔH ⋅ Δ (B.10) where the residual vector is defined to be Δ = A ⋅ x − b. In solving optimizadf tion problems, we often need to calculate the gradient of f , dx . The vector x is Least Squares complex (x = xR + ixI ), whereas f (x) is a scalar. Obviously, f and any component of x do not satisfy the Cauchy–Riemann equations and, consequently, f is df not complex differentiable. To interpret the notation of “gradient” dx , we have to treat the real and imaginary parts separately. T We first introduce a useful notation. For real 𝛼, the gradient of g = 𝛼 ⋅ 𝛽 = T dg 𝛽 ⋅ 𝛼 with respect to 𝛼 is given by d𝛼 = 𝛽. A further step is to define the T T gradient of a vector. If G = [g1 , g2 , … , gM ]T , where g1 = 𝛼 ⋅ 𝛽 1 , g2 = 𝛼 ⋅ 𝛽 2 , T T T …, gM = 𝛼 ⋅ 𝛽 M , then G = 𝛼 ⋅ B, where B = [𝛽 1 , 𝛽 2 , … , 𝛽 M ]. We have T T dg dg dG = [ 1 , … , M ] = [𝛽 , … , 𝛽 ] = B; that is, d𝛼 ⋅B = B. d𝛼 d𝛼 1 d𝛼 M d𝛼 Let P denote the subscript R or I, and the gradient of f that is shown in (B.10) with respect to xP is obtained by the product rule, df d(A ⋅ x − b)H d(A ⋅ x − b) = ⋅ Δ + ΔH ⋅ dxP dxP dxP = d(A ⋅ x)H d(A ⋅ x)T ⋅Δ+ ⋅ Δ∗ dxP dxP = d(x )T ⋅ (A ⋅ Δ) d(x)T ⋅ (A ⋅ Δ)∗ + dxP dxP H ∗ H (B.11) where the superscript * denotes complex conjugate. Consequently, the real and imaginary parts can be obtained separately, H H H df = A ⋅ Δ + (A ⋅ Δ)∗ = 2Re{A ⋅ Δ} dxR (B.12) H H H df = −iA ⋅ Δ + i(A ⋅ Δ)∗ = 2Im{A ⋅ Δ} dxI (B.13) Strictly speaking, the gradient of f (x) with respect to x is a 2N-dimensional real vector, [( )T ( )T ]T df df df , (B.14) = dx dxR dxI df If the operation on dx is limited to only vector addition and scalar-vector multiplication, the real part and the imaginary part do not crosstalk. Consedf quently, the 2N-dimensional real vector dx can be compactly rewritten as an N-dimensional complex vector, df df df +i (B.15) = dx dxR dxI This notation is analogous to the usual practice of writing the space vector r = [x, y, z]T as r = x̂x + ŷy + ẑz. 293 294 Electromagnetic Inverse Scattering To conclude, H df = 2A ⋅ (A ⋅ x − b) dx As an example, for the Tikhonov regularization functional, J(x) = ||A ⋅ x − b||2 + 𝛼||x||2 (B.16) (B.17) its minimum occurs when its derivative is zero; that is, H 2A ⋅ (A ⋅ x − b) + 2𝛼x = 0 (B.18) which can be rewritten as H H (A ⋅ A + 𝛼I) ⋅ x = A ⋅ b (B.19) The solution is given by H H x = (A ⋅ A + 𝛼I)−1 ⋅ A ⋅ b (B.20) 295 C Conjugate Gradient Method The Conjugate Gradient (CG) method is a mathematical technique for numerically solving unconstrained optimization problems. The CG method uses conjugate directions instead of the local gradient for going downhill and it generally converges faster than the method of steepest descent. This book applies the CG to minimize objective functions in inverse scattering problems and to solve linear equation systems in an iterative way. The appendix covers two topics: the conjugate gradient method for general minimization problems and its application to solve linear equation systems. C.1 Solving General Minimization Problems C.1.1 Real Space First, we consider the case when the unknown x is an N-tuple real-valued vector and we will minimize the objective function f (x). The implementation steps of the CG algorithm are given as follows [7] (section 3.2). Step 1: Initial iteration step, n = 0: Choose the initial guess x0 ; Calculate the gradient (Fréchet derivative) g 0 = ∇f (x0 ) at x0 ; Initialize the search directions, p0 = −g 0 ; Step 2:Line search for the scalar Line search for the scalar 𝛼n that minimizes f (xn + 𝛼n pn ); Update solution: xn+1 = xn + 𝛼n pn ; Update the search direction: Calculate the gradient g n+1 = ∇f (xn+1 ) Calculate the coefficient 𝛽n , following either the Fletcher–Reeves formula 𝛽n = ∥g n+1 ∥2 ∥g n ∥2 or the Polak–Ribière formula 𝛽n = Update the search direction pn+1 = −g n+1 + 𝛽n pn T g n+1 ⋅(g n+1 −g n ) ∥g n ∥2 ; Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 296 Electromagnetic Inverse Scattering Step 3: Is a predetermined termination condition satisfied, such as whether the gradient falls below some predetermined value? If yes: stop iteration. If no: n ∶= n + 1 and go to Step 2. C.1.2 Complex Space For an N-tuple complex-valued vector x = xR + ixI , the CG method outlined in Section C.1.1 in fact applies to a 2N-dimensional real vector, [(xR )T , (xI )T ]T (C.1) As discussed in Appendix B.2, if the operation is limited to only vector addition and scalar-vector multiplication, the real part and the imaginary part do not cross talk and consequently the N-dimensional complex-value notation is equivalent to the 2N-dimensional real-value notation. After a careful check up, we find that the only step in the CG method that cannot use the N-dimensional T complex-value notation is the numerator in the Polak–Ribière formula g n+1 ⋅ (g n+1 − g n ). In 2N-dimensional real-value notation, it reads Re[g n+1 ]T ⋅ Re[g n+1 − g n ] + Im[g n+1 ]T ⋅ Im[g n+1 − g n ] (C.2) If we force ourselves to use the N-dimensional complex-value notation, then (C.2) is equal to H Re[g n+1 ⋅ (g n+1 − g n )] (C.3) To summarize, for a complex-valued vector x, the only change we need to make is to replace the numerator in the Polak–Ribière formula by (C.3). C.2 Solving Linear Equation Systems In the complex space, we solve the linear equation system, A⋅x=b (C.4) which is equivalent to the minimization problem 1 (C.5) f (x) = ∥ A ⋅ x − b∥2 2 Thus, we are able to apply the CG method to minimize (C.5). The following three analytical results are obtained [16] (section 4.11), due to the special property of the linear equation system: Conjugate Gradient Method H • g n = ∇f (xn ) = A ⋅ (A ⋅ xn − b), which is taken directly from Appendix B.2. • The scalar 𝛼n is actually just the least-squares solution, 𝛼n = − H (A⋅pn )H ⋅(A⋅xn −b) • Since g n+1 ⋅ g n = 0, the Polak–Ribière formula reduces to 𝛽n = is exactly the same as the Fletcher–Reeves formula. ∥A⋅pn ∥2 ∥g n+1 ∥2 ∥g n ∥2 . , which 297 299 D Matrix-Vector Product by the FFT Procedure Electromagnetic problems posed in terms of integral equations with convolutional kernels can sometimes be discretized to yield matrices with discrete convolutional symmetries. Such examples include scattering problems by a one-dimensional lattice of uniform cells, a rectangle of uniform cells, or a cuboid of uniform cells embedded in a homogeneous background medium. Uniform cells are necessary to make good use the property of translational invariance of a background Green’s function. For a matrix-vector product, with size of the matrix being N × N, the FFT procedure has a computational complexity of O(N log N), which is lower than the counterpart O(N 2 ) of the traditional approach (section 4.12 of [16] and [17]). D.1 One-Dimensional Case In one-dimensional scattering problems, electric field E may present the form of discrete convolution between kernel-induced function G and the current J, Em = N ∑ Gm−n Jn , m = 1, 2, … , N (D.1) n=1 where Gm−n denotes the interaction between the mth and the nth cell. Due to the property of translational invariance of the background Green’s function, any two cells that are different by m − n in terms of the indices of cells have an interaction coefficient Gm−n . Written in the form of matrix-vector multiplication, (D.1) appears as E =G⋅J (D.2) where the element of the N × N matrix G is given by Gm,n = Gm−n , m, n = 1, 2, … , N (D.3) It is well known that the discrete convolution can be efficiently implemented by the FFT and inverse FFT algorithm if the convolution is of type circular Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 300 Electromagnetic Inverse Scattering discrete convolution, also known as cyclic discrete convolution. If the elements of the sequence G repeat with period N, that is, Gn−N = Gn , n = 1, 2, … , N − 1, the operation (D.1) is known as the circular discrete convolution. For a circular discrete convolution, the matrix G in (D.1) would exhibit the property that its rows are circular right shifts of the elements of the preceding row. Unfortunately, (D.1) is not a circular discrete convolution, which can be easily seen since the second row of G is not a circular right shift of the elements of the first row. The reason is that the interaction between cells 1 and N is different from that between cells 2 and 1; that is, the elements of the sequence G does not repeat with period N. Nevertheless, it is well known that any noncircular discrete convolution can be extended to a larger-size circular discrete convolution. The sequence Ge , extended from G, repeats its elements with period 2N − 1. Written in a vector, the elements in a period are e G = [G0 , G1 , G2 , … , GN−1 , G1−N , G2−N , … , G−1 ]T . (D.4) In order not to change the value of Em in (D.1), where N is replaced by 2N − 1, the vector J should be padded with N − 1 zeros so as to eliminate the contribue tion of the added N − 1 elements in Ge . Consequently, the J , expanded from J by padding zeros, is a vector of size 2N − 1, e J = [J1 , J2 , … , JN , 0, 0, … 0]T . (D.5) The extended circular discrete convolution can be written in the form of matrix-vector multiplication, e e E =G ⋅J e (D.6) e where E is of size 2N − 1, with only the first N elements being the original vale ues of E. The G is of size (2N − 1) × (2N − 1). We can easily verify that its rows are circular right shifts of the elements of the preceding row and, in addition, e the first column of it is just the vector G in (D.4). According to the discrete convolution theorem, the Fourier transform of a circulate discrete convolution is the point-wise product of Fourier transforms. e Thus, the E can be efficiently calculated by the FFT and inverse FFT algorithm, e e e E = FFT−1 [FFT(G ). ∗ FFT(J )] (D.7) where . ∗ denotes point-wise multiplication. Finally, the sought-after E is e extracted from the first N elements of E . D.2 Two-Dimensional Case The procedures outlined in the previous section are easily generalized to two or three dimensions. A two-dimensional discrete convolution is an operation Matrix-Vector Product by the FFT Procedure of the form Ei,j = M N ∑ ∑ Gi−m,j−n Jm,n , i = 1, 2, … , M, j = 1, 2, … , N (D.8) m=1 n=1 e To create a circular discrete convolution, the extended parameters are J of size (2M − 1) × (2N − 1), { J(p, q), if 1 ≤ p ≤ M and 1 ≤ q ≤ N J e (p, q) = (D.9) 0, if M < p ≤ 2M − 1 or N < q ≤ 2N − 1 e and G of size (2M − 1) × (2N − 1) Ge (p, q) = Gp′ ,q′ , (D.10) { { p − 1, if 1 ≤ p ≤ M q − 1, if 1 ≤ q ≤ N where p′ = , q′ = p − 2M, M < p ≤ 2M−1 q − 2N, N < q ≤ 2N −1 e The extended E is of size (2M − 1) × (2N − 1) and can be calculated by the two-dimensional FFT and inverse FFT algorithms, e e e E = FFT2 −1 [FFT2 (G ). ∗ FFT2 (J )] (D.11) where FFT2 denotes two-dimensional fast Fourier transform. Finally, the e sought-after E is extracted as the upper left sub matrix of size M × N from E . Appendix References 1 Kirsch, A. (1996) An introduction to the mathematical theory of inverse problem, Springer, New York. 2 Colton, D. and Kress, R. (1998) Inverse acoustic and electromagnetic scatter- ing theory, 2nd Edn. Springer-Verlag, Berlin, Germany. 3 Neumaier, A. (1998) Solving ill-conditioned and singular linear systems: A tutorial on regularization. SIAM Review, 40 (3), 636–666. 4 Isakov, V. (2006) Inverse problems for partial differential equations, vol. 127, Springer Science and Business Media. 5 Engl, H.W., Hanke, M., and Neubauer, A. (1996) Regularization of inverse problems, vol. 375, Kluwer. 6 Hansen, P.C. (1998) Rank-deficient and discrete ill-posed problems: numeri- cal aspects of linear inversion, SIAM. 7 Vogel, C. (2002) Computational methods for inverse problems, SIAM. 8 Nakamura, G. and Potthast, R. (2015) Inverse modeling, IOP Publishing. 9 Mojabi, P. and LoVetri, J. (2009) Overview and classification of some reg- ularization techniques for the Gauss-Newton inversion method applied to 301 302 Electromagnetic Inverse Scattering 10 11 12 13 14 15 16 17 inverse scattering problems. IEEE Transactions on Antennas and Propagation, 57 (9), 2658–2665. Abubakar, A., van den Berg, P.M., and Mallorqui, J.J. (2002) Imaging of biomedical data using a multiplicative regularized contrast source inversion method. IEEE Transactions on Microwave Theory and Techniques, 50 (7), 1761–1771. Hadamard, J. (1923) Lectures on Cauchy’s problem in linear partial differential equations, Yale University Press. Cheng, J. and Yamamoto, M. (2000) One new strategy for a priori choice of regularizing parameters in Tikhonov’s regularization. Inverse Probl., 16 (4), L31. Belge, M., Kilmer, M.E., and Miller, E.L. (2002) Efficient determination of multiple regularization parameters in a generalized l-curve framework. Inverse Probl., 18 (4), 1161. Rudin, L.I., Osher, S., and Fatemi, E. (1992) Nonlinear total variation based noise removal algorithms. Physica D: Nonlinear Phenomena, 60 (1), 259–268. Hansen, P.C. (2010) Discrete inverse problems: insight and algorithms, SIAM. Peterson, A.F., Ray, S.L., and Mittra, R. (1998) Computational methods for electromagnetics, IEEE Press, New York. Su, C.C. (1987) Calculation of electromagnetic scattering from a dielectric cylinder using the conjugate gradient method and FFT. IEEE Transactions on Antennas and Propagation, 35 (12), 1418–1425. 303 Index a acoustic wave 48 active source 16, 36, 41 see also primary source addition theorem 108, 198 analytical continuation 98, 117, 118, 262 angular spectrum representation 32, 33 b back-propagation scheme 133, 134 basis function 29–31, 150, 193, 231, 244 Bayesian approach 8, 215 Born approximation (BA) 118, 130, 131, 216, 268–272 boundary conditions (BC) 3, 15, 21 see also Dirichlet BC; impedance BC; Neumann BC; radiation BC boundary element method (BEM) 229 boundary integral (BI) 228, 243 c Calderón’s problem 124 coherent wave 224, 258, 260, 277 compact 151, 163 compressive/compressed sensing (CS) 214–220 computational complexity FFT 30, 164, 299 general iterative approach 128 matrix inversion 30 matrix-vector product 160, 161, 163, 299 SVD 160, 161, 163 computed tomography (CT) 131 conducting medium/conductor 16 confocal laser scanning microscopy (CLSM) 246–248 conjugate gradient (CG) 30, 129, 140, 295–297 constitutive relation 16 continuity of solution 3, 4 see also stability of solution contrast 127, 263 contrast current density 126 contrast source extend Born (CS-EB) 144–146 contrast source inversion (CSI) 142–144, 155 convolution 19, 260, 270, 299–301 coupled dipole method (CDM) 30, 147 covariance matrix 63, 74 Cramér-Rao bound (CRB) 79, 264–268 Computational Methods for Electromagnetic Inverse Scattering, First Edition. Xudong Chen. © 2018 John Wiley & Sons Singapore Pte. Ltd. Published 2018 by John Wiley & Sons Singapore Pte. Ltd. 304 Index d data equation 127, 198, 221 decomposition of the time-reversal operator (DORT) 55, 74 degenerate scatterer 82 degree of freedom 28, 57, 125, 128, 173 depolarization factor 24 see also polarization strength deterministic optimization algorithm 128 diagonal tensor approximation (DTA) 132, 148 dielectric material 3, 16 diffraction tomography (DT) 131 diffuse optical tomography (DOT) 224 direct problem 1 see also forward problem Dirichlet BC 3, 203 discrete dipole approximation (DDA) 30 see also coupled dipole method (CDM) distorted Born iterative method (DBIM) 139–142, 173 distorted-wave Born approximation (DWBA) 139 domain of interest (DOI) 1, 71, 103, 127 double-layer potential 39 duality principle 18, 26 dual space method 146, 185 e edge-based vector elements 244 eigen-dipole 92 eigen-source 57 eigenvalue 54–56, 84, 93 decomposition 54–56 eigenvector 54–56, 84, 93 electric current dipole 24 electric field integral equation (EFIE) 21–23, 30, 193 electric impedance tomography (EIT) 124, 173 evanescent wave 33, 44, 259 Ewald limiting sphere 270, 273 Ewald–Oseen extinction theorem see extinction theorem Ewald’s sphere of reflection 269 existence of solution 3, 4, 281, 282 extended Born approximation (EBA) 131–133, 145 extended scatterer 6, 29, 98, 117, 149, 220 extinction theorem 39 f factorization method (FM) 116–118, 186, 196 far field 32–34, 46, 50, 104, 118, 263, 272 integral equation 104, 116 MSR matrix 117 operator 117 pattern 104 fast Fourier transform (FFT) 30, 128, 160, 164, 166, 299–301 field-type equations 127 finite-aperture data see limited-aperture data finite difference (FD) 228, 236, 267 finite element method (FEM) 228, 231, 243 Fisher information matrix (FIM) 79, 265 Foldy–Lax equation 28, 68, 80, 217 forward problem 1, 2 Fourier components/spectrum 148, 163, 164, 185, 259–262, 268–273 Fourier transform (FT) 32, 45, 259–262, 268–273, 299–301 frequency hopping 173 full-aperture data 48, 56, 146, 186 full-wave nonlinear algorithm 6, 8, 139, 229, 277 Index g Galerkin FEM 232, 244 Gauss–Newton 128 generalized eigenvalue decomposition 93 Green’s function dyadic 19, 34, 35, 261 eigen-function expansion 273 inhomogeneous background 34, 35, 139, 229, 245 scalar 19, 22, 48 vector 72, 82, 117 Green’s theorem/formula 45, 106, 107, 230 Gs subspace-based optimization method (Gs-SOM) 149 h Hadamard product 211, 221 Heaviside step function 190 Herglotz wave function 117 heuristic optimization algorithm 128 Huygens’ principle 35–39, 236, 244 inverse Fourier transform (IFT) 32, 259–262 inverse source problem 7, 41, 70, 151, 215, 261 invisibility/cloaking 4, 124 Ipswich database 171 l least-squares 77, 89, 110, 133, 291–294 level set 187 Levenberg–Marquardt 128, 152 limited-aperture data 44, 48, 118, 119 linear sampling method (LSM) 103, 186, 196 Lippmann–Schwinger equation 126, 263, 273 l0 norm 215 l1 norm 215 L2 -norm 105 locally plane wave 3, 33 local shape function (LSF) 186 low-pass filter 164, 260, 270, 271 i ill-posed problem 3, 71, 125, 130, 185, 208, 215, 281–289 impedance BC 3, 203 impenetrable scatterers 3, 6, 184, 191 incoherence sampling 214, 216 wave/source 224, 258, 261 induced source 7, 41, 53 monopole/dipole 24–29, 68, 82, 92, 210, 212 multipole 108, 109 surface 21, 23, 183, 184 volumetric 17, 23, 36, 107, 126, 240, 263 injectivity 69–73, 98, 150 Institut Fresnel database 171, 201 interior transmission problem 4, 119, 124 inverse crime 174 m magnetic current density 17 magnetic current dipole 25 magnetic field integral equation (MFIE) 21–23, 193 Maxwell’s equations 2, 13, 14 medium problem 3 method of moments (MoM) 29, 31, 150, 188 microwave impedance microscopy (MIM) 249–252 modified gradient method 143, 238 monochromatic wave 3, 14, 45 see also time-harmonic wave monopole 27, 28, 46–48, 90, 104 multiple scattering 5–7, 28, 53, 68, 99, 214–216, 240, 273–277 multiple signal classification (MUSIC) 73, 74, 82, 117, 213 305 306 Index multipole-based linear sampling method (MLSM) 109 multipole expansion 108, 197 multistatic response (MSR) matrix 53, 69, 212 n near field 47, 119, 249 Neumann BC 3, 203 Neumann series 274 Newton–Kantorovich (NK) 140–142 noise subspace 74, 91, 155 nondegenerate scatterer 82 noniterative method 6, 77, 88, 129, 214 nonmagnetic 16, 21, 28, 82, 91 nonradiating current 143, 155, 262 NP-hard (non-deterministic polynomial-time hard) 154, 215 o obstacle problem 3, 184 optical microscopy 257–261 overdetermined problem 77, 282, 291 p partial-aperture data see limited-aperture data passive source 17, 53 see also induced source penetrable scatterers 3, 6, 187 perfect electric conductor (PEC) 3, 16 permeability 16 permittivity 3, 5, 16 phase conjugation mirror (PCM) 42 phaseless data 6, 207 PhaseLift 154 phase retrieval (PR) 208 point-like scatterer 6, 53, 63, 67, 117, 149, 209, 214 see also small scatterer point spread function (PSF) 253, 258, 260, 270, 271 polarization strength/tenor 24–28, 30, 80, 210 primary source 16, 72, 109, 230, 277 see also active source propagation wave see travelling wave pseudoinverse of matrix 77, 89, 110, 284, 292 q quadratically constrained quadratic problem (QCQP) 154 quadratic function 142, 143, 154 qualitative method 6, 103, 186, 196 quantitative method 6, 103, 123, 196 quasi-analytical (QA) approximation 132, 148 quasi-Newton method 128 r radiation BC 3, 17, 19, 24, 46, 50 radiation operator 129 range of matrix/operator 72–74, 117, 118 rank of matrix 72, 82–84, 117, 212, 220 Rayleigh scattering 24, 67, 80 Rayleigh’s criterion 257, 258 Rayleigh theorem 84 reciprocity 34, 46, 47, 50, 140, 173 refractive index 124, 230, 258 relative permittivity 16 resolution 47–49, 51, 62, 63, 76, 90, 99, 119, 257–277 restricted isometry property (RIP) 215 Rytov approximation (RA) 130 s scattering potential 263 see also contrast scattering strength 68, 221 see also polarization strength Index secondary source 17, 41 see also induced source Shannon–Nyquist sampling theorem 214 signal subspace 74, 91, 155 signal-to-noise ratio (SNR) 76, 267, 275 single-layer potential 39 singular value decomposition (SVD) 56, 73, 91, 105, 151, 284 small scatterer 3, 6, 24, 67, 254 see also point-like scatterer Sommerfeld radiation condition 19, 24, 46 see also radiation BC sound-hard BC 3 sound-soft BC 3, 184, 185 source-type equation 127 source-type integral equation (STIE) 143, 155 sparsity 71, 214–216, 220 stability estimate 5, 125, 185, 208 stability of solution 4–5, 125, 130, 135, 185, 208, 274, 281–289 state equation 127, 189, 198, 221 stationary phase 33 stochastic optimization algorithm 128 subspace-based optimization method (SOM) 149 super-resolution 49, 63, 262, 272–277 t test function in MUSIC 82 testing function 29–31, 150, 230, 244 through-wall-imaging (TWI) 241 Tikhonov regularization 105, 130, 285, 288, 294 time-harmonic wave 3, 14, 25, 74 time-reversal invariance 45 Maxwell equations 51 time-reversal mirror (TRM) 41–43 time-reversal operator (TRO) 54 T-matrix 147, 197, 198 total variation (TV) 174, 247, 288 transmission eigenvalue 4, 119, 124 transverse electric (TE) 22, 192 transverse magnetic (TM) 22, 187 travelling wave 33, 44, 259 truncated SVD 161, 284 two-dimensional scattering problem 22 twofold subspace-based optimization method (TSOM) 161–164 u underdetermined problem 215, 216 uniqueness of solution 3, 22, 69–73, 124, 184, 196, 207–209, 281 v virtual image 42 w well-posed problem 3, 132, 215 well-resolved targets 54–56 Weyl identity 44, 259, 272 307