The Factorization Method for EIT in the Case of Mixed Inclusions

The Factorization Method for EIT in the Case of
Mixed Inclusions
Susanne Schmitt
Institut fuer Algebra und Geometrie, Universitaet Karlsruhe (TH), 76128 Karlsruhe,
Germany
E-mail: [email protected]
Abstract.
The inverse problem of electrical impedance tomography (EIT) is to recover the
conductivity inside an investigated subject from boundary measurements of current
and voltage. In this work we deal with the simpler case in which the background
conductivity is known a priori and we wish to locate inclusions, i.e. domains inside
the investigated subject having a different conductivity than the background. A very
successful method for solving this problem is the factorization method.
However, for the factorization method in EIT it is usually assumed that there is
only one type of inclusions present, e.g. only inclusions with a higher or with a lower
conductivity than the background. The question whether the factorization method also
works in the mixed case is still an open problem. Here we present a modified version of
the method to cope with this case that makes use of some a priori information about
where the inclusions are roughly located. We show that under this assumption we can
even detect inclusions in the mixed case.
AMS classification scheme numbers: 35R30, 35Q60
Detecting mixed inclusions in EIT
2
1. Introduction
In electrical impedance tomography (EIT) we inject a current f into the surface of the
investigated subject B and measure the induced potential at the surface. The potential
u solves the boundary value problem
div(γ∇u) = 0 in B,
∂γ u = f on ∂B,
where ∂γ u := γ ∂ν u denotes the conormal derivative at the boundary ∂B. From data
sets of this kind we wish to extract information about the conductivity γ inside the
subject. This work is based on the knowledge of all possible measurement data sets
{f, u|∂B }, i.e. we assume to know the Neumann-to-Dirichlet map Λ that maps each
current pattern f to the corresponding boundary potential u|∂B . This idealized model
is called the continuum model.
The inverse problem that we deal with is the detection of anomalies inside B from the
knowledge of the Neumann-to-Dirichlet map Λ, i.e. the location domains in which the
conductivity is different from the background conductivity γ0 which is assumed to be
known a priori. Thus we suppose that the conductivity has the form γ = γ0 + χΩ γ1 ,
where χΩ is the characteristic function of the inclusion Ω.
A very successful method for solving this problem is the factorization method that
has first been suggested by A. Kirsch in [1] for scattering problems. The factorization
method for electrical impedance tomography has been derived in [2], [3], [4] and has
been extended and improved continuously since then: In [5] the case of complex and
anisotropic conductivities is considered, while in [6], [7] the complete electrode model is
applied which represents a much more realistic model than the continuum model.
The proof that the factorization method works is based on the result that the ranges of
of certain operators coincide. For the proof of this range identity it is crucial to assume
that all the inclusions are of the same type, i.e. for real isotropic conductivities that they
all have either a higher or a lower conductivity than the background medium. However,
in some applications this is not the case, e.g. in imaging of the human thorax. Also in
geoelectrical imaging one might expect a mixed conductivity distribution.
Numerical examples suggest that the factorization method even works for the mixed case
(cf. figure 7 in [8]), but to our knowledge there is no proof and it is still an open problem.
Thus we apply a method that was originally developed by N. Grinberg and A. Kirsch
for scattering from different types of obstacles (cf. [9], [10], [11]) to the EIT problem.
This method is based on the idea of covering one of the obstacle types in order to obtain
a modified factorization for which one can prove the corresponding range identity and
thus that the factorization method works.
For an extensive description of important contributions to the inverse problem of
electrical impedance tomography we refer to the review paper [12] and the references
therein. There are several recent works dealing with related problems of weakening
Detecting mixed inclusions in EIT
3
assumptions on the problem setting for the factorization method. In the article [13] it
is shown that the assumption on the contrast between the background conductivity and
the inclusion conductivity can be weakened but it is still assumed that the conductivity
inside all inclusions is either higher or lower than in the background. In [14] a different
partial differential equation is considered and it is shown that the factorization method
locates inhomogeneities both in the leading coefficient and in the coefficient of 0-th
order. Again, the contrasts in these coefficients need to have the same direction for all
inclusions.
This work is organized as follows: In the next section we consider the direct problem
of EIT and state the main assumptions on the problem setting. Moreover, we show the
well-known factorization for the case of two disjoint inclusions and give an outline of
the factorization method in EIT. Finally, we derive a representation for the operator
that appears in the middle of this factorization and that this representation gives a
connection to the middle operator for the case of only one inclusion.
In section 3 we state the required additional a priori assumptions and use the results
from section 2 to derive our new method. We obtain two slight modifications of the
original factorization and show that these can be used to detect inclusions in the mixed
case. In the last section 4 we show some numerical examples using our new method.
2. The factorization method for two disjoint inclusions
We start by explaining the problem setting and by providing an overview over the
original factorization method for impedance tomography. In order to investigate the
direct problem we need to state some basic assumptions on the underlying geometry of
the body considered and the inclusions as well as the conductivity distribution. Since
our new method is aimed at the detection of mixed inclusion types, we restrict ourselves
to the case of at least two disjoint inclusions.
Assumption 2.1. Let B ⊂ Rn (n = 2, 3) be a bounded domain and ∂B ∈ C 2 . Let
Ω1 , Ω2 be subdomains of B with C 2 -boundaries, Ω1 , Ω2 ⊂ B and Ω1 ∩ Ω2 = ∅. By Ω we
denote the union of both inclusions: Ω = Ω1 ∪ Ω2 . Let B \ Ω be connected.
Additionally, we allow isotropic and real-valued conductivities that have properties as
stated below:
Assumption 2.2. Let the conductivity be as follows: γ : B → R and


x ∈ B \ Ω,

γ0 (x),
γ(x) = γ0 (x) + γ1 (x), x ∈ Ω1 ,


γ (x) + γ (x), x ∈ Ω .
0
2
2
Let the background conductivity satisfy γ0 ∈ C 2,α (B) for some α > 0 and let γ be
strictly positive, i.e. there exists c > 0 with
γ(x) ≥ c > 0 for all x ∈ B.
Detecting mixed inclusions in EIT
4
We assume that γj ∈ L∞ (Ωj ) (j = 1, 2) and allow two different types of inclusions:
Either there exists cj > 0 such that
γ0 (x) − γ(x) ≥ cj > 0
for almost all x ∈ Ωj , or there exists cj > 0 such that
γ(x) − γ0 (x) ≥ cj > 0
for almost all x ∈ Ωj (j = 1, 2). In the first case we call Ωj an inclusion of type 1 and
in the second case an inclusion of type 2.
This means that type 1 inclusions have a lower conductivity than the background, while
type 2 inclusions have a higher conductivity than the background.
Throughout this work we will deal with the following function spaces:
L2⋄ (∂B) = {g ∈ L2 (∂B) : hg, 1i = 0}
1
1
H⋄2 (∂B) = {g ∈ H 2 (∂B) : hg, 1i = 0},
−1
1
H⋄ 2 (∂B) = {g ∈ H − 2 (∂B) : hg, 1i = 0},
1
H⋄1 (B) = {u ∈ H 1 (B) : u|∂B ∈ H⋄2 (∂B)},
where h·, ·i denotes the scalar product in L2 (∂B) as well as the dual pairing between
−1
1
H⋄ 2 (∂B) and H⋄2 (∂B).
−1
Now we can formulate the direct problem. For a given current pattern f ∈ H⋄ 2 (∂B)
find a weak solution u ∈ H⋄1 (B) to the boundary value problem
div(γ∇u) = 0 in B,
∂γ u = f on ∂B.
Using Green’s formula we obtain the weak formulation for this problem:
ZZ
Z
γ∇u · ∇ϕ dx = f ϕ ds for all ϕ ∈ H⋄1 (B).
B
(1)
∂B
By the Lax-Milgram theorem (cf. [15]) this problem is uniquely solvable for every
−1
f ∈ H⋄ 2 (∂B). Using the trace theorem we obtain the Neumann-to-Dirichlet Operator
−1
1
Λ : H⋄ 2 (∂B) → H⋄2 (∂B), f 7→ u|∂B ,
where u solves (1). Λ0 denotes the Neumann-to-Dirichlet Operator for the homogeneous
case, i.e. γ ≡ γ0 in B, respectively. Thus Λ, Λ0 are well-defined and bounded operators.
We proceed by deriving the factorization method as in [5] but for the special case of
two disjoint inclusions. At first we define the operators appearing in the factorization
of Λ − Λ0 . Consider the operator
Detecting mixed inclusions in EIT
5
−1
−1
1
G : H⋄ 2 (∂Ω1 ) × H⋄ 2 (∂Ω2 ) → H⋄2 (∂B), (ψ1 , ψ2 )⊤ 7→ v|∂B .
1
Here v ∈ H 1 (B \ Ω) with v|∂B ∈ H⋄2 (∂B) solves the following boundary value problem
in the weak sense:
div(γ0 ∇v) = 0 in B \ Ω,
∂γ0 v = ψj on ∂Ωj (j = 1, 2),
∂γ0 v = 0 on ∂B.
1
As shown in [5], G is compact, one-to-one, and R(G) is dense in H⋄2 (∂B). Additionally,
the following operator will appear:
1
1
−1
−1
T : H⋄2 (∂Ω1 ) × H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω1 ) × H⋄ 2 (∂Ω2 ),
(h1 , h2 )⊤ 7→ (∂γ0 w|+,1, ∂γ0 w|+,2)⊤
1
Here, w ∈ H 1 (B \∂Ω) with w|∂B ∈ H⋄2 (∂B) is the solution to the transmission boundary
value problem
div(γ∇w) = 0 in B \ ∂Ω,
∂γ0 w = 0 on ∂B,
∂γ0 w|+,j − ∂γ w|−,j = 0 on ∂Ωj (j = 1, 2),
(2)
w|+,j − w|−,j = hj on ∂Ωj (j = 1, 2).
The notation w±,j indicates the trace of w from the exterior and interior of Ωj ,
respectively. The corresponding operator for the homogenous case γ ≡ γ0 is denoted by
T0 .
A weak formulation for this transmission boundary value problem is to find w ∈
1
H 1 (B \ ∂Ω), w|∂B ∈ H⋄2 (∂B) satisfying the jump conditions w|+,j − w|−,j = hj (j = 1, 2)
and
ZZ
γ∇w · ∇ϕ dx = 0 for all ϕ ∈ H⋄1 (B).
B
Since this weak formulation with an additional jump condition is not suitable for our
purpose, we derive an equivalent formulation.
1
For hj ∈ H⋄2 (∂Ωj ) choose ŵ (j) ∈ H 1 (Ωj ) such that ŵ (j) |∂Ωj = hj (j = 1, 2). Then by
setting w̃ = w + ŵ (1) + ŵ (2) we get the formulation: find w̃ ∈ H⋄1 (B) satisfying
ZZ
ZZ
ZZ
(1)
γ∇w̃ · ∇ϕ dx =
γ∇ŵ · ∇ϕ dx +
γ∇ŵ (2) · ∇ϕ dx
(3)
B
Ω1
Ω2
Detecting mixed inclusions in EIT
6
for all ϕ ∈ H⋄1 (B). Here we can also show unique solvability by the Lax-MilgramTheorem, and from the trace theorem we have well-definedness and boundedness of
T, T0 .
During the remainder of this section we recall the main results of the factorization
method for EIT. For the corresponding proofs we refer to [5]. First we state the wellknown factorization that can be proven independently of γ1 and γ2 ,
Λ − Λ0 = G(T − T0 )G∗ .
(4)
Additionally, T and T0 are self-adjoint. Under the assumption that only one inclusion
type is present inside B the middle operator T − T0 satisfies the following coercivity
relations:
Lemma 2.3. (a) If Ω1 and Ω2 are both of type 1, then h(T − T0 )h, hi∂Ω ≥ ckhk2
1
H 2 (∂Ω)
1
2
for all h ∈ H⋄ (∂Ω),
(b) If Ω1 and Ω2 are both of type 2, then h(T0 − T )h, hi∂Ω ≥ ckhk2
1
H 2 (∂Ω)
for all
1
2
h ∈ H⋄ (∂Ω).
An immediate conclusion of lemma 2.3 is that the operator T − T0 is one-to-one. Later
we will see that these coercivity results are not valid in the mixed case. However, we
are still able to show the following lemma, which we will need in section 3.
Lemma 2.4. Assume that Ω1 is of type 1 while Ω2 is of type 2. Then the operator
T − T0 is one-to-one.
1
1
Proof. Let h = (h1 , h2 )⊤ ∈ H⋄2 (∂Ω1 ) × H⋄2 (∂Ω2 ) be such that (T − T0 )h = 0. Then
∂γ0 w|+,1 = ∂γ0 w0 |+,1 , ∂γ0 w|+,2 = ∂γ0 w0 |+,2 ,
where w, w0 are the solutions tho the transmission boundary value problem (2) for the
inhomogeneous and the homogeneous case, respectively. By uniqueness of the Neumann
problem in B \ Ω we know that w ≡ w0 in B \ Ω, from which we can conclude using the
jump conditions at ∂Ω1 , ∂Ω2 that
∂γ w|−,1 = ∂γ0 w0 |−,1 , ∂γ w|−,2 = ∂γ0 w0 |−,2 ,
w|−,1 = w0 |−,1 , w|−,2 = w0 |−,2.
Using Green’s formula, the fact that Ω1 is a type 1 inclusion and the Dirichlet principle
we can estimate
ZZ
ZZ
2
γ|∇w| dx =
γ0 |∇w0 |2 dx
Ω1
Ω
≥
Z 1Z
2
γ|∇w0 | dx + c1
Ω
≥
Z 1Z
Ω1
ZZ
|∇w0 |2 dx
Ω
γ|∇w|2 dx + c1
Z Z1
Ω1
|∇w0 |2 dx.
Detecting mixed inclusions in EIT
7
Now it follows that ∇w0 = 0 and ∇w = 0 in Ω1 , and thus w, w0 are constant in Ω1 .
This means that the normal derivatives of w, w0 at ∂Ω1 from both sides are zero, which
1
implies that w = w0 = 0 in B \ Ω. Now h1 has to be constant, and since h1 ∈ H⋄2 (∂Ω1 )
we have that h1 = 0. Now we have to apply the very same arguments to inclusion Ω2
using its type 2 property to obtain h2 = 0.
The coercivity results from lemma 2.3 play a crucial role in the proof of the range
identity
R |Λ − Λ0 |
1
2
= R(G),
(5)
Now this range identity can be used in the following way: It is a well-known result that
y ∈ Ω ⇔ ϕy ∈ R(G),
where ϕy is the trace at ∂B of the potential of a dipole located in y, i.e. ϕy (x) =
γ0 â · ∇y N(x, y) for x ∈ B where N is the Neumann function for the domain B and the
background conductivity γ0 while â is an arbitrary unit vector.
Together with the range identity (5) and the Picard criterion we deduce the equivalence
y∈Ω⇔
∞
X
hϕy , ψk i2
k=1
λk
<∞
with an orthonormal eigensystem {λj , ψj } of |Λ − Λ0 |.
This binary criterion can be used to decide if a point y lies inside the inclusion or not.
However, we have to assume that there is only one inclusion type present, which is a
severe restriction.
In order to investigate the factorization method in the special case where at least two
disjoint inclusions are present we now take a closer look at the middle operator. Our
aim is to write T − T0 in the form
!
(11)
(12)
T (11) − T0
T (12) − T0
T − T0 =
(21)
(22)
T (21) − T0
T (22) − T0
(ij)
where T (ij) , T0
it follows that
−1
1
1
1
: H⋄2 (∂Ωj ) → H⋄ 2 (∂Ωi ) Then for h = (h1 , h2 )⊤ ∈ H⋄2 (∂Ω1 ) ×H⋄2 (∂Ω2 )
T (11) − T0
and
(11)
(12)
h1 + T (12) − T0
h2 = ((T − T0 )h)|∂Ω1 ,
T (21) − T0
respectively.
(21)
(22)
h1 + T (22) − T0
h2 = ((T − T0 )h)|∂Ω2 ,
Detecting mixed inclusions in EIT
8
Additionally, we wish to find a connection to the cases where only one of the two
inclusions is present in order to make use of the coercivity results from lemma 2.3. The
subsequent conclusions are based on the weak formulation (3).
1
1
Let (h1 , h2 )⊤ ∈ H⋄2 (∂Ω1 ) ×H⋄2 (∂Ω2 ) be given. For these densities, choose ŵ (j) ∈ H 1 (Ωj )
such that ŵ (j) |∂Ωj = hj (j = 1, 2).
(1)
Now consider the following problems: On the one hand find w̃0 ∈ H⋄1 (B) such that
ZZ
ZZ
(1)
(1)
γ0 ∇w̃0 · ∇ϕ dx =
γ0 ∇ŵ0 · ∇ϕ dx for all ϕ ∈ H⋄1 (B).
(6)
Ω1
B
(2)
w̃0
On the other hand find
∈ H⋄1 (B) such that
ZZ
ZZ
(2)
(2)
γ0 ∇w̃0 · ∇ϕ dx =
γ0 ∇ŵ0 · ∇ϕ dx for all ϕ ∈ H⋄1 (B).
(7)
Ω2
B
(1)
(2)
By addition of (6) and (7) it is easy to see that w̃0 := w̃0 + w̃0 is solution to (3) for
the homogeneous case γ ≡ γ0 . Now we define the components of T0 :
(11)
T0
(12)
T0
(21)
T0
(22)
T0
1
−1
(1)
(1)
−1
(2)
(2)
−1
(1)
(1)
−1
(2)
(2)
: H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω1 ), h1 7→ ∂γ0 w̃0 |+,1 , w̃0 solves (6),
1
: H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω1 ), h2 7→ ∂γ0 w̃0 |+,1 , w̃0 solves (7),
1
: H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω2 ), h1 7→ ∂γ0 w̃0 |+,2 , w̃0 solves (6),
1
: H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω2 ), h2 7→ ∂γ0 w̃0 |+,2 , w̃0 solves (7).
(11)
It is easy to see that T0 corresponds to T0 in the case where only the inclusion Ω1
(22)
is present, and that T0 corresponds to T0 in the case where Ω2 is the only inclusion,
respectively.
(12)
Lemma 2.5. T0
(21)
and T0
are compact operators. Thus T0 can be represented by
!
(11)
T0
0
T0 =
+ K0
(22)
0
T0
where K0 is a compact operator.
(12)
Proof. We only prove the assertion for T0
1
2
(21)
; for T0
the arguments are analogous.
Let (h2,j )j∈N be a bounded sequence in H⋄ (∂Ω2 ). Then the corresponding sequence
(2,j)
of solutions w̃0
of (7) is also bounded in H 1 (B \ Ω2 ). Now let U ⊂ B \ Ω2
j∈N
be a subdomain
U ⊂ B \ Ω2 and ∂Ω1 ⊂ U. Following Theorem. 8.8 in [16]
with
(2,j)
the sequence w̃0
is even bounded in H 2 (U) and by the trace theorem we get:
j∈N
(2,j)
k∂γ0 w̃0 kH 12 (∂Ω )
1
−1
1
≤ c j ∈ N. By compactness of the embedding J : H⋄2 (∂Ω1 ) →
H⋄ 2 (∂Ω1 ) we get the assertion.
Detecting mixed inclusions in EIT
9
For T the partitioning is not as simple as for T0 , since the different conductivities γ1 , γ2
appear in equation (3). However, we start as before and divide T into parts contributed
by jump conditions at the individual inclusion boundaries.
1
1
As before, for (h1 , h2 )⊤ ∈ H⋄2 (∂Ω1 ) × H⋄2 (∂Ω2 ) choose ŵ (j) ∈ H 1 (Ωj ) such that
ŵ (j) |∂Ωj = hj (j = 1, 2) and consider the following problems: find w̃ (j) ∈ H⋄1 (B)
(j = 1, 2) satisfying
ZZ
γ0 ∇w̃
(1)
· ∇ϕ dx +
ZZ
γ1 ∇w̃
(1)
· ∇ϕ dx +
Ω
B
=
Z1Z
ZZ
γ2 ∇w̃ (1) · ∇ϕ dx
ZZ
γ2 ∇w̃ (2) · ∇ϕ dx
Ω2
γ∇ŵ
(1)
(8)
· ∇ϕ dx,
Ω1
ZZ
γ0 ∇w̃
(2)
· ∇ϕ dx +
ZZ
γ1 ∇w̃
(2)
· ∇ϕ dx +
Ω
B
=
Z1Z
Ω2
(9)
γ∇ŵ (2) · ∇ϕ dx
Ω2
for all ϕ ∈ H⋄1 (B). One can easily see that w̃ := w̃ (1) + w̃ (2) is a solution to (3). As
before, we define component operators:
1
−1
1
−1
1
−1
1
−1
T (11) : H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω1 ), h1 7→ ∂γ0 w̃ (1) |+,1 , w̃ (1) solves (8),
T (12) : H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω1 ), h2 7→ ∂γ0 w̃ (2) |+,1 , w̃ (2) solves (9),
T (21) : H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω2 ), h1 7→ ∂γ0 w̃ (1) |+,2 , w̃ (1) solves (8),
T (22) : H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω2 ), h2 7→ ∂γ0 w̃ (2) |+,2 , w̃ (2) solves (9).
All four partial operators are well-defined and bounded. It can be shown that T (12)
and T (21) are compact operators for which we only give an outline of a proof: first we
have to perform a decomposition of T (12) and T (21) as in the proof of theorem 2.2 in
[5] and show compactness of one of the decomposed operators using compactness of the
imbeddings between sobolev spaces as is done in lemma 2.5.
Here T (11) is not identical to T in the case where Ω1 is the only inclusion. The same
holds for T (22) . Therefore we carry out one more decomposition of these two operators.
1
−1
Define T (1) : H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω1 ) by h1 7→ ∂γ0 w̃ (11) |+,1 , where w̃ (11) solves the weak
problem
ZZ
ZZ
ZZ
(11)
(11)
γ0 ∇w̃
· ∇ϕ dx +
γ1 ∇w̃
· ∇ϕ dx =
γ∇ŵ (1) · ∇ϕ dx
(10)
B
Ω1
Ω1
Detecting mixed inclusions in EIT
10
for all ϕ ∈ H⋄1 (B). T (1) is obviously equivalent to T in the case where the inclusion Ω2
−1
1
is not present. Analogously, define T (2) : H⋄2 (∂Ω2 ) → H⋄ 2 (∂Ω2 ) by h2 7→ ∂γ0 w̃ (22) |+,2 ,
where w̃ (22) solves
ZZ
ZZ
ZZ
(22)
(22)
γ0 ∇w̃
· ∇ϕ dx +
γ2 ∇w̃
· ∇ϕ dx =
γ∇ŵ (2) · ∇ϕ dx
(11)
Ω2
B
Ω2
for all ϕ ∈ H⋄1 (B). T (2) is equal to T in the case where Ω2 is the only inclusion. Now
we continue by investigating the difference between T (11) and T (1) (between T (22) and
T (2) , respectively) and show that it is a compact operator.
Lemma 2.6. The following identities hold:
T (11) = T (1) + S (1) , T (22) = T (2) + S (2) ,
(12)
where S (1) , S (2) are compact operators.
Proof. We start by defining S (1) , S (2) and show that the representations in (12) are
−1
1
valid. Let S (1) : H⋄2 (∂Ω1 ) → H⋄ 2 (∂Ω1 ), h1 7→ ∂γ0 ṽ (1) |+,1 where ṽ (1) ∈ H 1 (B) solves
ZZ
γ0 ∇ṽ
(1)
· ∇ϕ dx+
ZZ
γ1 ∇ṽ
(1)
· ∇ϕ dx +
Ω
B
=−
Z 1Z
ZZ
γ2 ∇ṽ (1) · ∇ϕ dx
Ω2
γ2 ∇w̃
(11)
(13)
· ∇ϕ dx
Ω2
for all ϕ ∈ H 1 (B), where w̃ (11) is solution to problem (10).
1
2
H⋄ (∂Ω2 ) →
−1
H⋄ 2 (∂Ω2 ),
ZZ
γ0 ∇ṽ
(2)
Analogously S (2) :
h2 7→ ∂γ0 ṽ (2) |+,2 where ṽ (2) ∈ H 1 (B) is solution to
· ∇ϕ dx+
ZZ
γ1 ∇ṽ
(2)
· ∇ϕ dx +
Ω
B
=−
Z 1Z
ZZ
Ω2
γ1 ∇w̃
(22)
γ2 ∇ṽ (2) · ∇ϕ dx
(14)
· ∇ϕ dx
Ω1
for all ϕ ∈ H 1 (B) where w̃ (22) is solution to (11).
By addition of (10) and (13) (and of (11) and (14), respectively) we realize that
w̃ (1) := w̃ (11) + ṽ (1) solves (8) (and that w̃ (2) := w̃ (22) + ṽ (2) solves (9), respectively).
Thus it follows that T (1) + S (1) = T (11) and T (2) + S (2) = T (22) .
Now we have to show that S (1) and S (2) are compact operators.
We only prove the assertion for S1 and decompose S (1) by S (1) = S̃˜ ◦ S̃. Here
1
1
1
S̃ : H⋄2 (∂Ω1 ) → H⋄2 (∂Ω2 ), h1 7→ w̃ (11) |−,2, where w̃ (11) solves (10) and S̃˜ : H⋄2 (∂Ω2 ) →
−1
H⋄ 2 (∂Ω1 ), h̃2 7→ ∂γ0 ṽ|+,1 , where ṽ solves
Detecting mixed inclusions in EIT
ZZ
γ0 ∇ṽ · ∇ϕ dx +
11
ZZ
γ1 ∇ṽ · ∇ϕ dx +
Ω1
B
=−
ZZ
ZZ
γ2 ∇ṽ · ∇ϕ dx
Ω2
γ2 ∇ŵ (2) · ∇ϕ dx
Ω2
for all ϕ ∈ H⋄1 (B), and ŵ (2) ∈ H 1 (Ω2 ) was chosen such that ŵ (2) |∂Ω2 = h̃2 . As in
the proof of theorem 2.2 of [5] it can be shown that S̃˜ is compact. Furthermore S̃ is
bounded, which yields the assertion.
Altogether we have now derived the representation
!
(1)
T
0
+K
T =
0 T (2)
with a compact operator K and by combination with lemma 2.5
!
(11)
(1)
T − T0
0
+ K̃
T − T0 =
(22)
(2)
0
T − T0
(15)
with a compact operator K̃.
3. The covering method
Now we restrict ourselves to the mixed case, i.e. there is an inclusion Ω1 of type 1 as well
as an inclusion Ω2 of type 2. In this section we derive the factorization method for slight
modifications of Λ − Λ0 under some additional a priori assumptions on the inclusions’
locations. We show that using these we can reconstruct inclusions even in the case of
different types of inclusions. This setting will be defined in the next assumption.
Assumption 3.1. We assume that we know C 2 -domains Ω̃1 , Ω̃2 ⊂ B where Ω̃1 ∩ Ω̃2 = ∅,
Ω̃1 ∪ Ω̃2 ⊂ B, and Ωj ⊂ Ω̃j (j = 1, 2) holds and B \ (Ω̃1 ∪ Ω̃2 ) is connected.
This configuration is illustrated in figure (3). The a priori knowledge of Ω̃1 , Ω̃2 is –at
least in some applications– no strong restriction. For example, in medical applications
one knows roughly where the different tissues lie and which conductivities they usually
have.
Corresponding to lemma 2.3 the following coercivity assertions hold for the operators
on the diagonal in the representation (15) of T − T0 .
(11)
h(T (1) − T0
(22)
h(T0
−T
1
2 (∂Ω1 )
for all h1 ∈ H⋄2 (∂Ω1 ),
)h2 , h2 i∂Ω2 ≥ ckh2 k2
1
2 (∂Ω2 )
for all h2 ∈ H⋄2 (∂Ω2 ).
H
(2)
1
)h1 , h1 i∂Ω1 ≥ ckh1 k2
H
1
Detecting mixed inclusions in EIT
12
Ω1
Ω̃1
Ω2
Ω̃2
Ω1
B
Figure 1. Sketch of the inclusions and the a priori known domains Ω̃1 , Ω̃2
Now it is easy to see from (15) that the operator T −T0 is neither positively nor negatively
coercive, so that we are not able to apply the factorization method immediately. In order
to derive a factorization for a slight modification of Λ−Λ0 , we now define some auxiliary
operators.
−1
−1
Qj : H⋄ 2 (∂Ωj ) → H⋄ 2 (∂ Ω̃j ), ϕ 7→ ∂γ0 w|+ on ∂ Ω̃j
1
Here w ∈ H 1 (B \Ωj ) with w|∂B ∈ H⋄2 (∂B) (j = 1, 2) solves the boundary value problem:
div(γ0 ∇w) = 0 in B \ Ωj ,
(16)
∂γ0 w = ϕ on ∂Ωj ,
∂γ0 w = 0 on ∂B.
As in the proof of lemma 2.5 we can show that Q1 , Q2 are compact, one-to-one and have
dense range. The same holds for the adjoints Q∗1 , Q∗2 .
Furthermore, we make use of the composed operators
Q1
I
!
I
Q2
!
−1
−1
−1
−1
: H⋄ 2 (∂Ω1 ) × H⋄ 2 (∂Ω2 ) → H⋄ 2 (∂ Ω̃1 ) × H⋄ 2 (∂Ω2 )
:
−1
H⋄ 2 (∂Ω1 )
×
−1
H⋄ 2 (∂Ω2 )
→
−1
H⋄ 2 (∂Ω1 )
×
(17)
−1
H⋄ 2 (∂ Ω̃2 )
Q1
These are defined correspondingly to Q1 , Q2 :
is defined by (ϕ1 , ϕ2 )⊤ 7→
I
(∂γ0 w|+,1, ϕ2 )⊤ , where w solves an slight modification of the boundary value problem
Detecting mixed inclusions in EIT
13
(16): w is solution to the conductivity equation in B \ Ω and has Neumann boundary
values ϕ1 , ϕ2 at the boundaries ∂Ω1 , ∂Ω2 .
⊤
⊤
I
Q2 is defined by (ϕ1 , ϕ2 ) 7→ (ϕ1 , ∂γ0 w|+,2 ) , where w solves the same boundary value
problem in B \ Ω.
−1
1
Additionally, we make use of the operators G̃j : H⋄ 2 (∂ Ω̃j ) → H⋄2 (∂B) (j = 1, 2)
G1 that are defined just asnG but
with
Ω
replaced
by
Ω̃
j . We formally write G as
G2 .
o
Analogously, we define
G̃1
G2
just the same as G, but here Ω1 is replaced by Ω̃1 . The
n o
1
corresponding definition holds for G
.
G̃2
Now it is easy to check that the following equalities are valid:
Lemma 3.2. (a)
( ) ( )
!
( )
! ( )∗
G1
G̃1
Q1
G̃
I
0
G̃1
1
=
, G̃1 G̃∗1 =
G2
G2
I
G2
0 0
G2
(b)
( ) ( )
!
( )
! ( )∗
G1
G1
I
G1
0 0
G1
=
, G̃2 G̃∗2 =
G2
G̃2
Q2
G̃2
0 I
G̃2
n o n o
1
1
It is quite clear that G̃1 , G̃2 , G̃
, G
have the same properties as G concerning
G2
G̃2
1 ∗
compactness, injectivity and denseness of the range. The adjoint G
maps from
G2
−1
1
1
(∂B) tonH⋄2 o
(∂Ω1 ) × H⋄2 (∂Ω1 ) and the corresponding mapping property holds for
H⋄ 2 o
n
∗
∗
G1
G̃1
and
G2
G̃2
Now choose ρ1 , ρ2 ∈ C such that Re{ρj } > 0 (j = 1, 2) and consider the modified
Neumann-to-Dirichlet maps Λ̃1 = Λ − Λ0 − ρ1 G̃1 G̃∗1 and Λ̃2 = Λ − Λ0 + ρ2 G̃2 G̃∗2 . First,
we remark that for the acquisition of both maps we only need measured data (i.e. Λ)
and information known a priori. Using lemma 3.2 and the well-known factorization (4)
we can derive factorizations of Λ̃1 and Λ̃2 :
( )
( )∗
G1
G1
Λ̃1 =
(T − T0 )
− ρ1 G̃1 G̃∗1
G2
G2
( )"
!
!∗
G̃1
Q1
Q1
=
(T − T0 )
−
G2
I
I
ρ1 I 0
0 0
( )
( )∗
G1
G1
Λ̃2 =
(T − T0 )
+ ρ2 G̃2 G̃∗2
G2
G2
( )"
!
!∗
G1
I
I
=
(T − T0 )
+
G̃2
Q2
Q2
0 0
0 ρ2 I
!# ( )∗
G̃1
,
G2
!# ( )∗
G1
.
G̃2
Detecting mixed inclusions in EIT
14
For Λ̃1 we choose ρ1 such that Im{ρ1 } < 0 while for Λ̃2 we choose Im{ρ2 } > 0. In
order to apply the factorization method we have to show some required properties of
the middle operator S defined by
!
Q
1
T − T0
I
!
I
Q2
S1 =
Q1
I
S2 =
I
Q2
or
T − T0
!∗
!∗
!
(18)
!
(19)
−
ρ1 I 0
0 0
+
0 0
0 ρ2 I
.
1
1
Lemma 3.3. (a) ImhS1 h, hi ≥ 0 for all h = (h1 , h2 )⊤ ∈ H⋄2 (∂ Ω̃1 ) × H⋄2 (∂Ω2 ) and
1
1
ImhS2 h, hi ≥ 0 for all (h1 , h2 )⊤ ∈ H⋄2 (∂Ω1 ) × H⋄2 (∂ Ω̃2 ).
(b) If (h1 , h2 )⊤ 6= 0 such that (ReSj )h = 0, then ImhSj h, hi > 0 (j = 1, 2).
Proof. We only consider the first factorization (18). For (19) the arguments are the same.
1
1
−1
−1
We denote X = H⋄2 (∂ Ω̃1 ) × H⋄2 (∂Ω2 ) and its dual space X ∗ = H⋄ 2 (∂ Ω̃1 ) × H⋄ 2 (∂Ω2 ).
Then the middle operator is
Q1
I
!
Q
1
S1 =
T − T0
I
!
ρ1 I 0
=: H −
.
0 0
!∗
+
−ρ1 I 0
0
0
!
∗
By lemma 2.4 and the injectivity of QI1 and QI1 we can conclude that H : X → X ∗
is such that ReH is injective and ImhHh, hi = 0 for all h ∈ X . Thus
ImhS1 h, hi = −Im{ρ1 }kh1 k2 ≥ 0,
and the first assertion is shown.
Let h = h02 ∈ X such that (ReS1 )h = 0. Then (ReS1 )h = (ReH)h = 0. From the
injectivity of ReH it follows that h2 = 0. This means that for h = hh12 ∈ X where
h 6= 0 and (ReS1 )h = 0 we have that h1 6= 0. Now assume that such an h exists, then:
ImhS1 h, hi = −Im{ρ1 }kh1 k2 > 0,
which proves the second assertion.
We derive one more representation of Λ̃1 and Λ̃2 that is used to prove that the middle
operator is a compact perturbation of a coercive operator. For this we make use of the
Detecting mixed inclusions in EIT
15
represention (15), lemma 3.2 and the fact that
!∗
!
(11)
(1)
Q∗1
0
Q1 T − T0
Q1
Q1
+ K1 ,
=
T − T0
(22)
I
I
0
T (2) − T0
!
!
!
(11)
I ∗
T (1) − T0
0
I + K2
=
T − T0
(22)
Q2
Q2
Q∗2
0
Q2 T (2) − T0
!
(20)
where K1 , K2 are compact operators. The representations (20) can be shown similarly
to the derivations in section 2. Now all preparations for the derivation of the new
representations for Λ̃1 , Λ̃2 are met an we can write
!
# ( )∗
( )"
(11)
T (1) − T0
0
G1
G1
− ρ1 G̃1 G̃∗1
+
K̃
Λ̃1 =
(22)
(2)
G
G2
0
T − T0
2
!
( )"
−ρ1 I
0
G̃1
=
(22)
(2)
G2
0
T − T0
!
# ( )∗
(11)
(1)
∗
G̃1
Q1 (T − T0 )Q1 0
+
+ K̃
G2
0
0
( )"
!
# ( )∗
−ρ1 I
0
G̃1
G̃1
˜
=
+ K̃
,
(22)
(2)
G2
G2
0
T − T0
(21)
!
# ( )∗
( )"
(11)
G1
G1
T (1) − T0
0
+ K̃
Λ̃2 =
+ ρ2 G̃2 G̃∗2
(22)
(2)
G2
G2
0
T − T0
( )"
!
(11)
G1
T (1) − T0
0
=
G̃2
0
ρ2 I
!
# ( )∗
0
0
G1
+
+ K̃
(22)
(2)
∗
G̃2
0 Q2 (T − T0 )Q2
( )"
!
# ( )∗
(11)
G1
G1
T (1) − T0
0
˜
=
+ K̃
.
G̃2
G̃2
0
ρ2 I
(22)
Regarding the factorizations (21), (22) and lemma 3.3 we can conclude that in both
cases we have a factorization of the form
F = GSG ∗
satisfying the following properties:
(a) F : L2⋄ (∂B) → L2⋄ (∂B) is a bounded operator.
Detecting mixed inclusions in EIT
−1
16
−1
1
1
(b) In (21) G : H⋄ 2 (∂ Ω̃1 ) × H⋄ 2 (∂Ω2 ) → L2⋄ (∂B) and S : H⋄2 (∂ Ω̃1 ) × H⋄2 (∂Ω2 ) →
−1
−1
H⋄ 2 (∂ Ω̃1 ) × H⋄ 2 (∂Ω2 ) are bounded operators.
−1
1
−1
1
(c) In (22) G : H⋄ 2 (∂Ω1 ) × H⋄ 2 (∂ Ω̃2 ) → L2⋄ (∂B) and S : H⋄2 (∂Ω1 ) × H⋄2 (∂ Ω̃2 ) →
−1
−1
H⋄ 2 (∂Ω1 ) × H⋄ 2 (∂ Ω̃2 ) are bounded operators.
1
(d) G is compact and R(G) = H⋄2 (∂B).
(e) ReG = C + K where K is compact and C is self-adjoint. In (21) −C is coercive, and
in (22) C is coercive.
1
1
(f) ImhSh, hi ≥ 0 for all h = (h1 , h2 )⊤ ∈ H⋄2 (∂ Ω̃1 ) × H⋄2 (∂Ω2 ) (for all h = (h1 , h2 )⊤ ∈
1
1
H⋄2 (∂Ω1 ) × H⋄2 (∂ Ω̃2 ), respectively).
(g) ImS is positive on the nullspace of ReS.
Thus we are able to apply the F# -factorization method in the form of the following
theorem which is cited from [17].
Theorem 3.4. Let X ⊂ U ⊂ X ∗ be a Gelfand triple with a Hilbert space U and a
reflexive Banach space X such that the imbedding is dense. Let H be a second Hilbert
space and let F : H → H, G : X ∗ → H and S : X → X ∗ be linear and bounded operators
with F = GSG ∗ and
(a) G is one-to-one and compact with dense range in H,
(b) ReS = C + K where C (or −C) is coercive and K is compact,
(c) ImS is non-negative on X,
(d) S is injective or ImS is positive on the finite-dimensional nullspace of ReS.
Then F# := |ReF | + ImF is positive definite and the ranges of G : X ∗ → H and
1
F#2 : H → H coincide.
As a result, we can conclude for our factorizations:
Corollary 3.5. The operators Λ#,1, Λ#,2 : L2⋄ (∂B) → L2⋄ (∂B) defined by
Λ#,1 = |Λ − Λ0 − Re{ρ1 }G̃1 G̃∗1 | − Im{ρ1 }G̃1 G̃∗1 ,
Λ#,2 = |Λ − Λ0 + Re{ρ2 }G̃2 G̃∗2 | + Im{ρ2 }G̃2 G̃∗2 ,
are positive definite, and the ranges of
1
2
coincide.
and Λ#,2
n
G̃1
G2
o
1
2
as well as the ranges of
and Λ#,1
n
G1
G̃2
o
By means of the test functions ϕy from section 2 we can again derive a binary criterion
to decide whether a point y lies inside an inclusion or not. As above we conclude
n o
1
.
Lemma 3.6. (a) Let y ∈ Ω̃1 . Then: y ∈ Ω1 ⇔ ϕy ∈ R G
G̃2
n o
1
(b) Let y ∈ Ω̃2 . Then: y ∈ Ω2 ⇔ ϕy ∈ R G̃
.
G2
Detecting mixed inclusions in EIT
17
Proof. We only prove assertion a). Here we can state y ∈ Ωn1 ⇔oy ∈ Ω1 ∪ Ω̃2 , since Ω̃1
1
and Ω̃2 are disjoint. Additionally, y ∈ Ω1 ∪ Ω̃2 ⇔ ϕy ∈ R G
as is already known
G̃2
from the original factorization method.
Now by combination of lemma 3.6 and theorem 3.5 we obtain the following equivalences
using the Picard criterion
Corollary 3.7. (a) Let y ∈ Ω̃1 . Then
y ∈ Ω1 ⇔
Here
∞
X
k=1
D
(2)
ϕy , ψk
(2)
λk
E2
< ∞.
(23)
o
n
(2)
(2)
λk , ψk : k ∈ N is an eigensystem of Λ#,2 .
(b) Let y ∈ Ω̃2 . Then
y ∈ Ω2 ⇔
∞
X
k=1
D
(1)
ϕy , ψk
(1)
λk
E2
< ∞.
(24)
o
n
(1)
(1)
Here
λk , ψk : k ∈ N is an eigensystem of Λ#,1 .
These two binary criteria can now be used to reconstruct inclusions. However, in contrast
to the original factorization method we now have to perform two steps in order to identify
both inclusions. In the first step we use criterion (23) and reconstruct Ω1 , while in the
second step we use criterion (24) to reconstruct Ω2 .
The new method can now be interpreted as follows: For the reconstruction of Ω1 we use
the parameter ρ2 to synthesize a type 1 inclusion Ω̃2 that covers the disturbing type 2
inclusion Ω2 . On the other hand, we cover Ω1 by an artificial type 2 inclusion that is
produced by ρ1 in oder to identify Ω2 .
4. Numerical Experiments
In this section we give some results of numerical experiments with our new method. In
all our examples B is the unit circle in R2 , and the background conductivity is γ0 (x) ≡ 1.
Thus the dipole test function ϕy can explicitly be represented by
ϕy (x) =
1 (y − x) · â
,
2π |y − x|2
where â is a unit vector that represents the dipole axis. As a basis for the current
patterns as well as the boundary potentials we use the trigonometric functions
1
1
√ cos(kθ), √ sin(kθ), k = 1, 2, . . . ,
π
π
where θ denotes the argument of boundary points in polar coordinates.
Detecting mixed inclusions in EIT
18
In order to obtain approximations of Λ and Λ0 we solve the homogeneous and the
inhomogeneous forward problem for the basis current patterns up to an end index N ∈ N
using a standard finite element method.
In our example there are two inclusions: Ω1 has a kite shape, lies within Ω̃1 and
has conductivity γ = 0.5, while in the lower covering domain Ω2 is an ellipse with
conductivity γ = 2. The inclusion boundaries are marked by white lines in our
illustrations.
In order to reconstruct the inclusions, we evaluate the functions

E2 −1
D
(j)
N

X ϕy , ψk
Wj (y) = 
 (j = 1, 2)
(j)
λk
k=1
on a mesh of points y. As stated in theorem 3.7, we obtain the reconstruction of Ω1 by
(2)
(2)
evaluation of W2 in points inside Ω̃1 , where {(λk , ψk ) : k ∈ N } is an eigensystem of
Λ#,2 . On the other hand, we can reconstruct Ω2 by evaluating W1 on a mesh inside Ω̃2 ,
(1)
(1)
where {(λk , ψk ) : k ∈ N } is an eigensystem of Λ#,1 .
The experience from scattering theory (cf. [10]) suggests that the original factorization
method produces better reconstructions that the covering method although it is not
proven to work in the case of mixed obstacles.
What is more, the larger the absolute value of the parameters ρ1 , ρ2 get the more
they might influence the reconstruction as we can see in our theory: The larger |ρj | is
(j = 1, 2) the larger the contrast of the artificial covering inclusion to the background
gets, and the factorization method emphasizes this synthetic inclusion rather than the
one that we wish to identify.
This can also be seen in the representations (18), (19) of the middle operator. The
information about the desired inclusion lies inside the first part
Q1
I
!
while the second part
Q
1
T − T0
I
!∗
or
!
−ρ1 I 0
or
0
0
I
Q2
!
T − T0
0 0
0 ρ2 I
I
Q2
!∗
,
!
only contains information about the covering domains Ω̃1 , Ω̃2 , but carries more weight
as |ρ| gets larger.
In the following two numerical examples we verify these expectations for our new method
where we performed both reconstructions using different values of the parameters ρ1 ,
ρ2 .
Now the covering domains Ω̃1 and Ω̃2 are ellipses and defined as:
Detecting mixed inclusions in EIT
19
(a) ρ2 = 0
(b) ρ2 = 10−3 (1 + i)
(c) ρ2 = 10−2 (1 + i)
(d) ρ2 = 10−1 (1 + i)
Figure 2. Reconstruction type 1 inclusion; no noise
x22
1
,
Ω̃1 = x ∈ B : (x1 − 0.5) +
<
4
9
1
x22
2
.
<
Ω̃2 = x ∈ B : (x1 + 0.5) +
4
9
2
At first we consider the case of no artificial noise. In figure 2 we can see the
reconstruction of the type 1 inclusion, i.e. the kite shape for ρ2 = 0, ρ2 = 10−3 (1 + i),
ρ2 = 10−2 (1 + i) and ρ2 = 10−1 (1 + i). Here we can see that for ρ2 = 0 we get quite
a good reconstruction, while for growing absolute value of ρ2 the reconstructions get
worse.
The reconstruction of the ellipse is illustrated in figure 3 for the values ρ1 = 0,
ρ1 = 10−3 (1 − i), ρ1 = 10−2 (1 − i) and ρ1 = 10−1 (1 − i). Again, for ρ1 = 0 the
reconstruction is best, and for growing |ρ1 | the reconstructions deteriorate.
Figures 4 and 5 contain the same reconstructions for 0.5% white noise added to Λ,
while the observations concerning ρ1 , ρ2 are the same as for the noiseless case. We thus
recommend to choose ρ1 , ρ2 such that their absolute values are very small compared to
the the first few eigenvalues of |Λ − Λ0 |.
Detecting mixed inclusions in EIT
20
(a) ρ1 = 0
(b) ρ1 = 10−3 (1 − i)
(c) ρ1 = 10−2 (1 − i)
(d) ρ1 = 10−1 (1 − i)
Figure 3. Reconstruction of type 2 inclusion; no noise
In our next experiment we used smaller coverings Ω̃1 , Ω̃2 in order to improve the
reconstructions:
Ω̃1 =
Ω̃2 =
2
x ∈ B : (x1 − 0.5) +
x22
1
<
9
,
1
x ∈ B : (x1 + 0.5) + (x2 − 0.4) <
16
2
2
.
For ρ1 we used the values 10−3 (1 − i) and 10−2 (1 − i) while for ρ2 we used 10−3 (1 + i)
and 10−2 (1 + i).
Figure 6 illustrates the corresponding reconstructions. We observe that they are
noticeably better than the corresponding reconstructions for the same values of ρ1 ,
ρ2 and the previous larger covering domains. Since the synthetic inclusion caused by
the covering method is smaller than before it is less disturbing for the location of the
desired inclusion. It is thus recommended to choose the coverings as small as possible.
Our last experiment deals with the case in which the covering domains do not cover the
inclusions properly. Here we chose
Detecting mixed inclusions in EIT
21
(a) ρ2 = 0
(b) ρ2 = 10−3 (1 + i)
(c) ρ2 = 10−2 (1 + i)
(d) ρ2 = 10−1 (1 + i)
Figure 4. Reconstruction type 1 inclusion; 0.5% noise
1
,
Ω̃1 = x ∈ B : (x1 − 0.5) + (x2 − 0.2) <
9
1
2
2
Ω̃2 = x ∈ B : (x1 + 0.5) + (x2 − 0.2) <
,
16
2
2
while the values for ρ1 , ρ2 are the same as before.
The reconstructions for this case are shown in figure 7. They are slightly worse than the
reconstructions in figure 6 but still have an edge on the first ones where the coverings
were larger. This observation is in some sense plausible since the unions Ω̃j ∪Ωj (j = 1, 2)
are only slightly larger than the coverings in figure 6 but still much smaller than the
coverings in the first example. However, we have to emphasize that this case is not
covered by our theory.
Conclusions
We have shown that under some additional a priori information about the inclusions’
positions we can derive the factorization method for slight modifications of the operator
Detecting mixed inclusions in EIT
22
(a) ρ1 = 0
(b) ρ1 = 10−3 (1 − i)
(c) ρ1 = 10−2 (1 − i)
(d) ρ1 = 10−1 (1 − i)
Figure 5. Reconstruction of type 2 inclusion; 0.5% noise
Λ − Λ0 . Our numerical examples show that this new method can be used to reconstruct
inclusions even in the mixed case. However, the reconstructions are not as good as for
ρ = 0, i.e. for the standard version of the factorization method which is not proven
to work in the mixed case. This observation is the same as for this method applied to
scattering problems (cf. [10]).
We are confident that our method also gives some further insight into the factorization
method which could lead to future extensions of the currently required assumptions on
the problem setting.
Acknowledgments
This work was supported by the German Ministry of Education and Research in
the BMBF-project ‘Regularization techniques for electrical impedance tomography in
medical and geological sciences’
Detecting mixed inclusions in EIT
23
(a) ρ2 = 10−3 (1 + i)
(b) ρ2 = 10−2 (1 + i)
(c) ρ1 = 10−3 (1 − i)
(d) ρ1 = 10−2 (1 − i)
Figure 6. Reconstruction of both inclusions; no noise
References
[1] A. Kirsch. Characterization of the shape of a scattering obstacle using the spectral data of the
far field operator. Inverse Problems, 14:1489–1512, 1998.
[2] M. Brühl. Gebietserkennung in der elektrischen Impedanztomographie. PhD thesis, Universität
Karlsruhe, Karlsruhe, Germany, 1999.
[3] M. Brühl and M. Hanke. Numerical implementation of two noniterative methods for locating
inclusions by impedance tomography. Inverse Problems, 16:1029–1042, 2000.
[4] M. Brühl. Explicit characterization of inclusions in electrical impedance tomography. SIAM J.
Math. Anal., 32:1327–1341, 2001.
[5] A. Kirsch. The factorization method for a class of inverse elliptic problems. Math. Nachr.,
278:258–277, 2004.
[6] N. Hyvönen. Complete electrode model of electrical impedance tomography: approximation
properties and characterization of inclusions. SIAM J. Appl. Math., 64:902–931, 2004.
[7] A. Lechleiter, N. Hyvönen, and H. Hakula. The factorization method applied to the complete
electrode model of impedance tomography. SIAM J. Appl. Math., 68:1097–1121, 2008.
[8] N. Hyvönen, H. Hakula, and S. Pursiainen. Numerical implementation of the factorization method
within the complete electrode model of impedance tomography. Inverse Problems and Imaging,
1:299–317, 2007.
[9] N. Grinberg. On the inverse obstacle scattering problem with robin or mixed boundary condition:
application of the modified Kirsch factorization method. Technical report, 2002.
Detecting mixed inclusions in EIT
24
(a) ρ2 = 10−3 (1 + i)
(b) ρ2 = 10−2 (1 + i)
(c) ρ1 = 10−3 (1 − i)
(d) ρ1 = 10−2 (1 − i)
Figure 7. Reconstruction of both inclusions; no noise
[10] N.I. Grinberg and A. Kirsch. The factorization method for obstacles with a-priori separated soundsoft and sound-hard parts. Mathematics and Computers in Simulation, 66:267–279, 2004.
[11] A. Kirsch and N.I. Grinberg. The Factorization Method for Inverse Problems. Oxford Lecture
Series in Mathematics and its Applications 36. Oxford University Press, 2008.
[12] L. Borcea. Electrical impedance tomography. Inverse Problems, 18:R99–R136, 2002.
[13] B. Gebauer and N. Hyvönen. Factorization method and irregular inclusions in electrical impedance
tomography. Inverse Problems, 23:2159–2170, 2007.
[14] B. Gebauer and N. Hyvönen. Factorization method and inclusions of mixed type in an inverse
elliptic boundary value problem. Inverse Problems and Imaging, 2:355–372, 2008.
[15] W. McLean. Strongly Elliptic Systems and Boundary Integral Operators. Cambridge University
Press, Cambridge, UK, 2000.
[16] D. Gilbarg and N.S. Trudinger. Elliptic Partial Differential Equations of Second Order. Springer,
New York etc., 1983.
[17] A. Lechleiter. The Factorization method is independent of transmission eigenvalues. Inverse
Problems and Imaging, 3:123–138, 2009.