Comprehensive approaches to 3D inversion of magnetic ... - CGISS
Comprehensive approaches to 3D inversion of magnetic ... - CGISS
Comprehensive approaches to 3D inversion of magnetic ... - CGISS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
L6<br />
positivity constraint on the amplitude <strong>of</strong> magnetization. Shearer<br />
2005 carries out a detailed investigation <strong>of</strong> the approach and demonstrates<br />
that the amplitude data are far less dependent on magnetization<br />
direction than the <strong>to</strong>tal gradient data. Furthermore, the amplitude<br />
data preserve the low-wavenumber content in the data and<br />
therefore retain the signal from deeper causative bodies that is<br />
present in the <strong>to</strong>tal-field <strong>magnetic</strong> anomaly. Consequently, <strong>inversion</strong><br />
<strong>of</strong> amplitude data <strong>of</strong>fers a better alternative than does <strong>inversion</strong> <strong>of</strong> <strong>to</strong>tal<br />
gradient data. We describe the amplitude <strong>inversion</strong> below, but<br />
readers are referred <strong>to</strong> Shearer 2005 for more details. The <strong>inversion</strong><br />
<strong>of</strong> <strong>to</strong>tal gradient data is exactly parallel.<br />
Basic algorithm for amplitude <strong>inversion</strong><br />
The algorithm starts by calculating the amplitude <strong>of</strong> the anomalous<br />
<strong>magnetic</strong> field from the observed <strong>to</strong>tal-field anomaly. This is accomplished<br />
by first transforming the <strong>to</strong>tal-field anomaly in<strong>to</strong> the<br />
three orthogonal components in the x-, y-, and z-directions. The amplitude<br />
data are given by<br />
B a B a Bx 2 B y 2 B z 2 ,<br />
where B a are the amplitude and B x ,B y ,B z are the transformed <strong>magnetic</strong><br />
anomaly vec<strong>to</strong>rs. A common approach <strong>to</strong> obtain the three orthogonal<br />
components is <strong>to</strong> use the wavenumber-domain expressions<br />
e.g., Pedersen, 1978 when the data are located on a plane. Alternatively,<br />
equivalent-source techniques Dampney, 1969 can be used<br />
<strong>to</strong> carry out the transformation when ground data are acquired in areas<br />
with high <strong>to</strong>pographic relief. In such cases, the wavenumber-domain<br />
approach, which assumes that all observations lie on a planar<br />
surface, is inappropriate. The amplitude data are then treated as the<br />
input data and inverted <strong>to</strong> recover the distribution <strong>of</strong> magnetization<br />
as a function <strong>of</strong> <strong>3D</strong> position in the subsurface. One advantage <strong>of</strong> the<br />
approach is that it is not limited <strong>to</strong> a single anomaly nor does it require<br />
that adjacent anomalies have the same magnetization direction.<br />
Therefore, the approach is generally applicable <strong>to</strong> a wide range<br />
<strong>of</strong> problems where the source distribution is more complicated.<br />
The basic <strong>inversion</strong> algorithm follows that <strong>of</strong> Li and Oldenburg<br />
1996, 2003 in which the Tikhonov formalism is used <strong>to</strong> trade <strong>of</strong>f<br />
between the data misfit and the structural complexity <strong>of</strong> the recovered<br />
model. The data misfit is defined as<br />
N<br />
d <br />
i1<br />
B obs pre<br />
ai B ai<br />
i<br />
3<br />
2<br />
, 4<br />
where B obs ai and B pre ai are observed and predicted amplitude data, respectively,<br />
and i are the standard deviation <strong>of</strong> the amplitude data.<br />
Although we commonly assume a Gaussian distribution for errors in<br />
<strong>magnetic</strong> field component data, the corresponding errors in the computed<br />
amplitude data no longer follow such a distribution.<br />
The model objective function is chosen as<br />
m s w 2 z 0 2 dv<br />
V<br />
wz 0 <br />
x<br />
V<br />
y<br />
V<br />
x<br />
wz 0 <br />
y<br />
2<br />
dv<br />
2<br />
dv<br />
Li et al.<br />
z V<br />
wz 0 <br />
z<br />
2<br />
dv,<br />
where is the effective susceptibility, defined as the ratio <strong>of</strong> magnitude<br />
<strong>of</strong> magnetization over the strength <strong>of</strong> the inducing field H 0 , 0 is<br />
a reference model, and wz is a depth-weighting function. The inverse<br />
solution is given by the minimization <strong>of</strong> the <strong>to</strong>tal objective<br />
function, consisting <strong>of</strong> a weighted sum <strong>of</strong> d and m , subject <strong>to</strong> the<br />
constraint that the effective susceptibility must be nonnegative:<br />
5<br />
minimize d m<br />
subject <strong>to</strong> 0, 6<br />
where is the regularization parameter. The positivity is implemented<br />
by using a primal logarithmic barrier method Wright, 1997;<br />
Li and Oldenburg, 2003. The solution is obtained iteratively because<br />
nonlinearity is introduced by the positivity constraint and the<br />
nonlinear relationship between amplitude data and effective susceptibility.<br />
We discuss the basics <strong>of</strong> this aspect next, but readers are referred<br />
<strong>to</strong> Shearer 2005 for more details.<br />
We adopt a commonly used model representation that discretizes<br />
the model region in three dimensions in<strong>to</strong> a set <strong>of</strong> contiguous rectangular<br />
prisms by an orthogonal mesh, and we assume a constant effective<br />
susceptibility value within each prism. Under this assumption,<br />
each component <strong>of</strong> the <strong>magnetic</strong> anomaly vec<strong>to</strong>r is given by a matrix-vec<strong>to</strong>r<br />
product:<br />
d x G x ,<br />
d y G y ,<br />
d z G z ,<br />
where d x B x1 ,¯,B xN T is an algebraic vec<strong>to</strong>r holding the<br />
x-components <strong>of</strong> the anomalous <strong>magnetic</strong> field; d y and d z are similarly<br />
defined; 1 ,¯, M T is the vec<strong>to</strong>r <strong>of</strong> unknown effective<br />
susceptibility <strong>to</strong> be recovered; and G x , G y , and G z are the sensitivity<br />
matrices relating the respective components <strong>of</strong> anomalous <strong>magnetic</strong><br />
field <strong>to</strong> effective susceptibilities. The elements <strong>of</strong> the sensitivity matrices<br />
quantify the field produced at the ith observation location by a<br />
unit effective susceptibility in the jth prism.<br />
Assuming the susceptibility model is n at the nth iteration, substituting<br />
equation 7 in<strong>to</strong> equation 3 and differentiating B ai with respect<br />
<strong>to</strong> j yields<br />
n<br />
B ai<br />
B ai<br />
n j ·b ij,<br />
B ai<br />
where B n ai is the predicted anomalous <strong>magnetic</strong> vec<strong>to</strong>r at the ith observation<br />
location by the model n at the nth iteration and where b ij<br />
is the <strong>magnetic</strong> vec<strong>to</strong>r produced at the same location by a unit susceptibility<br />
in the jth prisms. Thus, the sensitivity has a simple and elegant<br />
form given by the inner product <strong>of</strong> the unit vec<strong>to</strong>r <strong>of</strong> the predicted<br />
<strong>magnetic</strong> field at the nth iteration and the <strong>magnetic</strong> field produced<br />
by a unit effective susceptibility in a prism. For computational<br />
purposes, this means we only need <strong>to</strong> compute and s<strong>to</strong>re the three<br />
sensitivity matrices corresponding <strong>to</strong> the three components <strong>of</strong> the<br />
field in equation 7 and calculate the sensitivity for the amplitude data<br />
by a sequence <strong>of</strong> matrix-vec<strong>to</strong>r multiplications when solving the<br />
minimization in equation 6.<br />
When calculating the three individual sensitivity matrices, we<br />
7<br />
8