13.02.2015 Views

Comprehensive approaches to 3D inversion of magnetic ... - CGISS

Comprehensive approaches to 3D inversion of magnetic ... - CGISS

Comprehensive approaches to 3D inversion of magnetic ... - CGISS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

L6<br />

positivity constraint on the amplitude <strong>of</strong> magnetization. Shearer<br />

2005 carries out a detailed investigation <strong>of</strong> the approach and demonstrates<br />

that the amplitude data are far less dependent on magnetization<br />

direction than the <strong>to</strong>tal gradient data. Furthermore, the amplitude<br />

data preserve the low-wavenumber content in the data and<br />

therefore retain the signal from deeper causative bodies that is<br />

present in the <strong>to</strong>tal-field <strong>magnetic</strong> anomaly. Consequently, <strong>inversion</strong><br />

<strong>of</strong> amplitude data <strong>of</strong>fers a better alternative than does <strong>inversion</strong> <strong>of</strong> <strong>to</strong>tal<br />

gradient data. We describe the amplitude <strong>inversion</strong> below, but<br />

readers are referred <strong>to</strong> Shearer 2005 for more details. The <strong>inversion</strong><br />

<strong>of</strong> <strong>to</strong>tal gradient data is exactly parallel.<br />

Basic algorithm for amplitude <strong>inversion</strong><br />

The algorithm starts by calculating the amplitude <strong>of</strong> the anomalous<br />

<strong>magnetic</strong> field from the observed <strong>to</strong>tal-field anomaly. This is accomplished<br />

by first transforming the <strong>to</strong>tal-field anomaly in<strong>to</strong> the<br />

three orthogonal components in the x-, y-, and z-directions. The amplitude<br />

data are given by<br />

B a B a Bx 2 B y 2 B z 2 ,<br />

where B a are the amplitude and B x ,B y ,B z are the transformed <strong>magnetic</strong><br />

anomaly vec<strong>to</strong>rs. A common approach <strong>to</strong> obtain the three orthogonal<br />

components is <strong>to</strong> use the wavenumber-domain expressions<br />

e.g., Pedersen, 1978 when the data are located on a plane. Alternatively,<br />

equivalent-source techniques Dampney, 1969 can be used<br />

<strong>to</strong> carry out the transformation when ground data are acquired in areas<br />

with high <strong>to</strong>pographic relief. In such cases, the wavenumber-domain<br />

approach, which assumes that all observations lie on a planar<br />

surface, is inappropriate. The amplitude data are then treated as the<br />

input data and inverted <strong>to</strong> recover the distribution <strong>of</strong> magnetization<br />

as a function <strong>of</strong> <strong>3D</strong> position in the subsurface. One advantage <strong>of</strong> the<br />

approach is that it is not limited <strong>to</strong> a single anomaly nor does it require<br />

that adjacent anomalies have the same magnetization direction.<br />

Therefore, the approach is generally applicable <strong>to</strong> a wide range<br />

<strong>of</strong> problems where the source distribution is more complicated.<br />

The basic <strong>inversion</strong> algorithm follows that <strong>of</strong> Li and Oldenburg<br />

1996, 2003 in which the Tikhonov formalism is used <strong>to</strong> trade <strong>of</strong>f<br />

between the data misfit and the structural complexity <strong>of</strong> the recovered<br />

model. The data misfit is defined as<br />

N<br />

d <br />

i1<br />

B obs pre<br />

ai B ai<br />

i<br />

3<br />

2<br />

, 4<br />

where B obs ai and B pre ai are observed and predicted amplitude data, respectively,<br />

and i are the standard deviation <strong>of</strong> the amplitude data.<br />

Although we commonly assume a Gaussian distribution for errors in<br />

<strong>magnetic</strong> field component data, the corresponding errors in the computed<br />

amplitude data no longer follow such a distribution.<br />

The model objective function is chosen as<br />

m s w 2 z 0 2 dv<br />

V<br />

wz 0 <br />

x<br />

V<br />

y<br />

V<br />

x<br />

wz 0 <br />

y<br />

2<br />

dv<br />

2<br />

dv<br />

Li et al.<br />

z V<br />

wz 0 <br />

z<br />

2<br />

dv,<br />

where is the effective susceptibility, defined as the ratio <strong>of</strong> magnitude<br />

<strong>of</strong> magnetization over the strength <strong>of</strong> the inducing field H 0 , 0 is<br />

a reference model, and wz is a depth-weighting function. The inverse<br />

solution is given by the minimization <strong>of</strong> the <strong>to</strong>tal objective<br />

function, consisting <strong>of</strong> a weighted sum <strong>of</strong> d and m , subject <strong>to</strong> the<br />

constraint that the effective susceptibility must be nonnegative:<br />

5<br />

minimize d m<br />

subject <strong>to</strong> 0, 6<br />

where is the regularization parameter. The positivity is implemented<br />

by using a primal logarithmic barrier method Wright, 1997;<br />

Li and Oldenburg, 2003. The solution is obtained iteratively because<br />

nonlinearity is introduced by the positivity constraint and the<br />

nonlinear relationship between amplitude data and effective susceptibility.<br />

We discuss the basics <strong>of</strong> this aspect next, but readers are referred<br />

<strong>to</strong> Shearer 2005 for more details.<br />

We adopt a commonly used model representation that discretizes<br />

the model region in three dimensions in<strong>to</strong> a set <strong>of</strong> contiguous rectangular<br />

prisms by an orthogonal mesh, and we assume a constant effective<br />

susceptibility value within each prism. Under this assumption,<br />

each component <strong>of</strong> the <strong>magnetic</strong> anomaly vec<strong>to</strong>r is given by a matrix-vec<strong>to</strong>r<br />

product:<br />

d x G x ,<br />

d y G y ,<br />

d z G z ,<br />

where d x B x1 ,¯,B xN T is an algebraic vec<strong>to</strong>r holding the<br />

x-components <strong>of</strong> the anomalous <strong>magnetic</strong> field; d y and d z are similarly<br />

defined; 1 ,¯, M T is the vec<strong>to</strong>r <strong>of</strong> unknown effective<br />

susceptibility <strong>to</strong> be recovered; and G x , G y , and G z are the sensitivity<br />

matrices relating the respective components <strong>of</strong> anomalous <strong>magnetic</strong><br />

field <strong>to</strong> effective susceptibilities. The elements <strong>of</strong> the sensitivity matrices<br />

quantify the field produced at the ith observation location by a<br />

unit effective susceptibility in the jth prism.<br />

Assuming the susceptibility model is n at the nth iteration, substituting<br />

equation 7 in<strong>to</strong> equation 3 and differentiating B ai with respect<br />

<strong>to</strong> j yields<br />

n<br />

B ai<br />

B ai<br />

n j ·b ij,<br />

B ai<br />

where B n ai is the predicted anomalous <strong>magnetic</strong> vec<strong>to</strong>r at the ith observation<br />

location by the model n at the nth iteration and where b ij<br />

is the <strong>magnetic</strong> vec<strong>to</strong>r produced at the same location by a unit susceptibility<br />

in the jth prisms. Thus, the sensitivity has a simple and elegant<br />

form given by the inner product <strong>of</strong> the unit vec<strong>to</strong>r <strong>of</strong> the predicted<br />

<strong>magnetic</strong> field at the nth iteration and the <strong>magnetic</strong> field produced<br />

by a unit effective susceptibility in a prism. For computational<br />

purposes, this means we only need <strong>to</strong> compute and s<strong>to</strong>re the three<br />

sensitivity matrices corresponding <strong>to</strong> the three components <strong>of</strong> the<br />

field in equation 7 and calculate the sensitivity for the amplitude data<br />

by a sequence <strong>of</strong> matrix-vec<strong>to</strong>r multiplications when solving the<br />

minimization in equation 6.<br />

When calculating the three individual sensitivity matrices, we<br />

7<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!