Next Article in Journal
3D Virtual Reconstruction of the Ancient Roman Incile of the Fucino Lake
Previous Article in Journal
Localized Trajectories for 2D and 3D Action Recognition
Previous Article in Special Issue
Deep Learning-Based Real-Time Multiple-Object Detection and Tracking from Aerial Imagery via a Flying Robot with GPU-Based Embedded Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Subdiffusive Source Sensing by a Regional Detection Method

1
School of Computer Science, China University of Geosciences, Wuhan 430074, China
2
School of Engineering (MESA-Lab), University of California, Merced, CA 95343, USA
*
Author to whom correspondence should be addressed.
Current address: No. 388 Lumo Road, Hongshan District, Wuhan 430074, China.
Sensors 2019, 19(16), 3504; https://doi.org/10.3390/s19163504
Submission received: 1 July 2019 / Revised: 1 August 2019 / Accepted: 1 August 2019 / Published: 10 August 2019
(This article belongs to the Special Issue Sensors In Target Detection)

Abstract

:
Motivated by the fact that the danger may increase if the source of pollution problem remains unknown, in this paper, we study the source sensing problem for subdiffusion processes governed by time fractional diffusion systems based on a limited number of sensor measurements. For this, we first give some preliminary notions such as source, detection and regional spy sensors, etc. Secondly, we investigate the characterizations of regional strategic sensors and regional spy sensors. A regional detection approach on how to solve the source sensing problem of the considered system is then presented by using the Hilbert uniqueness method (HUM). This is to identify the unknown source only in a subregion of the whole domain, which is easier to be implemented and could save a lot of energy resources. Numerical examples are finally included to test our results.

1. Introduction

Recently, the studies of transport dynamics in complex systems which exhibit the subdiffusion property have attracted increasing attention. Typical examples include the water in membranes for fuel cells [1], charge transport in amorphous semiconductors [2] or heating processes of the heterogeneous rod [3]. It is worth mentioning that the mean squared displacement of subdiffusion process is a power-law function of fractional exponent, which is smaller than that of the Gaussian diffusion process [4,5]. Due to the strong interactions between components in these processes, a rather complex dynamical behavior would emerge. Note that a fractional order derivative itself is a kind of convolution and naturally links to subdiffusion processes, time fractional diffusion system is confirmed in [5,6,7,8] to be used to efficiently describe these subdiffusion processes. Then, some model-based investigations are needed to deal with their rather complex dynamical behaviors.
Source seeking is a fundamental issue in nature and, currently, different approaches have been developed to study it for the non-fractional diffusion systems (see monographs [9,10] and the survey [11] for example). This is motivated by the fact that, in some practical applications, such as the pollution problems, the danger may increase if the source remains unknown [12]. However, from a practical point of view, engineers are more interested in the sensing problem that, if a source is detectable, how can it be identified based on a limited number of sensor measurements. Then, in this paper, we consider this source sensing problem for the subdiffusion processes governed by time fractional diffusion systems.
Motivated by these above considerations, in this paper, we deal with the following time fractional diffusion systems with a Riemann–Liouville fractional order derivative:
0 D t α y ( t ) = A y ( t ) + S ( t ) , t [ 0 , T ] , 0 < α 1 , lim t 0 + 0 I t 1 α y ( t ) = y 0 L 2 ( Ω ) ,
where Ω R n is an open bounded subset with a smooth boundary Ω , 0 D t α and 0 I t α represent the Riemann–Liouville fractional order derivative and integral, respectively. Here, S t denotes the unknown source to be specified later and A is the infinitesimal generator of a strongly continuous semigroup { Φ ( t ) } t 0 in L 2 ( Ω ) . It is supposed that A is a self-adjoint uniformly elliptic operator and, in addition, y L 2 ( 0 , T ; V ) , where V is a Hilbert space such that V * L 2 ( Ω ) V with continuous injections ( V * is the dual of V).
It is worth noting that, although the initial condition for Riemann–Liouville type time fractional diffusion system does not take the same form as that of non-fractional differential equations, expressions like lim t 0 + 0 I t 1 α y ( t ) in system (1) make sense. The reason is that it does not require a direct experimental evaluation of these fractional integrals. Instead, one can get it by measuring the initial values of its “inseparable twin”, which is obtained based on some basic physical law for the particular field of science. That is, the physical meaning for the Riemann–Liouville fractional integral of a function is equivalent to the initial value of its “inseparable twin”. For example, in the fractional Voigt model (a spring and a spring-pot in parallel) of viscoelasticity, the physical meaning of a Riemann–Liouville fractional integral of the unknown strain ε ( t ) is in fact identical to the initial condition of its “inseparable twin”—the stress [13]. This is also consistent with the known fact that the spring in the Voigt model only affects long-term behavior. For more “inseparable twins”, we refer the reader to e.g., monographs [14,15] for more information on the pair of current and voltage in electrical circuits or the pair of temperature difference and heat flux in heat conduction, etc.
The applications of system (1) are rich in the real world. As stated in [16], system (1) is usually used to describe the dynamic process in spatially inhomogeneous environments. Typical examples include the flow through porous media with a source or sensing the source of groundwater flow, etc. The corresponding sensing techniques cited in this paper can also be used to enable more complex tasks such as landmine clearing, the disease spreading control in agriculture lands or the crowd evacuation in the case of emergencies.
Let the limited number of sensor measurements be given by
z ( t ) = C y ( t ) ,
where C : L 2 ( 0 , T ; V ) L 2 ( 0 , T ; Z ) depends on the structure of sensors and Z is a Hilbert space. Then, the source sensing problem can be stated as follows:
  • Given the measurements z L 2 ( 0 , T ; Z ) , find a source S such that the solution of system (1) satisfies
    C y ( t ) = z ( t ) .
    Several questions arise in such problems: can the available measurements z uniquely determine S? If so, how does S depend on z and is there an approach to determine it (sensing)?
In the past two decades, several numerical algorithm approaches have been proposed for the source sensing problem of non-fractional diffusion systems. In [17], fast algorithms to solve the source sensing problem for elliptic partial differential equations (PDEs) were presented, in which the solution was approximated by using the Fourier–Galerkin truncated method. By using the multidimensional frequency estimation techniques, a new framework for solving the source sensing problems for systems governed by linear PDEs was presented in [18,19]. In addition, if the source is assumed to be a sum of a finite number of Dirac delta functions at unknown locations, numerical algorithms for the source identification problem of linear heat equations and time-dependent advection-diffusion systems with a nonlinear reaction were considered in [20,21], respectively. For an overview of the optimisation approaches for pollution source sensing in groundwater, we refer the reader to [22] and the references cited therein, although it was confirmed in [23,24] that the transport phenomena under the ground should be a subdiffusion process governed by time fractional diffusion systems.
However, the investigations for the source sensing problem of time fractional diffusion systems are still very limited. This is due to the fact that there is a need for further studies on the optimization variant theory and gradient theory of fractional order systems. As a result, the above optimisation numerical methods seem to be inapplicable for system (1). Furthermore, a source detection method has been proposed by El Jai and Afifi [25], in which the source is characterized by three parameters according to its properties. Here, we adopt these concepts and introduce the notion of regional detection of unknown sources, where we are interested in the sensing of unknown source only in a subregion of the whole domain. As it will be shown, the idea of regional detection can surely save energy resources. In addition, it is easier to be implemented even for some cases where we have a possibility to detect it in the whole domain.
After the introduction, the mathematical concepts of source and detection are given in the next section. The third section is focused on the regional strategic sensors, regional spy sensors and their relationships. In Section 4, an approach on solving the source sensing problem is presented. Two applications are worked out in the end.

2. Preliminary Results

The purpose of this section is to introduce the notions of sources, detection and some basic results to be used thereafter.

2.1. Sources

Let I : = [ 0 , T ] . The definition of a source S is as follows:
Definition 1.
[25] A source S is characterized by a triplet ( Σ , g , I ) , where
1. 
Σ ( · ) : t I Σ ( t ) Ω represents the support of source that varies in time t;
2. 
g ( · , t ) : x Σ ( t ) g ( x , t ) defines the intensity of source in x at time t;
3. 
I = t : g ( · , t ) 0   o n   Σ ( t ) denotes the support of g and represents the life duration of source S .
Here, the support Σ ( · ) , which describes the moving trajectory of the source, is usually determined by the evolution of some dynamic systems. With this, S is said to be a
  • moving pointwise source if Σ ( t ) is reduced to a single point of Ω for all t I ;
  • moving zone source if Σ ( t ) is reduced to a region of Ω for all t I ;
  • boundary source if Σ ( t ) Ω , t I and, in this case, we can define the similar pointwise/zone boundary sources;
  • fixed source if Σ is independent of t, which may be pointwise, zone or boundary.
In addition, it is worth noting that, when discussing the sensing problem, the pointwise fixed source defined as Σ ( t ) = { σ } Ω , t I is always used. In this case, Σ is independent of t, which is used to describe a single point of Ω .

2.2. Regional Detection

Since the detection of a source can be done by neglecting its life duration, we consider the source as a couple ( Σ , g ) . Let the set of such sources be E . One has
E F 0 , T ; P ( Ω ) .
Here, P ( Ω ) represents the set of parts of Ω and F 0 , T ; denotes the space of functions f : I . With this, E can be a vector space with convenient scalar product operations.
Definition 2.
A source S is said to be detectable on I if the knowledge of system (1), together with the output function (2), is sufficient to guarantee that the operator
Q : S E z L 2 ( 0 , T ; Z )
is injective.
However, in many cases, it is impossible or too costly to reconstruct all parameters of a source. Let ω be a non-empty, not necessarily connected subregion of Ω . In what follows, we introduce the concepts of regional detection.
Assume that the source is located in ω such that Σ ( t ) ω , t I . Considering the subspace
E ω : = Σ , g E : Σ ( t ) ω , t I , g L 2 ( 0 , T ; L 2 ( ω ) )
and defining the operator Q ω : S E ω z L 2 ( 0 , T ; Z ) , we obtain the following definition.
Definition 3.
A source S is called to be ω detectable on I if (1), (2) is sufficient to ensure that Q ω is injective.
Note that a source, which is ω 1 detectable, is called to be ω 2 detectable if ω 1 ω 2 Ω   with   Σ ( t ) ω 1 .

2.3. Some Basic Results

To obtain our results, in this part, we present some basic results on fractional calculus.
Definition 4
([26]). The Riemann–Liouville fractional integral of order α > 0 for a function y is given by
0 I t α y ( t ) = 0 t ( t s ) α 1 Γ ( α ) y ( s ) d s ,
where Γ ( α ) represents the Euler gamma function defined by Γ ( α ) = 0 t α 1 e t d t and the right side is pointwise defined on [ 0 , T ] .
Definition 5
([26]). The Riemann–Liouville fractional derivative of order α ( 0 , 1 ] for a function y is defined as
0 D t α y ( t ) = d d t 0 I t 1 α y ( t ) , α ( 0 , 1 ) , d d t y ( t ) , α = 1
provided that the right side is pointwise defined on [ 0 , T ] .
Consider system (1); without loss of generality, suppose that y ( t ) 0 and S ( t ) 0 when t I .
Let
y ˜ ( s ) = e s t y ( t ) d t   and   S ˜ ( s ) = e s t S ( t ) d t
be the Laplace transforms of functions y and S. Based on
L 0 D t α y ( s ) = s L 0 I t 1 α y ( s ) y 0 = s α y ˜ ( s ) y 0 , α ( 0 , 1 ] ,
system (1) is equivalent to s α y ˜ ( s ) y 0 = A y ˜ ( s ) + S ˜ ( s ) , which yields
y ˜ ( s ) = ( s α I A ) 1 ( y 0 + S ˜ ( s ) ) = e s α τ Φ ( τ ) [ y 0 + S ˜ ( s ) ] d τ .
Then, if there exists a function ψ α ( t ) such that its Laplace transform is
e s t ψ α ( t ) d t = e s α , α ( 0 , 1 ] ,
let ϕ α ( t ) = 1 α t 1 1 α ψ α ( t 1 α ) , El-Borai has shown in [27,28] that the unique solution of system (1) satisfies
y ( t ) = α 0 θ t α 1 ϕ α ( θ ) Φ ( t α θ ) y 0 d θ + α 0 t 0 θ ( t τ ) α 1 ϕ α ( θ ) Φ ( ( t τ ) α θ ) d θ S ( τ ) d τ .
Here, ψ α ( t ) can, for example, be [29],
ψ α ( t ) = 1 π n = 1 ( 1 ) n 1 t α n 1 Γ ( n α + 1 ) n ! sin ( n π α ) , t ( 0 , ) , 0 , t ( , 0 ] .
In addition, for the sake of simplicity, let K α ( t ) = α 0 θ ϕ α ( θ ) Φ ( t α θ ) d θ . Equation (13) yields that
y ( t ) = t α 1 K α ( t ) y 0 + 0 t ( t τ ) α 1 K α ( t τ ) S ( τ ) d τ .
For more knowledge on the expression of solutions to system (1), we refer the reader to [7,30,31] and the references cited therein.

3. Regional Strategic Sensors and Regional Spy Sensors

The aim of this section is to explore the notions of regional strategic sensors, regional spy sensors and their relationships.

3.1. Regional Strategic Sensors

Let p ω : L 2 ( Ω ) L 2 ( ω ) be the projection operator in ω defined by p ω y = y | ω and we use
p ω * y ( x ) : = y ( x ) , x ω , 0 , x Ω \ ω
to denote its adjoint operator. Consider the following autonomous system:
0 D t α y ( t ) = A y ( t ) , t I , lim t 0 + 0 I t 1 α y ( t ) = y 0   supposed   to   be   unknown , z ( t ) = C y ( t ) .
Based on (15), one has z ( t ) = K ( t ) y 0 : = C t α 1 K α ( t ) y 0 .
Definition 6.
System (17) is said to be ω weakly observable if
K e r K ( t ) p ω * = { 0 } , t I .
As pointed out in [32], a sensor can be described by a couple ( D , f ) such that D Ω represents the support of the actuator and f denotes its spatial distribution. Then, to obtain our main results, it is supposed that the measurements are made by p sensors ( D i , f i ) 1 i p and the output function becomes
z ( t ) = f 1 , y ( t ) L 2 ( D 1 ) , , f p , y ( t ) L 2 ( D p ) T , t I .
Here, L 2 ( Ω ) is a Hilbert space endowed with the inner product ( · , · ) L 2 ( Ω ) ; p denotes the number of the sensors, D i Ω is the support of the sensors and f i L 2 ( Ω ) represents their spatial distributions. In this case, Z = R p .
Definition 7.
Sensors ( D i , f i ) 1 i p are said to be ω strategic if the system (17) is ω weakly observable.
For the self-adjoint uniformly elliptic operator A with Dirichlet boundary conditions, i.e.,
D ( A ) = ξ L 2 ( Ω ) : ξ ( x ) = 0   in   Ω ,
we see that the spectrum of ( A , D ( A ) ) is composed of eigenvalues and counting according to the multiplicities [33]. Then, there exists a sequence ( λ j , ξ j ) j 1 such that
  • λ j is real for each j = 1 , 2 , , and λ j is the eigenvalue of A with multiplicities r j such that
    0 > λ 1 > λ 2 > > λ j > , lim j λ j = .
  • ξ j k ( k = 1 , 2 , , r j ) , which is the non-trivial solution of the problem:
    A ξ j ( x ) = λ j ξ j ( x ) , x Ω , ξ j ( x ) = 0 , x Ω ,
    is the eigenfunction corresponding to λ j such that ( ξ j k m , ξ j k n ) L 2 ( Ω ) = δ k m , k n , k m , k n = 1 , 2 , , r j , where δ k m , k n is Kronecker delta function concentrated at the origin. In addition, we get that the sequence { ξ j k } j = 1 , 2 , , k = 1 , 2 , , r j forms a complete and orthonormal basis in L 2 ( Ω ) and any φ L 2 ( Ω ) can be expressed by
    φ ( x ) = j = 1 k = 1 r j ( φ , ξ j k ) ξ j k ( x ) .
Note that the above assumptions on operator A is general. For example, if Ω = ( 0 , 1 ) , A = = 2 / x 2 , then A is a symmetric operator. Considering the Dirichlet boundary conditions z ( 0 , t ) = z ( 1 , t ) = 0 , we get that λ n = n 2 π 2 , ξ n ( x ) = 2 sin ( n π x ) , n = 1 , 2 , and, in addition, { 2 sin ( n π x ) } n 1 forms a complete and orthonormal basis in L 2 ( Ω ) [33].
We are now ready to state the following result.
Theorem 1.
Define p × r j matrices G j as
G j = ξ j 1 1 ξ j 2 1 ξ j r j 1 ξ j 1 2 ξ j 2 2 ξ j r j 2 ξ j 1 p ξ j 2 p ξ j r j p p × r j ,
where ξ j k i = ( ξ j k , f i ) L 2 ( D i ) , i = 1 , 2 , , p and k = 1 , 2 , , r j . Then, the sensors ( D i , f i ) 1 i p are ω strategic if and only if
p r = max { r j } a n d r a n k G j = r j , j = 1 , 2 , .
Proof. 
It follows from Definition 7 that the sensors ( D i , f i ) 1 i p are ω strategic if and only if
C t α 1 K α ( t ) p ω * y = 0 y = 0 , y L 2 ( ω ) .
Considering that α E α , β 2 = E α , β 1 ( 1 + α β ) E α , β [7], where
E α , β μ ( z ) : = n = 0 ( μ ) n Γ ( α n + β ) z n n ! , z C , α , β , μ C , R e ( α ) > 0
is known as the generalized Mittag–Leffler function in three parameters. In particular, write E α , β 0 ( z ) = E α , β ( z ) and E α , 1 ( z ) = E α ( z ) for short when μ = 0 and μ = 0 , β = 1 , respectively. With this, we have
K α ( t ) p ω * y = α 0 θ ϕ α ( θ ) Φ ( t α θ ) p ω * y d θ = α 0 θ ϕ α ( θ ) j = 1 k = 1 r j exp ( λ j t α θ ) ( p ω * y , ξ j k ) ξ j k ( x ) d θ = j = 1 k = 1 r j n = 0 α ( n + 1 ) ! ( λ j t α ) n Γ ( α n + α + 1 ) n ! ( p ω * y , ξ j k ) ξ j k ( x ) = j = 1 k = 1 r j α E α , α + 1 2 ( λ j t α ) ( p ω * y , ξ j k ) ξ j k ( x ) = j = 1 k = 1 r j E α , α ( λ j t α ) ( p ω * y , ξ j k ) L 2 ( Ω ) ξ j k ,
which is following from the property 0 θ ν ϕ α ( θ ) d θ = Γ ( 1 + ν ) Γ ( 1 + α ν ) for some ν 0 [29,30]. Consequently, the necessary and sufficient condition for strategic sensors ( D i , f i ) 1 i p is that
j = 1 k = 1 r j E α , α ( λ j t α ) t 1 α G j ( p ω * y , ξ j k ) L 2 ( Ω ) = θ : = ( 0 , , 0 ) R p y = 0 .
Finally, we cover our proof by using Reductio ad Absurdum.
Necessity. If p r = max { r j }   and   r a n k G j < r j   for   some   j = 1 , 2 , , there exists a non-zero vector y ˜ j = y ˜ j 1 , y ˜ j 2 , , y ˜ j r j T satisfying G j y ˜ j = θ . Then, we can construct a non-zero element y ˜ L 2 ( ω ) with y ˜ j k = ( p ω * y ˜ , ξ j k ) , for which
C t α 1 K α ( t ) p ω * y ˜ = θ .
This implies that the sensors ( D i , f i ) 1 i p are not ω strategic.
Sufficiency. If the sensors ( D i , f i ) 1 i p are not strategic, we can find a element y ^ 0 , y ^ L 2 ( Ω ) such that C t α 1 K α ( t ) p ω * y ^ = θ . Since E α , α ( λ j t α ) / t 1 α > 0 for all t 0 , there exists some j * = 1 , 2 , satisfying
k = 1 r j G j * ( p ω * y ^ , ξ j * k ) L 2 ( Ω ) = θ .
Consequently, if p r = max { r j * } , it is sufficient to see that r a n k G j * < r j * . The proof is complete. □

3.2. Regional Spy Sensors

Consider system (1) with measurements given by p sensors ( D i , f i ) 1 i p , we state the following definition of regional spy sensors, which may lead to numerous problems and pose challenging research topics at the same time.
Definition 8.
Sensors are said to be ω spy sensors if they can detect any unknown sources in E ω E .

3.3. The Relationships between ω Spy Sensors and ω Strategic Sensors

Note that the detection problem and the observation problem are different [34]. Consequently, it leads immediately to the difference between ω strategic sensors and ω spy sensors.
Lemma 1.
Strategic ( ω strategic) sensors are spy ( ω spy) sensors, while the converse is not true.
Proof. 
Based on the conclusion in [35] that S y ( t ) is injective but not surjective, it is not difficult to see that, if sensors are ω strategic, they are ω spy sensors, while the converse fails. Here, ω may be whole domain. The proof is finished. □
In addition, we explore the following further result. For the sake of convenience, it is assumed that y 0 = 0 in the following discussion by realizing that system (1) is linear.
Theorem 2.
Suppose that g in S satisfying g L 2 0 , T ; L 2 ( ω ) . Then, ( D i , f i ) 1 i p are ω spy sensors if and only if they are ω strategic sensors.
Proof. 
From Lemma 1, strategic sensors are spy sensors. Then, we next focus on showing its converse.
For any unknown sources S E ω E , define the operator Q ω : E ω L 2 ( 0 , T ; R p ) as
S ( Q ω S ) ( t ) = z ( t ) = z 1 ( t ) , z 2 ( t ) , , z p ( t ) T ,
where ξ j k i = ( ξ j k , f i ) L 2 ( D i ) and
z i ( t ) = j = 1 k = 1 r j 0 t E α , α ( λ j ( t τ ) α ) ( t τ ) 1 α ( S ( τ ) , ξ j k ) L 2 ( Ω ) d τ ξ j k i , i = 1 , 2 , , p .
Based on Definitions 3 and 8, the necessary and sufficient condition for the ω spy sensors ( D i , f i ) 1 i p is that Q ω is injective. Then, if the sensors ( D i , f i ) 1 i p are not ω strategic, by Theorem 1, there exists an element y ^ 0 , y ^ L 2 ( ω ) such that k = 1 r j ξ j * k i ( p ω * y ^ , ξ j * k ) L 2 ( Ω ) = θ for some j * = 1 , 2 , . That is,
Q ω p ω * y ^ = θ   with   y ^ 0 .
Therefore, since S E ω and g L 2 0 , T ; L 2 ( ω ) , let g ^ = g + y ^ . One has
Q ω S ^ = Q ω S ,
where S ^ is the source having g ^ as its intensity. This means that S ^ is not detectable. As a result, we conclude that ( D i , f i ) 1 i p are not ω spy sensors and the proof is finished. □

4. Source Sensing Approach

In this section, we show how to identify the source S = Σ , g E ω under the hypothesis that ( D i , f i ) 1 i p are ω spy sensors.
Theorem 3.
If ( D i , f i ) 1 i p are ω spy sensors, then the source S = Σ , g E ω in system (1) can be uniquely identified by the observation z as the unique solution of the following equation
Λ ω S = Q ω * z .
That is, given any S 1 , S 2 E ω , the equality Q ω S 1 = Q ω S 2 could imply S 1 = S 2 .
Proof. 
Let y i ( t ) , i = 1 , 2 be the solution of system
0 D t α y i ( t ) = A y i ( t ) + S i ( t ) , t I , lim t 0 + 0 I t 1 α y i ( t ) = y 0 .
Then, the difference y ( t ) : = y 1 ( t ) y 2 ( t ) satisfies
0 D t α y ( t ) = A y ( t ) + S 1 ( t ) S 2 ( t ) , t I , lim t 0 + 0 I t 1 α y ( t ) = 0 .
In what follows, we divide the proof into three steps.
Step 1, we consider the following semi-norm
S F ω = Q ω S L 2 ( 0 , T ; R p ) , S E ω
and show that · F ω defines a norm for the space F ω : = E ω ¯ . For this, we only need to prove that any S E ω with S F ω = 0 could yield S = 0 [36]. Indeed, by Definitions 3 and 8, since ( D i , f i ) 1 i p are ω spy sensors, we get that Q ω is injective, i.e., Q ω S = 0 could imply S = 0 . With this, we conclude that F ω is a Hilbert space endowed with the norm · F ω and the inner product
S 1 , S 2 F ω : = Q ω S 1 , Q ω S 2 L 2 ( 0 , T ; R p ) .
Step 2, we prove that the operator Λ ω : F ω F ω * given by
Λ ω S = Q ω * Q ω S
is an isomorphism from space F ω into its dual F ω * . Here, Q ω * denotes the adjoint operator of Q ω . Indeed, given any v L 2 ( 0 , T ; R p ) , by (15), one has
Q ω S , v L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = C y ( t ) , v L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = 0 T v ( t ) C 0 t ( t τ ) α 1 K α ( t τ ) S ( τ ) d τ d t = 0 T τ T v ( t ) C ( t τ ) α 1 K α ( t τ ) d t S ( τ ) d τ .
Then, the duality relationship Q ω S , v L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = S , Q ω * v F ω × F ω * and (28) yield that
( Q ω * v ) ( t ) = t T ( ς t ) α 1 K α ( ς t ) C * v ( ς ) d ς = j = 1 k = 1 r j t T E α , α ( λ j ( ς t ) α ) ( ς t ) 1 α ( C * v ( ς ) , ξ j k ) L 2 ( Ω ) d ς ξ j k .
Based on (43), define
( Λ ω S ) ( t ) : = ( Q ω * Q ω S ) ( t ) = j = 1 k = 1 r j t T E α , α ( λ j ( ς t ) α ) ( ς t ) 1 α m = 1 n = 1 r m 0 ς E α , α ( λ m ( ς τ ) α ) ( ς τ ) 1 α d τ × ( S ( τ ) , ξ m n ) L 2 ( Ω ) C * C ξ m n , ξ j k L 2 ( Ω ) d ς ξ j k .
It follows from (40) that
Λ ω S 1 , S 2 L 2 ( 0 , T ; R p ) = S 1 , S 2 F ω .
Then, if we consider the linear mapping Λ ω S 1 : F ω R given by
Λ ω S 1 S 2 = Λ ω S 1 , S 2 L 2 ( 0 , T ; R p ) ,
it leads to Λ ω S 1 S 2 S 1 F ω S 2 F ω . Therefore, Λ ω S 1 is a continuous operator and has a unique extension to F ω such that
Λ ω S 1 F ω * = S 1 F ω , S 1 F ω .
Moreover, we obtain that the linear operator Λ ω : F ω F ω * is continuous. Then, Λ ω is an isomorphism from F ω to F ω * , which is following from (45) and (47).
Step 3, based on Theorem 1.1 of [37], to complete the proof, we only need to show that Λ ω is a coercive operator. That is, there exists a positive constant γ such that
Λ ω S , S F ω × F ω * γ S F ω 2 , S F ω .
In fact, with these above preliminaries, if Q ω is injective, F ω is Hilbert space endowed with the norm S F ω and the inner product
S 1 , S 2 F ω = Q ω S 1 , Q ω S 2 L 2 ( 0 , T ; R p ) .
For any S F ω , one has
Λ ω S , S F ω × F ω * = Q ω * Q ω S , S F ω × F ω * = Q ω S , Q ω S L 2 ( 0 , T ; R p ) = S F ω .
Then, (36) has a unique solution. This means that any S 1 , S 2 E ω satisfying the equality Q ω S 1 = Q ω S 2 could yield S 1 = S 2 . Consequently, the unknown source S is uniquely identified and the proof is finished. □
Remark 1.
From Theorem 3, if ( D i , f i ) 1 i p are ω spy sensors, we get that the operator Q ω is injective by using the knowledge of the considered time fractional diffusion system and the sensor measurements. The main tool used in the above proof is the duality theory and our results could be used for sensing both the bounded time-varying space-dependence source (the zone source) and the unbounded time-varying space-dependence source (the pointwise source). With this, we see that the obtained results can be considered as a generalization of that in [38]. In particular, if y 0 = 0 and S ( t ) in the integral (15) is uniformly bounded with respect to all t [ 0 , T ] , i.e., | S ( t ) | M , t [ 0 , T ] holds for some constant M > 0 , we have [7]
y ( t ) = 0 t ( t τ ) α 1 K α ( t τ ) S ( τ ) d τ = n = 1 0 t E α , α λ n ( t τ ) α 1 ( t τ ) 1 α S ( τ ) d τ M n = 1 1 E α λ n t α 1 λ n M n = 1 1 λ n ,
which is convergent and is consistent with the conditional stability results in Theorem 3.1 of [38].
Remark 2.
Note that Theorem 3 is obtained by assuming that the measurement doesn’t contain noise and the considered domain is regular so that the eigenvalue pairing of operator A satisfying Equations (21) and (22) is obtained. However, these assumptions may fail in some practical applications. For this, due to the memory effect of the fractional derivative, more new properties on fractional derivatives (or on Mittag–Leffler functions) and more constraints on a system operator are required. While interesting, we conclude that source sensing problems for time fractional diffusion systems under uncertain measurements of an irregular bounded domain and their robust analysis are of great interest.
Next, we give a concrete algorithm to recover the unknown fixed zone source S = ( ω , g ( x ) ) . Here, ω Ω denotes the support of the source and g L 2 ( ω ) represents its intensity.
Since { ξ j k } j 1 , k = 1 , 2 , , r j forms a complete and orthonormal basis in L 2 ( Ω ) , p ω * g L 2 ( Ω ) can be rewritten as follows:
p ω * g ( x ) = j = 1 k = 1 r j g j k ξ j k ( x ) .
Then, the source sensing problem is converted to identify the value of coefficients g j k . By (36), one has
j = 1 k = 1 r j g j k Λ ω ξ j k ( x ) = Q ω * z ( x ) .
Multiplying both sides of (53) with ξ m n ( x ) yields that
j = 1 k = 1 r j Λ ω ξ j k , ξ m n L 2 ( Ω ) g j k = Q ω * z , ξ m n L 2 ( Ω ) , m 1 , n = 1 , 2 , , r m .
With this, set D j k m n = Λ ω ξ j k , ξ m n L 2 ( Ω ) and F m n = Q ω * z , ξ m n L 2 ( Ω ) . For a big enough integer J, g j k can then be approximated by solving the following equation:
j = 1 J k = 1 r j D j k m n g j k = F m n , m = 1 , 2 , , J , n = 1 , 2 , , r m .
It is worth mentioning that the matrix of (55) is positive. Consequently, we have
g ( x ) = p ω j = 1 J k = 1 r j g j k ξ j k ( x ) .

5. Further Remarks

Realize that the Caputo fractional order derivative is another widely used derivative in fractional order systems; in this section, we consider the source sensing problem for the following time fractional diffusion system with a Caputo fractional derivative:
0 C D t α y ( t ) = A y ( t ) + S ( t ) , t I , 0 < α 1 , y ( 0 ) = y 0 ,
where 0 C D t α y ( t ) = 0 I t 1 α d d t y ( t ) , α ( 0 , 1 ) , d d t y ( t ) , α = 1 denotes the Caputo fractional derivative.
Taking a Laplace transform on both sides of system (57), it yields that
y ˜ ( s ) = s α 1 y 0 + S ˜ ( s ) s α I A = s α 1 e s α τ Φ ( τ ) y 0 d τ + e s α τ Φ ( τ ) S ˜ ( s ) d τ .
Observing that L 0 I t 1 α y ( s ) = s α 1 L y ( s ) , α ( 0 , 1 ] and
0 I t 1 α E α , α ( λ j t α ) t 1 α = i = 0 0 t λ j i ( t τ ) α τ α i + α 1 Γ ( 1 α ) Γ ( α i + α ) d τ = i = 0 λ j i t α i Γ ( α i + 1 ) = E α ( λ j t α ) ,
the unique solution of system (57) satisfies [7]
y ( t ) = 0 I t 1 α ( t α 1 K α ( t ) ) y 0 + 0 t ( t τ ) α 1 K α ( t τ ) S ( τ ) d τ = j = 1 k = 1 r j E α ( λ j t α ) ( ξ j k , y 0 ) L 2 ( Ω ) ξ j k + j = 1 k = 1 r j 0 t E α , α ( λ j ( t τ ) α ) ( t τ ) 1 α ( S ( τ ) , ξ j k ) L 2 ( Ω ) d τ ξ j k .
For the approach on identifying the source S E ω governed by system (57), however, the conclusions obtained in previous sections will never hold if the measurements are defined as in (19). This is due to the fact that E α ( λ j t α ) is usually not equal to t α 1 E α , α ( λ j t α ) if α ( 0 , 1 ) . Then, some new revised definition of the measurements should be introduced.
Observing that 0 D t 1 α E α ( λ j t α ) = t α 1 E α , α ( λ j t α ) for any λ j R , t 0 following from (59), if the sensor measurements are revised to be given by p sensors ( D i , f i ) 1 i p as follows:
z ^ ( t ) = C 2 y ( t ) : = f 1 , 0 C D t 1 α y ( t ) L 2 ( D 1 ) , , f p , 0 C D t 1 α y ( t ) L 2 ( D p ) T .
Consider system (57) with S = 0 , define z ^ ( t ) = K 2 ( t ) y 0 : = C 2 y ( t ) , and we obtain the following result.
Definition 9.
System (57), (61) with S = 0 is said ω weakly observable if K e r K 2 ( t ) p ω * = { 0 } , t I .
Theorem 4.
Define p × r j matrices G j as
G j = ξ j 1 1 ξ j 2 1 ξ j r j 1 ξ j 1 2 ξ j 2 2 ξ j r j 2 ξ j 1 p ξ j 2 p ξ j r j p p × r j ,
where ξ j k i = ( ξ j k , f i ) L 2 ( D i ) , i = 1 , 2 , , p and k = 1 , 2 , , r j . Then, the sensors ( D i , f i ) 1 i p are ω strategic for system (57) with S = 0 if and only if
p r = max { r j } a n d r a n k G j = r j , j = 1 , 2 , .
Since the proof of Theorem 4 is very similar to that of Theorem 1, we omit it.
Consider system (57), let the operator Q ^ ω : E ω L 2 ( 0 , T ; R p ) be given by
( Q ^ ω S ) ( t ) = z ^ ( t ) = z ^ 1 ( t ) , z ^ 2 ( t ) , , z ^ p ( t ) T ,
where
z ^ i ( t ) : = j = 1 k = 1 r j 0 t E α , α ( λ j ( t τ ) α ) ( t τ ) 1 α ( S ( τ ) , ξ j k ) L 2 ( Ω ) d τ ξ j k i , i = 1 , 2 , , p .
The source sensing problem is stated as follows:
  • Given the measurements z ^ L 2 ( 0 , T ; R p ) defined by (61), find a source S such that the solution of system (57) satisfies
    Q ^ ω S ( t ) = z ^ ( t ) .
Theorem 5.
Assume that ( D i , f i ) 1 i p are ω spy sensors. Then, the source S = Σ , g E ω in system (57) can be uniquely identified by the observation z in (61) as the unique solution of the following equation
Λ ω S = Q ^ ω * z .
Proof. 
For any two solutions y 1 , y 2 of system (57), their difference y ( t ) : = y 1 ( t ) y 2 ( t ) satisfies
0 C D t α y ( t ) = A y ( t ) + S 1 ( t ) S 2 ( t ) , t I , y ( 0 ) = 0 .
Then, we divide the proof into three steps.
Step 1, if ( D i , f i ) 1 i p are ω spy sensors, we get that Q ^ ω is injective. Then, the semi-norm
S F ω = Q ^ ω S L 2 ( 0 , T ; R p ) , S E ω
defines a norm for the space F ω : = E ω ¯ . Therefore, F ω is a Hilbert space endowed with the norm · F ω and the inner product S 1 , S 2 F ω = Q ^ ω S 1 , Q ^ ω S 2 L 2 ( 0 , T ; R p ) .
Step 2, given any v L 2 ( 0 , T ; R p ) , since
Q ^ ω S , v L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = 0 T j = 1 k = 1 r j τ T E α , α ( λ j ( t τ ) α ) ( t τ ) 1 α ( C 2 * v ( t ) , ξ j k ) L 2 ( Ω ) d t ( S ( τ ) , ξ j k ) L 2 ( Ω ) d τ .
The duality relationship Q ^ ω S , v L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = S , Q ^ ω * v F ω × F ω * leads to
( Q ^ ω * v ) ( t ) = j = 1 k = 1 r j t T E α , α ( λ j ( ς t ) α ) ( ς t ) 1 α ( C 2 * v ( ς ) , ξ j k ) L 2 ( Ω ) d ς ξ j k .
Define Λ ˜ ω : F ω F ω * as
( Λ ˜ ω S ) ( t ) : = ( Q ω * Q ω S ) ( t ) = j = 1 k = 1 r j t T E α , α ( λ j ( ς t ) α ) ( ς t ) 1 α m = 1 n = 1 r m 0 ς E α , α ( λ m ( ς τ ) α ) ( ς τ ) 1 α d τ × ( S ( τ ) , ξ m n ) L 2 ( Ω ) C * C ξ m n , ξ j k L 2 ( Ω ) d ς ξ j k .
Similar to Step 2 of Theorem 3, we get that the operator Λ ˜ ω is an isomorphism from F ω to its dual F ω * .
Step 3, for any S F ω , one has
Λ ˜ ω S , S F ω × F ω * = Q ^ ω S , Q ^ ω S L 2 ( 0 , T ; R p ) × L 2 ( 0 , T ; R p ) = S F ω .
Then, Theorem 1.1 of [37] yields that (67) has a unique solution. As a result, the unknown source S in system (57) is uniquely identified by the observation (61). The proof is finished. □
Similarly, for any unknown fixed zone source S = ( ω , g ( x ) ) , by (52) and (67), we have
j = 1 k = 1 r j g j k Λ ω ξ j k ( x ) = Q ^ ω * z ( x ) .
For big enough integer J, then g j k can be approximated by multiplying both sides of (74) with ξ m n ( x ) as follows:
j = 1 J k = 1 r j D j k m n g j k = F ^ m n , m = 1 , 2 , , J , n = 1 , 2 , , r m ,
where D j k m n = Λ ω ξ j k , ξ m n L 2 ( Ω ) and F ^ m n = Q ^ ω * z , ξ m n L 2 ( Ω ) . With this, we obtain that
g ( x ) = p ω j = 1 J k = 1 r j g j k ξ j k ( x ) .

6. Numerical Examples

The aim of this numerical work is to identify a fixed zone source S E ω according to the methods given in Section 4.
Let Ω R n be an open bounded subset with smooth boundary Ω , we consider the following system
0 D t α y ( x , t ) = y ( x , t ) + S ( x , t )   in   Ω × [ 0 , T ] , y ( x , t ) = 0   in   Ω × [ 0 , T ] , lim t 0 + 0 I t 1 α y ( x , t ) = 0   in   Ω ,
where = 2 / x 2 denotes the Laplace operator and S ( x , t ) = ω , g ( x ) represents the unknown source to be sought. The measurements are made by p sensors ( D i , f i ) 1 i p as follows:
z ( t ) = C y ( x , t ) = f 1 , y ( · , t ) L 2 ( D 1 ) , , f p , y ( · , t ) L 2 ( D p ) T , t I .
Based on the arguments in Section 4, the sensing problem of system (77) under measurements (78) can be solved via the following applicable steps:
  • Initial data α , Ω , T and the ω spy sensors ( p , D i , f i ) ;
  • Given big enough integer J, obtain D j k m n and F m n for all m = 1 , 2 , J ;
  • Solve the problem (55) to get g j k and then obtain g based on (52).

6.1. One-Dimensional Case

Let Ω = ( 0 , 1 ) . We get that λ j = j 2 π 2 , ξ j ( x ) = 2 sin ( j π x ) and r j = 1 . Here, 2 sin ( j π x ) j 1 forms a complete and orthonormal basis in L 2 ( 0 , 1 ) [33]. Consider a fixed zone source S = ( ω , g ( x ) ) with the intensity g given by
g ( x ) = ( 5.2 x ) ( x 0.4 ) + 1 , 0.2 x < 0.4 ; 1 , 0.4 x < 0.6 ; ( x 0.6 ) ( x 5.8 ) + 1 , 0.6 x < 0.8 ; 0 , elsewhere ,
where ω = [ 0.2 , 0.8 ] denotes the support of the source. Suppose that the measurements are made by one sensor ( D , f ) . By Theorem 1, we obtain
Proposition 1.
The sensor D , f is ω strategic for some subregion ω Ω if and only if
D f ( x ) sin ( j π x ) d x 0
holds true for all j = 1 , 2 , .
Proof. 
Since r j = 1 , n = 1 , it then follows that
G 1 = 2 D f ( x ) sin ( j π x ) d x .
Theorem 1 shows that (80) holds and the proof is complete. □
In particular, if the support D of sensor reduces to a point δ ( x σ ) , we see that (80) is equal to σ Q . Without loss of generality, let the measurements be given by a pointwise sensor located at σ = 2 / 3 with the unit spatial distribution. Then, sensor ( D , f ) reduces to δ x 2 / 3 , 1 . With this, we get that
( Q ω g * ) ( t ) = j = 1 0 t ( t τ ) α 1 E α , α ( λ j ( t τ ) α ) d τ g * , ξ j L 2 ( Ω ) ξ j ( σ ) = j = 1 E α ( λ j t α ) 1 λ j g * , ξ j L 2 ( Ω ) ξ j ( σ ) ,
which is injective. Therefore, ( Q ω * z ) ( t ) = m = 1 t T E α , α ( λ m ( ς t ) α ) ( ς t ) 1 α z ( ς ) d ς ξ m ( σ ) ξ m and
( Λ ω g * ) ( t ) = m = 1 j = 1 t T E α , α ( λ m ( ς t ) α ) ( ς t ) 1 α E α ( λ j ς α ) 1 λ j d ς ( g * , ξ j ) L 2 ( Ω ) ξ j ( σ ) ξ m ( σ ) ξ m .
Moreover, one has
D j m = Λ ω ξ j , ξ m L 2 ( Ω ) = t T E α , α ( λ m ( ς t ) α ) ( ς t ) 1 α E α ( λ j ς α ) 1 λ j d ς ξ j ( σ ) ξ m ( σ )
and
F m = Q ω * z , ξ m L 2 ( Ω ) = t T E α , α ( λ m ( ς t ) α ) ( ς t ) 1 α z ( ς ) d ς ξ m ( σ ) .
Let α = 0.5 . Figure 1 shows how the approximated g * is close to g.

6.2. The Cases of n = 2

This part focuses on the system (77) in Ω 2 = ( 0 , 1 ) × ( 0 , 1 ) R 2 . In this case, the eigenvalues and corresponding eigenfunctions of operator are λ i j = ( i 2 + j 2 ) π 2 and ξ i j ( x 1 , x 2 ) = 2 sin ( i π x 1 ) sin ( j π x 2 ) , respectively. Here, r i j = 1 . Let the system (77) be excited by a fixed zone source S = ( ω , g ( x 1 , x 2 ) ) with g ( x 1 , x 2 ) = φ ( x 1 ) ψ ( x 2 ) such that
φ ( x 1 ) = ( 5.2 x 1 ) ( x 1 0.4 ) + 1 , 0.2 x < 0.4 ; 1 , 0.4 x < 0.6 ; ( x 1 0.6 ) ( x 1 5.8 ) + 1 , 0.6 x < 0.8 ; 0 , elsewhere
and
ψ ( x 2 ) = 25 4 ( x 2 0 . 2 ) 2 , 0.2 x < 0.6 ; 25 ( x 2 0 . 8 ) 2 , 0.6 x < 0.8 ; 0 , elsewhere .
Then, the support of S is ω = [ 0.2 , 0.8 ] × [ 0.3 , 0.7 ] Ω and its presentation is given by ( a ) of Figure 2.
Suppose that the measurements are made by one sensor ( D , f ) . It follows that
Proposition 2.
The sensor D , f is ω strategic for subregion ω Ω 2 if and only if for all m , n = 1 , 2 , ,
D f ( x 1 , x 2 ) sin ( m π x 1 ) sin ( n π x 2 ) d x 1 d x 2 0 .
The proof can be easily obtained similar to the proof of Proposition 1 following from Theorem 1. Then, we omit it.
Let D = 2 / 12 , 2 / 6 × { 0 . 5 } and f = 1 . Then, the sensor ( D , f ) reduces to 2 / 12 , 2 / 6 × { 0 . 5 } , 1 , which is a spy sensor. Moreover, it follows that Q ω is injective and is defined as
( Q ω g ^ ) ( t ) = i , j = 1 0 t ( t τ ) α 1 E α , α ( λ i j ( t τ ) α ) d τ g ^ , ξ i j L 2 ( Ω ) ( ξ i j , f ) L 2 ( D ) = i , j = 1 E α ( λ i j t α ) 1 λ i j g ^ , ξ i j L 2 ( Ω ) ( ξ i j , f ) L 2 ( D ) .
Then, ( Q ω * z ) ( t ) = m , n = 1 t T E α , α ( λ m n ( ς t ) α ) ( ς t ) 1 α z ( ς ) d ς ( ξ m n , f ) L 2 ( D ) ξ m n and
( Λ ω g ^ ) ( t ) = m , n = 1 i , j = 1 t T E α , α ( λ m n ( ς t ) α ) ( ς t ) 1 α E α ( λ i j ς α ) 1 λ j d ς g ^ , ξ i j L 2 ( Ω ) ( ξ i j , f ) L 2 ( D ) ( ξ m n , f ) L 2 ( D ) ξ m n .
Therefore, Theorem 3 shows that the source S can be sought from observation z by solving the equation Λ ω S = Q ω * z . Let J = 50 . We get that
D i j m n = Λ ω ξ i j , ξ m n L 2 ( Ω ) = t T E α , α ( λ m n ( ς t ) α ) ( ς t ) 1 α E α ( λ i j ς α ) 1 λ j d ς ( ξ i j , f ) L 2 ( D ) ( ξ m n , f ) L 2 ( D )
and
F m n = Q ω * z , ξ m n L 2 ( Ω ) = t T E α , α ( λ m n ( ς t ) α ) ( ς t ) 1 α z ( ς ) d ς ( ξ m n , f ) L 2 ( D ) .
Then, we refer the reader to ( b ) and ( c ) of Figure 2 on how close is the approximated g ^ to the exact g when α = 0.5 .

7. Conclusions

The aim of this paper is to discuss the source sensing problem in a subdiffusion process by a regional detection method motivated by the great potential applications in environmental problems. The characterizations of regional strategic sensors, regional spy sensors and their relationships are presented. We discuss an approach on how to identify the unknown source only in a subregion of the whole domain by using the HUM. Some comparison results are given between time fractional diffusion system with a Riemann–Liouville fractional order derivative and that with a Caputo fractional order derivative. The results here can be regarded as an extension of the results in [25]. Moreover, we claim that some regularization method such as an iterative regularization method in [39] can be introduced to combine the concrete algorithm in this paper. Therefore, the source sensing problems for a fractional order distributed parameter systems by combining a regional detection method and the iterative regularization method as well as their comparisons with existing methods are of great interest.

Author Contributions

All authors contributed to this research. F.G. designed the research and wrote the paper. W.S. contributed to the numerical simulation and assisted in writing the paper. Y.C. contributed to designing the research and revised the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (NSFC) Grant No. 41801365 and the Fundamental Research Funds for the Central Universities, China University of Geosciences, Wuhan Grant No. CUGGC05 and the Hubei NSFC Grant No. 2019CFB158.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Berrod, Q.; Hanot, S.; Guillermo, A.; Mossa, S.; Lyonnard, S. Water sub-diffusion in membranes for fuel cells. Sci. Rep. 2017, 7, 1–14. [Google Scholar] [CrossRef] [PubMed]
  2. Uchaikin, V.; Sibatov, R. Fractional Kinetics in Solids: Anomalous Charge Transport in Semiconductors, Dielectrics and Nanosystems; World Science: Singapore, 2013. [Google Scholar]
  3. Ge, F.; Chen, Y. Event-triggered boundary feedback control for networked reaction-subdiffusion processes with input uncertainties. Inf. Sci. 2019, 476, 239–255. [Google Scholar] [CrossRef]
  4. Ning, W.; Wang, J.; Li, Z. Fractional-order PID control strategy on hydraulic-loading system of typical electromechanical platform. Sensors 2018, 18, 3024. [Google Scholar]
  5. Metzler, R.; Klafter, J. The random walk’s guide to anomalous diffusion: A fractional dynamics approach. Phys. Rep. 2000, 339, 1–77. [Google Scholar] [CrossRef]
  6. Ge, F.; Chen, Y.; Kou, C. Regional Analysis of the Time-Fractional Diffusion Process; Springer: Cham, Switzerland, 2018. [Google Scholar]
  7. Ge, F.; Chen, Y.; Kou, C. Regional controllability analysis of fractional diffusion equations with Riemann–Liouville time fractional derivatives. Automatica 2017, 76, 193–199. [Google Scholar] [CrossRef]
  8. Ge, F.; Meurer, T.; Chen, Y. Mittag-Leffler convergent backstepping observers for coupled semilinear subdiffusion systems with spatially varying parameters. Syst. Control Lett. 2018, 122, 86–92. [Google Scholar] [CrossRef]
  9. Zhang, C.; Ordóñez, R. Extremum-Seeking Control and Applications: A Numerical Optimization-Based Approach; Springer Science & Business Media: Berlin, Germany, 2011. [Google Scholar]
  10. Liu, S.; Krstic, M. Stochastic Averaging and Stochastic Extremum Seeking; Springer Science & Business Media: Berlin, Germany, 2012. [Google Scholar]
  11. Dochain, D.; Perrier, M.; Guay, M. Extremum seeking control and its application to process and reaction systems: A survey. Math. Comput. Simul. 2011, 82, 369–380. [Google Scholar] [CrossRef]
  12. El Badia, A.; Ha-Duong, T.; Hamdi, A. Identification of a point source in a linear advection-dispersion-reaction equation: Application to a pollution source problem. Inverse Probl. 2005, 21, 1121–1136. [Google Scholar] [CrossRef]
  13. Heymans, N.; Podlubny, I. Physical interpretation of initial conditions for fractional differential equations with riemann-liouville fractional derivatives. Rheol. Acta 2006, 45, 765–771. [Google Scholar] [CrossRef]
  14. Kaczorek, T.; Rogowski, K. Fractional Linear Systems and Electrical Circuits; Springer International Publishing: Cham, Switzerland, 2015. [Google Scholar]
  15. Povstenko, Y. Fractional thermoelasticity; Springer: Berlin, Germany, 2015. [Google Scholar]
  16. Henry, B.I.; Wearne, S.L. Fractional reaction–diffusion. Phys. A 2000, 276, 448–455. [Google Scholar] [CrossRef]
  17. Adavani, S.S.; Biros, G. Fast algorithms for source identification problems with elliptic PDE constraints. SIAM J. Imaging Sci. 2010, 3, 791–808. [Google Scholar] [CrossRef]
  18. Murray-Bruce, J.; Dragotti, P.L. A Solving physics-driven inverse problems via structured least squares. In Proceedings of the 2016 24th European Signa (EUSIPCO), Budapest, Hungary, 29 August–2 September 2016. [Google Scholar]
  19. Murray-Bruce, J.; Dragotti, P.L. A sampling framework for solving physics-driven inverse source problems. IEEE Trans. Signal Process. 2017, 65, 6365–6380. [Google Scholar] [CrossRef]
  20. Li, Y.; Osher, S.; Tsai, R. Heat source identification based on l1 constrained minimization. Inverse Probl. Imag. 2014, 8, 199–221. [Google Scholar]
  21. Mamonov, A.V.; Tsai, Y.R. Point source identification in nonlinear advection–diffusion–reaction systems. Inverse Probl. 2013, 29, 035009. [Google Scholar] [CrossRef]
  22. Chadalavada, S.; Datta, B.; Naidu, R. Optimisation approach for pollution source identification in groundwater: An overview. Int. J. Environ. Waste Manag. 2011, 8, 40–61. [Google Scholar] [CrossRef]
  23. Marseguerra, M.; Zoia, A. The monte carlo and fractional kinetics approaches to the underground anomalous subdiffusion of contaminants. Ann. Nucl. Energy 2006, 33, 223–235. [Google Scholar] [CrossRef]
  24. Nakagawa, J.; Sakamoto, K.; Yamamoto, M. Overview to mathematical analysis for fractional diffusion equations–new mathematical aspects motivated by industrial collaboration. J. Math Ind. 2010, 2, 99–108. [Google Scholar]
  25. El Jai, A.; Afifi, L. Spy-sensors and detection. Int. J. Syst. Sci. 1995, 26, 1447–1463. [Google Scholar] [CrossRef]
  26. Kilbas, A.A.; Srivastava, H.M.; Trujillo, J.J. Theory and Applications of Fractional Differential Quations; Elsevier Science Limited: Oxford, UK, 2006. [Google Scholar]
  27. El-Borai, M.M. Some probability densities and fundamental solutions of fractional evolution equations. Chaos Solitons Fract. 2002, 14, 433–440. [Google Scholar] [CrossRef]
  28. El-Borai, M.M. The fundamental solutions for fractional evolution equations of parabolic type. Int. J. Stoch. Anal. 2004, 3, 197–211. [Google Scholar] [CrossRef]
  29. Mainardi, F.; Paradisi, P.; Gorenflo, R. Probability distributions generated by fractional diffusion equations. arXiv 2007, arXiv:0704.0320. [Google Scholar]
  30. Liu, Z.; Li, X. Approximate controllability of fractional evolution systems with riemann–liouville fractional derivatives. SIAM J. Control Optim. 2015, 53, 1920–1933. [Google Scholar] [CrossRef]
  31. Zhou, Y.; Zhang, L.; Shen, X. Existence of mild solutions for fractional evolution equations. J. Integral Equ. Appl. 2013, 25, 557–586. [Google Scholar] [CrossRef]
  32. El Jai, A.; Pritchard, A.J. Sensors and Controls in the Analysis of Distributed Systems; Halsted Press: Chichester, UK, 1988. [Google Scholar]
  33. Courant, R.; Hilbert, D. Methods of Mathematical Physics; Cambridge University Press: Cambridge, UK, 1966; Volume 1, Available online: https://onlinelibrary.wiley.com/doi/book/10.1002/9783527617210 (accessed on 23 May 2018).
  34. Ge, F.; Chen, Y.; Kou, C. Regional detection of unknown sources for the sub-diffusion process. In Proceedings of the American Control Conference (ACC), Seattle, WA, USA, 24–26 May 2017; pp. 3237–3242. [Google Scholar]
  35. Ge, F.; Chen, Y.; Kou, C. On the regional gradient observability of time fractional diffusion processes. Automatica 2016, 74, 1–9. [Google Scholar] [CrossRef] [Green Version]
  36. Kreyszig, E. Introductory Functional Analysis with Applications; Wiley: New York, NY, USA, 1989. [Google Scholar]
  37. Lions, J.L. Optimal Control of Systems Governed by Partial Differential Equations; Springer: Berlin, Germany, 1971. [Google Scholar]
  38. Wang, J.; Wei, T. Quasi-reversibility method to identify a space-dependent source for the time-fractional diffusion equation. Appl. Math. Model. 2015, 39, 6139–6149. [Google Scholar] [CrossRef]
  39. Wang, J.; Ran, Y. An iterative method for an inverse source problem of time-fractional diffusion equation. Inverse Probl. Sci. Eng. 2018, 26, 1509–1521. [Google Scholar] [CrossRef]
Figure 1. The exact intensity g and approximate intensity g * of the unknown fixed source.
Figure 1. The exact intensity g and approximate intensity g * of the unknown fixed source.
Sensors 19 03504 g001
Figure 2. Comparison between the exact intensity g and the approximate intensity g * .
Figure 2. Comparison between the exact intensity g and the approximate intensity g * .
Sensors 19 03504 g002

Share and Cite

MDPI and ACS Style

Song, W.; Ge, F.; Chen, Y. Subdiffusive Source Sensing by a Regional Detection Method. Sensors 2019, 19, 3504. https://doi.org/10.3390/s19163504

AMA Style

Song W, Ge F, Chen Y. Subdiffusive Source Sensing by a Regional Detection Method. Sensors. 2019; 19(16):3504. https://doi.org/10.3390/s19163504

Chicago/Turabian Style

Song, Weijing, Fudong Ge, and YangQuan Chen. 2019. "Subdiffusive Source Sensing by a Regional Detection Method" Sensors 19, no. 16: 3504. https://doi.org/10.3390/s19163504

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop