Three-dimensional inversion of volumetric defects profiles from electromagnetic nondestructive testing signals by means of stochastic methods with the aid of parallel computation

Noritaka Yusa, Mihai Rebican, Zhenmao Chen, Kenzo Miya, Tetsuya Uchimoto, Toshiyuki Takagi

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

This study applies five stochastic inversion methods to the reconstruction of three-dimensional volumetric defect regions from eddy current testing signals, and evaluates their efficiencies in relation to this problem. The five stochastic methods considered here are iterative local search, tabu search, simple genetic algorithm, parameter-free genetic algorithms, and simulated annealing. Since stochastic methods require evaluation of many solution candidates, simulations here are performed on a supercomputer aided by parallel computation to avoid too lengthy computational times. Three-dimensional volumetric defects in a thin flat conductive plate are considered. The results of this study demonstrate that the stochastic methods applied to eddy current inversion problems are highly compatible with parallel computation, and that computational time can be significantly shortened with the use of parallel computation. Among the five algorithms adopted in this study, tabu search and simulated annealing provided good results whereas genetic algorithms had very poor performances.

Original languageEnglish
Pages (from-to)47-63
Number of pages17
JournalInverse Problems in Science and Engineering
Volume13
Issue number1
DOIs
Publication statusPublished - 2005 Feb

Keywords

  • Eddy current testing
  • Inversion
  • Non-destructive testing
  • Parallel computing
  • Volumetric defects

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science Applications
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Three-dimensional inversion of volumetric defects profiles from electromagnetic nondestructive testing signals by means of stochastic methods with the aid of parallel computation'. Together they form a unique fingerprint.

Cite this