Documente Academic
Documente Profesional
Documente Cultură
Abstract—A recently introduced technique of topology sensitiv- polynomial-time (NP) complexity, and a novel method of topol-
ity in method of moments is extended by the possibility of adding ogy sensitivity [8] is adopted and extended by the possibility
degrees of freedom (reconstruct) into the underlying structure. of reconstructing the structure. The resulting local algorithm is
The algebraic formulation is inversion-free, suitable for paralleliza-
tion, and scales favorably with the number of unknowns. The re- based on an investigation of nearest neighbors in a Hamming
construction completes the nearest neighbors procedure for an graph H(N, 2) [9]. It utilizes method of moments (MoM) [10]
evaluation of the smallest shape perturbation. The performance and the Sherman–Morrison–Woodbury identity [11], [12], a
of the method is studied with a greedy search over a Hamming popular scheme for evaluating consequences of local geometry
graph representing the structure in which initial positions are cho- perturbations [8], [13]–[16].
sen from a random set. The method is shown to be an effective data
mining tool for machine learning-related applications. Exploration of all shapes with a unit Hamming distance is per-
formed with an inversion-free evaluation. The proposed method
Index Terms—Antennas, numerical methods, optimization is fine-grained (with an expected linear speedup when paral-
methods, shape sensitivity analysis, structural topology design.
lelization is used), well suited for vectorization, and its imple-
mentation has the potential to evaluate millions of mid-size an-
I. INTRODUCTION tenna candidates per minute on a laptop. As such, it represents
an ideal data mining tool for machine learning algorithms [17]
HAPE synthesis, a technique of constructing a particular
S body from piecewise constant materials, is an unsolved
problem across many engineering branches. The major obstacle
or an apt candidate for a local step in global optimization [18].
Specifically, the training phase of supervised learning [19] can
be significantly shortened. Utilizing the linear regression mod-
is a 2N combinatorial explosion [1] for N degrees of freedom els [19], the proposed technique can provide additional informa-
(d-o-f) that arises from its binary nature: Each unknown is as- tion about first-order perturbations. These claims are supported
sociated with a given material or with vacuum [2]. Although by a Monte Carlo simulation with a greedy search over the near-
the formulation can be relaxed by introducing continuous vari- est neighbors.
ables, as in the case of topology optimization [3], the solution is The letter is organized as follows. Topology sensitivity tech-
finally rounded with respect to a given threshold [4]. This last nique is briefly reviewed in Section II and extended by the pos-
step is encumbered with difficulties such as nonuniqueness and sibility of reconstructing a previously reduced shape. Section III
instability [5]. shows that an iterative evaluation of all nearest neighbors of an
Contemporary solutions to shape optimization are mostly actual shape can be employed in a greedy algorithm. Perfor-
parametric sweeps, heuristic algorithms [6], and, recently, ma- mance of the greedy algorithm based on the nearest neighbors
chine learning [7]. All these techniques share a common feature: search is statistically studied in Section IV. The letter concludes
a demand on vast amounts of samples for which a fitness func- in Section V.
tion has to be evaluated. Therefore, large data sets are dealt with
during shape optimization.
In this letter, the binary nature of the optimization prob- II. EFFECTIVE SHAPE PERTURBATION IN MOM
lem is kept in its original form accepting non-deterministic MoM [10] for a fixed discretization and a set of piecewise
basis functions {ψ n (r)} is considered here as the starting point;
see Fig. 1. The presence of basis functions is a subject of binary
Manuscript received February 20, 2019; revised April 9, 2019; accepted
April 17, 2019. Date of publication April 22, 2019; date of current ver- optimization; see [8] for details. The primary quantities being
sion November 4, 2019. This work was supported by the Czech Science operated on are the impedance matrix Z ∈ C N ×N [10], which
Foundation under Project no. 19-06049S. The work of M. Capek was sup- carries information about the electromagnetic behavior of an
ported by the Ministry of Education, Youth and Sports through the project
CZ.02.2.69/0.0/0.0/16_027/0008465. (Corresponding author: Miloslav Capek.) actual shape, and a set of matrix operators {Am } representing
M. Capek and L. Jelinek are with the Department of Electromagnetic criterion function p in a form
Field, Faculty of Electrical Engineering, Czech Technical University in Prague,
166 27 Prague, Czech Republic (e-mail: miloslav.capek@fel.cvut.cz; lukas.
jelinek@fel.cvut.cz). p (I) = h . . . , I H Am I , · · · (1)
M. Gustafsson is with the Department of Electrical and Information Tech-
nology, Lund University, 221 00 Lund, Sweden (e-mail: mats.gustafsson@
eit.lth.se). where I is a column vector of current expansion coefficients [10],
Digital Object Identifier 10.1109/LAWP.2019.2912459 and h is an arbitrary function operating over individual quantities
1536-1225 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2312 IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 18, NO. 11, NOVEMBER 2019
where
H
D AE , IE\B− = diag IE\B− AE IE\B− . (5)
The symbols introduced in (3)–(5) read: yE,f and yE,b are the f th
and bth columns of the admittance matrix YE = Z−1 E , respec-
tively, Yf b and Ybb are admittance matrix elements, lf is the
length of the fed edge, and V0 = 1 V. Matrix operators {AE,n }
have only lines and columns corresponding to the entries in set E,
and matrices in a form of [I] contain columns of current expan-
sion coefficients corresponding to the investigated perturbations.
The edge corresponding to the worst topology sensitivity is
Fig. 1. Discretized rectangular plate with a side aspect ratio of 2:1. Binary selected (here denoted by index b) and removed (disabled) by
optimization is defined over a graph depicted by red lines representing a con- virtue of an admittance matrix update
nectivity of basis functions. The thick vertical line represents the position of a
delta gap source [20].
T yE,b T
YE\b = CE\b YE − yE,b CE\b , (6)
Ybb
where CE\b is a permutation matrix
0⇔ n=b
CE\b,nn = (7)
1 ⇔ otherwise
in which all zero columns are removed. A removal of one basis
function thus means reduction of the admittance matrix dimen-
sion by one.
Fig. 2. Randomly generated initial structure ΩE . Gray and yellow pixels rep-
The basis function removal technique (3) is excellent for in-
resent vacuum and metal, respectively. All basis functions fully residing in the vestigating topological sensitivity (2); however, a nonexistence
conducting region are enabled; the others are disabled. Position of the feeder is of a technique of a basis function addition commonly caused
highlighted by the thick vertical line and is always a part of the metallic motif.
All disabled d-o-f can be subject of addition, i.e., they belong to set B+ , and
a premature deadlock [8]. Here, the addition of a basis func-
enabled d-o-f can be subject of removal, i.e., they belong to set B− = E \{f }. tion is introduced by further applying the Sherman–Morrison–
Woodbury identity [11], which results in
IH Am I, m ∈ {1, . . . , M }. Let us further assume that the f th IE∪B+
basis function is fed where index f is fixed. ⎡
⎤
T yf xf b x b (8)
Topology sensitivity is defined as [8] . . . , CE∪b + , ...⎦
=⎣ 0 zb −1 lf V 0
τb (p, ΩE ) = − p (IE ) − p (Ib ) (2)
where
expressing a difference between the performance of the actual
xb = Yzb , zb = Zbb − zT
b xb (9)
shape ΩE and of its smallest perturbations realized via individ-
ual removals or additions of the bth basis function, b ∈ B. The and permutation matrix CE∪b provides a correct ordering of the
symbol E denotes a set of all “enabled” d-o-f, and B denotes a basis functions since the basic Sherman–Morrison–Woodbury
set of all investigated edges, B = {B− , B+ }, where B− is a set identity demands that the basis function added must be the last
of d-o-f to be removed (one by one) and B+ is a set of d-o-f to one. Entries of CE∪b read
be added (one by one); see Fig. 2 for a particular example.
1 ⇔ n = S (m)
CE∪b,mn = (10)
0 ⇔ otherwise
A. Removal of Basis Functions
with m ∈ {1, 2, . . . , E + 1} and where S is a set of target indices
Shape reduction via the removal of d-o-f with indices b ∈ B− if a set {E, b} is sorted in ascending order.
is possible with a linear asymptotic complexity as After deciding which basis function should be added (en-
abled), an admittance matrix update is performed as follows:
Yf b
IE\B− = . . . , yE,f − yE,b , . . . lf V0 (3) ⎡ ⎤
Ybb z Y + xb xTb −xb
1 T ⎣ b
YE∪b = CE∪b −xTb 1 ⎦ CE∪b (11)
with an effective evaluation of (1) as zb
pE\B− = h D AE,m , IE\B− (4) with the auxiliary variables defined in (9).
CAPEK et al.: INVERSION-FREE EVALUATION OF NEAREST NEIGHBORS IN METHOD OF MOMENTS 2313
TABLE I
COMPARISON OF SHAPE OPTIMIZATION PERFORMANCE DEPENDING ON THE
NUMBER OF D-O-F
Fig. 8. PDF and CDF representing local minima found by the greedy algorithm
starting from positions generated by a Monte Carlo algorithm.
Fig. 7. PDF representing the number of local steps, i.e., the number of itera-
tions of the greedy algorithm performed to find the local minimum.
V. CONCLUSION
evaluated in AToM [27], and all calculations ran on the computer An inversion-free method was introduced for evaluation of
specified in Table I. The only run-time variables are gE , YE , Z the smallest perturbation within the MoM. It makes it possible
(for shape reconstruction), and {Am } matrices. In total, 5 · 104 to preserve the binary nature of the shape synthesis problem,
trials were performed for both grids, and the overall performance furthermore improving the convergence rate and robustness of
is summarized in Table I and in Figs. 5–8. the optimization method. The reconstruction of the structure was
It can be seen in Fig. 5 that the greedy search, which is a local derived using the Sherman–Morrison–Woodbury identity.
algorithm, is capable of improving the performance in Q-factor A greedy algorithm used on topology sensitivity was em-
to a mean value of 0.064Qinit and 0.028Qinit for 4 × 8 and 6 × ployed to demonstrate the capability to gather millions of eval-
12 grids, respectively. As expected, the improvements are more uated shapes per minute. To this end, the presented method can
pronounced when working with a finer grid (nonhatched bars). be utilized as a local step in global optimization schemes. When
As confirmed in Fig. 6, this is only possible if both removal and randomly restarted, it can also serve as a data mining tool or
addition techniques are involved. In particular, the removal alone as a building block for machine learning techniques aimed at
performs poorly when starting from a random seed. Fig. 7 shows shape/pattern synthesis.
the statistics of resemblance between the initial and final samples The letter also stimulates further development. It is inevitable
and reveals that, on average, κ ≈ 0.43 of all d-o-f were modified. that a study of the dependence of the method on the number of
The final result, showing the probability density function (PDF) unknowns and the type of mesh grid will be required. Another
and the cumulative density function (CDF) of a normalized Q- important question to be discussed concerns the multiobjective
factor, is presented in Fig. 8. Interestingly, the most probable formulation and the proposal of a hybrid optimization algorithm
Q-factor is close to its lower bound and is reachable from many based on a combination of a heuristic approach and topology
starting positions. sensitivity.
CAPEK et al.: INVERSION-FREE EVALUATION OF NEAREST NEIGHBORS IN METHOD OF MOMENTS 2315