for n= 50 . . . 64 and n= 72 . . . 81. Thus, the results
were optimized by adjusting the algorithm in several
cases considered the best known.
4 Conclusions
The modification of the algorithm for three defective
items presented in this paper brings only minor im-
provements, yet it provides the best possible solution
for a few small values n. The advantage of the mod-
ified algorithm is its ease of implementation. It is
not without interest that for small values of n, dif-
ferent values of k(k= 2,3,4,5) appear to be the
most effective. For larger n, in most cases, it is most
advantageous to choose k= 3. Although still for
n= 315 + 1 . . . 224,k= 4 is the most effective.
Future research should focus on applying the re-
sults presented in this paper to algorithms that run in
more than one round (e.g., [10]). The improvements
introduced here could help to improve them, espe-
cially in future rounds of testing where the number of
defective samples in a group is already limited. Find-
ing optimal algorithms for small nusing ICT would
undoubtedly be interesting.
References:
[1] T. Bardini Idalino, L. Moura, Structure-aware
combinatorial group testing: a new method for
pandemic screening. In International Workshop
on Combinatorial Algorithms. Cham: Springer
International Publishing, 2022. p. 143–156.
[2] F. Huang, P. Guo, Y. Wang, Optimal group test-
ing strategy for the mass screening of SARS-
CoV-2. Omega, Vol. 112, 2022, no. 102689.
[3] V. H. da Silva, C. P. Goes, P. A. Trevisoli,
R. Lello, L. G. Clemente, T. B. de Almeida,
J. Petrini, L. L. Countinho, Simulation of group
testing scenarios can boost COVID-19 screening
power. Scientific Reports, Vol. 12, No. 1, 2022,
no: 11854.
[4] M. Farach, S. Kannan, E. Knill, S. Muthukr-
ishnan, Group testing problems with sequences
in experimental molecular biology, In: Pro-
ceedings. Compression and Complexity of SE-
QUENCES 1997, IEEE, 1997, pp. 357–367
[5] A. De Bonis, G. Di Crescenzo, Combinatorial
group testing for corruption localizing hashing,
In: International Computing and Combinatorics
Conference, Springer, Berlin, 2011, pp. 579–591
[6] L. Lazic, S. Ppopovic, N. Mastorakis, A si-
multaneous application of combinatorial testing
and virtualization as a method for software test-
ing. WSEAS Transactions on Information Sci-
ence and Applications, Vol. 6, No. 11, 2009, pp.
1802–1813.
[7] S. W. Chiu, K. K. Chen, J. C. Yang, M.
H. Hwang, Deriving the Optimal Production-
Shipment Policy with Imperfect Quality and
an Amending Delivery Plan using Algebraic
Method. WSEAS Transactions on Systems, Vol.
11, No. 5, 2012, pp. 163–172.
[8] M. T. Goodrich, D. S. Hirschberg, Improved
adaptive group testing algorithms with applica-
tions to multiple access channels and dead sensor
diagnosis, Journal of Combinatorial Optimiza-
tion, Vol. 15, No. 1, 2008, pp. 95–121
[9] D. Eppstein, M. T. Goodrich, D. S. Hirschberg,
Improved combinatorial group testing algorithms
for real-world problem sizes, SIAM Journal on
Computing, Vol. 36, 2007, pp. 1360–1375
[10] T. Mehta, Y. Malinovsky, C. C. Abnet, P.
S. Albert, Using group testing in a two-phase
epidemiologic design to identify the effects of
a large number of antibody reactions on disease
risk. BMC Medical Research Methodology, Vol.
22, No. 1, 2022, pp. 1–9.
Contribution of individual authors to
the creation of a scientific article
(ghostwriting policy)
A. Jančařík – investigation, validation and writing &
editing.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The author has no conflict of interest to declare that
is relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2023.20.47