Research article

Separable detecting arrays

  • This paper aimed to address the issue of potential noise or measurement errors in component-based systems by utilizing separable detecting arrays (SDAs) to identify interaction faults and assess whether the number of faulty interactions exceeded a predefined threshold. In this paper, we established a comprehensive lower bound on the size of SDAs and explored an equivalence between optimum SDAs and orthogonal arrays with specific properties. By leveraging this equivalence, numerous optimum SDAs were derived from known results of orthogonal arrays. Additionally, optimum SDAs constructed from difference matrices (DMs) possessing the 'super-simple' property were presented. Several infinite classes of such DMs were provided. Specifically, the existence of super-simple DMs with four rows was fully determined. Our study's findings offer practical implications for improving the reliability and accuracy of fault detection in component-based systems.

    Citation: Ce Shi, Tatsuhiro Tsuchiya, Chengmin Wang. Separable detecting arrays[J]. AIMS Mathematics, 2024, 9(12): 34806-34826. doi: 10.3934/math.20241657

    Related Papers:

    [1] A. El-Mesady, Y. S. Hamed, Khadijah M. Abualnaja . A novel application on mutually orthogonal graph squares and graph-orthogonal arrays. AIMS Mathematics, 2022, 7(5): 7349-7373. doi: 10.3934/math.2022410
    [2] Hany A. Hosham, Thoraya N. Alharthi . Bifurcation and chaos in simple discontinuous systems separated by a hypersurface. AIMS Mathematics, 2024, 9(7): 17025-17038. doi: 10.3934/math.2024826
    [3] Hannah Blasiyus, D. K. Sheena Christy . Two-dimensional array grammars in palindromic languages. AIMS Mathematics, 2024, 9(7): 17305-17318. doi: 10.3934/math.2024841
    [4] Salman Zeb, Muhammad Yousaf, Aziz Khan, Bahaaeldin Abdalla, Thabet Abdeljawad . Updating $ QR $ factorization technique for solution of saddle point problems. AIMS Mathematics, 2023, 8(1): 1672-1681. doi: 10.3934/math.2023085
    [5] Sultanah M. Alshammari, Nofe A. Alganmi, Mohammed H. Ba-Aoum, Sami Saeed Binyamin, Abdullah AL-Malaise AL-Ghamdi, Mahmoud Ragab . Hybrid arithmetic optimization algorithm with deep learning model for secure Unmanned Aerial Vehicle networks. AIMS Mathematics, 2024, 9(3): 7131-7151. doi: 10.3934/math.2024348
    [6] Salah Boulaaras, Rafik Guefaifia, Bahri Cherif, Taha Radwan . Existence result for a Kirchhoff elliptic system involving p-Laplacian operator with variable parameters and additive right hand side via sub and super solution methods. AIMS Mathematics, 2021, 6(3): 2315-2329. doi: 10.3934/math.2021140
    [7] Peng Wang, Jiajun Huang, Weijia He, Jingqi Zhang, Fan Guo . Maximum likelihood DOA estimation based on improved invasive weed optimization algorithm and application of MEMS vector hydrophone array. AIMS Mathematics, 2022, 7(7): 12342-12363. doi: 10.3934/math.2022685
    [8] Zhongzi Zhao, Meng Yan . Positive radial solutions for the problem with Minkowski-curvature operator on an exterior domain. AIMS Mathematics, 2023, 8(9): 20654-20664. doi: 10.3934/math.20231052
    [9] Tong Wu, Yong Wang . Super warped products with a semi-symmetric non-metric connection. AIMS Mathematics, 2022, 7(6): 10534-10553. doi: 10.3934/math.2022587
    [10] Jingjing Yang, Weizhong Tian, Chengliang Tian, Sha Li, Wei Ning . Empirical likelihood method for detecting change points in network autoregressive models. AIMS Mathematics, 2024, 9(9): 24776-24795. doi: 10.3934/math.20241206
  • This paper aimed to address the issue of potential noise or measurement errors in component-based systems by utilizing separable detecting arrays (SDAs) to identify interaction faults and assess whether the number of faulty interactions exceeded a predefined threshold. In this paper, we established a comprehensive lower bound on the size of SDAs and explored an equivalence between optimum SDAs and orthogonal arrays with specific properties. By leveraging this equivalence, numerous optimum SDAs were derived from known results of orthogonal arrays. Additionally, optimum SDAs constructed from difference matrices (DMs) possessing the 'super-simple' property were presented. Several infinite classes of such DMs were provided. Specifically, the existence of super-simple DMs with four rows was fully determined. Our study's findings offer practical implications for improving the reliability and accuracy of fault detection in component-based systems.



    Throughout this paper, the set {1,2,,n} for a positive integer n is denoted by In. Combinatorial interaction testing (CIT) has emerged as a fundamental software testing paradigm aimed at detecting faults arising from intricate interactions among test parameters in complex software systems [24,29]. Kuhn et al. studied faults in several software projects, and found that all the known faults are caused by interactions among six or fewer parameters [25,26]. Based on this finding, CIT has been shown to be highly effective for specific applications, providing performance comparable to exhaustive testing while utilizing significantly fewer test cases. Typically, the test suites employed in CIT are structured as arrays, with each row corresponding to an individual test case and each column representing a distinct test parameter. The mathematical structures employed in CIT are t-way covering arrays (t-CAs). In a t-CA, every interaction involving t parameters is guaranteed to appear in at least one test case, ensuring comprehensive coverage of all t-way interactions.

    CAs have garnered significant research attention, leading to the development of diverse methodologies and substantial findings, which are comprehensively documented in the academic literature. For researchers interested in further exploring this topic, the following references are highly recommended: Colbourn provided valuable insights into CAs of strength two [7]; Chateauneuf et al. conducted comprehensive studies on CAs of strength three [4,5]; Colbourn et al. introduced Roux-type constructions for CAs with strengths of both three and four [9]; Ji and Yin constructed CAs of strength three utilizing difference covering arrays [22]; Hartman et al. discussed algorithms pertinent to CAs in detail [18,31]; while Tzanakis et al. illuminated special constructions derived from m-sequences [42]. In generating test suites using CAs, each column meticulously represents distinct factors that impact the system's response, with the entries within each column specifying various settings or values associated with those factors. This process constitutes a crucial step in scrutinizing a system for potential interaction faults prior to its release.

    However, while testing with a CA is effective for detecting the presence of interaction faults, it provides little information to identify and determine faulty corrections. To address this, Colbourn and McClary introduce (d,t)-locating arrays (LAs) and (d,t)-detecting arrays (DAs) under the assumption that the system contains (at most) a certain number d of faults, each involving (at most) a certain number t of interacting factors in [10]. They conducted a thorough analysis of the mathematical properties associated with these arrays. We specifically focus on detecting arrays in this paper. As outlined in [10], the majority of studies on detecting arrays have primarily centered on their mathematical characteristics and constructions. For instance, uniform (1,t)-detecting arrays with a limited number of factors were studied in [41]. Subsequently, this research was broadened to (d,t)-detecting arrays in [36], with a focus on independent interaction faults, as discussed in [39], and later extended to mixed detecting arrays in [37]. In [40], optimum detecting array with 5 factors was almost determined. Notably, when t=1, (1,1)-detecting arrays are equivalent to (n,v)-Sperner partition system, which was initially introduced in [28]. These arrays can be perceived as a natural extension of the Sperner family. For a (n,v)-Sperner partition system, the maximum number of classes has been precisely determined for an infinite number of n values, as reported in [27,28]. Furthermore, [3] and[] have established both lower and upper bounds for all possible values of n and each v. Algorithmic approaches for (1,t)-mixed level detecting arrays were developed and documented in [33]. Additionally, other array types designed specifically for fault localization include consecutive detecting arrays, as explored in [35,38].

    In practical application, detecting arrays may encounter various challenges. For example, one or more tests may fail to execute correctly, and resulting in either no response or outlier responses. To tackle this issue, Seidel et al. [33] introduced the concept of "separation" into the definition of detection arrays, aiming to quantify the tolerance for unreliable test outcomes. This concept gives rise to the notion of detecting arrays with separation, also known as separable detecting arrays (SDAs). SDAs, particularly those for main effects (i.e., where t=1), are constructed using error-correcting codes and separating hash families. The techniques are shown to yield explicit constructions with few tests for large numbers of factors [11,12]. Furthermore, a local optimization method for (1,2)-detecting arrays with reduced separation is presented in [33]. However, to the best of our knowledge, there are currently no widely recognized results for t>1 with general separation, highlighting a significant research gap.

    The remainder of this paper is structured as follows: Section 2 provides a detailed exposition of the definitions of CAs, DAs, and SDAs. Section 3 establishes a general criterion for assessing the optimality of an SDA based on its size, and subsequently characterizes the equivalence between SDAs with optimum size and orthogonal arrays possessing specified properties. Section 4 presents optimum SDAs based on the known results of orthogonal arrays and constructs optimum SDAs from difference matrices (DMs) possessing the 'super-simple' property. Several infinite classes of such DMs are provided. Specifically, the existence of super-simple DMs with rows 4 are fully determined. Finally, we conclude this paper in Section 5.

    We define the nonnegative integers d, δ, N, t, k, and v with the conditions t<k and δ>0. We consider a system under test (SUT) comprising k parameters (or factors), each of which assumes one of v possible values from the symbol set V. A test case is represented as a k-tuple (σ1,σ2,,σk), where σiV for all i=1,2,,k. Upon execution, a test case produces a response, either a pass or a fail outcome. A collection of these k-tuples forms a test suite specifically designed for the SUT. Typically, a test suite is visualized as an N×k array, where each row corresponds to a test case, each column represents a distinct system parameter, and each entry within the array denotes the value assigned to that parameter in the corresponding test case. Here, N denotes the total number of test cases, synonymous with the size of the test suite.

    Consider an array A=(aij) (iIN,jIk) over an alphabet V of size v. Each column of the array A represents one of the k factors that may potentially influence the outcome of a test case (where each test case is represented by a row). For any subset of column indices j1,j2,,jt such that 1j1<j2<<jtk and any t-tuple (x1,x2,,xt)Vt, the set T={(jr,xr):1rt} is defined as a t-way interaction of the array. The integer t signifies the strength of the interaction. Formally, a test case σ=(σ1,σ2,,σk) covers an interaction T={(jr,xr):1rt} if, and only if, σjr=xr for all r. Let ρ(A,T) denote the set of indices of rows in A that cover the interaction T, defined as ρ(A,T)={i:aijr=xr,1rt}. For an arbitrary set T of interactions, we define ρ(A,T)=TTρ(A,T).

    Let It denote the set of all t-way interactions in A. To detect the presence or absence of faulty interactions in the SUT, it is necessary to ensure that each t-way interaction is covered at least once. This implies |ρ(A,T)|1 for each t-way interaction T. Subsequently, we give the definition of a CA. A CAλ(N;t,k,v) over V is defined as

    TIt,   |ρ(A,T)|λ.

    In other words, a CA of size N, strength t, degree k, index λ, and order v, or a CAλ(N;t,k,v), is an N×k array with entries from a set V of v symbols such that in any t columns of the array, all t-tuples in Vt occur as rows at least λ times. When λ=1, we use the notation CA(N;t,k,v). It is evident from the definition that Nλvt. If N=λvt in a CAλ(N;t,k,v), then it is defined as an orthogonal array, denoted by OAλ(t,k,v). Extensive research has been conducted on various related orthogonal arrays, particularly graph-orthogonal arrays [14,20].

    In contrast to t-CAs, DAs offer the advantage of not only detecting the existence of faulty interactions but also locating them. DAs were initially introduced by Colbourn and McClary [10] and later extended to include DAs with separation, as discussed in [33]. Let A be a CAλ(N;t,k,v). If, for any TIt with |T|=d and any TIt, we have

    |ρ(A,T)ρ(A,T)|<δTT,

    then the array A is called an SDA and denoted as a (d,t,δ)-SDA(N;k,v). Here, the parameter d signifies the maximum number of faulty interactions that the array can accurately identify, t denotes the strength of the target interactions, and δ represents the separation of the separable detecting arrays. Rows in ρ(A,T)ρ(A,T) act as witnesses for T that remain unmasked by interactions in T. Separation by distance δ ensures that any δ1 or fewer tests can fail to provide a response, or provide an outlier response, without losing the differentiation supported by the SDAs.

    It is evident that when TT, the set of rows covering interaction T is necessarily contained within the set of rows covering the entire set of target interactions T, formally ρ(A,T)ρ(A,T). This direct implication ensures that |ρ(A,T)ρ(A,T)|=0 always holds. Consequently, the condition |ρ(A,T)ρ(A,T)|<δTT naturally translates to |ρ(A,T)ρ(A,T)|δ, when TT. Setting d=0 in the definition, T=, and ρ(A,T)= implies |ρ(A,T)|δ when T. This implies that A is a CAδ(N;t,k,v). Furthermore, by assigning δ=1 in the (d,t,δ)-SDA(N;k,v), if |ρ(A,T)ρ(A,T)|<δ=1, then |ρ(A,T)ρ(A,T)|=0. It becomes evident that ρ(A,T)ρ(A,T) due to the condition |ρ(A,T)|δ=1. Thus, the notion of (d,t,δ)-SDA(N;k,v) can be viewed as a generalization for (d,t)-DA(N;k,v). Since the rows of an SDA represent tests affecting money, time, and other resources, an SDA of minimum size is of particular interest when its other parameters have been fixed. We designate (d,t,δ)-SDAN(k,v) as the minimum N for which a (d,t,δ)-SDA(N;k,v) exists, referring to this quantity as the SDA number. An array that achieves this minimal size, i.e., N=(d,t,δ)-SDAN(k,v), is said to be optimum. In the next section, we will give the lower bounds and combinatorial characterization.

    A model for the SUT in electronic commerce systems (ECS) is presented in Table 1. The ECS comprises four components: client, operating system (OS), web server, and payment, each of which can assume one of three distinct values. Exhaustive testing would require conducting 34=81 tests. Table 2 displays a test suite consisting of 27 carefully selected tests from the total possibilities, representing a (1,2,2)-SDA(4,3). Such SDA allows for the identification of a faulty interaction of strength two based on test outcomes, provided that the number of outlier or nonresponsive results does not exceed 1. For instance, the interaction ((F1,Opera),(F2,Win)) is deemed faulty if tests 1,2, and 3 fail, test 11 yields no response or an outlier response, and all other tests pass. Suppose the outcomes are as follows: tests 1, 2, and 3 fail; tests 11 and 20 yield no response or an outlier response; and all other tests pass. In this case, we conclude that ((F1,Opera),(F2,Win)) is a faulty interaction. However, ((F2,Win),(F3,Apache)) might also be faulty, but it is obscured by the presence of ((F1,Opera),(F2,Win)).

    Table 1.  Configuration parameters for ECS.
    Parameter Values
    F1 Client Opera (0) IE (1) Firefox (2)
    F2 OS Win (0) Linux (1) Mac (2)
    F3 Web Server WebSphere (0) Apache (1) NET (2)
    F4 Payment MasterCard (0) Visa (1) UnionPay (2)

     | Show Table
    DownLoad: CSV
    Table 2.  Test sets corresponding to a (1,2,2)-SDA(4,3).
    F1: Client F2: OS F3: Web Server F4: Payment
    1 0 0 0 0
    2 0 0 1 2
    3 0 0 2 1
    4 0 1 0 2
    5 0 1 1 1
    6 0 1 2 0
    7 0 2 0 1
    8 0 2 1 0
    9 0 2 2 2
    10 1 0 0 2
    11 1 0 1 1
    12 1 0 2 0
    13 1 1 0 1
    14 1 1 1 0
    15 1 1 2 2
    16 1 2 0 0
    17 1 2 1 2
    18 1 2 2 1
    19 2 0 0 1
    20 2 0 1 0
    21 2 0 2 2
    22 2 1 0 0
    23 2 1 1 2
    24 2 1 2 1
    25 2 2 0 2
    26 2 2 1 1
    27 2 2 2 0

     | Show Table
    DownLoad: CSV

    This subsection aims to establish a lower bound on the size of a (d,t,δ)-SDA(k,v). There exist specific permissible parameters that govern the existence of (d,t,δ)-SDAs. Notably, in scenarios where k<t, d<0, or δ<0, the existence of (d,t,δ)-SDA's is not feasible. Furthermore, when t=k, an optimum SDA is simply the exhaustive array. Therefore, our focus will be on cases where k>t and δ1. Initially, we can deduce the following outcome from the definition of a (d,t,δ)-SDA.

    Lemma 3.1. Suppose that A is a (d,t,δ)-SDA(N;k,v) with d1. Then A is also a (d1,t,δ)-SDA(N;k,v) and a (d,t,δ1)-SDA(N;k,v)(δ>1), respectively.

    Proof. Let A be the given (d,t,δ)-SDA(N;k,v). According to the definition, for any t-way interaction TT, where TIt and |T|=d, we have |ρ(A,T)ρ(A,T)|δ. If we remove one t-way interaction from T to form a set of t-way interactions T, it follows that TT and |ρ(A,T)ρ(A,T)||ρ(A,T)ρ(A,T)|δ. Hence, A is also a (d1,t,δ)-SDA(N;k,v). The proof for the other conclusion is straightforward and is omitted here.

    The following result can be derived from the definition of (d,t,δ)-SDA(N;k,v) and Lemma 3.1.

    Lemma 3.2. Suppose that A is a (d,t,δ)-SDA(N;k,v) with d1. Then, |ρ(A,T)|d+δ for any t-way interaction T.

    Proof. The proof proceeds by mathematical induction on d. For d=1, a (1,t,δ)-SDA(N;k,v) must be a (0,t,δ)-SDA(N;k,v) by Lemma 3.1. It has been proven that a (0,t,δ)-SDA(N;k,v) is equivalent to a CAδ(N;t,k,v) [11]. This implies that |ρ(A,T)|δ for any t-way interaction T. Suppose there exists a t-way interaction T with |ρ(A,T)|=δ. Then, T is covered by δ rows of A. Select a certain row R=(x1,x2,,xk) from these δ rows. This row R also covers (kt)1 other t-way interactions different from T. Since t<k, we have (kt)1>0. Therefore, there exists at least one t-way interaction T (T) such that both T and T are covered by R. Hence, |ρ(A,T)ρ(A,T)|<δ, but since TT, this contradicts the definition of a (1,t,δ)-SDA. Therefore, |ρ(A,T)|1+δ for any t-way interaction T.

    Now, assuming the conclusion holds for d=n1, we show it holds for d=n. Let A be an (n,t,δ)-SDA(N;k,v). Suppose T is an arbitrary t-way interaction of A. By Lemma 3.1, an (n,t,δ)-SDA must also be an (n1,t,δ)-SDA. By the induction hypothesis, we have |ρ(A,T)|n1+δ. Now, assume for the sake of contradiction that |ρ(A,T)|=n1+δ for some t-way interaction T. Select n rows Ri(1in) from these n1+δ rows of A that cover T. Each row Ri also covers (kt)1 other t-way interactions different from T. Since t<k, we can select a t-way interaction Ti from each row Ri (1in) such that TiT. Write T={T1,T2,,Tn}. Then, 1|T|n. We would have Riρ(A,T)ρ(A,T), while TT. Thus, |ρ(A,T)ρ(A,T)|δ1<δ. This contradicts the fact that A is an (h,t,δ)-SDA with 1hn. Therefore, |ρ(A,T)|n1+δ. It follows that |ρ(A,T)|n+δ=d+δ. Thus, by induction, the conclusion holds for all d1.

    It is noteworthy that the conclusion presented above can be inferred from Lemma 1 in [11], which provides a foundational understanding of the topic. Here, we provide an alternative proof based on the definition and properties of (d,t,δ)-SDA. Combining Lemma 3.2, we can infer that a (d,t,δ)-SDA does not exist if there exists a t-way interaction T such that |ρ(A,T)|<d+δ. Additionally, according to [10,11], a necessary condition for the existence of a (d,t,δ)-SDA is that d<v [10,11]. Specifically, if there exists a t-way interaction T such that |ρ(A,T)|=d+δ in a (d,t,δ)-SDA, it constitutes a necessary condition for its existence. This condition can be considered as a generalization of the previous one by setting δ=1.

    Lemma 3.3. Let A be a (d,t,δ)-SDA(N;k,v) with d1. If there exists a t-way interaction T of A such that |ρ(A,T)|=d+δ, then d<vδ+1.

    Proof. Let A=(aij)N×k be a (d,t,δ)-SDA(N;k,v) with d1. Assume d=vδ+1. Then, d+δ=v+1. Without loss of generality, suppose that T=((1,0),(2,0),,(t,0)) is covered by the first (v+1) rows Ri of A, where i=1,2,,v+1. Since the elements are drawn from a symbol set of size v and v+1 exceeds the total number of elements, it follows that among the v+1 rows, there are b rows (2bv+1) with identical elements in the (t+1)th column. Without loss of generality, assume that aR1,t+1=aR2,t+1==aRb,t+1. We now consider three cases:

    Case 1. 2b<d.

    Form t-way interaction Ti=((1,0),(2,0),,(t1,0),(t+1,aRi,t+1)) for i=1,2,,v+1. Let T={Tb,Tb+1,,Td+1}. It is clear that 1|T|d and TT. By the construction of T, the rows Ri also cover Ti, where 1iv+1. Thus, |ρ(A,TTb)|d+1b and |ρ(A,T)ρ(A,T)|d+1b+b=d+1. Observe that |ρ(A,T)ρ(A,T)|=|ρ(A,T)||ρ(A,T)ρ(A,T)|v+1(d+1)=d+δd1=δ1<δ. However, A is a (|T|,t,δ)-SDA, as proved by Lemma 3.1.

    Case 2. 2b=d.

    Since d+1d+δ=v+1, we can form t-way interactions Ti=((1,0),(2,0),,(t1,0), (t+1,aRi,t+1)) for i=d,d+1. Define T={Td,Td+1}. Clearly, 2=|T|d, TT, and |ρ(A,T)ρ(A,T)|d+1. However, |ρ(A,T)ρ(A,T)|v+1(d+1)=vd=δ1<δ. Nevertheless, A is a (2,t,δ)-SDA, as shown by Lemma 3.1.

    Case 3. b>d.

    Form a t-way interaction Td=((1,0),(2,0),,(t1,0),(t+1,aRb,t+1)). We deduce that |ρ(A,T)ρ(A,Td)|b. Clearly, TTd, but |ρ(A,T)ρ(A,Td)|v+1b<v+1d=δ. However, A is a (1,t,δ)-SDA, which is proved by Lemma 3.1.

    By applying Lemma 3.2, we can derive the following lower bound on the SDA numbers, which serves as our benchmark for measuring the optimality of (d,t,δ)-SDA's.

    Theorem 3.1. Let t,k, and v be positive integers. Then,

    (d,t,δ)-SDAN(k,v)(d+δ)vt. (3.1)

    Proof. Let A be a (d,t,δ)-SDA(N;k,v) over V and N=(d,t,δ)-SDAN(k,v). By definition, for any fixed t columns {j1,j2,,jt} with 1j1<j2<<jtk, there exist exactly vt t-way interactions of A: {(jr,xr):1rt}, where (x1,x2,,xt) runs over all the t-tuples from Vt. According to Lemma 3.2, we know that |ρ(A,T)|d+δ for any t-way interaction T of A. Therefore, each sub-array consisting of certain t columns of A must contain at least (d+δ)vt rows. This implies that N=(d,t,δ)-SDAN(k,v)(d+δ)vt.

    When δ=1, a (d,t,δ)-SDA is essentially a (d,t)-DA, as stated in Section 2. Therefore, by setting δ=1 in Theorem 3.1, we can easily obtain the following corollary, which was first presented in [36].

    Corollary 3.1. Let t,k, and v be positive integers. Then,

    (d,t)-DAN(k,v)(d+1)vt. (3.2)

    It's worth noting that optimum (d,t,δ)-SDAs that meet the lower bound Eq (3.1) are equivalent to super-simple OAs, which will be shown in next subsection. We say that an OAλ(t,k,v) is super-simple if any (t+1) columns of the array contain every (t+1)-tuple of symbols as a row at most once. We denote it by SSOAλ(t,k,v). Clearly, from this definition, it follows that an SSOAλ(t,k,v) can only exist if λv.

    Example 3.1. The transpose of the following array is an SSOA3(2,4,3) over Z3. As shown later, this OA is an optimum (d,2,σ)-SDA array such that (d,σ)=(1,2) or (2,1).

    000000000111111111222222222000111222000111222000111222012012012012012012012012012021210102210102021102021210.

    In this subsection, we aim to provide a combinatorial description of optimum (d,t,δ)-SDAs using super-simple OAs. To establish the foundation for our ensuing discussion, we introduce the following lemma.

    Lemma 3.4. Let A be a (d,t,δ)-SDA(N;k,v). If |ρ(A,T)|=d+δ and |ρ(A,T)ρ(A,T1,,Td)|<δ, then there exists an iId such that |ρ(A,Ti)ρ(A,T)|2, where T is an arbitrary t-way interaction and Ti{T1,,Td}.

    Proof. From the set theory, we know that |AB|+|AB|=|A|. Therefore, |ρ(A,T)ρ(A,T)|=|ρ(A,T)||ρ(A,T)ρ(A,T)|>d+δδ=d. This implies that there are at least d+1 rows covering both T and T. The set of row indices is denoted by I. Since T contains d t-way interactions, it follows that at least one t-way interaction Ti appears at least twice within the set of row indices. Consequently, |ρ(A,Ti)ρ(A,T)|2.

    The following theorem establishes the equivalence between optimal (d,t,δ)-SDAs and SSOAs.

    Theorem 3.2. Suppose that t,k, and d are positive integers with d1. Then, an SSOAd+δ(t,k,v) is equivalent to an optimum (d,t,δ)-SDA(N;k,v) meeting the lower bound Eq (3.1), namely, N=(d+δ)vt.

    Proof. () Let A represent a super-simple OAd+δ(t,k,v). Suppose T is any arbitrary t-way interaction of A. By definition, a super-simple OA has exactly N=(d+δ)vt rows and |ρ(A,T)|=d+δ. Consider a set T={T1,T2,,Td} containing d t-way interactions of A, excluding T. We aim to demonstrate that |ρ(A,T)ρ(A,T)|δ. If this were not the case, there would exist at least one TjT such that |ρ(A,Tj)ρ(A,T)|2 by Lemma 3.4. This implies that there would be one (t+1)-tuple of symbols occurring in certain (t+1) columns as the number of rows is more than once, since TTj. This contradicts the super-simple property of A.

    () Conversely, let B be a (d,t,δ)-SDA((d+δ)vt;k,v). From Lemma 3.2, we know that |ρ(A,T)|d+δ for any t-way interaction T of B. This implies that each t-tuple of symbols occurs as a row at least d+δ times in any t columns of B, and, hence, exactly d+δ times (since B contains precisely (d+δ)vt rows). Thus, we have proven that B is an OAd+δ(t,k,v). Next, we will prove that B is super-simple.

    If not, without loss of generality, suppose that |ρ(A,Tt+1)|=j, where Tt+1=((1,0),(2,0),, (t1,0),(t,0),(t+1,0)). It is evident that j is less than d+δ+1, since B is an OAd+δ(t,k,v). We denote the rows that cover Tt+1 by Sj, where 2jd+δ. Let T=((1,0),(2,0),,(t1,0),(t,0)) and T=((1,0),(2,0),,(t1,0),(t+1,0)). Since B is an OAd+δ(t,k,v), |ρ(A,T)|=d+δ, indicating that T is covered by d+δ rows of B. If d=1, then |ρ(A,T)ρ(A,T)|=1+δj<δ1<δ. This contradicts the assumption that B is a (1,t,δ)-SDA. For d>1, we proceed with the proof by considering two cases.

    Case 1. d+1>j.

    Select d+1j rows Ri(1id+1j) from the d+δ rows, excluding Sj. This is feasible since d+1jd+δj. Each row Ri also covers (kt)1 t-way interactions other than T. As t<k by assumption, we can select a t-way interaction Ti from each row Ri (1id+1j) such that TiT. Let T={T1,T2,,Td+1j,T}. Then, 1|T|d and |ρ(A,T)ρ(A,T)|d+1j+j=d+1. Thus, |ρ(A,T)ρ(A,T)|=|ρ(A,T)||ρ(A,T)ρ(A,T)|d+δ(d+1)=δ1<δ, but TT. Consequently, B is not a (|T|,t,δ)-SDA.

    Case 2. 2d+1j.

    Since TTt+1, it follows that |ρ(A,T)|j. Observe that |ρ(A,T)ρ(A,T)|d+δ(d+1)=δ1<δ. This contradicts the assumption that B is a (1,t,δ)-SDA.

    The proof is completed.

    Let δ=1 in Theorem 3.2. This allows us to derive the following corollary, originally presented in [36].

    Corollary 3.2. Suppose that t, k, and d are positive integers. Then, an SSOAd+1(t,k,v) is equivalent to an optimum (d,t)-DA(N;k,v) with N=(d+1)vt.

    It should be noted that, as indicated by Theorem 3.2 and Corollary 3.2, SSOAs with index greater than one can be utilized to construct optimum DAs as well as optimum SDAs. Indeed, an SSOAλ(t,k,v) with λ2 can produce an optimum (λ1,t)-DA(N;k,v) with N=λvt. An optimum (d,t,δ)-SDA(N;k,v) with N=λvt and d+δ=λ can be obtained from it. SSOAs with the same parameters can be applied to software system fault localization both in the presence and absence of outliers and nonresponses. The only difference is that, when outliers and nonresponses are present, the number of interaction faults that can be localized may be relatively smaller. From the theorem above, it follows that optimum SDAs are equivalent to SSOAs. The definition of SSOAs implies that the number of rows, (d+δ)vt, in an SSOAd+δ(t,k,v) cannot exceed the total number of (t+1)-tuples of symbols, vt+1. In other words, (d+δ)vtvt+1, which implies d+δv. This observation aligns with the necessary conditions outlined in Lemma 3.3 for DAs with separation.

    In this section, we will utilize several known SSOAs to derive optimum SDAs by using Theorem 3.2. Furthermore, we will present a construction based on difference schemes of strength t with a specific prescribed property.

    The existence of SSOAλ(t,k,v) has been fully established for the case where t=2 and k=4 in [17]. For the scenario with t=2 and k=5, the existence was delineated in [6,43]. Additionally, SSOAs for t=3 and k6 were presented in earlier studies [39,40,41].

    Lemma 4.1. [6,43] Let λ2 and v=2α3βu4, with v6, where α and β are nonnegative integers and gcd(u,6) = 1. An SSOAλ(2,5,v) exists for λΔ(v), where

    Δ(v)={v,if α1 and β1;v21,if α=1 and β1;2v32,if α1 and β=1;2v32,if λeven,α=1 and β=1;2v311,if λodd,α=1 and β=1.

    Lemma 4.2. [40,41] Let λ2 and v=2α3βu2, where α and β are nonnegative integers and gcd(u,6) = 1. An SSOAλ(3,5,v) exists, except possibly in the following cases:

    (1) v=3u or v=32αu with α3 and λ=v1;

    (2) v=6u and λ{v1,v5};

    (3) v=12u and λ{v1,v2}.

    For (t,k){(2,4),(2,5),(3,5)}, the following results are derived using Theorem 3.2, Table 3, and Lemmas 4.1 and 4.2. We first establish the existence of optimum (d,2,δ)-SDAs for specific parameters.

    Table 3.  SSOAs.
    Parameters Constraints References
    SSOAλ(2,4,v) 2λv and (λ,v){(1,2),(1,6)} Theorem 18 [17]
    SSOAλ(t,t+1,v) λv, t1 and v2 Theorem 3.8 [36]
    SSOAλ(t,q,q) q be a prime power, t+1<q, λq Theorem 3.10 [36]
    SSOAλ(2,q+1,q) q4 is a power of 2, λq Theorem 3.10 [36]
    SSOAλ(t,k,v) v=q1q2qs, k=min{qi:1is}, qi>t+1 and λv Theorem 3.9 [36]

     | Show Table
    DownLoad: CSV

    Theorem 4.1. An optimum (d,2,δ)-SDA((d+δ)v2;4,v) exists for any d1 and δ1, where d+δv.

    Theorem 4.2. Let v=2α3βu4,v6 be two integers where α and β are two nonnegative integers and gcd(u,6) = 1. For d+δΔ(v), an optimum (d,2,δ)-SDA((d+δ)v2;5,v) exists for any d1 and δ1, where

    Δ(v)={v,if α1,β1;v21,if α=1,β1;2v32,if α1,β=1;2v32,if λ even,α=1,β=1;2v311,if λ odd,α=1,β=1.

    Furthermore, we extend our results to cases involving (d,3,δ)-SDAs. Specifically, we provide the following theorem which also accounts for certain exceptional cases.

    Theorem 4.3. An optimum (d,3,δ)-SDA((d+δ)v3;5,v) exists for any d1 and δ1, where d+δv, except possibly in the following cases, where gcd(u,6) = 1:

    (1) v=3u or v=32αu with α3 and d+δ=v1;

    (2) v=6u and d+δ{v1,v5};

    (3) v=12u and d+δ{v1,v2}.

    We now proceed to present more generalized findings that are applicable to any given value of t. The necessary SSOAs for these results are provided in Table 3.

    Theorem 4.4. Suppose that t1 and v2 are integers. Then, for any d1 and δ1, an optimum (d,t,δ)-SDA((d+δ)vt;t+1,v) exists, provided that d+δv.

    We now consider the scenario where q is a prime power. The following theorem establishes the existence of optimum SDAs under these conditions.

    Theorem 4.5. Let q be a prime power and d+δq, with d1 and δ1. Then an optimum (d,t,δ)-SDA((d+δ)qt;q,q) exists, where t+1<q. Moreover, if q4 is a power of 2, then an optimum (d,2,δ)-SDA((d+δ)q2;q+1,q) exists.

    Proof. According to Theorem 3.2, our task is simplified to constructing the corresponding SSOAs. Fortunately, these required SSOAs are already outlined in Table 3.

    Finally, we extend our results to the case where v is factored into distinct prime powers. The following theorem addresses this generalization.

    Theorem 4.6. Suppose v=q1q2qs is a standard factorization of v into distinct prime powers, and k=min{qi:1is}. If qi>t+1 and d+δv, then there exists an optimum (d,t,δ)-SDA((d+δ)vt;k,v)

    Proof. The proof process is similar to that of Theorem 4.5 and, thus, we omit it here.

    In this subsection, we aim to construct optimum SDAs from difference schemes possessing a specific prescribed property. To describe the definition of a DM in a general manner, we denote G as a finite Abelian group of order v with its operation represented by addition throughout the following discussion. For t1, Gt denotes the abelian group of order vt consisting of all t-tuples of elements from G with the usual addition as the binary operation. Gt0 refers to the subgroup of Gt isomorphic to G, consisting of all elements of the form (g,g,,g). The cosets of this subgroup in Gt will be denoted by Gti, where 0ivt11.

    Definition 4.1. For given positive integers t2, k, and v, a k×λvt1 array D with entries from G of order v is termed a difference scheme of strength t and index λ, denoted as a DMλ(t,k,v), if every t×λvt1 sub-matrix of D contains each coset Gti (0ivt11) exactly λ times.

    The aforementioned notion was first formulated by Seiden [32] and was subsequently utilized to produce OAs of strength t. This concept was further studied by Hedayat et al. [19]. Note that a difference scheme of strength 2 in Definition 4.1 is simply a (v,k,λ)-DM. This DM satisfies the property that all elements of G appear exactly λ times in the difference of any two distinct columns. Difference matrices were introduced in a seminal paper by Bose and Bush in the case strength t=2 [1]. Bose and Bush introduced and studied these matrices to facilitate the construction of OAs. The definition of a difference matrix can easily be extended to non-Abelian groups. However, for the construction of SDAs discussed in this paper, this extension is of little use and is therefore omitted. The principal idea for the construction of OAs via DMs has received significant attention for the case t = 2 (see [8,21]). It is evident that an OAλ(t,k,v) can be obtained from a DMλ(t,k,v) under the development of D. However, such an OA cannot be super-simple. To address this issue, we require a super-simple difference scheme of strength t.

    Definition 4.2. A DMλ(t,k,v) of order v over the group G is said to be super-simple, denoted by SSDMλ(t,k,v), if, within any (t+1)×λvt1 sub-matrix of D, each coset Gt+1i appears no more than once, where 0ivt1.

    Example 4.1. The following array is an SSDM2(3,4,3) over Z3:

    (000000000000000000000111222000111222012012012012012012012120201120201012).

    For t=2, the notion of a super-simple (v,k,λ)-DM was introduced by Hartman [17]. Let D=(dij)4×λv be a (v,4,λ)-DM over the group G. D is called super-simple, and it further satisfies the following condition: for any indices r1,r2,r3 with 1r1<r2<r34 and any indices j,j with 1j<jλv, if dr2jdr1j=dr2jdr1j, then it must hold that dr3jdr2jdr3jdr2j. We denote it by (v,k,λ)-SSDM. It is clear that λv must hold whenever an SSDMλ(t,k,v) exists. Suppose that D=(dij) is an SSDMλ(t,k,v) over the group G={g0=0,g1,g2,,gv1}. For each column (d1j,dij,,dkj)T of D, we form v rows given by C(j,u)=(d1j+u,d2j+u,,dkj+u),uG. These rows are then juxtaposed to form a λvt×k array A over G, which is an SSOAλ(t,k,v). This approach is simple yet effective, as SSDMs are significantly smaller in size than the SSOAs that they induce, and constructing SSDMs directly is more feasible than constructing SSOAs directly. We state this as a lemma for convenient reference for later use.

    Lemma 4.3. If an SSDMλ(t,k,v) over the group G exists with λ2, then an SSOAλ(t,k,v) over the group G also exists, and, therefore, an optimum (d,t,δ)-SDA(λvt;k,v) exists with d+δ=λ and d1.

    Proof. Let D be the given SSDMλ(t,k,v) over the group G. As explained previously, the generation of an SSDM naturally leads to the formation of SSOAλ(t,k,v). Consequently, by invoking Theorem 3.2, it follows that there exists a (d,t,δ)-SDA(λvt;k,v) satisfying the conditions d+δ=λ and d1.

    We will now present the existence of SSDMs. Initially, we have the following lemma.

    Lemma 4.4. [15] A (v,4,1)-DM exists if, and only if, v4 and v2(mod4).

    By applying Lemma 4.4 and following the proof of Theorem 3.13 presented in [34], we can establish the existence of the following SSDMs.

    Lemma 4.5. For any integer v4, if v2(mod4), then there exists a (v,4,λ)-SSDM, where the parameter λ satisfies λv.

    For the cases where v=2 or v=3, a (v,4,λ)-SSDM is provided below, with the condition that λv.

    Lemma 4.6. A (v,4,λ)-SSDM exists for the pair (v,λ){(2,2),(3,2),(3,3)}.

    Proof. A (2,4,2)-SSDM is presented as follows:

    (0000001101100101),

    (3,4,λ)-SSDM's for λ=2,3 are given below:

    (000000000001122011010212102012021120),(000000000001220211012202110022021101).

    For the completeness of existence for (v,4,λ)-SSDM's, we require the following product constructions, which were first stated in [34].

    Lemma 4.7. If there exist a (g,k,λ1)-SSDM over G and a (g,k,λ2)-SSDM over G, then it follows that there exists a (gg,k,λ1λ2)-SSDM over G×G.

    Lemma 4.8. A (6,4,λ)-SSDM exists for λ{2,4,6}.

    Proof. By Lemma 4.7, the existence of a (6,4,λ)-SSDM is established for λ=4,6. The necessary ingredients for their construction are provided in Lemma 4.6. Additionally, an explicit (6,4,2)-SSDM is presented in the following array:

    (000000000000001122334455010345132524011534503242).

    With the existence of SSDMs for order 6 established, we now broaden our scope to investigate the existence of such DMs for v10 and v2(mod4).

    Lemma 4.9. Let v10 be an integer. If v2(mod4), then a (v,4,λ)-SSDM exists, where λ is an even integer satisfying λv.

    Proof. Let v=2(2t+1) with t2. According to Lemma 4.5, it is known that a (2t+1,4,λ)-SSDM exists, where λ2t+1. Consequently, by applying Lemma 4.7, the conclusion holds since the (2,4,2)-SSDM is given in Lemma 4.6.

    While we have explored the existence of SSDMs for certain cases, it is also important to consider scenarios where such DMs do not exist. In particular, we now examine the nonexistence of DMs with specific parameter constraints.

    Lemma 4.10. [13] Let k3 be an integer and λ be an odd integer. Then, there is no (v,k,λ)-DM, when v2(mod4).

    Combing Lemmas 4.5, 4.6, and 4.8–4.10, we can determine the existence of super-simple (v,4,λ)-DM's as below.

    Theorem 4.7. Let v2 be a positive integer with λv. Then, a (v,4,λ)-SSDM exists if, and only if, v2(mod4) and λ even, or v2(mod4).

    It is notable that the existence of a (v,4,λ)-DM was previously determined by Pan and Chang [30]. They established that a (G,4,λ)-DM exists if, and only if, λ is even, or λ is odd and G has no nontrivial cyclic Sylow 2-subgroups, where G is a nontrivial finite Abelian group and λ>1 is an integer. In this paper, we completely determine the existence of (v,4,λ)-SSDMs. We would like to remind readers again that SSOAλ(2,4,v) has been completely solved, but only partial results can be obtained using Lemma 4.3 and Theorem 4.7. As described earlier, SSDMs have relatively small sizes.

    Lemma 4.11. [2] Let G be any group of order v. Then, there exists a (v,p,1)-DM over G, where p is the small prime power dividing v.

    We begin by considering the construction of SSDMs over prime powers of strength 2. The following theorem asserts the existence of such matrices for prime powers.

    Theorem 4.8. Let q be a prime power. Then, there exists a (q,q,λ)-SSDM, where λq.

    Proof. Let q=pn, where n is a positive integer and p is an odd prime. Let α be a primitive element of GFq, meaning that GF(q)={0,1,α,α2,,αpn2}. We define the matrices As=(asxy) for x,yGF(q) and s=0,1,2,,λ1 as follows:

    a0xy=xy,a1xy=xy+x2,a2xy=xy+αx2,,aixy=xy+αi1x2,,aλ1xy=xy+αλ2x2.

    The matrix A0=(a0xy) for x,y{0,1,α,α2,,αpn2}, represents the multiplication table of GF(q) and forms a (q,q,1)-DM by Lemma 4.11. It is also a (q,q,1)-SSDM. Clearly, each Ai for i=1,2,,λ1 is a (q,q,1)-DM. Let D=(A0,A1,,Aλ1). Thus, D is a (q,q,λ)-DM. Next, we prove that D is super-simple. We start by showing that D=(Am,An) is a (q,q,2)-SSDM for 0m<nλ1. The proof depends on two cases based on the value of m.

    Case 1. m0.

    If D is not super-simple, then there exist x1,x2,x3,y,yGF(q) with x1x2x3 such that amx2yamx1y=anx2yanx1y,amx3yamx2y=anx3yanx2y. This leads to the following equations:

    x2y+αm1x22x1yαm1x21x2y+αn1x22x1yαn1x21(modq), (4.1)

    and

    x3y+αm1x23x2yαm1x22x3y+αn1x23x2yαn1x22(modq). (4.2)

    From Eqs (4.1) and (4.2), we deduce y+αm1(x2+x1)y+αn1(x2+x1)(modq) and y+αm1(x3+x2)y+αn1(x3+x2)(modq). This implies that αm1(x3x2)αn1(x3x2)(modq). Since x2,x3GF(q) with x2x3 and α is a primitive element, we conclude that m=n. However, mn, which leads to a contradiction.

    Case 2. m=0.

    In this case, we replace αm1 with 0 in both Eqs (4.1) and (4.2). Thus, we can conclude that αn1(x3x2)0(modq). Clearly, this conclusion does not hold since α is a primitive element and x2x3.

    The same argument can be applied to prove that D is super-simple. If p=2, the same reasoning can be used to prove the conclusion.

    We will provide an example to illustrate this theorem.

    Example 4.2. Let α be a root of f=x2+x+2F3[x]. It is straightforward to verify that α is a primitive element of F9 and we have the relations α2=2α+1,α3=2α+2,α4=2,α5=2α,α6=α+2, and α7=α+1. The multiplication table for the finite field F9 is as follows:

    01αα2α3α4α5α6α70000000000101αα2α3α4α5α6α7α0αα2α3α4α5α6α71α20α2α3α4α5α6α71αα30α3α4α5α6α71αα2α40α4α5α6α71αα2α3α50α5α6α71αα2α3α4α60α6α71αα2α3α4α5α70α71αα2α3α4α5α6

    We replace the elements a+bα with ab, and, subsequently, three (9,9,1)-DM over Z3×Z3 are derived. Notably, the second and third arrays can be generated through the application of the formula xy+x2 and xy+αx2, respectively.

    (000000000000000000001001122220022111000112222002211110001222200221111001002220022111100112002002211110011222000221111001122220002111100112222002001110011222200221),(000000000000000000102011220200120121121021010211002022200212102211010021211011201202012200100012012120112202121100202210210102201101002102121022210201220010112012).
    (000000000000000000011102102021002212222001111221100002021121220120101200110001100222211220012100221211021020222110000220011112022010120011212201112221122000011002).

    By juxtaposing the three arrays mentioned above, we can obtain a (9,9,3)-SSDM over Z3×Z3.

    We now delve into the results for k=t+1 under specific conditions.

    Theorem 4.9. Let v3 be a positive integer. Then, an SSDMλ(t,t+1,v) exists for v2(mod4) or t odd.

    Proof. By Theorem 4.1 in [19], a DM(t,t+1,v) exists over the group G for v2(mod4) or t odd. We denoted it by D. For each hG, let Dh=(dhij), where dhij=dij for i=1,2,,t and dhij=dij+h for i=t+1. Clearly, Dh is also a DM(t,t+1,v) over G from the definition of a difference scheme. Define D=(Dx1|Dx2||Dxλ), where xi(i=1,2,,λ) are mutually distinct elements in G. Then, D is the required SSDM.

    Further refining our results, we now consider the existence of SSDMs specifically for integers v that are congruent to 1 or 5(mod6). The following theorem demonstrates that under these conditions, SSDMs with strength 3 can be constructed over the additive group G of order v.

    Theorem 4.10. Let v5 and v1 or 5(mod6). Then, there exists an SSDMλ(3,5,v) over the additive group of Zv.

    Proof. By Lemma 3.3 in [23], a DM(3,5,v) exists over the additive group of Zv. We denote it by D=(dij)(iI5,jIv2). For each hZv, define Dh=(dhij), where dhij=dij for i=1,2,3 and dhij=dij+h for i=4,5. Clearly, Dh is also a DM(3,5,v) over G from the definition of a difference matrix. Define D=(Dx1|Dx2||Dxλ), where xi(i=1,2,,λ) are mutually distinct elements in Zv. Then, D is the required SSDM.

    In the remainder of this subsection, we will establish the existence of (v,5,2)-SSDM. Initially, we will introduce some SSDMs of small order that will be utilized later.

    Lemma 4.12. A (v,5,2)-SSDM exists for v{3,4,6,8,12,16}.

    Proof. A (3,5,2)-SSDM over Z3 is given below:

    (000000001122010212012021021201).

    A (4,5,2)-SSDM is constructed over over Z2×Z2.

    (00000000000000000000010110101111000110110001101100011110101100010010001011011101).

    A (6,5,2)-SSDM over Z6 is given below:

    (000000000000000110142215001024520353010245315134014554230342).

    A (8,5,2)-SSDM over Z2×Z2×Z2 is given below:

    (000000000000000000000000000000000000000000000000000000001001010010011011100100101101110110111111000001000001100101100101010011010011110111110111000001001000110111110111000001000001100101100101000010100110000010100110000010100110000010100110).

    A (12,5,2)-SSDM over Z2×Z6 is as follows:

    000000000000000000000000000000000000000000000000000102030405101112131415000102030405101112131415000310011315021205041114010412111003150014130502001201150513031402111004011411050315040212100013000415140211121013010305021203011015130511001404.

    A (16,5,2)-SSDM over Z2×Z2×Z2×Z2 is the juxtaposition of the following two arrays.

    00000000000000000000000000000000000000000000000000000000000000000000000100100100100000110110110010110101101001111110111111011001000000100100100000110110110010110101101001111110111111011001000100000100100000110110110010110101101001111110111111011001000100100000100000110110110010110101101001111110111111011001000100100100,
    00000000000000000000000000000000000000000000000000000000000000000000000100100011010001010110011110001001101010111100110111101111000100110010000010011011101010001100111011111101010001100111010100010010000000111110110111111100011101000110010110101001101110000011010110101100111010000001011101100000101111011001111100100100.

    Theorem 4.11. Let v=2α3βu2, where α0, β0, and gcd(u,6)=1. A (v,5,2)-SSDM exists for v2, except possibly when v=18,2u with u1.

    Proof. The proof process is divided into four cases based on the values of α and β.

    Case 1. α=0 and β0.

    By Theorem 4.8, a (3β,3β,2)-SSDM exists for β2. Consequently, a (3β,5,2)-SSDM is guaranteed for β2. A (3,5,2)-SSDM is provided in Lemma 4.12, which further implies that a (3β,5,2)-SSDM exists for β1. If u=1, this conclusion remains valid. However, if u1, then a (u,5,1)-DM exists by Lemma 4.11. Then, by Lemma 4.7, a (v,5,2)-SSDM exists. When β=0, a (u,5,2)-SSDM exists by Theorem 4.8 if u has only one prime factor. If u has two prime factors, pi and pj, then by Lemma 4.8, a (pai,5,2)-SSDM exists for any a1. Similarly, by Lemma 4.11, a (pbj,5,1)-DM exists for b1. Consequently, using Lemma 4.7, a (u,5,2)-SSDM can be constructed. A similar argument can be used to demonstrate the existence of a (u,5,2)-SSDM when u has at least three prime factors.

    Case 2. α=1 and β1.

    When β=1 and u=1, a (6,5,2)-DM is provided by Lemma 4.12. For β=1 and u1, Lemma 4.7 ensures the existence of a (v,5,2)-SSDM, with a corresponding (u,5,1)-DM given by Lemma 4.11. If β2 and v18, Lemma 4.7 also guarantees the existence of a (v,5,2)-SSDM, utilizing the (3β1u,5,1)-DM as given in Lemma 4.11.

    Case 3. α=2 and β0.

    A similar argument as in Case 2 can be used to show that a (v,5,2)-SSDM exists for v12. The necessary (4,5,2)-SSDM is provided by Lemma 4.12. A (12,5,2)-SSDM is provided in Lemma 4.12.

    Case 4. α3 and β0.

    We begin by proving the existence of a (2α,5,2)-SSDM. Lemma 4.12 provides the (2α,5,2)-SSDM for α=2,3,4. A (2α2,5,1)-DM for α5 is guaranteed by Lemma 4.11, thereby establishing the conclusion. A similar argument shows that a (2αu,5,2)-SSDM exists. As established in Case 1, a (3β,5,2)-SSDM exists for β1. Additionally, a (2α,5,1)-DM for α3 and a (u,5,1)-DM with u1 exist, as shown in Lemma 4.11. Therefore, a (2αu,5,1)-DM for α3 exists. By Lemma 4.7, this leads to the existence of a (2α3βu,5,2)-SSDM. The proof is completed.

    In conclusion, this paper has made significant contributions to the field of SDAs. We have established a comprehensive lower bound on the size of SDAs and demonstrated an equivalence between optimum SDAs and SSOAs. By exploiting the properties of SSOAs, we have systematically constructed numerous optimum SDAs from OAs and difference matrices. These SDAs are vital for detecting and tolerating noisy test outcomes in various practical applications.

    The results presented offer significant insights into the design of efficient test suites for complex software systems. By utilizing SDAs, software testers can not only detect the presence of interaction faults but also quantify tolerance to unreliable test outcomes. This dual capability has substantial implications for improving the quality and reliability of software products through rigorous testing processes. Looking forward, there are several promising directions for future research. One key area is the extension of our construction methods to accommodate SDAs of higher strengths, which would further enhance their robustness and applicability in more complex and challenging scenarios. Additionally, exploring the potential application of SDAs beyond software testing, in domains where noise tolerance and interaction fault detection are critical, offers exciting opportunities for future investigation.

    Ce Shi: computing, writing, literature survey, editing; Tatsuhiro Tsuchiya: computing and writing; Chengmin Wang: writing, literature survey, editing. All authors have read and agreed to the published version of the manuscript.

    The authors declare they have used Artificial Intelligence (AI) tools in the creation of this article.

    The first author's work was supported by NSFC grant 11301342 and Natural Science Foundation of Shanghai No. 17ZR1419900.

    The authors declare that they have no conflict of interest.



    [1] R. Bose, K. Bush, Orthogonal arrays of strength two and three, Ann. Math. Statist., 23 (1952), 508–524. https://doi.org/10.1214/aoms/1177729331 doi: 10.1214/aoms/1177729331
    [2] M. Buratti, Recursive constructions for difference matrices and relative difference families, J. Comb. Des., 6 (1998), 165–182. https://doi.org/10.1002/(sici)1520-6610(1998)6:3<165::aid-jcd1>3.0.co;2-d doi: 10.1002/(sici)1520-6610(1998)6:3<165::aid-jcd1>3.0.co;2-d
    [3] Y. Chang, C. Colbourn, A. Gowty, D. Horsley, J. Zhou, New bounds on the maximum size of Sperner partition systems, Eur. J. Combin., 90 (2020), 103165. https://doi.org/10.1016/j.ejc.2020.103165 doi: 10.1016/j.ejc.2020.103165
    [4] M. Chateauneuf, C. Colbourn, D. Kreher, Covering arrays of strength three, Des. Codes Cryptogr., 16 (1999), 235–242. https://doi.org/10.1023/A:1008379710317 doi: 10.1023/A:1008379710317
    [5] M. Chateauneuf, D. Kreher, On the state of strength three covering arrays, J. Comb. Des., 10 (2002), 217–238. https://doi.org/10.1002/jcd.10002 doi: 10.1002/jcd.10002
    [6] Y. Chen, Constructions of optimal detecting arrays of degree 5 and strength 2, M.Sc Thesis, Soochow University, 2011.
    [7] C. Colbourn, Strength two covering arrays: existence tables and projection, Discrete Math., 308 (2008), 772–786. https://doi.org/10.1016/j.disc.2007.07.050 doi: 10.1016/j.disc.2007.07.050
    [8] C. Colbourn, CRC handbook of combinatorial designs, New York: CRC Press, 1996. https://doi.org/10.1201/9781003040897
    [9] C. Colbourn, S. Martirosyan, T. Trung, R. Walker Ⅱ, Roux-type constructions for covering arrays of strengths three and four, Des. Codes Cryptogr., 41 (2006), 33–57. https://doi.org/10.1007/s10623-006-0020-8 doi: 10.1007/s10623-006-0020-8
    [10] C. Colbourn, D. McClary, Locating and detecting arrays for interaction faults, J. Comb. Optim., 15 (2008), 17–48. https://doi.org/10.1007/s10878-007-9082-4 doi: 10.1007/s10878-007-9082-4
    [11] C. Colbourn, V. Syrotiuk, Detecting arrays for main effects, In: Algebraic informatics, Cham: Springer, 2019,112–123. https://doi.org/10.1007/978-3-030-21363-3_10
    [12] C. Colbourn, V. Syrotiuk, Detecting arrays for effects of single factor, In: European congress of mathematics, Berlin: EMS Press, 2023,693–718. https://doi.org/10.4171/8ecm/19
    [13] D. Drake, Partial λ-geometries and generalized Hadamard matrices over groups, Can. J. Math., 31 (1979), 617–627. https://doi.org/10.4153/CJM-1979-062-1 doi: 10.4153/CJM-1979-062-1
    [14] A. El-Mesady, Y. Hamed, K. Abualnaja, A novel application on mutually orthogonal graph squares and graph-orthogonal arrays, AIMS Mathematics, 7 (2022), 7349–7373. https://doi.org/10.3934/math.2022410 doi: 10.3934/math.2022410
    [15] G. Ge, On (g,4;1)-difference matrices, Discrete Math., 301 (2005), 164–174. https://doi.org/10.1016/j.disc.2005.07.004 doi: 10.1016/j.disc.2005.07.004
    [16] A. Gowty, D. Horsley, More constructions for Sperner partition systems, J. Comb. Des., 29 (2021), 579–606. https://doi.org/10.1002/jcd.21780 doi: 10.1002/jcd.21780
    [17] S. Hartman, On simple and supersimple transversal designs, J. Comb. Des., 8 (2000), 311–320. https://doi.org/10.1002/1520-6610(2000)8:5<311::aid-jcd1>3.0.co;2-1 doi: 10.1002/1520-6610(2000)8:5<311::aid-jcd1>3.0.co;2-1
    [18] A. Hartman, L. Raskin, Problems and algorithms for covering arrays, Discrete Math., 284 (2004), 149–156. https://doi.org/10.1016/j.disc.2003.11.029 doi: 10.1016/j.disc.2003.11.029
    [19] A. Hedayat, J. Stufken, G. Su, On difference schemes and orthogonal arrays of strength t, J. Stat. Plan. Infer., 56 (1996), 307–324. https://doi.org/10.1016/s0378-3758(96)00026-2 doi: 10.1016/s0378-3758(96)00026-2
    [20] M. Higazy, A. El-Mesady, M. Mohamed, On graph-orthogonal arrays by mutually orthogonal graph squares, Symmetry, 12 (2020), 1895. https://doi.org/10.3390/sym12111895 doi: 10.3390/sym12111895
    [21] A. Hedayat, N. Sloane, J. Stufken, Orthogonal array: theory and applications, New York: Springer, 1999. http://dx.doi.org/10.1007/978-1-4612-1478-6
    [22] L. Ji, J. Yin, Constructions of new orthogonal arrays and covering arrays of strength three, J. Comb. Theory A, 117 (2010), 236–247. https://doi.org/10.1016/j.jcta.2009.06.002 doi: 10.1016/j.jcta.2009.06.002
    [23] L. Jiang, C. Shi, A construction of variable strength covering arrays, Acta Math. Appl. Sin. Engl. Ser., 37 (2021), 240–250. https://doi.org/10.1007/s10255-021-1006-z doi: 10.1007/s10255-021-1006-z
    [24] D. Kuhn, R. Kacker, Y. Lei, Introduction to combinatorial testing, Boca Raton: Chapman & Hall/CRC, 2013.
    [25] D. Kuhn, M. Reilly, An investigation of the applicability of design of experiments to software testing, Proceedings of 27th Annual NASA Goddard/IEEE Software Engineering Workshop, 2002, 91–95. https://doi.org/10.1109/sew.2002.1199454 doi: 10.1109/sew.2002.1199454
    [26] D. Kuhn, D. Wallace, A. Gallo, Software fault interactions and implications for software testing, IEEE T. Software Eng., 30 (2004), 418–421. https://doi.org/10.1109/TSE.2004.24 doi: 10.1109/TSE.2004.24
    [27] P. Li, K. Meagher, Sperner partition systems, J. Comb. Des., 21 (2013), 267–279. https://doi.org/10.1002/jcd.21330 doi: 10.1002/jcd.21330
    [28] K. Meagher, L. Moura, B. Stevens, A Sperner-type theorem for set-partition systems, Electron. J. Combin., 12 (2005), 20. https://doi.org/10.37236/1987 doi: 10.37236/1987
    [29] C. Nie, H. Leung, A survey of combinatorial testing, ACM Comput. Surv., 43 (2011), 11. https://doi.org/10.1145/1883612.1883618 doi: 10.1145/1883612.1883618
    [30] R. Pan, Y. Chang, A note on difference matrices over non-cyclic finite abelian groups, Discrete Math., 339 (2016), 822–830. https://doi.org/10.1016/j.disc.2015.10.028 doi: 10.1016/j.disc.2015.10.028
    [31] K. Sarkar, C. Colbourn, Two-stage algorithms for covering array construction, J. Comb. Des., 27 (2019), 475–505. https://doi.org/10.1002/jcd.21657 doi: 10.1002/jcd.21657
    [32] E. Seiden, On the problem of construction of orthogonal arrays, Ann. Math. Statist., 25 (1954), 151–156. https://doi.org/10.1214/aoms/1177728855 doi: 10.1214/aoms/1177728855
    [33] S. Seidel, K. Sarkar, C. Colbourn, V. Syrotiuk, Separating interaction effects using locating and detecting arrays, In: Combinatorial algorithms, Cham: Springer, 2018,349–360. https://doi.org/10.1007/978-3-319-94667-2_29
    [34] C. Shi, Optimum super-simple mixed covering arrays of type a1bk1, Acta Math. Sin.-English Ser., 33 (2017), 153–164. https://doi.org/10.1007/s10114-017-5684-7 doi: 10.1007/s10114-017-5684-7
    [35] C. Shi, L. Jiang, A. Tao, Consecutive detecting arrays for interaction faults, Graph. Combinator., 36 (2020), 1203–1218. https://doi.org/10.1007/s00373-020-02176-7 doi: 10.1007/s00373-020-02176-7
    [36] C. Shi, Y. Tang, J. Yin, The equivalence between optimal detecting arrays and super-simple OAs, Des. Codes Cryptogr., 62 (2012), 131–142. https://doi.org/10.1007/s10623-011-9498-9 doi: 10.1007/s10623-011-9498-9
    [37] C. Shi, Y. Tang, J. Yin, Optimum mixed level detecting arrays, Ann. Statist., 42 (2014), 1546–1563. https://doi.org/10.1214/14-AOS1228 doi: 10.1214/14-AOS1228
    [38] C. Shi, A. Tao, Consecutive detecting arrays from m-sequence, IAENG International Journal of Applied Mathematics, 50 (2020), 80–86.
    [39] C. Shi, C. Wang, Optimum detecting arrays for independent interaction faults, Acta Math. Sin.-English Ser., 32 (2016), 199–212. https://doi.org/10.1007/s10114-016-5049-7 doi: 10.1007/s10114-016-5049-7
    [40] C. Shi, J. Yin, Existence of super-simple OAλ(3,5,v)'s, Des. Codes Cryptogr., 72 (2014), 369–380. https://doi.org/10.1007/s10623-012-9771-6 doi: 10.1007/s10623-012-9771-6
    [41] Y. Tang, J. Yin, Detecting arrays and their optimality, Acta. Math. Sin.-English Ser., 27 (2011), 2309–2318. https://doi.org/10.1007/s10114-011-0184-7 doi: 10.1007/s10114-011-0184-7
    [42] G. Tzanakis, L. Moura, D. Panario, B. Stevens, Covering arrays from m-sequences and character sums, Des. Codes Cryptogr., 85 (2017), 437–456. https://doi.org/10.1007/s10623-016-0316-2 doi: 10.1007/s10623-016-0316-2
    [43] Y. Zang, G. Chen, K. Chen, Z. Tian, Further results on 2-uniform states arising from Irredundant orthogonal arrays, Adv. Math. Commun., 16 (2022), 231–247. https://doi.org/10.3934/amc.2020109 doi: 10.3934/amc.2020109
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(384) PDF downloads(37) Cited by(0)

Figures and Tables

Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog