Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (21)

Search Parameters:
Keywords = exact enumeration

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 449 KB  
Review
A Survey on Classical Lattice Algorithms
by Tongchen Shen and Xiangxue Li
Cryptography 2026, 10(2), 17; https://doi.org/10.3390/cryptography10020017 - 6 Mar 2026
Viewed by 210
Abstract
The rapid advancement of quantum computing poses a severe threat to traditional public key cryptosystems. Lattice-based cryptography has emerged as a core candidate for post-quantum cryptography due to its presumed quantum resistance, robust security foundations, and functional versatility, with its concrete security relying [...] Read more.
The rapid advancement of quantum computing poses a severe threat to traditional public key cryptosystems. Lattice-based cryptography has emerged as a core candidate for post-quantum cryptography due to its presumed quantum resistance, robust security foundations, and functional versatility, with its concrete security relying on the computational hardness of lattice problems. Existing lattice-based cryptography surveys mainly focus on cryptosystem design, scheme comparisons, and post-quantum cryptography standardization progress, with only cursory coverage of classical lattice algorithms that underpin the concrete security of lattice-based cryptography. We present the first systematic survey of classical lattice algorithms, focusing on two core categories of algorithms for solving lattice problems: approximate algorithms and exact algorithms. The approximate algorithms cover mainstream lattice basis reduction methods such as Lenstra–Lenstra–Lovász (LLL), Block Korkine–Zolotarev (BKZ), and General Sieve Kernel (G6K) algorithms, as well as alternative frameworks. The exact algorithms encompass dominant techniques like enumeration and sieving algorithms, along with alternative strategies. We systematically trace the evolutionary trajectory and inherent logical connections of various algorithms, clarify their core mechanisms, and identify promising future research directions. This survey not only serves as an introductory guide for beginners but also provides a valuable reference for seasoned researchers, facilitating the concrete security evaluation of lattice-based cryptosystems and the design of novel lattice algorithms. Full article
(This article belongs to the Section Cryptography Reviews)
Show Figures

Figure 1

25 pages, 390 KB  
Article
On Enumeration and Distance Bounds of Double-Circulant Codes over a Semi-Local Ring
by Sami H. Saif and Alhanouf Ali Alhomaidhi
Symmetry 2026, 18(3), 418; https://doi.org/10.3390/sym18030418 - 27 Feb 2026
Viewed by 147
Abstract
We study double-circulant codes over a class of semi-local rings arising from the idempotent construction R=Zp2+uZp2, where u2=u, and p is an odd prime. Although both algebraic settings considered [...] Read more.
We study double-circulant codes over a class of semi-local rings arising from the idempotent construction R=Zp2+uZp2, where u2=u, and p is an odd prime. Although both algebraic settings considered admit this presentation, they correspond to two distinct rings depending on whether the additional relation pu=0 is imposed or not. These two configurations induce different ideal lattices and symmetry properties, which play a decisive role in the structure and enumeration of codes. Exploiting the Chinese Remainder Theorem, we describe self-dual and linear complementary dual (LCD) double-circulant codes in a unified, componentwise manner. Exact enumeration formulas are derived by reducing the corresponding duality constraints to norm equations over finite fields and unramified Galois extensions of Zp2. We further construct explicit Fp-linear Gray maps from R2n to Fp6n in the degenerate case pu=0 and to Fp8n in the standard case pu0, and show that these maps preserve self-duality and the LCD property. Assuming a standard primitive-root hypothesis on the code length, as predicted by Artin’s primitive root conjecture, we establish asymptotic existence bounds for the Gray images of both LCD and self-dual double-circulant codes via a probabilistic argument. The degenerate case pu=0 yields a shorter Gray expansion and a stronger self-dual entropy threshold, while the case pu0 leads to a larger self-dual ensemble with distinct asymptotic characteristics. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

23 pages, 3517 KB  
Article
Finite-Size Thermodynamics of the Two-Dimensional Dipolar Q-Clock Model
by Michel Aguilera, Francisco J. Peña, Eugenio E. Vogel and Patricio Vargas
Entropy 2026, 28(2), 181; https://doi.org/10.3390/e28020181 - 5 Feb 2026
Viewed by 319
Abstract
We present a fully controlled thermodynamic study of the two-dimensional dipolar Q-state clock model on small square lattices with free boundaries, combining exhaustive state enumeration with noise-free evaluation of canonical observables. We resolve the complete energy spectra and degeneracies [...] Read more.
We present a fully controlled thermodynamic study of the two-dimensional dipolar Q-state clock model on small square lattices with free boundaries, combining exhaustive state enumeration with noise-free evaluation of canonical observables. We resolve the complete energy spectra and degeneracies {En,cn} for the Ising case (Q=2) on lattices of size L=3,4,5, and for clock symmetries Q=4,6,8 on a 3×3 lattice, tracking how the competition between exchange and long-range dipolar interactions reorganizes the low-energy manifold as the ratio α=D/J is varied. Beyond a finite-size characterization, we identify several qualitatively new thermodynamic signatures induced solely by dipolar anisotropy. First, we demonstrate that ground-state level crossings generated by long-range interactions appear as exact zeros of the specific heat in the limit C(T0,α), establishing an unambiguous correspondence between microscopic spectral rearrangements and macroscopic caloric response. Second, we show that the shape of the associated Schottky-like anomalies encodes detailed information about the degeneracy structure of the competing low-energy states: odd lattices (L=3,5) display strongly asymmetric peaks due to unbalanced multiplicities, whereas the even lattice (L=4) exhibits three critical values of α accompanied by nearly symmetric anomalies, reflecting paired degeneracies and revealing lattice parity as a key organizing principle. Third, we uncover a symmetry-driven crossover with increasing Q: while the Q=2 and Q=4 models retain sharp dipolar-induced critical points and pronounced low-temperature structure, for Q6, the energy landscape becomes sufficiently smooth to suppress ground-state crossings altogether, yielding purely thermal specific-heat maxima. Altogether, our results provide a unified, size- and symmetry-resolved picture of how long-range anisotropy, lattice parity, and discrete rotational symmetry shape the thermodynamics of mesoscopic magnetic systems. We show that dipolar interactions alone are sufficient to generate nontrivial critical-like caloric behavior in clusters as small as 3×3, establishing exact finite-size benchmarks directly relevant for van der Waals nanomagnets, artificial spin-ice arrays, and dipolar-coupled nanomagnetic structures. Full article
(This article belongs to the Section Thermodynamics)
Show Figures

Figure 1

16 pages, 336 KB  
Article
An Exact Algorithm for Counting the Number of Independent Sets of a Graph
by Guillermo De Ita Luna, J. Raymundo Marcial-Romero, Pedro Bello López and Meliza Contreras González
Mathematics 2026, 14(2), 275; https://doi.org/10.3390/math14020275 - 12 Jan 2026
Viewed by 504
Abstract
For a graph G of a degree greater than or equal to 3, counting the number of independent sets (denoted as i(G)) is a classical #P-complete problem. Here, we establish a new worst-case upper bound time complexity for computing [...] Read more.
For a graph G of a degree greater than or equal to 3, counting the number of independent sets (denoted as i(G)) is a classical #P-complete problem. Here, we establish a new worst-case upper bound time complexity for computing i(G) for any non-constraint undirected graph. Our proposal applies the vertex division rule i(G)=i(G{x})+i(GN[x]) over a vertex x which satisfies some conditions, and considers cactus and outerplanar graphs as basic subgraphs.Our algorithm establishes a leading worst-case upper bound of O*(1.2321n), where n is the number of vertices in the graph and O* omits polynomial terms in n. Full article
(This article belongs to the Special Issue Computational Algorithms and Models for Graph Problems)
Show Figures

Figure 1

12 pages, 571 KB  
Article
Partition Function Zeros of the Spin-One Ising Model on the Honeycomb Lattice in the Complex Temperature Plane
by Seung-Yeon Kim
Entropy 2025, 27(12), 1258; https://doi.org/10.3390/e27121258 - 15 Dec 2025
Viewed by 360
Abstract
The spin-one Ising model on the honeycomb lattice has never been solved exactly in spite of its simplicity. Even its exact critical temperature is not known. The exact integer values for the density of states of the spin-one Ising model on the [...] Read more.
The spin-one Ising model on the honeycomb lattice has never been solved exactly in spite of its simplicity. Even its exact critical temperature is not known. The exact integer values for the density of states of the spin-one Ising model on the L×2L honeycomb lattice are enumerated up to L=14. The partition function zeros in the complex temperature plane of the spin-one Ising model on the L×2L honeycomb lattice are exactly obtained, using the density of states. The properties of the partition function zeros in the complex temperature plane are related to the behaviors of various thermodynamic functions, in particular, their singular behaviors. The unknown properties of the spin-one Ising model on the honeycomb lattice are investigated, based on its partition function zeros in the complex temperature plane. Full article
(This article belongs to the Special Issue Ising Model—100 Years Old and Still Attractive)
Show Figures

Figure 1

19 pages, 1012 KB  
Article
A Recursive Solution to the Global Maximum Minimum Cut Problem with a Fixed Sink
by Xiaoyao Huang, Shuo Quan and Jie Wu
Algorithms 2025, 18(10), 665; https://doi.org/10.3390/a18100665 - 20 Oct 2025
Viewed by 661
Abstract
In graph theory and network design, the minimum cut is a fundamental measure of system connectivity and communication capacity. While prior research has largely focused on computing the minimum cut for a fixed source–sink pair, practical scenarios such as data center communication often [...] Read more.
In graph theory and network design, the minimum cut is a fundamental measure of system connectivity and communication capacity. While prior research has largely focused on computing the minimum cut for a fixed source–sink pair, practical scenarios such as data center communication often demand a different objective: identifying the source node whose minimum cut to a designated sink is maximized. This task, which we term the Global Maximum Minimum Cut with Fixed Sink (GMMC-FS) problem, captures the goal of locating a high-capacity source relative to a shared sink node that aggregates multiple servers. The problem is of significant engineering importance, yet it is computationally challenging as it involves a nested max–min optimization. In this paper, we present a recursive reduction (RR) algorithm for solving the GMMC-FS problem. The key idea is to iteratively select pivot nodes, compute their minimum cuts with respect to the sink, and prune dominated candidates whose cut values cannot exceed that of the pivot. By recursively applying this elimination process, RR dramatically reduces the number of max-flow computations required while preserving exact correctness. Compared with classical contraction-based and Gomory–Hu tree approaches that rely on global cut enumeration, the proposed RR framework offers a more direct and scalable mechanism for identifying the source that maximizes the minimum cut to a fixed sink. Its novelty lies in exploiting the structural properties of the sink side of suboptimal cuts, which leads to both theoretical efficiency and empirical robustness across large-scale networks. We provide a rigorous theoretical analysis establishing both correctness and complexity bounds, and we validate the approach through extensive experiments. Results demonstrate that RR consistently achieves optimal solutions while significantly outperforming baseline methods in runtime, particularly on large and dense networks. Full article
Show Figures

Figure 1

16 pages, 304 KB  
Article
LDPC Codes on Balanced Incomplete Block Designs: Construction, Girth, and Cycle Structure Analysis
by Hengzhou Xu, Xiaodong Zhang, Mengmeng Xu, Haipeng Yu and Hai Zhu
Entropy 2025, 27(5), 476; https://doi.org/10.3390/e27050476 - 27 Apr 2025
Viewed by 1571
Abstract
In this paper, we investigate the cycle structure inherent in the Tanner graphs of low-density parity-check (LDPC) codes constructed from balanced incomplete block designs (BIBDs). We begin by delineating the incidence structure of BIBDs and propose a methodology for constructing LDPC codes based [...] Read more.
In this paper, we investigate the cycle structure inherent in the Tanner graphs of low-density parity-check (LDPC) codes constructed from balanced incomplete block designs (BIBDs). We begin by delineating the incidence structure of BIBDs and propose a methodology for constructing LDPC codes based on these designs. By analyzing the incidence relations between points and blocks within a BIBD, we prove that the resulting LDPC codes possess a girth of 6. Subsequently, we provide a detailed analysis of the cycle structure of the constructed LDPC codes and introduce a systematic approach for enumerating their short cycles. Using this method, we determine the exact numbers of cycles of lengths 6 and 8. Simulation results demonstrate that the constructed LDPC codes exhibit excellent performance. Full article
(This article belongs to the Special Issue Advances in Modern Channel Coding)
Show Figures

Figure 1

14 pages, 832 KB  
Article
Can Self-Reported Symptoms Be Relied on for COVID-19 Screening in Low-Resource Settings?
by Suraj Singh Senjam, Garima Goel, Neiwete Lomi, Yatan Pal Singh Balhara, Yashdeep Gupta and Animesh Ray
COVID 2025, 5(2), 15; https://doi.org/10.3390/covid5020015 - 27 Jan 2025
Cited by 1 | Viewed by 1508
Abstract
Background: Understanding the extent of the disease penetration and assessing its impact is critical during a pandemic. However, laboratory-based COVID-19 estimation can be resource-intensive and may not be feasible during an emergency, particularly in low-resource settings. Aim: To investigate whether self-reported symptoms can [...] Read more.
Background: Understanding the extent of the disease penetration and assessing its impact is critical during a pandemic. However, laboratory-based COVID-19 estimation can be resource-intensive and may not be feasible during an emergency, particularly in low-resource settings. Aim: To investigate whether self-reported symptoms can be used for COVID-19 screening to estimate the burden among individuals aged 18 years and above in a rural setting. Methods: A community-based cross-section study was conducted in a rural district of Haryana, a state in north India, using a self-reported semi-structured questionnaire developed on a digital platform. Information on COVID-19 manifestations as essential and non-essential, confirmed laboratory tests, and disability data using Washington Groups of Short Set were obtained. The sensitivity of the COVID-19 symptoms was estimated against laboratory-confirmed true positives. A chi-square or Fisher exact test for association and a multivariable regression to determine the predictors of the prevalence was carried out. Results: In total, 2954 respondents (79.8%), out of 3700 enumerated, were interviewed. The mean age of respondents was 42 years (SD 17.2), with 54.8% female respondents. The prevalence of COVID-19 based on self-reported symptoms was 6.2% (95%CI: 5.3–7.1). The age-adjusted prevalence was 6.04% (95%CI: 5.9–6.1). Of the total COVID-19 cases, 170 (5.7%, 95%CI: 4.9–6.5) revealed a laboratory-confirmed test. Given three essential symptoms to declare provisionally COVID-19 cases, the sensitivity was 82.9% (141/170), but considering two or more essential symptoms along with two or more non-essential, the sensitivity reached up to 91.8% (156/170). The multivariable analysis showed that increased age, higher education attainment, students, entrepreneurs, persons working in private sectors, and participants with poor hygiene were predictors. Conclusions: A symptoms-based identification of COVID-19 cases can give a reliable estimate and valuable insight into the extent of the penetration, especially in low-middle-income countries, and can be a supplement, not a replacement, to a laboratory test. Full article
(This article belongs to the Special Issue COVID and Public Health)
Show Figures

Figure 1

15 pages, 3782 KB  
Article
Self-Assembly of Particles on a Curved Mesh
by Gabriele Costa and Santi Prestipino
Entropy 2025, 27(1), 46; https://doi.org/10.3390/e27010046 - 9 Jan 2025
Cited by 3 | Viewed by 1169
Abstract
Discrete statistical systems offer a significant advantage over systems defined in the continuum, since they allow for an easier enumeration of microstates. We introduce a lattice-gas model on the vertices of a polyhedron called a pentakis icosidodecahedron and draw its exact phase diagram [...] Read more.
Discrete statistical systems offer a significant advantage over systems defined in the continuum, since they allow for an easier enumeration of microstates. We introduce a lattice-gas model on the vertices of a polyhedron called a pentakis icosidodecahedron and draw its exact phase diagram by the Wang–Landau method. Using different values for the couplings between first-, second-, and third-neighbor particles, we explore various interaction patterns for the model, ranging from softly repulsive to Lennard-Jones-like and SALR. We highlight the existence of sharp transitions between distinct low-temperature “phases”, featuring, among others, regular polyhedral, cluster-crystal-like, and worm-like structures. When attempting to reproduce the equation of state of the model by Monte Carlo simulation, we find hysteretic behavior near zero temperature, implying a bottleneck issue for Metropolis dynamics near phase-crossover points. Full article
(This article belongs to the Special Issue Dimensional Crossover in Classical and Quantum Systems)
Show Figures

Figure 1

27 pages, 5611 KB  
Article
Applying Microbial Source Tracking Techniques for Identification of Pathways of Faecal Pollution from Water Sources to Point of Use in Vhembe District, South Africa
by Opelo Tlotlo Wryl Mochware, Mathoto Lydia Thaoge-Zwane and Maggy Ndombo Benkete Momba
Water 2024, 16(14), 2014; https://doi.org/10.3390/w16142014 - 16 Jul 2024
Cited by 4 | Viewed by 2108
Abstract
A safe water supply is a necessity, but it remains one of the backlogs of services rendered in rural areas of developing countries. This leads to vulnerable communities using water from available sources that is unsafe as it is contaminated with faecal matter. [...] Read more.
A safe water supply is a necessity, but it remains one of the backlogs of services rendered in rural areas of developing countries. This leads to vulnerable communities using water from available sources that is unsafe as it is contaminated with faecal matter. Microbial source tracking (MST) methods are gold-standard techniques that detect the exact sources of faecal contamination. This study, therefore, tracked and identified the exact sources of faecal contamination from the catchment to the point of use in rural areas of Vhembe District Municipality. Collected water samples (n = 1048) were concentrated by membrane filtration for the enumeration and detection of E. coli, followed by DNA extraction. The extracted DNA was subjected to a quantitative polymerase chain reaction (qPCR) to track target host-specific Bacteroidales genetic markers from the water source to the point of use. Rivers and dams exhibited maximum E. coli counts of up to 90 CFU/100 mL during the wet season and up to 50 CFU/100 mL during the dry season. Due to the effective treatment of these water sources, no E. coli bacteria were detected in any of the sampled municipal drinking water treatment plants at the point of treatment, while this indicator bacterium was detected at the point of use (households), with a maximum of 4 CFU/100 mL recorded during both the wet and dry seasons. Overall, the most prevalent MST marker exhibited during the wet season was BacCan (dog-associated, 6.87%), followed by BacCow (cow-associated, 5.53%), while Pig-2-Bac (pig-associated, 2.48%) was the least prevalent. The most prevalent marker exhibited during the dry season was BacCan (5.34%), followed by BacCow, with Pig-2-Bac (1.72%) being the least prevalent. A positive correlation (r = 0.31, p = 0.001) was established between the presence of the MST markers and detected E. coli from water sources to the point of use. The knowledge of the faecal contamination attributes in both public and domestic domains will assist in developing prevention and control strategies. Full article
(This article belongs to the Special Issue Water Quality Monitoring and Public Health)
Show Figures

Figure 1

38 pages, 7240 KB  
Article
Challenges of Engineering Applications of Descriptive Geometry
by Zsuzsa Balajti
Symmetry 2024, 16(1), 50; https://doi.org/10.3390/sym16010050 - 29 Dec 2023
Cited by 11 | Viewed by 6988
Abstract
Descriptive geometry has indispensable applications in many engineering activities. A summary of these is provided in the first chapter of this paper, preceded by a brief introduction into the methods of representation and mathematical recognition related to our research area, such as projection [...] Read more.
Descriptive geometry has indispensable applications in many engineering activities. A summary of these is provided in the first chapter of this paper, preceded by a brief introduction into the methods of representation and mathematical recognition related to our research area, such as projection perpendicular to a single plane, projection images created by perpendicular projection onto two mutually perpendicular image planes, but placed on one plane, including the research of curves and movements, visual representation and perception relying on a mathematical approach, and studies on toothed driving pairs and tool geometry in order to place the development presented here among them. As a result of the continuous variability of the technological environment according to various optimization aspects, the engineering activities must also be continuously adapted to the changes, for which an appropriate approach and formulation are required from the practitioners of descriptive geometry, and can even lead to improvement in the field of descriptive geometry. The imaging procedures are always based on the methods and theorems of descriptive geometry. Our aim was to examine the spatial variation in the wear of the tool edge and the machining of the components of toothed drive pairs using two cameras. Resolving contradictions in spatial geometry reconstruction research is a constant challenge, to which a possible answer in many cases is the searching for the right projection direction, and positioning cameras appropriately. A special method of enumerating the possible infinite viewpoints for the reconstruction of tool surface edge curves is presented in the second part of this paper. In the case of the monitoring the shape geometry, taking into account the interchangeability of the projection directions, i.e., the property of symmetry, all images made from two perpendicular directions were taken into account. The procedure for determining the correct directions in a mathematically exact way is also presented through examples. A new criterion was formulated for the tested tooth edge of the hob to take into account the shading of the tooth next to it. The analysis and some of the results of the Monge mapping, suitable for the solution of a mechanical engineering task to be solved in a specific technical environment, namely defining the conditions for camera placements that ensure reconstructibility are also presented. Taking physical shadowing into account, conclusions can be drawn about the degree of distortion of the machined surface from the spatial deformation of the edge curve of the tool reconstructed with correctly positioned cameras. Full article
Show Figures

Graphical abstract

18 pages, 530 KB  
Article
A Hybrid Exact–Local Search Approach for One-Machine Scheduling with Time-Dependent Capacity
by Christos Valouxis, Christos Gogos, Angelos Dimitsas, Petros Potikas and Anastasios Vittas
Algorithms 2022, 15(12), 450; https://doi.org/10.3390/a15120450 - 29 Nov 2022
Cited by 4 | Viewed by 2497
Abstract
Machine scheduling is a hard combinatorial problem having many manifestations in real life. Due to the schedule followed, the possibility of installations of machines operating sub-optimally is high. In this work, we examine the problem of a single machine with time-dependent capacity that [...] Read more.
Machine scheduling is a hard combinatorial problem having many manifestations in real life. Due to the schedule followed, the possibility of installations of machines operating sub-optimally is high. In this work, we examine the problem of a single machine with time-dependent capacity that performs jobs of deterministic durations, while for each job, its due time is known in advance. The objective is to minimize the aggregated tardiness in all tasks. The problem was motivated by the need to schedule charging times of electric vehicles effectively. We formulate an integer programming model that clearly describes the problem and a constraint programming model capable of effectively solving it. Due to the usage of interval variables, global constraints, a powerful constraint programming solver, and a heuristic we have identified, which we call the “due times rule”, the constraint programming model can reach excellent solutions. Furthermore, we employ a hybrid approach that exploits three local search improvement procedures in a schema where the constraint programming part of the solver plays a central role. These improvement procedures exhaustively enumerate portions of the search space by exchanging consecutive jobs with a single job of the same duration, moving cost-incurring jobs to earlier times in a consecutive sequence of jobs or even exploiting periods where capacity is not fully utilized to rearrange jobs. On the other hand, subproblems are given to the exact constraint programming solver, allowing freedom of movement only to certain parts of the schedule, either in vertical ribbons of the time axis or in groups of consecutive sequences of jobs. Experiments on publicly available data show that our approach is highly competitive and achieves the new best results in many problem instances. Full article
(This article belongs to the Special Issue Scheduling: Algorithms and Applications)
Show Figures

Figure 1

13 pages, 563 KB  
Article
Exact Enumeration Approach to Estimate the Theta Temperature of Interacting Self-Avoiding Walks on the Simple Cubic Lattice
by Sing-Shuo Huang, Yu-Hsin Hsieh and Chi-Ning Chen
Polymers 2022, 14(21), 4536; https://doi.org/10.3390/polym14214536 - 26 Oct 2022
Cited by 4 | Viewed by 2019
Abstract
We compute the exact root-mean-square end-to-end distance of the interacting self-avoiding walk (ISAW) up to 27 steps on the simple cubic lattice. These data are used to construct a fixed point equation to estimate the theta temperature of the collapse transition of the [...] Read more.
We compute the exact root-mean-square end-to-end distance of the interacting self-avoiding walk (ISAW) up to 27 steps on the simple cubic lattice. These data are used to construct a fixed point equation to estimate the theta temperature of the collapse transition of the ISAW. With the Bulirsch–Stoer extrapolation method, we obtain accurate results that can be compared with large-scale long-chain simulations. The free parameter ω in extrapolation is precisely determined using a parity property of the ISAW. The systematic improvement of this approach is feasible by adopting the combination of exact enumeration and multicanonical simulations. Full article
(This article belongs to the Special Issue Phase Transitions and Structures in Polymer Science)
Show Figures

Figure 1

20 pages, 3180 KB  
Article
Evaluation of Methods for Measuring Fusarium-Damaged Kernels of Wheat
by Arlyn J. Ackerman, Ryan Holmes, Ezekiel Gaskins, Kathleen E. Jordan, Dawn S. Hicks, Joshua Fitzgerald, Carl A. Griffey, Richard Esten Mason, Stephen A. Harrison, Joseph Paul Murphy, Christina Cowger and Richard E. Boyles
Agronomy 2022, 12(2), 532; https://doi.org/10.3390/agronomy12020532 - 21 Feb 2022
Cited by 12 | Viewed by 6353
Abstract
Fusarium head blight (FHB) is one of the most economically destructive diseases of wheat (Triticum aestivum L.), causing substantial yield and quality loss worldwide. Fusarium graminearum is the predominant causal pathogen of FHB in the U.S., and produces deoxynivalenol (DON), a mycotoxin [...] Read more.
Fusarium head blight (FHB) is one of the most economically destructive diseases of wheat (Triticum aestivum L.), causing substantial yield and quality loss worldwide. Fusarium graminearum is the predominant causal pathogen of FHB in the U.S., and produces deoxynivalenol (DON), a mycotoxin that accumulates in the grain throughout infection. FHB results in kernel damage, a visual symptom that is quantified by a human observer enumerating or estimating the percentage of Fusarium-damaged kernels (FDK) in a sample of grain. To date, FDK estimation is the most efficient and accurate method of predicting DON content without measuring presence in a laboratory. For this experiment, 1266 entries collectively representing elite varieties and SunGrains advanced breeding lines encompassing four inoculated FHB nurseries were represented in the analysis. All plots were subjected to a manual FDK count, both exact and estimated, near-infrared spectroscopy (NIR) analysis, DON laboratory analysis, and digital imaging seed phenotyping using the Vibe QM3 instrument developed by Vibe imaging analytics. Among the FDK analytical platforms used to establish percentage FDK within grain samples, Vibe QM3 showed the strongest prediction capabilities of DON content in experimental samples, R2 = 0.63, and higher yet when deployed as FDK GEBVs, R2 = 0.76. Additionally, Vibe QM3 was shown to detect a significant SNP association at locus S3B_9439629 within major FHB resistance quantitative trait locus (QTL) Fhb1. Visual estimates of FDK showed higher prediction capabilities of DON content in grain subsamples than previously expected when deployed as genomic estimated breeding values (GEBVs) (R2 = 0.71), and the highest accuracy in genomic prediction, followed by Vibe QM3 digital imaging, with average Pearson’s correlations of r = 0.594 and r = 0.588 between observed and predicted values, respectively. These results demonstrate that seed phenotyping using traditional or automated platforms to determine FDK boast various throughput and efficacy that must be weighed appropriately when determining application in breeding programs to screen for and develop resistance to FHB and DON accumulation in wheat germplasms. Full article
(This article belongs to the Special Issue Wheat Breeding: Procedures and Strategies – Series Ⅱ)
Show Figures

Figure 1

20 pages, 2458 KB  
Article
Research of NP-Complete Problems in the Class of Prefractal Graphs
by Rasul Kochkarov
Mathematics 2021, 9(21), 2764; https://doi.org/10.3390/math9212764 - 31 Oct 2021
Cited by 7 | Viewed by 5165
Abstract
NP-complete problems in graphs, such as enumeration and the selection of subgraphs with given characteristics, become especially relevant for large graphs and networks. Herein, particular statements with constraints are proposed to solve such problems, and subclasses of graphs are distinguished. We propose a [...] Read more.
NP-complete problems in graphs, such as enumeration and the selection of subgraphs with given characteristics, become especially relevant for large graphs and networks. Herein, particular statements with constraints are proposed to solve such problems, and subclasses of graphs are distinguished. We propose a class of prefractal graphs and review particular statements of NP-complete problems. As an example, algorithms for searching for spanning trees and packing bipartite graphs are proposed. The developed algorithms are polynomial and based on well-known algorithms and are used in the form of procedures. We propose to use the class of prefractal graphs as a tool for studying NP-complete problems and identifying conditions for their solvability. Using prefractal graphs for the modeling of large graphs and networks, it is possible to obtain approximate solutions, and some exact solutions, for problems on natural objects—social networks, transport networks, etc. Full article
(This article belongs to the Special Issue New Trends in Graph and Complexity Based Data Analysis and Processing)
Show Figures

Figure 1

Back to TopTop