Skip to main content
Log in

Some Indecomposable t-Designs

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

The existence of large sets of 5-(14,6,3) designs is in doubt. There are five simple 5-(14,6,6) designs known in the literature. In this note, by the use of a computer program, we show that all of these designs are indecomposable and therefore they do not lead to large sets of 5-(14,6,3) designs. Moreover, they provide the first counterexamples for a conjecture on disjoint t-designs which states that if there exists a t-(v, k, λ) design (X, D) with minimum possible value of λ, then there must be a t-(v, k, λ) design (X, D′) such that DD′ = Ø.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. A. E. Brouwer, Table of t-designs without repeated blocks, 2 ≤ t ≤ kv/2, λλ +/2, Math. Centrum. Report ZN76, Amsterdam (1977); unpublished update (1986).

  2. B. Ganter, J. Pelikan and L. Teirlinck, Small sprawling systems of equicardinal sets, Ars Combinatoria, Vol. 4 (1977) pp. 133–142.

    Google Scholar 

  3. A. S. Hedayat, G. B. Khosrovshahi and D. Majumdar, A prospect for a general method of constructing t-designs, Discrete Appl. Math., Vol. 42 (1993) pp. 31–50.

    Google Scholar 

  4. M. Mohammad-Noori and B. Tayfeh-Rezaie, Backtracking algorithm for finding t-designs, J. Combin. Des., Vol. 11 (2003) pp. 240–248.

    Google Scholar 

  5. R. M. Wilson, A diagonal form for the incidence matrices of t-subsets vs. k-subsets, European J. Combin., Vol. 11 (1990) pp. 609–615.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Khosrovshahi, G.B., Tayfeh-Rezaie, B. Some Indecomposable t-Designs. Designs, Codes and Cryptography 32, 235–238 (2004). https://doi.org/10.1023/B:DESI.0000029226.07366.dd

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:DESI.0000029226.07366.dd

Navigation