(05-06-2019, 04:56 AM)ReneZ Wrote: You are not allowed to view links. Register or Login to view.I did not want ...
Please note, that we use the algorithm to create a "facsimile" of the VMS "Recipes" section. We keep the algorithm as simple as possible to demonstrate that even with a simple implementation it is possible to reproduce the intriguing key properties of the original text, including the presence of long-range correlations, the "binomial-like" word length distribution, and both of Zipf’s laws (You are not allowed to view links.
Register or
Login to view., p. 2).
You say that modifications are not at all arbitrary. Indeed, we describe rules as "Replace one ore more glyphs by similar ones", "Add or remove a prefix" and "Combine two source words to create a new word" to modify tokens (You are not allowed to view links.
Register or
Login to view., p. 10).
We also explain the reason for the word patterns (You are not allowed to view links.
Register or
Login to view., p. 10f). On page 10 two reasons are explained. One reason is that a glyph in the VMS is used because of its shape. "The shape of a glyph must be compatible with the shape of the previous one and is also influenced by its position within a word or a line" (You are not allowed to view links.
Register or
Login to view., p. 10).
You also give some examples of repeated elements that are easy to spot. This examples confirm local repetition and that glyphs are used because of there shape. They are in fact evidence in favor of the self-citation hypothesis.
Every time the scribe was starting a new (empty) page it was necessary to initialize the self-citation method by generating an initial line. To generate the first token it would be possible to use another page as source. Moreover, a source token from a different context was also used for the initial token of a paragraph (see You are not allowed to view links.
Register or
Login to view., p. 16). The scribe was also using additional gallow glyphs in order to generate unique tokens within the first line of a paragraph (You are not allowed to view links.
Register or
Login to view., p. 26ff)
This is confirmed by two patterns:
- In 86 % the start of a paragraph is highlighted by a gallow glyph. This confirms that a glyph is used because of its shape (see chapter 8 "The line as a functional entity" in You are not allowed to view links.
Register or
Login to view., p. 18)
- That the paragraph-initial characters become repeated within the first line confirms local repetition and the rule that it is possible to replace a glyph by similar ones (see chapter 10 The paragraph as a functional entity in You are not allowed to view links.
Register or
Login to view., p. 26ff).
"The first and the last word in each line are easy to spot, the most obvious way is to pick them as a source for the generation of a group at the beginning or at the end of a line" (You are not allowed to view links.
Register or
Login to view., p. 19). It is therefore expected for the self-citation method that some line initial and line final repetition occur.
- The first group in a line usually has a prefix like <y> and <o> or <d> and <s>. Since <y> is similar to <o> and <d> is similar to <s> this is another example of local repetition for similar glyphs (see chapter 8 "The line as a functional entity" in You are not allowed to view links.
Register or
Login to view. p. 19ff).
- On pages like f1r/f1v, f2r/f2v, f4r/f4v, ... Eva-m is rarely used, on pages like f3r/f3v and f6r/f6v Eva-m is used word final and only later Eva-m becomes line final (see You are not allowed to view links.
Register or
Login to view.). On page You are not allowed to view links.
Register or
Login to view. even paragraph initial words like <tsheoarom> and <pcheoldom> contain Eva-m. This observation confirms local repetition and also that a glyph is used because of its shape (see chapter 8 "The line as a functional entity" in You are not allowed to view links.
Register or
Login to view., p. 19).
You argue that not much arbitrariness is left. In fact we demonstrate that tokens depend on their position to similar tokens (see You are not allowed to view links.
Register or
Login to view., p. 2ff). But words in a 'code' vocabulary, a synthetic language or characters in a script didn't depend on each other. They depend on something that shouldn't be visible. They should depend on the meaning they are carrying! The high regularities of the VMS text is therefore our key argument for a meaningless text (You are not allowed to view links.
Register or
Login to view., p. 17).
For the gradual evolution of a single system from Currier A to Currier B see You are not allowed to view links.
Register or
Login to view. (p. 7) and also You are not allowed to view links.
Register or
Login to view. (p. 25). It is expected for the self-citation method that spelling variants invented while writing did not appear on pages already completed. This leads to the conclusion that the pages using Currier B were written after the pages in Currier A (You are not allowed to view links.
Register or
Login to view., p. 25).