Torsten > 27-05-2019, 07:40 PM
(26-05-2019, 10:50 PM)Emma May Smith Wrote: You are not allowed to view links. Register or Login to view.Quote:This would mean that every page has it's own topic.
Now you mention it.
nablator > 28-05-2019, 12:06 PM
(27-05-2019, 07:40 PM)Torsten Wrote: You are not allowed to view links. Register or Login to view.Keep in mind that there is also the gradual evolution from Currier A to Currier B. Moreover, tokens with high structural similarity appear preferably in close vicinity of each other. In other words, the chance that two tokens share structural similarities decreases with the distance between these two tokens.
Torsten > 28-05-2019, 12:41 PM
(28-05-2019, 12:06 PM)nablator Wrote: You are not allowed to view links. Register or Login to view.Hello Torsten,
I like the title of the article "A possible generating algorithm..." but I don't agree with the emphasis on meaningless "self-citation". Isn't it an argument from ignorance to assume that only meaningless "self-citation" is possible or probable to account for these findings? They could be explained as well by the rule of least effort in a cipher where each vord (Voynichese word) is chosen among many possibilities and reusing a vord with little or no modification is quicker than generating a completely different vord from scratch. (Exactly the type of cipher that I have been studying since 2017.)
nablator > 28-05-2019, 08:15 PM
(28-05-2019, 12:41 PM)Torsten Wrote: You are not allowed to view links. Register or Login to view.I don't know about such an argumentation. Which statement are you referring to?In the conclusion : "Why are we then convinced that the hoax hypothesis can be the only correct interpretation of the VMS?" A cipher, significantly more complex than mono-alphabetic substitution is ruled out only because of "the historical context" (1). Steganography is "not totally dismissed" but "compelling arguments against it do exist". The arguments being a rhetorical question "Why, e.g., would someone hide a genuine secret within an obviously “suspicious” book?" (2) and "high regularities of the VMS text significantly limit the maximal amount of information possibly hidden within the “container”, virtually rendering it useless." (3)
-JKP- > 28-05-2019, 08:50 PM
nablator > 28-05-2019, 09:00 PM
(28-05-2019, 08:50 PM)-JKP- Wrote: You are not allowed to view links. Register or Login to view.I think McCrone determined that the VMS ink was most likely added close to the time of the radiocarbon dating (I'm going by memory, so it might be a good idea to double-check).Yes it might be. You are not allowed to view links. Register or Login to view.
Torsten > 28-05-2019, 09:38 PM
(28-05-2019, 08:15 PM)nablator Wrote: You are not allowed to view links. Register or Login to view.In the conclusion : "Why are we then convinced that the hoax hypothesis can be the only correct interpretation of the VMS?" A cipher, significantly more complex than mono-alphabetic substitution is ruled out only because of "the historical context" (1). Steganography is "not totally dismissed" but "compelling arguments against it do exist". The arguments being a rhetorical question "Why, e.g., would someone hide a genuine secret within an obviously “suspicious” book?" (2) and "high regularities of the VMS text significantly limit the maximal amount of information possibly hidden within the “container”, virtually rendering it useless." (3)
(28-05-2019, 08:15 PM)nablator Wrote: You are not allowed to view links. Register or Login to view.1) Fair enough but the ink is not dated and it is not unconceivable that a more complex cipher was invented or derived from an existing cipher, known since antiquity, just once. A cipher/steganography/abbreviation hybrid could be designed to cover a wide range of ciphertext:plaintext ratios for variety and increased security. (I have a possible system in mind, yet unpublished).
(28-05-2019, 08:15 PM)nablator Wrote: You are not allowed to view links. Register or Login to view.2) They certainly tried hard to make it look mostly like a normal European 15th century manuscript (illustrations, glyphs imitating common Latin abbreviations) so it does not looks suspicious at first glance, not any more than any manuscript written in an unknown foreign language and script. Only those who studied all existing languages and scripts would find it suspicious, and not many people had such an encyclopedic knowledge.
(28-05-2019, 08:15 PM)nablator Wrote: You are not allowed to view links. Register or Login to view.3) Useless is a (too) strong word.
bi3mw > 31-05-2019, 09:53 AM
Quote:Thread "[Article] A possible generating algorithm of the Voynich manuscript"
The tool is used to demonstrate that by using this method it is possible to reproduce the statistical key properties of the Voynich manuscript.
MarcoP > 31-05-2019, 10:09 AM
(31-05-2019, 09:53 AM)bi3mw Wrote: You are not allowed to view links. Register or Login to view.Quote:Thread "[Article] A possible generating algorithm of the Voynich manuscript"
The tool is used to demonstrate that by using this method it is possible to reproduce the statistical key properties of the Voynich manuscript.
At least the word lengths seem to differ from the VMS ( You are not allowed to view links. Register or Login to view., Figure 3 ). The "self-citation text generator" does not produce text with the "bell-like" curve as in the VMS.
Torsten > 31-05-2019, 10:28 AM
(31-05-2019, 09:53 AM)bi3mw Wrote: You are not allowed to view links. Register or Login to view.Quote:Thread "[Article] A possible generating algorithm of the Voynich manuscript"
The tool is used to demonstrate that by using this method it is possible to reproduce the statistical key properties of the Voynich manuscript.
At least the word lengths seem to differ from the VMS ( You are not allowed to view links. Register or Login to view., Figure 3 ). The "self-citation text generator" does not produce text with the "bell-like" curve as in the VMS.