Torsten > 12-07-2025, 12:42 AM
(07-07-2025, 09:34 AM)Jorge_Stolfi Wrote: You are not allowed to view links. Register or Login to view.In their argument T&T implicitly or explicitly assume that Prob(A|not H) is practically zero; that is, they assume that a manuscript that is not a hoax cannot have the "context-dependent repetitions" that they observed -- because they did not observe them in a few other non-hoax books that they analyzed. Conversely they claim that Prob(A|H) is much higher, because the hypothetical forger may well have generated the VMS using a method, like the SCM, that accidentally created such repetitions.
(07-07-2025, 09:34 AM)Jorge_Stolfi Wrote: You are not allowed to view links. Register or Login to view.I don't see the SCM as a plausible answer to that question. The "self-citation" part is relatively easy to execute, but does not seem to be a natural choice for the hypothetical forger, and would require a non-trivial "warm-up" period to create a stable seed text that could then be used to start the VMS. But the "mutation" part of the SCM would require generating several coin tosses, with non-uniform probabilities, at each word. And these probabilities would have to be finely tuned in order to generate the proper Zipf plot and other "natural" properties.
Quote:"We deliberately did not fine-tune the algorithm to pick an 'optimal' sample for this presentation. Such a strategy is by itself questionable. Nevertheless, an exhaustive scan of the parameter space (involving thousands of automatically analyzed text samples) verified the overall stability of the proposed algorithm. About 10-20% of the parameter space even yields excellent numerical conformity (≤ 10% relative error) with all considered key features of the real VMS text (entropy values, random walk exponents, token length distribution, etc.).
nablator > Yesterday, 01:06 PM
(05-07-2025, 10:19 AM)oshfdk Wrote: You are not allowed to view links. Register or Login to view.This scheme is a pain to encode/decode, and I guess it's much more complicated than the actual cipher of the Voynich manuscript, but it shows that in principle it doesn't take advanced tech to encode text via self-citation.