5 research outputs found

    The Language and Writing System of MS408 (Voynich) Explained

    Get PDF

    Analysis of Ancient Dialects Using Artificial Intelligence in Relation to Voynich's Manuscript

    Get PDF
    Diplomová práce je zaměřena na částečnou analýzu jednoho z nejzáhadnějších děl všech dob, nazývaného Voynichův rukopis. První část bude věnována samotnému popisu knihy a bude zde ukázáno několik pokusů různých badatelů a vědců o získání užitečné informace z textu nebo vlastností jazyka. Druhá část je věnována vlastní analýze. Bude zjišťována podobnost Voynichova rukopisu s různými jinými spisy pomocí centralit. Rovněž bude provedena analýza pomocí neuronových sítí a následná vizualizace podobnosti písmen. Analýzy budou prováděny v programovacím jazyce Python.The diploma thesis is focused on a partial analysis of one of the most mysterious works of all time, called Voynich’s Manuscript. The first part will be devoted to the description of the book itself and will show several attempts by various researchers and scientists to obtain useful information from the text or properties of the language. The second part is devoted to the analysis itself. The similarity of Voynich’s manuscript with various other writings will be determined with the help of centralities. Neural network analysis and subsequent visualization of letter similarity will also be performed. The analyzes will be performed in the programming language Python.460 - Katedra informatikyvelmi dobř

    Mathematical Modelling in Engineering & Human Behaviour 2018

    Get PDF
    This book includes papers in cross-disciplinary applications of mathematical modelling: from medicine to linguistics, social problems, and more. Based on cutting-edge research, each chapter is focused on a different problem of modelling human behaviour or engineering problems at different levels. The reader would find this book to be a useful reference in identifying problems of interest in social, medicine and engineering sciences, and in developing mathematical models that could be used to successfully predict behaviours and obtain practical information for specialised practitioners. This book is a must-read for anyone interested in the new developments of applied mathematics in connection with epidemics, medical modelling, social issues, random differential equations and numerical methods

    A Study in Authenticity : Admissible Concealed Indicators of Authority and Other Features of Forgeries : A Case Study on Clement of Alexandria, Letter to Theodore, and the Longer Gospel of Mark

    Get PDF
    A standard approach in historically minded disciplines to documents and other artefacts that have become suspect is to concentrate on their dissimilarities with known genuine artefacts. While such an approach works reasonably well with relatively poor forgeries, more skilfully done counterfeits have tended to divide expert opinions, demanding protracted scholarly attention. As there has not been a widespread scholarly consensus on a constrained set of criteria for detecting forgeries, a pragmatic maximum for such dissimilarities—as there are potentially an infinite numbers of differences that can be enumerated between any two artefacts—has been impossible to set. Thus, rather than relying on a philosophically robust critical framework, scholars have been accustomed to approaching the matter on a largely case-by-case basis, with a handful of loosely formulated rules for guidance. In response to these shortcomings, this dissertation argues that a key characteristic of inquiry in historically minded disciplines should be the ability to distinguish between knowledge-claims that are epistemically warranted—i.e., that can be asserted post hoc from the material reality they have become embedded in with reference to some sort of rigorous methodological framework—and knowledge-claims that are not. An ancient letter by Clement of Alexandria (ca. 150–215 CE) to Theodore, in which two passages from the Longer Gospel of Mark (also known as the Secret Gospel of Mark) are quoted, has long been suspected of having been forged by Morton Smith (1915–1991), its putative discoverer. The bulk of this dissertation consists of four different articles that each use different methodological approaches. The first, a discourse analysis on scholarly debate over the letter’s authenticity, illuminates the reasons behind its odd character and troubled history. Second, archival research unearths how data points have become corrupted through unintended additions in digital-image processing (a phenomenon labelled line screen distortion here). Third, a quantitative study of the handwriting in Clement’s Letter to Theodore shows the inadequacy of unwittingly applying palaeographic standards in cases of suspected deceptions compared to the standards adhered to in forensic studies. Additionally, Smith’s conduct as an academic manuscript hunter is found to have been consistent with the standard practices of that profession. Finally, a study of the conceptual distinctions and framing of historical explanations in contemporary forgery discourse reveals the power of the methodologic approach of WWFD (What Would a Forger Do?), which has recently been used in three varieties (unconcealed, concealed, and hyperactive) to construe suspected documents as potential forgeries—despite its disregard of justificatory grounding in favour of coming up with free-form, first-person narratives in which the conceivable functions as its own justification. Together, the four articles illustrate the pitfalls of scholarly discourse on forgeries, especially that surrounding Clement’s Letter to Theodore. The solution to the poor argumentation that has characterized the scholarly study of forgeries is suggested to be an exercise in demarcation: to decide (in the abstract) which features should be acceptable as evidence either for or against the ascription of the status of forgery to an historical artefact. Implied within this suggestion is the notion of constraint, i.e., such that a constrained criterion would be one that cannot be employed to back up both an argument and its counter-argument. A topical case study—a first step on the road to creating a rigorous standard for constrained criteria in determining counterfeits—is the alternative narrative of an imagined creation of Clement’s Letter to Theodore by Smith around the time of its reported discovery (1958). Concealed indicators of authority, or the deliberate concealment of authorial details within the forged artefact by the forger, is established as a staple of the literary strategy of mystification, and their post hoc construction as acceptable evidence of authorship is argued to follow according to criteria: 1) that the beginning of the act of decipherment of a concealed indicator of authority has to have been preceded by a literary primer that is unambiguous to a high degree, 2) that, following the prompting of the literary primer, the act of deciphering a concealed indicator of authority has to have adhered to a technique or method that is unambiguous to a high degree, and 3) that, following the prompting of the literary primer and the act of decipherment, both of which must have been practiced in an unambiguous manner to a high degree, the plain-text solution to the concealed indicator of authority must likewise be unambiguous to a high degree.Tässä väitöskirjassa tarkastellaan Klemens Aleksandrialaisen (n. 150-215 jaa.) kirjettä Theodorokselle, joka sisältää Salaisen Markuksen evankeliumin nimellä tunnettuja tekstikatkelmia. Näissä katkelmissa, jotka eivät sisälly kanonisoituun Uuteen testamenttiin, Jeesus mm. herättää nuorukaisen kuolleista ja opettaa tälle Jumalan valtakunnan salaisuuden. Klemensin kirje todistaa laajemmin kristinuskon varhaisvaiheen moninaisuudesta, mutta sitä on myös epäilty väärennökseksi. Historiallisten väärennösten tunnistamiseen ei ole löytynyt yleisesti hyväksyttyä metodia. Historiantutkijat ovat joutuneet arvioimaan epäiltyjä väärennöksiä tapauskohtaisesti, ja taidokkaasti toteutetut väärennökset johtavatkin usein pitkään ja kiivaaseen keskusteluun. Väitöskirjan ytimen muodostavat neljä artikkelia, joissa tarkastellaan Klemensin kirjettä eri näkökulmista ja kuvataan myös yleisemmin historiallisten väärennösten paljastamiseen liittyviä sudenkuoppia. Ensimmäinen artikkeli kuvaa diskurssianalyysin keinoin väärennösväitteistä käytyä sananvaihtoa, jota leimaa puhuminen toisten tutkijoiden ohi ja yli. Toinen ja kolmas artikkeli analysoivat Klemensin kirjeen käsialaa. Ne paljastavat, että digitaalinen kuvankäsittely on tahattomasti muokannut käsialan yksityiskohtia. Vertailuaineisto osoittaa, ettei Klemensin kirjeen käsiala sisällä "väärentäjän vapinaa" tai muita yleisiä väärennöksen tuntomerkkejä. Neljäs artikkeli tarkastelee ja problematisoi tutkijoiden tapaa perustella väärennösväitteitä luomalla kuvitteellisia tarinoita, joilla selitetään väärennöksien yksityiskohtien syntymistä. Väitöskirjassa ehdotetaan, että historiallisten väärennösten paljastamiseen täytyy kehittää vankka tieteellinen viitekehys. Väitöskirjan yhteenvetoluvussa otetaan tähän ensimmäinen askel tarkastelemalla, kuinka autenttisuuden kysymystä on lähestytty mm. kirjallisuustieteen alalla. Yhteenvetoluvussa analysoidaan mystifikaatiolle (kirjallinen genre) tyypillistä tapaa piilottaa "kätkettyjä tekijyyden indikaattoreita" väärennöksiin. Analyysin perusteella todetaan, että aiemmin tutkijat ovat saattaneet langeta kehittelemään villejä väärennösteorioita erilaisten kuviteltujen vihjeiden ja salakirjoitusten pohjalta. Jotta vältytään tämänkaltaiselta "kryptoanalyyttiseltä hyperaktiivisuudelta," tarvitaan "kätkettyjen tekijyyden indikaattoreiden" käytölle kriteerejä. Ehdotettujen kriteerien mukaan ainoastaan sellaiset "kätketyt tekijyyden indikaattorit" voidaan hyväksyä todellisiksi, joiden 1) olemassaoloon viitataan yksiselitteisesti, joiden 2) purkaminen tapahtuu yksiselitteisellä metodilla ja jotka 3) nimeävät tekijän yksiselitteisellä tavalla

    The Cryptographic Imagination

    Get PDF
    Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing—his essays on cryptography and the short stories that grew out of them—requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a "secret history" of literary modernity itself. "Both postwar fiction and literary criticism," the author writes, "are deeply indebted to the rise of cryptography in World War II." Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's "The Dancing-Men" or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being. "The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production—the diacritical relationship between decoding and encoding—that the literary imagination dissimulates as hieroglyphics—the hermeneutic relationship between a sign and its content."—Donald E. Pease, Dartmouth Colleg
    corecore