About enspace.net

We dedicate this site to presenting theories about enduring scientific or historical quests that require fresh examination or new attempts at resolution. We began with the enigmatic Voynich Manuscript and have since made significant progress. We have developed a key that assigns the glyphs to Aramaic letters, which we have identified as the basis for …

About enspace.net Read More »

The classes and boundaries of automation

On Computability 2 – In continuation of the previous ‘On Computability’-papers, we proceed in exploring questions like: ‘What is computability?’, ‘Where do the exact boundaries of decidability lie?’, ‘Can the complexity classes be distinctly separated?’ and present responses provided by various pioneering scientists in the field through their lemmas and theorems over the last 90 …

The classes and boundaries of automation Read More »

Chordis ad verificationem

Decoding of the VMS-application folio – In this document, we provide a comprehensive decipherment of the entire folio 57v, which contains a text specifically directed towards the scribes. The text offers guidance on various aspects, including the usage and shaping of glyphs, the meanings of rarely used glyphs and abbreviations, design considerations, spelling hints, and …

Chordis ad verificationem Read More »

Austere rules

On Computability 1B – In this document, we aim to further investigate the possible syntax of the Voynich Manuscript (VMS) by completing words containing glyphs for which we have evaluated possible mappings through previous statistical analysis. Our goal is to construct meaningful words and sentences in the plaintext. Our analysis primarily focuses on folio 57v, …

Austere rules Read More »

Syntax of a substitution cipher

On Computability 1A – In this document, we continue to deal with the topic of constraint satisfaction, which we use for pattern matching processing. In particular, we exemplarily examine the syntax of the Voynich Manuscript (VMS) to determine the most probable substitutions for the prevalent glyph patterns used in the script, assuming that the script …

Syntax of a substitution cipher Read More »

Worth of constraints

On Computability 1 – AI is increasingly capable to simulate human behaviour and reasoning in different areas. The Turing test (“imitation game” as of 1950s) proposes the interrogation of the machine intelligence by answers to written questions and the assessment if the given answers are generated by a human or a machine. Are the machine …

Worth of constraints Read More »

The place of Abaddo(w)n

Decoding of the VMS-pharmaceutical section 3 – In this decryption document, we present the plaintext of the folio 102v, lower passage, of the VMS. The text on this folio consists of 2 different passages and a number of short notes around images and on an item on the left-hand side. The lower passage consists of …

The place of Abaddo(w)n Read More »

The heartwood to be enquired

Decoding of the VMS-pharmaceutical section 2 – In this decryption document, we present the plaintext of the folio 102v, images notes, of the VMS. The text on this folio consists of 2 different passages and a number of short notes around images and on an item on the left-hand side. These notes are here the …

The heartwood to be enquired Read More »

Foundation

Decoding of the VMS-initial folio 3 – In this decryption document, we present the plaintext of the folio 1r, first passage of the VMS. The text on this folio is arranged in 4 different passages with some free spaces between them. The first passage consists of 4 lines of coded text from an external source, …

Foundation Read More »