Authorship and Attribution in Early essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

A certain feeling toward propriety and morality is stamped upon our sex, which does not allow us to appear alone in public, nor without an escort. Thus how can I present my musical work, to the public with anything other than timidity. The work of any lady…can indeed arouse a degree of pity in the eyes of some experts." (Bowers and Tick, 1987)

Bowers and Tick state that many composers of this time "Reichardt, Hensel, and Schumann -- published lieder under male authorship. A few of Reichardt's early songs were included in a collection of her father's lieder, 'Duetsche Lieder' and three of Hensel's early songs "appear in each of Felix's Opus 8 and Opus 9; the 'Allegemeine musikalische Zeitung' claimed that 'An des lust'gen Brunnenes Rand' a duet composed by Fanny, is the best song in the collection" of Opus 8. Additionally three of Schumann's lieder were "included in a collection of twelve songs published under the joint names of Robert and Clara Schumann." (Bowers and Tick, 1987) So it was that women first published under the names of their father's and husbands prior to possessing the self-confidence and freedom within society to express themselves through compositions which they dared to publish in their own names.

IV. Composer Identification Based on Typical Pattern Detection

The work of Salas and Gelbukh (nd) entitled: "Musical Composer Based on Detection of Typical Patterns in a Human Composer's Style" states that the advance in informational technology and the use of computational tools "make it possible to develop models of music in order to automate composition processes and eventually build systems that automatically generate music." (nd) the following are stated to be possible applications of such systems:

(1) Creation of new styles of music by finding patterns of different styles and mixing them, helping people to compose music.

(2) Providing tools that allow the user to edit the compositions generated by the system, resulting in a user composition, but which contains patterns that great musicians create and thus, people without musical knowledge can make good music.

(3) Enabling computers have the capacity to carry out a process until now reserved for humans. Making this, machines will get human characteristics creating another way of human-machine communication.

(4) Breaking the monopoly of large music companies that currently decide what music is to be listened to.

(5) Having machinery for the generation of live music for restaurants, offices, shops, etc. with compositions created in real time by indefatigable musicians.

(6) Providing tools that allow children from a very young age to have direct contact with the process of musical composition, which according to studies stimulates the mind for better performance in all other human activities. (Salas and Gelbukh, nd)

Salas and Gelbukh state that it is very important to gain and understanding that will result in the generation "as much resemblance to the examples with which the system is trained 'when using supervised learning techniques." (Salas and Gelbukh, nd) One of the primary aspects of a melody are characteristics relating to the "pattern of the sequences of notes used for each author. These patterns of transition can be measured statistically to determine the probability of moving from one state to another in a Markov process, what can be used to generate music which reflects these patterns of transition making it similar." (Salas and Gelbukh, nd)

Salas and Gelbukh report that the evolving computerized composition systems have "proved to be a versatile tool that can be used to model various phenomena of reality. In the case of our system we have obtained satisfactory results and the opportunity to hear compositions forever different. The development of this work is open as part of an overall process of composition and will be more complete if it manages to inspire a person to engage in development of computer music." (Salas and Gelbukh, nd)

Salas and Gelbukh state that they are currently in the process of "…developing systems to improve the different sounds and effects that can be obtained, in addition to using matrices of 3, 4 or n dimensions, which may reflect the many variables involved in a musical work." (nd) Additionally stated is that Salas and Gelbukh are extremely "…interested in the development of models that can generate musical compositions that not only reflect the patterns of typical sequences of sounds, but also incorporate the emotional content of music."( Salas and Gelbukh, nd)

The work of Backer and Kranenburg (2004) entitled: "On Music Stylometry -- a Pattern Recognition Approach" reports a study of various experiments in which methods of statistical pattern recognition are applied for music style recognition and disputed musical authorship attribution" Specifically stated is that as follows:

"Values of a set of 20 features (also called "style markers") are measured in the scores of a set of compositions, mainly describing the different sonorities in the compositions. For a first study over 300 different compositions of Bach, Handel, Telemann, Mozart and Haydn were used and from this data set it was shown that even with a few features, the styles of the various composers could be separated with leave-one-out-error rates varying from 4% to 9% with the exception of the confusion between Mozart and Haydn which yielded a leave-one-out-error rate of 24%. A second experiment included 30 fugues from J.S. Bach, W.F. Bach and J.L. Krebs, all of different style and character. With this data set of compositions of undisputed authorship, the F minor fugue for organ, BWV 534 (of which Bach's authorship is disputed) then was confronted. It could be concluded that there is experimental evidence that J.L. Krebs should be considered in all probability as the composer of the fugue in question." (Backer and Kranenburg, 2004)

The work of Liu (2002) entitled: "Modeling music as Markov chains - composer identification" reports a research study in which it is posited that music "…can be thought of as random processes, and music style recognition can be thought of as a system identification problem. Then, a general framework for modeling music using Markov chains is described, and based on this framework, a two-way composer identification scheme is demonstrated." (Liu, 2002) This work reports a study in which the statistical reliability of human listening skills ensures the correct identification of the composer of a work will be examined.

Liu (2002) relate that this scheme is one that "…utilizes the Kullback-Leibler distance as the metric between distribution functions, and it is shown that under the condition when the marginals are identical, the scheme gives maximum likelihood identification." (2002)

Computational models of music styles are addressed and it is related that the steps of building a Markov chain model for a music style include the following steps:

Step 1: Define the repertoire of that style.

Step 2: Encode all the works of that repertoire.

Step 3: Define the state space that consists of musical events.

Step 4: From all the encoded works available in that repertoire, calculate the matrix of conditional event-transition probabilities.

Step 5: Let be the Markov chain corresponding to {P, S}. Call Ca a Markov chain model for that particular style of music. (2002)

According to Liu, Step 1 can be difficult because "musical styles are often of a vague notion to human beings. Is Beethoven's Moonlight Sonata classical or romantic? Here, it is supposed that the human researcher somehow clearly define the repertoire, anyway." (2002) as well, Liu state that the second step "…is not quite straightforward, either. It all depends on what musical features are relevant. Data-Entry is another practical difficulty in this step, because it takes forever if the repertoire is huge." (2002)

The third step is referred to be Liu as "huge" and one that involves "…defining an interesting prominent feature associated with that style, and quantifying that feature in a clever way. The state space consists of all the possible values to which the feature is quantified." (2002) Finally Liu state that the fourth step or the 'transmission matrix' "…is obtained by normalizing the histogram of state-transition instances in all the works of that repertoire." (2002)

Selfridge -- Field and Sapp relate that the chain models of Markov "..are built up for Mozart's and Haydn's scale degree class transitions" and that the repertoire is comprised by the following:

(1) all of their string quartets,

(2) 100 movements from Mozart and (3) 212 movements from Haydn.

(4) the scale degree is defined relative to the tonics, i.e., all works are transposed into the same key.

(5) Also, for the sake of reducing the dimensionality of transition matrix, the system does not distinguish between the same degree class at different octaves. The system does not distinguish between major keys and minor keys, either.

(6) Then, the two-way identification tests based on Kullback-Leibler distances were conducted for each of…[continue]

Some Sources Used in Document:

"ISMIR0693_Paper.pdf" 

Cite This Essay:

"Authorship And Attribution In Early" (2009, April 14) Retrieved December 10, 2016, from http://www.paperdue.com/essay/authorship-and-attribution-in-early-22962

"Authorship And Attribution In Early" 14 April 2009. Web.10 December. 2016. <http://www.paperdue.com/essay/authorship-and-attribution-in-early-22962>

"Authorship And Attribution In Early", 14 April 2009, Accessed.10 December. 2016, http://www.paperdue.com/essay/authorship-and-attribution-in-early-22962

Other Documents Pertaining To This Topic

  • Cyber Crime Malicious Activities Like Identity Theft

    Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

  • Jewish History

    Jewish history was promoted by the scribes or the Levites in early Jewish history and later on the popular educator and teachers promoted learning of the scriptures within the Jewish people so that history would be preserved however, at the time Christianity emerged this factor influenced the ancient writings in terms of how this history was related. Some of Jewish history is so ancient that it has only been related by

  • Theology Pseudoepigraphy Is a Term

    The Pastoral Epistles mention good works, as the concept of blending faith plus good works becomes embedded in Christianity ("Deutero-Pauline and Pastoral Epistles" n.d.). The concept of faith is re-framed from one of personal commitment to one of belief in core Christian dogma, a "a body of propositions," ("Deutero-Pauline and Pastoral Epistles" n.d.). Terms that were uncommon in earlier writings like "epiphany" appear in the Deutero-Pauline texts, too. Most

  • Scripture According to Christian Tradition

    " In fact, he and others instead see the gospel as a condemnation of the Jews who chose insurrection. Mark saw the choice between Barabbas and Jesus, as it was told and not necessarily as it happened, as one that symbolized the dramatic fate awaiting Jerusalem. In Greek, the technical term for such a rebel bandit is lestes, and that is exactly what Barabbas is called. He was a bandit, a

  • Psalm 94 A Message of

    This meaning would fit more with the call for vengeance in the first section of the Psalm. Verse 11 concludes this section addressing the evildoers. Like the previous section, it summarizes the passage with a declaration of the power of God and the weakness of man. At the end of the last verse, we learned that God is the source of knowledge for man. At the end of this verse,

  • Honesty in the Academic Environment

    One of the approaches being used by educators to detect instances of plagiarism is to simply type (or copy and paste) suspect phrases into a Web browser such as Google and see what matches result. Some institutions and/or individual teachers are also electing to use premium services such as TurnItIn.com for this purpose, but these services are relatively expensive and require a significant amount of time to complete their processing,

  • Strengths Weaknesses Mixed Methods Research for

    Recommended during latter phases of research projects. Recommended during earlier phases of research projects. Projects in different areas are not linear in approach. All aspects of the study are carefully designed before data is collected. The design emerges as the study unfolds. The study of a drug interaction in x population is different than a study of language variation in y population. Researcher uses tools, such as questionnaires or equipment to collect numerical data. Researcher is the


Read Full Essay
Copyright 2016 . All Rights Reserved