Low-latency f0 estimation for the finger plucked electric bass guitar using absolute difference function

Author(s):  
Márcio Ferreira Rocha
2020 ◽  
Vol 27 (4) ◽  
pp. 79-94
Author(s):  
Christhian Henrique Gomes Fonseca ◽  
Tiago Tavares

Audio-to-MIDI conversion can be used to allow digital musical control through an analog instrument. Audio-to-MIDI converters rely on fundamental frequency estimators that are usually restricted to a minimum delay of two fundamental periods. This delay is perceptible for the case of bass notes. In this dissertation, we propose a low-latency fundamental frequency estimation method that relies on specific characteristics of the electric bass guitar. By means of physical modeling and signal  acquisition, we show that the assumptions of this method are based on the generalization of all electric basses. We evaluated our method in a dataset with musical notes played by diverse bassists. Results show that our method outperforms the Yin method in low-latency settings, which indicates its suitability for low-latency audio-to-MIDI conversion of the electric bass sound.


2019 ◽  
Author(s):  
Christhian Fonseca ◽  
Tiago Tavares

Audio-to-MIDI conversion can be used to allow digital musical control by means of an analog instrument. Audio-to-MIDI converters rely on fundamental frequency estimators that are frequently restricted to a minimum delay of two fundamental periods. This delay is perceptible for the case of bass notes. In this paper, we propose a lowlatency fundamental frequency estimation method that relies on specific characteristics of the electric bass guitar. By means of physical modelling and signal acquisition, we show that the assumptions of the method relies on generalize throughout electric basses. We evaluate our method in a dataset with musical notes played by diverse bassists. Results show that our method outperforms the Yin method in low-latency settings, which indicates its suitability for low-latency audio-to-MIDI conversion of the electric bass sound.


2020 ◽  
Vol 32 (3) ◽  
pp. 121-138
Author(s):  
Brian F. Wright

This article explores Jaco Pastorius’s efforts to legitimize himself as a jazz electric bassist. Even though the instrument had existed at the margins of jazz for decades, by the 1970s it was overwhelmingly associated with rock and funk music and therefore carried with it the stigmatized connotations of outsider status. Building on the work of Bill Milkowski, Kevin Fellezs, Lawrence Wayte, and Peter Dowdall, I situate Pastorius’s career within the broader context of 1970s jazz fusion. I then analyze how he deliberately used his public persona, his virtuosic technical abilities, the atypical timbre of his fretless electric bass, and his work as a composer and bandleader to vie for acceptance within the jazz tradition. As I argue, Pastorius specifically attempted to establish his jazz credibility through his first two solo albums, initially by disassociating himself from his own instrument, and then by eventually abandoning the musical style that had made him famous. Ultimately, Pastorius’s story serves as a useful case study of the tangible ramifications of authenticity disputes and the complicated ways in which musicians have attempted to navigate contested musical spaces within popular music.


2020 ◽  
Vol 140 (12) ◽  
pp. 1297-1306
Author(s):  
Shu Takemoto ◽  
Kazuya Shibagaki ◽  
Yusuke Nozaki ◽  
Masaya Yoshikawa

2015 ◽  
Vol E98.C (4) ◽  
pp. 333-339 ◽  
Author(s):  
Go MATSUKAWA ◽  
Yohei NAKATA ◽  
Yasuo SUGURE ◽  
Shigeru OHO ◽  
Yuta KIMI ◽  
...  

Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Sign in / Sign up

Export Citation Format

Share Document