366 resultados para Computer music
Resumo:
Musical value cannot be experienced without direct knowledge of music, and engagement with the interactive elements of materials, expressive character and structure. Through these channels something is communicated, something is transmitted, some residue of ‘meaning’ is left with us. When a work of art stirs us it is more than simply sensory stimulation or some kind of emotional indulgence. We are gaining knowledge and expanding our experience... contributing to knowledge of ourselves and of the world.
Resumo:
In this article I would like to examine the promise and possibilities of music, digital media and National Broadband Network. I will do this based on concepts that have emerged from a study undertaken by Professor Andrew Brown and I that categorise technologies into what we term representational technologies and technologies with agency
Resumo:
The use of Cellular Automata (CA) for musical purposes has a rich history. In general the mapping of CA states to note-level music representations has focused on pitch mapping and downplayed rhythm. This paper reports experiments in the application of one-dimensional cellular automata to the generation and evolution of rhythmic patterns. A selection of CA tendencies are identified that can be used as compositional tools to control the rhythmic coherence of monophonic passages and the polyphonic texture of musical works in broad-brush, rather than precisely deterministic, ways. This will provide the composer and researcher with a clearer understanding of the useful application of CAs for generative music.
Resumo:
“Turtle Twilight” is a two-screen video installation. Paragraphs of text adapted from a travel blog type across the left-hand screen. A computer-generated image of a tropical sunset is slowly animated on the right-hand screen. The two screens are accompanied by an atmospheric stock music track. This work examines how we construct, represent and deploy ‘nature’ in our contemporary lives. It mixes cinematic codes with image, text and sound gleaned from online sources. By extending on Nicolas Bourriad’s understanding of ‘postproduction’ and the creative and critical strategies of ‘editing’, it questions the relationship between contemporary screen culture, nature, desire and contemplation.
Resumo:
This study aimed to examine the effects on driving, usability and subjective workload of performing music selection tasks using a touch screen interface. Additionally, to explore whether the provision of visual and/or auditory feedback offers any performance and usability benefits. Thirty participants performed music selection tasks with a touch screen interface while driving. The interface provided four forms of feedback: no feedback, auditory feedback, visual feedback, and a combination of auditory and visual feedback. Performance on the music selection tasks significantly increased subjective workload and degraded performance on a range of driving measures including lane keeping variation and number of lane excursions. The provision of any form of feedback on the touch screen interface did not significantly affect driving performance, usability or subjective workload, but was preferred by users over no feedback. Overall, the results suggest that touch screens may not be a suitable input device for navigating scrollable lists.
Resumo:
Internet and computer addiction has been a popular research area since the 90s. Studies on Internet and computer addiction have usually been conducted in the US, and the investigation of computer and Internet addiction at different countries is an interesting area of research. This study investigates computer and Internet addiction among teenagers and Internet cafe visitors in Turkey. We applied a survey to 983 visitors in the Internet cafes. The results show that the Internet cafe visitors are usually teenagers, mostly middle and high-school students and usually are busy with computer and Internet applications like chat, e-mail, browsing and games. The teenagers come to the Internet cafe to spend time with friends and the computers. In addition, about 30% of cafe visitors admit to having an Internet addiction, and about 20% specifically mention the problems that they are having with the Internet. It is rather alarming to consider the types of activities that the teenagers are performing in an Internet cafe, their reasons for being there, the percentage of self-awareness about Internet addiction, and the lack of control of applications in the cafe.
Resumo:
A broad range of positions is articulated in the academic literature around the relationship between recordings and live performance. Auslander (2008) argues that “live performance ceased long ago to be the primary experience of popular music, with the result that most live performances of popular music now seek to replicate the music on the recording”. Elliott (1995) suggests that “hit songs are often conceived and produced as unambiguous and meticulously recorded performances that their originators often duplicate exactly in live performances”. Wurtzler (1992) argues that “as socially and historically produced, the categories of the live and the recorded are defined in a mutually exclusive relationship, in that the notion of the live is premised on the absence of recording and the defining fact of the recorded is the absence of the live”. Yet many artists perform in ways that fundamentally challenge such positions. Whilst it is common practice for musicians across many musical genres to compose and construct their musical works in the studio such that the recording is, in Auslander’s words, the ‘original performance’, the live version is not simply an attempt to replicate the recorded version. Indeed in some cases, such replication is impossible. There are well known historical examples. Queen, for example, never performed the a cappella sections of Bohemian Rhapsody because it they were too complex to perform live. A 1966 recording of the Beach Boys studio creation Good Vibrations shows them struggling through the song prior to its release. This paper argues that as technology develops, the lines between the recording studio and live performance change and become more blurred. New models for performance emerge. In a 2010 live performance given by Grammy Award winning artist Imogen Heap in New York, the artist undertakes a live, improvised construction of a piece as a performative act. She invites the audience to choose the key for the track and proceeds to layer up the various parts in front of the audience as a live performance act. Her recording process is thus revealed on stage in real time and she performs a process that what would have once been confined to the recording studio. So how do artists bring studio production processes into the live context? What aspects of studio production are now performable and what consistent models can be identified amongst the various approaches now seen? This paper will present an overview of approaches to performative realisations of studio produced tracks and will illuminate some emerging relationships between recorded music and performance across a range of contexts.
Resumo:
This paper examines the integration of computing technologies into music education research in a way informed by constructivism. In particular, this paper focuses on an approach established by Jeanne Bamberger, which the author also employs, that integrates software design, pedagogical exploration, and the building of music education theory. In this tradition, researchers design software and associated activities to facilitate the interactive manipulation of musical structures and ideas. In short, this approach focuses on designing experiences and tools that support musical thinking and doing. In comparing the work of Jean Bamberger with that of the author, this paper highlights and discusses issues of significance and identifies lessons for future research.
Resumo:
Sound Thinking provides techniques and approaches to critically listen, think, talk and write about music you hear or make. It provides tips on making music and it encourages regular and deep thinking about music activities, which helps build a musical dialog that leads to deeper understanding.
Resumo:
Across post-industrial societies worldwide, the creative industries are increasingly seen as a key economic driver. These industries - including fields as diverse as advertising, art, computer games, crafts, design, fashion, film, museums, music, performing arts, publishing, radio, theatre and TV - are built upon individual creativity and innovation and have the potential to create wealth and employment through the mechanism of intellectual property. Creative Industries: Critical Readings brings together the key writings - drawing on both journals and books - to present an authoritative and wide-ranging survey of this emerging field of study. The set is presented with an introduction and the writings are divided into four volumes, organized thematically: Volume 1: Concepts - focuses on the concept of creativity and the development of government and industry interest in creative industries; Volume 2: Economy - maps the role and function of creative industries in the economy at large; Volume 3: Organization - examines the ways in which creative institutions organize themselves; and Volume 4: Work - addresses issues of creative work, labour and careers This major reference work will be invaluable to scholars in economics, cultural studies, sociology, media studies and organization studies.
Resumo:
In 2001 China amended its copyright law in accordance with the requirements of the Agreement on Trade Related Aspects of Intellectual Property (TRIPS). This thesis explores the impact of copyright reform on China’s domestic film and music industries. Through extensive interviews with film and music industry workers – directors, producers, executives, judges, lawyers and musicians – it investigates the role of copyright in film and music’s shift from state driven to commercially focussed. The construction and negotiation of a new ‘copyright culture’ in China is examined through the lens of Yurchak’s (1999) concept of ‘entrepreneurial governmentality.’ Administrative structures put in place prior to China’s economic reform are no longer capable of controlling film and music production and consumption and new approaches to managing it are becoming more important. High levels of unauthorised distribution are forcing these industries to adapt their business models so that they can function in a system with weak copyright protection. Legal, economic and political changes have resulted in the emergence of an ‘entrepreneurial governmentality’ among film and music industry professionals. This commercially focussed group is, in turn, increasing pressure on the state to expand the space in which it can function and support efforts to strengthen the copyright system that allows it to exist. It is suggested that the construction and negotiation of a new ‘copyright culture’ is now taking place. This thesis describes the current situation in the film and music industries. It examines the tension between the theoretical possibilities created by copyright law, and the practical challenges of operating in China. It observes innovative business models being applied by film and music businesses in China. It discusses the impact of traditional attitudes to copying and also examines the role that open licensing models might play in helping limit the negative effects of copyright protection on public access to content and in raising levels of education about copyright among key groups within the community.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
At St Thomas' Hospital, we have developed a computer program on a Titan graphics supercomputer to plan the stereotactic implantation of iodine-125 seeds for the palliative treatment of recurrent malignant gliomas. Use of the Gill-Thomas-Cosman relocatable frame allows planning and surgery to be carried out at different hospitals on different days. Stereotactic computed tomography (CT) and positron emission tomography (PET) scans are performed and the images transferred to the planning computer. The head, tumour and frame fiducials are outlined on the relevant images, and a three-dimensional model generated. Structures which could interfere with the surgery or radiotherapy, such as major vessels, shunt tubing etc., can also be outlined and included in the display. Catheter target and entry points are set using a three-dimensional cursor controlled by a set of dials attached to the computer. The program calculates and displays the radiation dose distribution within the target volume for various catheter and seed arrangements. The CT co-ordinates of the fiducial rods are used to convert catheter co-ordinates from CT space to frame space and to calculate the catheter insertion angles and depths. The surgically implanted catheters are after-loaded the next day and the seeds left in place for between 4 and 6 days, giving a nominal dose of 50 Gy to the edge of the target volume. 25 patients have been treated so far.
Resumo:
This paper presents two case studies of marginalised youth experimenting with digital music production in flexible education settings. The cases were drawn from a three-year study of alternative assessment in flexible learning centres that enrol 650+ students who have left formal schooling in Queensland, Australia. The cases are framed in reference to the literature on cultural studies approaches to education and the digital arts. Each case describes the student’s histories, cultural background and experiences, music productions, evidence of learning and re-engagement with education. Findings document how digital music production can re-engage and extend participation among students who have left formal education. They do so by theorising the online judgements and blog comments about the digital music production as a social field of exchange. It also raises critical questions about the adequacy of current approaches to evaluating and accounting for the learning and development of such youth, especially where this has occurred through creative arts and digital production.
Resumo:
In this video, a thumping house-music track is accompanied by lines of rotating text, which resemble computer screen-savers. The text is sourced from websites offering tips for dating and seducing potential lovers. This work engages with the language of online forums. It reworks text from online advice forums and mixes them with visual codes of computer graphics. By extending on some of Nicolas Bourriaud’s ideas around ‘postproduction’ and the creative and critical strategies of ‘editing’, it offers new speculative perspectives on the relationship between screen realities, desire and romance.