Nicholas Smith presented his graduate research project CombinoChord, which uses a heuristic algorithm to generate guitar chord fingerings based on parameters like the guitar's configuration, tuning, and a player's hand size. The project aims to find chords within 5 seconds for normal guitars. It models the fretboard and hand, considers factors like sound quality and anatomical distance in a heuristic function, and implements techniques like preprocessing, filtering, and multi-threading to improve performance. The Android app allows customizing parameters and searches chords in under 400ms on typical guitars, meeting the project's timing goals.
El documento describe los pasos del proceso de investigación ietisd 2012, el cual incluye la conformación de equipos de trabajo, la identificación de 40 problemas a través de una lluvia de ideas, la aplicación de 5 criterios para valorar los problemas, la selección de una pregunta reina, y el refinamiento de la pregunta de investigación. Luego, se detallan los pasos que incluyen el diseño de la investigación, la construcción de un artefacto, y la participación en ferias tecnológicas.
The document discusses various storage media including hard drives, floppy disks, tape, Zip disks, CDs, DVDs, Blu-ray discs, USB flash drives, memory cards, and solid state drives. It provides details on the capabilities, uses, advantages and limitations of each type of storage medium. The key points are that storage media are any devices or materials used to store data, and range from internal hard drives to removable options like disks, cards, and drives that allow transferring and sharing data between computers or other devices.
The document summarizes the most dangerous places on the web according to threat levels. It discusses email inboxes, video download sites, websites using Flash, social networks, ad-supported sites, Twitter, search engines, downloaded PDF files, hacked legitimate sites, fake anti-virus programs, torrent sites, and provides tips for staying safe online such as keeping software updated, using passwords wisely, and backing up data regularly. The overall message is to be cautious of links, attachments, and downloads from untrusted sources that could enable malware infections or data theft.
Yashwanth H.N. is a mechanical engineer currently working at QuEST Global Pvt Ltd as an engineer in turbine subsystem. He has over 5 years of experience in the aerospace industry modeling engine parts and conducting design optimization. His skills include CAD software such as CATIA and NX, technical report writing, and knowledge of gas turbine engines and design. He holds a Bachelor's degree in Mechanical Engineering and has worked on projects involving compressor and turbine blade design, cooling effectiveness optimization, and compressed air generation systems.
The document discusses how entrepreneurs are increasingly tackling issues traditionally handled by governments. It argues that government failures and inefficiencies create opportunities for entrepreneurs to address problems more flexibly. Entrepreneurs use tools like lean startup approaches, effectuation theory, open innovation, and crowdfunding to solve issues in innovative ways. While entrepreneurs have advantages over governments in opportunity recognition and flexibility, collaborations between entrepreneurs and governments could maximize their respective strengths and generate the greatest positive social impact.
The document summarizes the history and evolution of removable storage technologies from paper tape in the 1700s to modern USB thumb drives. It describes early technologies like punched cards, cassette tapes, floppy disks of various sizes, portable hard drives, Zip drives, and optical discs. Key points included the increasing storage capacities over time, from kilobytes to megabytes to gigabytes, as well as the advantages and disadvantages of each technology as newer options emerged.
Este documento describe los glaciares, incluyendo su definición como un cuerpo permanente de hielo, cómo se forman a través de la acumulación, compactación y recristalización de la nieve, y los diferentes tipos como glaciares alpinos, de montaña, de desbordamiento, de piedemonte y continentales. También explica los casquetes polares que cubren grandes áreas en los polos norte y sur, con el casquete polar ártico cubriendo Groenlandia y el océano Ártico, y el casquete polar antá
El documento describe los pasos del proceso de investigación ietisd 2012, el cual incluye la conformación de equipos de trabajo, la identificación de 40 problemas a través de una lluvia de ideas, la aplicación de 5 criterios para valorar los problemas, la selección de una pregunta reina, y el refinamiento de la pregunta de investigación. Luego, se detallan los pasos que incluyen el diseño de la investigación, la construcción de un artefacto, y la participación en ferias tecnológicas.
The document discusses various storage media including hard drives, floppy disks, tape, Zip disks, CDs, DVDs, Blu-ray discs, USB flash drives, memory cards, and solid state drives. It provides details on the capabilities, uses, advantages and limitations of each type of storage medium. The key points are that storage media are any devices or materials used to store data, and range from internal hard drives to removable options like disks, cards, and drives that allow transferring and sharing data between computers or other devices.
The document summarizes the most dangerous places on the web according to threat levels. It discusses email inboxes, video download sites, websites using Flash, social networks, ad-supported sites, Twitter, search engines, downloaded PDF files, hacked legitimate sites, fake anti-virus programs, torrent sites, and provides tips for staying safe online such as keeping software updated, using passwords wisely, and backing up data regularly. The overall message is to be cautious of links, attachments, and downloads from untrusted sources that could enable malware infections or data theft.
Yashwanth H.N. is a mechanical engineer currently working at QuEST Global Pvt Ltd as an engineer in turbine subsystem. He has over 5 years of experience in the aerospace industry modeling engine parts and conducting design optimization. His skills include CAD software such as CATIA and NX, technical report writing, and knowledge of gas turbine engines and design. He holds a Bachelor's degree in Mechanical Engineering and has worked on projects involving compressor and turbine blade design, cooling effectiveness optimization, and compressed air generation systems.
The document discusses how entrepreneurs are increasingly tackling issues traditionally handled by governments. It argues that government failures and inefficiencies create opportunities for entrepreneurs to address problems more flexibly. Entrepreneurs use tools like lean startup approaches, effectuation theory, open innovation, and crowdfunding to solve issues in innovative ways. While entrepreneurs have advantages over governments in opportunity recognition and flexibility, collaborations between entrepreneurs and governments could maximize their respective strengths and generate the greatest positive social impact.
The document summarizes the history and evolution of removable storage technologies from paper tape in the 1700s to modern USB thumb drives. It describes early technologies like punched cards, cassette tapes, floppy disks of various sizes, portable hard drives, Zip drives, and optical discs. Key points included the increasing storage capacities over time, from kilobytes to megabytes to gigabytes, as well as the advantages and disadvantages of each technology as newer options emerged.
Este documento describe los glaciares, incluyendo su definición como un cuerpo permanente de hielo, cómo se forman a través de la acumulación, compactación y recristalización de la nieve, y los diferentes tipos como glaciares alpinos, de montaña, de desbordamiento, de piedemonte y continentales. También explica los casquetes polares que cubren grandes áreas en los polos norte y sur, con el casquete polar ártico cubriendo Groenlandia y el océano Ártico, y el casquete polar antá
Condition Assessment of Concrete Bridge Elements using Active IR ThermographyJason Cattelino
Active infrared thermography can effectively detect concrete deterioration like delamination. Laboratory testing validated its use and identified factors like defect depth and heat time. A field test on a bridge found it suitable for underside deck scanning and detecting areas needing repair. Implementation could involve lower-cost cameras, automated analysis, and a pilot bridge inspection program to further evaluate the technique.
In this paper, we develop a vision of software evolution based
on a feature-oriented perspective. From the fact that features
provide a common ground to all stakeholders, we derive a
hypothesis that changes can be eectively managed in a
feature-oriented manner. Assuming that the hypothesis holds,
we argue that feature-oriented software evolution relying
on automatic traceability, analyses, and recommendations
reduces existing challenges in understanding and managing
evolution. We illustrate these ideas using an automotive
example and raise research questions for the community.
This document summarizes a laboratory seminar that presented a vision-based method for detecting uncut crop edges to guide a combine harvester. The presentation discussed materials and methods, including the experimental setup, inverse perspective mapping, color space transformation, and the uncut crop edge detection algorithm. It provided results from testing the method on different crop fields, showing a success rate of 97% across 2500 frames. Challenges included detecting edges in shadows and random crop patterns. The method performed image processing at 33ms per frame.
This document provides a summary of a systems engineering update presentation given to the International Council on Systems Engineering Colorado Front Range Chapter. It discusses:
1) The evolution of systems engineering from early space programs like Sputnik and Mercury through modern programs like the International Space Station.
2) An example case study of the Wake Shield Facility and the systems engineering approaches used in its development.
3) Recent government experience with systems engineering from the Director of Defense Research and Engineering and the Under Secretary of the Air Force.
4) Trends driving needs for systems engineering education and applications of systems engineering beyond aerospace to areas like energy and cybersecurity.
This document provides information about a 4-day course on Design for Test (DFT) and Printed Circuit Board (PCB) Design Analysis focused on testing. The course will be conducted by two instructors, Mauricio Castro and Francisco Briceño, and is aimed at design, test, product, project, and quality engineers. The course will cover DFT principles and standards, test equipment, test strategies, and include practical applications analyzing company products. Participants will receive course materials including standards for PCB design and acceptability.
This document presents a diploma thesis on the design and implementation of a low-cost embedded system for localization of drones flying in swarms. It discusses drones and different types of UAVs, localization problems and related work on localization techniques including WiFi, UWB, cellular networks, LoRa networks and more. It also covers localization algorithms, vision techniques, the thesis approach using monocular vision and multilateration, and the design and implementation of the proposed system including components, technologies used, and the Robot Operating System.
The document discusses the development of a system to counter asymmetric drone threats. A team called Guardian is working with the U.S. Army Asymmetric Warfare Group to develop a solution. Through testing scenarios and existing technologies, the team determined that detection and classification capabilities were needed. They have since pivoted to developing a detection and classification system that can provide threat information to countermeasure providers. The system will identify drone types, detect and localize drones, and provide an API for countermeasures. The goal is to deploy a solution to protect forward operating bases within two years.
The document provides an introduction to engineering optimization, outlining various problem types and methods as well as challenges. It discusses single and multi-objective optimization problems, constrained and unconstrained problems, and applications such as truss bridge structure optimization and microridged punch design optimization. The document emphasizes that engineering optimization is important for finding optimal designs that meet requirements while minimizing costs.
PGDay.Amsterdam 2018 - Bruce Momjian - Will postgres live foreverPGDay.Amsterdam
Bruce will explain how open source software can live for a very long time, and covers the differences between proprietary and open source software life cycles. He will also cover the increased adoption of open source, and many of the ways that Postgres is innovating to continue to be relevant.
Condition Assessment of Concrete Bridge Elements using Active IR ThermographyJason Cattelino
Active infrared thermography can effectively detect concrete deterioration like delamination. Laboratory testing validated its use and identified factors like defect depth and heat time. A field test on a bridge found it suitable for underside deck scanning and detecting areas needing repair. Implementation could involve lower-cost cameras, automated analysis, and a pilot bridge inspection program to further evaluate the technique.
In this paper, we develop a vision of software evolution based
on a feature-oriented perspective. From the fact that features
provide a common ground to all stakeholders, we derive a
hypothesis that changes can be eectively managed in a
feature-oriented manner. Assuming that the hypothesis holds,
we argue that feature-oriented software evolution relying
on automatic traceability, analyses, and recommendations
reduces existing challenges in understanding and managing
evolution. We illustrate these ideas using an automotive
example and raise research questions for the community.
This document summarizes a laboratory seminar that presented a vision-based method for detecting uncut crop edges to guide a combine harvester. The presentation discussed materials and methods, including the experimental setup, inverse perspective mapping, color space transformation, and the uncut crop edge detection algorithm. It provided results from testing the method on different crop fields, showing a success rate of 97% across 2500 frames. Challenges included detecting edges in shadows and random crop patterns. The method performed image processing at 33ms per frame.
This document provides a summary of a systems engineering update presentation given to the International Council on Systems Engineering Colorado Front Range Chapter. It discusses:
1) The evolution of systems engineering from early space programs like Sputnik and Mercury through modern programs like the International Space Station.
2) An example case study of the Wake Shield Facility and the systems engineering approaches used in its development.
3) Recent government experience with systems engineering from the Director of Defense Research and Engineering and the Under Secretary of the Air Force.
4) Trends driving needs for systems engineering education and applications of systems engineering beyond aerospace to areas like energy and cybersecurity.
This document provides information about a 4-day course on Design for Test (DFT) and Printed Circuit Board (PCB) Design Analysis focused on testing. The course will be conducted by two instructors, Mauricio Castro and Francisco Briceño, and is aimed at design, test, product, project, and quality engineers. The course will cover DFT principles and standards, test equipment, test strategies, and include practical applications analyzing company products. Participants will receive course materials including standards for PCB design and acceptability.
This document presents a diploma thesis on the design and implementation of a low-cost embedded system for localization of drones flying in swarms. It discusses drones and different types of UAVs, localization problems and related work on localization techniques including WiFi, UWB, cellular networks, LoRa networks and more. It also covers localization algorithms, vision techniques, the thesis approach using monocular vision and multilateration, and the design and implementation of the proposed system including components, technologies used, and the Robot Operating System.
The document discusses the development of a system to counter asymmetric drone threats. A team called Guardian is working with the U.S. Army Asymmetric Warfare Group to develop a solution. Through testing scenarios and existing technologies, the team determined that detection and classification capabilities were needed. They have since pivoted to developing a detection and classification system that can provide threat information to countermeasure providers. The system will identify drone types, detect and localize drones, and provide an API for countermeasures. The goal is to deploy a solution to protect forward operating bases within two years.
The document provides an introduction to engineering optimization, outlining various problem types and methods as well as challenges. It discusses single and multi-objective optimization problems, constrained and unconstrained problems, and applications such as truss bridge structure optimization and microridged punch design optimization. The document emphasizes that engineering optimization is important for finding optimal designs that meet requirements while minimizing costs.
PGDay.Amsterdam 2018 - Bruce Momjian - Will postgres live foreverPGDay.Amsterdam
Bruce will explain how open source software can live for a very long time, and covers the differences between proprietary and open source software life cycles. He will also cover the increased adoption of open source, and many of the ways that Postgres is innovating to continue to be relevant.
2. CombinoChord: Project Defense
Outline
Introduction
The Problem
Objectives
Significance
Related Research
Assumptions
Methodology
Heuristic
Fretboard Model
Hand Model
Sound Quality
Pre-Processing
Filtering
Multi-Threading
Android
Results
Analysis
Summary
CPSC 597 | California State University Fullerton 2/34
3. CombinoChord: Project Defense
Introduction
• Project Overview
• Key Terms:
– Guitar: A Stringed Instrument
– Guitar Strings & Fretboard
– Fret position
CPSC 597 | California State University Fullerton 3/34
5. CombinoChord: Project Defense
The Problem
Generate guitar chords based on the following parameters:
• The number of strings
• The number of frets
• The tuning of the strings
• The guitar setup
• The player’s hand
• The chord to play
CPSC 597 | California State University Fullerton 5/34
6. CombinoChord: Project Defense
Objectives
Goals for the system:
• Search for chords within 5 seconds for normal guitar configurations
• Use guitar tablature notation
• Conventional fingerings should be assigned a high score
CPSC 597 | California State University Fullerton 6/34
7. CombinoChord: Project Defense
Significance
Non-triviality:
• Guitar layout
• Definition of “goodness”
Brute force is unsatisfactory for two primary reasons:
1. There are a large number of possibilities
2. Most possibilities are undesirable
CPSC 597 | California State University Fullerton 7/34
8. CombinoChord: Project Defense
Significance
Brute force approach:
4
i=0
[2i
×
i−1
j=0
(n − j)] = 16n4
− 88n3
+ 156n2
− 82n + 1
Where n = s × f is the number of fret positions on the guitar, s is the
number of strings on the guitar, and f is the number of frets.
CPSC 597 | California State University Fullerton 8/34
10. CombinoChord: Project Defense
Related Research
• Two similar papers:
– Graph theory based approach: Norman and Grozman from
KTH Royal Institute of Technology [2]
– Evolutionary based approach: Tuohy and Potter from UGA [3]
• Similar Android apps
CPSC 597 | California State University Fullerton 10/34
11. CombinoChord: Project Defense
Existing Solutions
• Existing apps use static databases
• Drawbacks:
1. Cannot adapt to guitar tuning
2. Cannot adapt to guitar configuration
3. Cannot adapt to the user’s hand
4. Chord ordering is fixed
5. Substantial upfront work
CPSC 597 | California State University Fullerton 11/34
12. CombinoChord: Project Defense
Existing Solutions
• CombinoChord:
1. Can adapt to guitar tuning
2. Can adapt to guitar configuration
3. Can adapt to the user’s hand
4. Chord ordering is not fixed
5. No upfront work (besides mine)
CPSC 597 | California State University Fullerton 12/34
14. CombinoChord: Project Defense
Methodology
Overview:
• Notation
• Heuristic Function
• Fretboard Model
• Hand Model
• Sound Quality
• Preprocessing
• Filtering
• Multi-threading
• Android Programming
• Results
• Analysis
CPSC 597 | California State University Fullerton 14/34
15. CombinoChord: Project Defense
Heuristic
Define a heuristic function that considers:
1. Anatomical distance-based score
2. Sound quality score
CPSC 597 | California State University Fullerton 15/34
16. CombinoChord: Project Defense
Fretboard Model
• Define fretboard in R2
• Given first fret size, compute size of other frets
• Distance between strings
• Use euclidean distance p
CPSC 597 | California State University Fullerton 16/34
17. CombinoChord: Project Defense
Hand Model
Input table of max and min comfortable range values:
Finger 1 Finger 2 Min Range (mm) Max Range (mm)
1 2 5.0 80.0
1 3 15.0 95.0
1 4 25.0 110.0
2 3 6.0 52.0
2 4 12.0 69.0
3 4 8.5 47.0
CPSC 597 | California State University Fullerton 17/34
18. CombinoChord: Project Defense
Hand Model
Use a score function:
SF(x, a, b) =
1 + (x − 0.99a)3 x < a
1 − ((x − 0.99a)/(1.01b − 0.99a))2 x ≥ a.
Where a and b are the min and max range values for the pair of fingers
respectively, and x is the distance between the pair of fingers.
CPSC 597 | California State University Fullerton 18/34
20. CombinoChord: Project Defense
Hand Model
• Average SF over all pairs used
• Use best choice of fingers
• Only need to consider case where fingers don’t cross
• For 3: {1, 2, 3}, {1, 2, 4}, {1, 3, 4}, {2, 3, 4}
CPSC 597 | California State University Fullerton 20/34
21. CombinoChord: Project Defense
Sound Quality
• Unison notes
• Number of mutes
• Number of strings played
CPSC 597 | California State University Fullerton 21/34
22. CombinoChord: Project Defense
Pre-Processing
• Only consider fret-positions that produce notes in chord
• Drastically reduces size of state space
• CM7 on an acoustic:
4
i=0
[2i
×
i−1
j=0
(46 − j)] ≈ 6.34 × 107
.
CPSC 597 | California State University Fullerton 22/34
23. CombinoChord: Project Defense
Filtering
Idea: At each step we can filter possible fret positions
• Fret positions on same string
• Fret positions out of reach
• pi − pj > MAX
• Fret positions beneath tonic note
CPSC 597 | California State University Fullerton 23/34
24. CombinoChord: Project Defense
Multi-Threading
Multi-thread the search:
• Sub-tasks based on tonics
• Split ordered list into t parts
• Card dealing method
• Thread pool approach
CPSC 597 | California State University Fullerton 24/34
25. CombinoChord: Project Defense
150 200 250
0
20
40
60
80
n
Avg.SearchTime(ms)
2 Threads
Thread Pool
Shuffled
Ordered
150 200 250
0
20
40
60
n
Avg.SearchTime(ms)
4 Threads
Thread Pool
Shuffled
Ordered
CPSC 597 | California State University Fullerton 25/34
26. CombinoChord: Project Defense
Android
• Two packages:
– UI
– domain (to be made open source)
• UI:
– 7 Fragments
– Controlled by main activity
– Searching runs in background
CPSC 597 | California State University Fullerton 26/34
31. CombinoChord: Project Defense
Results
#Strings # Frets Avg. Search Time Std. Search Time
6 12 28.46 ms 19.52 ms
6 20 74.80 ms 41.86 ms
7 12 61.08 ms 51.22 ms
7 20 127.63 ms 53.55 ms
8 12 83.08 ms 51.32 ms
8 20 261.46 ms 161.73 ms
CPSC 597 | California State University Fullerton 31/34
32. CombinoChord: Project Defense
Analysis
• Times well within goal
• Less than Doherty threshold (400ms) for normal guitars [1]
CPSC 597 | California State University Fullerton 32/34
33. CombinoChord: Project Defense
Summary
CombinoChord:
• Finds chords well within timing constraints
• Presents guitar tablature notation
• Allows modification of specified parameters
CPSC 597 | California State University Fullerton 33/34
34. CombinoChord: Project Defense
References
[1] Doherty, Walter J. and Arvind J. Thadhani. "The economic value of
rapid response time." IBM Report (1982)
[2] Vladimir Grozman, and Christopher Norman An Algorithm for Optimal
Guitar Fingering. KTH Royal Institue of Technology, 2013
[3] D.R. Tuohy and W.D. Potter A Genetic Algorithm for the Automatic
Generation of Playable Guitar Tablature. Proceedings of the Inter-
national Computer Music Conference. Artificial Intelligence Center,
University of Georgia Athens, 2005
CPSC 597 | California State University Fullerton 34/34