AI Solves Beatles Songwriting Dispute

The contested origins of The Beatles’ hits penned under the writing partnership of Paul McCartney and John Lennon could be put to bed by artificial intelligence (AI) software which can identify each artist’s musical influence.

US researchers from Harvard University trained a machine learning algorithm on hundreds of the Fab Four’s hits to build a “musical fingerprint” for each songwriter. It was then asked to assess eight iconic songs, or musical fragments, recorded between 1962 and 1966, where debate rages over who was the major influence.

This includes tracks like “A Hard Day’s Night” and “In My Life” which are credited to the “Lennon-McCartney partnership”, but are widely believed to be entirely written by one or the other of the pair.

The findings, published in Harvard Data Science Review, allow for each artist’s influences on the song to be assessed, and predicts the probability that either McCartney or Lennon were chiefly responsible. As recently as 2015, Sir Paul McCartney has vented his frustrations at what he sees as “revisionism” over his influence relative to Lennon’s after he was murdered in 1980. He went as far as reversing the song credits to read “McCartney-Lennon” in a 2002 album – to the annoyance of Lennon’s widow, artist Yoko Ono.

Most of the eight songs of contested authorship were predicted to be predominantly in Lennon’s style, including tracks like “Ask Me Why” and the bridge to “A Hard Day’s Night” which McCartney sang and has suggested in previous interviews he had a role in. “In My Life”, which Rolling Stone magazine ranked, in 2011, the 23rd greatest song of all time has “garnered the greatest amount of speculation about its true author”, the researchers said.

Lennon wrote the song’s lyrics, but McCartney has claimed he wrote all the music, something Lennon’s account disputed.
The algorithm determined with 81.1 per cent certainty that Lennon wrote the verse, but McCartney’s influence in the song’s bridge was given with 43.5 per cent certainty. This would corroborate Lennon’s account that Paul contributed to the song’s middle-eight melody.

“Breaking apart the song into the verse and the bridge separately, it is apparent that the verse is much more consistent stylistically with Lennon’s song writing,” the authors wrote. Other songs like “Baby’s in Black”, “The Word”, and “From Me to You” were more confidently McCartney’s with up to 97 per cent certainty.

The system allows for a study of the way each musicians’ influences change over time, as well as the collaborative nature of song writing in popular music.

Insights from the study include that McCartney’s work “tended to use more non-standard musical motifs” in his songs, with higher song complexity a “distinguishing feature” of his songs.

Independent:       HarvardDataScienceReview:

You Might Also Read:

Google To Break Pirates Over Music Searches:

 


 

 

 

 

« Croatian Government Targeted By Mystery Hackers
The Cyber Effects Of Industry 4.0 On Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.