ICIEMS 2015

International Conference on Information Engineering, Management and Security 2015

 


ICIEMS 2015 Kokula Krishna Hari K
Publication Meta Value
Short Title ICIEMS 2015
Publisher ASDF, India
ISBN 13 978-81-929742-7-9
ISBN 10 81-929742-7-8
Language English
Type Hard Bound - Printed Book
Copyrights ICIEMS Organizers / DCRC, London, UK
Editor-in-Chief Kokula Krishna Hari K
Conference Dates 13 - 14, August 2015
Venue Country IITM-RP, Chennai, India
Submitted Papers 410
Acceptance Rate 4.11%
Website www.iciems.in

Paper 049


RAGA ANALYSIS AND CLASSIFICATION OF INSTRUMENTAL MUSIC

RAGA ANALYSIS AND CLASSIFICATION OF INSTRUMENTAL MUSIC

Prabha Kumari1, Y H Dandawate2, Angha Bidkar3

1, 2, 3 Vishwakarma Institute of Information Technology, Pune, S.NO.34 , Kondhwa, Budruk

Abstract

Raga played by Indian instrument is the actually soul of the Indian classical music. Indian classical music is famous around all over the world for its particular structure and well soundness. Our work is related to analyze and classify the instrumental music according to their features. This will help to non-professional and music learner for understanding and acquire knowledge about the music using the system intelligence. There are various features for analysis of music but our approach is towards the spectral and temporal features. For extraction of feature we prefer MIR toolbox and MATLAB function, it is really a very helpful tool for these purpose. At very first we just collect clips of ragas and find out the spectral and temporal features. These features show the better result. We are using four ragas namely:- Bhairav, Bhairavi, Todi and Yaman. For classification we use different types of classifier just like KNN classifier and SVM classifier they gives approximate 87% and 92% accuracy respectively.

Author's Profile

Prabha Kumari : Profile

Y H Dandawate : Profile

Angha Bidkar : Profile

Cite this Article as Follows

Prabha Kumari, Y H Dandawate, Angha Bidkar. "RAGA ANALYSIS AND CLASSIFICATION OF INSTRUMENTAL MUSIC." International Conference on Information Engineering, Management and Security (2015): 294-301. Print.