Skip to main content

Songs in the key of life: The linguistic universals of adapting sound to artistic expression

Source:
Linguistic Society of America
Summary:
A new study of how tone languages are sung has implications for the way humans manipulate and adapt the sounds of their language to artistic expression.
A new study of how tone languages are sung has implications for the way humans manipulate and adapt the sounds of their language to artistic expression. The study, "Tone-tune association in Tommo So (Dogon) folk songs," by Laura McPherson (Dartmouth College) and Kevin Ryan (Harvard University), will be published in the March 2018 issue of the scholarly journal Language.
The article explores a singular aspect of tone languages, which are defined as those which use tone, or pitch, to distinguish the meaning of a word. While this may seem unusual to speakers of most European languages, tone is actually a feature of at least half of the world's 7000 or so languages.
If pitch makes such a big difference in meaning, then how can anyone sing in a tone language? This paper looks at a set of women's folk songs in Tommo So, a language spoken in Mali in West Africa. The vast majority of African languages are tonal, including languages like Xhosa and Igbo that were recently featured in the smash movie Black Panther, and Tommo So is no exception. In this paper, the authors ask whether the songs follow the natural melodies of speech, or whether artistic expression wins out -- possibly at the expense of comprehensibility.
In Tommo So, combinations of high and low pitch on different syllables can change the meaning of a whole word (the difference between 'cow' and 'mother') or more subtle grammatical parts of meaning (the difference between 'run' and 'running'). The authors looked at 2232 two-syllable sequences to see if the musical melodies moved in the same direction as the linguistic tones on the words, in the opposite direction, or something in between. Overall, they found that Tommo So music generally avoids making singers sing words in pitches that directly contradict how they are spoken in non-musical contexts, especially if changing the tone would change the word's whole meaning.
Studies of this sort have been carried out on quite a number of tone languages from all over the world, from Zulu to Navajo to Hmong. Languages differ in how strictly their music follows their tone. But the novel contribution of this paper is digging deeper into what factors affect the assignment of a melody to words. While speakers of other languages may think that it would be confusing for a speaker of a tone language to understand a word sung with the wrong pitch, these same listeners generally have no problem at all understanding song lyrics where the emphasis or stress seems to fall on the "wrong" beat. The very same principles the authors found in Tommo So tone-tune association (the effect of word boundaries, their place in the line, whether the words are improvised or rote) are the principles governing the organization of poetic meter in languages like English or Latin, where stress takes the place of tone. In short, it seems there are universals to the way humans manipulate and adapt the sounds of their language to artistic expression.

Comments

Popular posts from this blog

IMPORTANCE AND ADVANTAGES OF SIWES

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) The Industrial Training/Students Industrial Work Experience Scheme, IT/SIWES is a new Directorate under the Vice-Chancellor’s Office.  It was established on 20th April, 2012 The Students Industrial Work Experience Scheme (SIWES) is a skills training programme designed to expose and prepare students of universities and other tertiary institutions for the Industrial Work situation they are likely to meet after graduation.  It is also a planned and structured programme based on stated and specific career objectives which are geared towards developing the occupational competencies of participants (Mafe, 2009).  Consequently, the SIWES programme is a compulsory graduation requirement for all Nigerian university students offering certain courses. The Students Industrial Work Experience Scheme (SIWES), is the accepted training programme, which

How to Reset HP Elitebook 8460p BIOS/Administrator Password

Have you  forgotten HP Elitebook 8460p password , bios or administrator account password? How to do if both of them lost? It seems hard though there may be lots of ways that can solve it. But if we talk about it separately, such as in two parts,  HP elitebook password reset  would be not so difficult. Part 1: Reset HP Elitebook 8460p BIOS password Part 2: HP Elitebook 8460p Administrator password recovery Part 1: How to Reset Forgotten HP Elitebook BIOS Password? Generally, there are two ways to  reset forgotten BIOS password .  One  is forcing BIOS/CMOS to reset itself to its stored defaults by removing all power from it.  The other  is to use a program to either locate or identify the password, and reveal it to you or erasing the password clearly. And the most easiest and convenient method for erasing dynamic BIOS/CMOS settings is to remove battery directly from the motherboard. However, it applies to most motherboards besides HP Elitebook BIOS. Fortunately, HP Eliteb

Ethical Hacking - TCP/IP Hijacking

TCP/IP Hijacking is when an authorized user gains access to a genuine network connection of another user. It is done in order to bypass the password authentication which is normally the start of a session. In theory, a TCP/IP connection is established as shown below − To hijack this connection, there are two possibilities − Find the seq which is a number that increases by 1, but there is no chance to predict it. The second possibility is to use the Man-in-the-Middle attack which, in simple words, is a type of network sniffing . For sniffing, we use tools like Wireshark or Ethercap . Example An attacker monitors the data transmission over a network and discovers the IP’s of two devices that participate in a connection. When the hacker discovers the IP of one of the users, he can put down the connection of the other user by DoS attack and then resume communication by spoofing the IP of the disconnected user. Shijack In practice, one of the best TCP/IP hijack too