{"id":536,"date":"2024-03-28T15:10:37","date_gmt":"2024-03-28T22:10:37","guid":{"rendered":"https:\/\/blogs.oregonstate.edu\/phish2024\/?page_id=536"},"modified":"2024-05-01T13:36:50","modified_gmt":"2024-05-01T20:36:50","slug":"quantifying-phish","status":"publish","type":"page","link":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/","title":{"rendered":"Quantifying Phish Plenary Panel"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"350\" src=\"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg\" alt=\"\" class=\"wp-image-537\" srcset=\"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg 752w, https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image-300x140.jpg 300w, https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image-400x186.jpg 400w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/figure>\n\n\n\n<p><em>Image credit: <\/em><a href=\"https:\/\/www.singulart.com\/en\/artist\/jarrod-barker-50089\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Jarrod Barker<\/em><\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>\u201cYou Don&#8217;t Have to Count Them, Just Enjoy Them One by One\u201d<\/strong><br><strong>\u2013 Quantifying Phish<\/strong><\/h4>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Paul Jakus, \u201cBombers and Fluffers: Anomalous Rating Behavior and Show Rankings\u201d<\/strong><\/p>\n\n\n\n<p>Using an (anonymized) Phish.Net ratings database composed of over 16,000 people providing over 340,000 show ratings, each rater\/user is evaluated according to metrics and methods grounded in information theory and marketing science. Metrics include the number shows rated by a user, deviation in ratings between the user and other users, and entropy of a given user\u2019s ratings. Entropy\u2014a measure of information provided by a user\u2019s ratings\u2014is, by far, the most useful metric in identifying anomalous users. In contrast to the current .Net rating system, which applies an equal weight to all users, one can use the above metrics to vary weights across users. Show rankings under the current system are compared to show rankings generated by five alternative weighting systems, including one designed to mimic the system used by rateyourmusic.com.<\/p>\n\n\n\n<p><strong>Matt Sottile, \u201cA Quantitative Examination of Phish History Through Audio Recordings\u201d<\/strong><\/p>\n\n\n\n<p>The presence of tapers and the surrounding trading scene has existed for the bulk of Phish\u2019s career resulting in a detailed performance history of the band via easily accessible audio recordings.\u00a0 This allows us to examine the content of the performances to look at how Phish and their repertoire has evolved.\u00a0 In this talk I will discuss the kinds of quantitative information that can be derived from this recorded history both manually and automatically.\u00a0 To illustrate some of the results I will take one of the band\u2019s longest standing songs as an example of study: Reba.\u00a0 I will look at Reba from a statistical and signal processing perspective to see what can be teased out of over 350 recorded performances of the song from 1989 through the present.\u00a0 I will also discuss the challenges that arise when applying audio analysis techniques to fan recordings.<\/p>\n\n\n\n<p><strong>Jason Zietz, \u201cWho Does Phish Play For? Themselves? The Fans? A Little from Column A, A Little from Column B?\u201d<\/strong><\/p>\n\n\n\n<p>While Phish\u2019s setlists were originally predetermined, the more recent approach reportedly finds the band creating a list of many possible songs before the show begins, only to have Trey Anastasio, Phish\u2019s guitarist and lead singer, destroy the list right before the show begins.&nbsp; Given this semi-random approach to setlist design, is it possible to determine what motivates the band to choose the songs they play?<\/p>\n\n\n\n<p>In this paper, I provide the details of a quantitative analysis of various data associated with Phish\u2019s recorded music and live performances that addresses this question.&nbsp; This analysis consists of several parts.&nbsp; First, I examine what songs, on average, fans of the band tend to prefer by determining the most popular songs on popular streaming services.&nbsp; I then analyze various qualities of these songs, including lyrical sentiment and audio properties such as key tonality, duration, and complexity, to determine if there are any commonalities among these most-liked songs.<\/p>\n\n\n\n<p>To determine what the band primarily likes, I look at the frequency of songs played at shows and generate from the most frequently played songs some general criteria that may predict what the band chooses to play based on the songs\u2019 audio qualities.&nbsp; Additionally, I also specifically analyze the cover songs the band most frequently plays, since learning another musician\u2019s work likely indicates a high level of appreciation for that music.<\/p>\n\n\n\n<p>Finally, I examine fan perceptions of shows to determine to what extent fan satisfaction correlates with fan preference of particular songs. &nbsp;This is done by examining both show ratings and semantic analyses of show reviews.&nbsp; These analyses are presented for the entire career of the band as well as segmented into the commonly used numerical \u201ceras\u201d (i.e, 1.0, 2.0, et cetera) to determine if, over time, any differences among these eras can be ascertained. These analyses help provide evidence that show setlists indicate that, rather than solely playing for either the band or the fans, Phish instead typically plays for, to quote Grandpa Abe Simpson, \u201cA little from column A, a little from column B\u201d.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image credit: Jarrod Barker \u201cYou Don&#8217;t Have to Count Them, Just Enjoy Them One by One\u201d\u2013 Quantifying Phish Paul Jakus, \u201cBombers and Fluffers: Anomalous Rating Behavior and Show Rankings\u201d Using an (anonymized) Phish.Net ratings database composed of over 16,000 people providing over 340,000 show ratings, each rater\/user is evaluated according to metrics and methods grounded [&hellip;]<\/p>\n","protected":false},"author":8846,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-536","page","type-page","status-publish","hentry","missing-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantifying Phish Plenary Panel - Phish Studies Conference 2024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantifying Phish Plenary Panel - Phish Studies Conference 2024\" \/>\n<meta property=\"og:description\" content=\"Image credit: Jarrod Barker \u201cYou Don&#8217;t Have to Count Them, Just Enjoy Them One by One\u201d\u2013 Quantifying Phish Paul Jakus, \u201cBombers and Fluffers: Anomalous Rating Behavior and Show Rankings\u201d Using an (anonymized) Phish.Net ratings database composed of over 16,000 people providing over 340,000 show ratings, each rater\/user is evaluated according to metrics and methods grounded [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/\" \/>\n<meta property=\"og:site_name\" content=\"Phish Studies Conference 2024\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-01T20:36:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/\",\"url\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/\",\"name\":\"Quantifying Phish Plenary Panel - Phish Studies Conference 2024\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/osu-wams-blogs-uploads.s3.amazonaws.com\\\/blogs.dir\\\/7016\\\/files\\\/2024\\\/03\\\/Quantifying-Phish-Image.jpg\",\"datePublished\":\"2024-03-28T22:10:37+00:00\",\"dateModified\":\"2024-05-01T20:36:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/#primaryimage\",\"url\":\"https:\\\/\\\/osu-wams-blogs-uploads.s3.amazonaws.com\\\/blogs.dir\\\/7016\\\/files\\\/2024\\\/03\\\/Quantifying-Phish-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/osu-wams-blogs-uploads.s3.amazonaws.com\\\/blogs.dir\\\/7016\\\/files\\\/2024\\\/03\\\/Quantifying-Phish-Image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/quantifying-phish\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantifying Phish Plenary Panel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#website\",\"url\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/\",\"name\":\"Phish Studies Conference 2024\",\"description\":\"May 17-19, 2024 \u2022 Oregon State University\",\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#organization\",\"name\":\"Phish Studies Conference 2024\",\"url\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/osu-wams-blogs-uploads.s3.amazonaws.com\\\/blogs.dir\\\/7016\\\/files\\\/2023\\\/06\\\/cropped-oregonstateuniversity.png\",\"contentUrl\":\"https:\\\/\\\/osu-wams-blogs-uploads.s3.amazonaws.com\\\/blogs.dir\\\/7016\\\/files\\\/2023\\\/06\\\/cropped-oregonstateuniversity.png\",\"width\":288,\"height\":100,\"caption\":\"Phish Studies Conference 2024\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.oregonstate.edu\\\/phish2024\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantifying Phish Plenary Panel - Phish Studies Conference 2024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/","og_locale":"en_US","og_type":"article","og_title":"Quantifying Phish Plenary Panel - Phish Studies Conference 2024","og_description":"Image credit: Jarrod Barker \u201cYou Don&#8217;t Have to Count Them, Just Enjoy Them One by One\u201d\u2013 Quantifying Phish Paul Jakus, \u201cBombers and Fluffers: Anomalous Rating Behavior and Show Rankings\u201d Using an (anonymized) Phish.Net ratings database composed of over 16,000 people providing over 340,000 show ratings, each rater\/user is evaluated according to metrics and methods grounded [&hellip;]","og_url":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/","og_site_name":"Phish Studies Conference 2024","article_modified_time":"2024-05-01T20:36:50+00:00","og_image":[{"url":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/","url":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/","name":"Quantifying Phish Plenary Panel - Phish Studies Conference 2024","isPartOf":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/#primaryimage"},"image":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/#primaryimage"},"thumbnailUrl":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg","datePublished":"2024-03-28T22:10:37+00:00","dateModified":"2024-05-01T20:36:50+00:00","breadcrumb":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/#primaryimage","url":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg","contentUrl":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2024\/03\/Quantifying-Phish-Image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/quantifying-phish\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.oregonstate.edu\/phish2024\/"},{"@type":"ListItem","position":2,"name":"Quantifying Phish Plenary Panel"}]},{"@type":"WebSite","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#website","url":"https:\/\/blogs.oregonstate.edu\/phish2024\/","name":"Phish Studies Conference 2024","description":"May 17-19, 2024 \u2022 Oregon State University","publisher":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.oregonstate.edu\/phish2024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#organization","name":"Phish Studies Conference 2024","url":"https:\/\/blogs.oregonstate.edu\/phish2024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#\/schema\/logo\/image\/","url":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2023\/06\/cropped-oregonstateuniversity.png","contentUrl":"https:\/\/osu-wams-blogs-uploads.s3.amazonaws.com\/blogs.dir\/7016\/files\/2023\/06\/cropped-oregonstateuniversity.png","width":288,"height":100,"caption":"Phish Studies Conference 2024"},"image":{"@id":"https:\/\/blogs.oregonstate.edu\/phish2024\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/pages\/536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/users\/8846"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/comments?post=536"}],"version-history":[{"count":8,"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/pages\/536\/revisions"}],"predecessor-version":[{"id":742,"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/pages\/536\/revisions\/742"}],"wp:attachment":[{"href":"https:\/\/blogs.oregonstate.edu\/phish2024\/wp-json\/wp\/v2\/media?parent=536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}