Because it is able to significantly improve the process, the research issue of determination of process faults has attracted considerable attention. Although some statistical decomposition methods may provide the possible solutions, the mathematical difficulty could confine the applications. As a consequence, this study proposes the soft computing approaches to determine the source of a process fault. In this study, we apply artificial neural network (ANN), support vector machine (SVM) and multivariate adaptive regression splines (MARS) to identify the faults of a multivariate process. The multivariate process is considered to have five quality characteristics and the variance shifts are presented either on 2, 3, 4 or 5 quality characteristics. A series of computer simulations are performed to evaluate the effectiveness of the proposed approaches.
{"title":"A Study on Determination of the Variance Faults of a Process Using Soft Computational Approaches","authors":"Y. Shao, Shi-Chieh Lin","doi":"10.1109/CISIS.2016.53","DOIUrl":"https://doi.org/10.1109/CISIS.2016.53","url":null,"abstract":"Because it is able to significantly improve the process, the research issue of determination of process faults has attracted considerable attention. Although some statistical decomposition methods may provide the possible solutions, the mathematical difficulty could confine the applications. As a consequence, this study proposes the soft computing approaches to determine the source of a process fault. In this study, we apply artificial neural network (ANN), support vector machine (SVM) and multivariate adaptive regression splines (MARS) to identify the faults of a multivariate process. The multivariate process is considered to have five quality characteristics and the variance shifts are presented either on 2, 3, 4 or 5 quality characteristics. A series of computer simulations are performed to evaluate the effectiveness of the proposed approaches.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126208068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Toward the world, there was more works done at different levels to model and estimate the impact of human activities on the environment, in particular the agriculture impact on the environment in the USA, Japan and Switzerland in Organization for Economic Co-operation and Development OCDE. Through this works two approaches were identified: - A specific approach that considers only one aspect, such as impact on water, and studied over a wide area, or even throughout the territory of a country, - A regional approach which considers the issue as a whole, taking into account all aspects in a restricted area. However, at the national level several specific works, treating the impact of a single parameter on the environment has been made. Besides, no integrated study was conducted in a rigorous manner. As part of this paper, we opted to consider environmental issues as a whole, based on a regional approach. We present in this paper, an integrated framework for modeling environmental phenomena's based on the combination of Cellular Automata models, GIS and multi-spatial analysis approach. The approach was implemented via the development of a simulation tool to model flood, erosion, vegetation dynamics, using date from a region in north morocco to initialize and validate the models.
{"title":"Toward an Integrated Tool for Complex Environmental Systems Modeling: A Cellular Automata Approach","authors":"Mustapha Ouardouz, A. Bernoussi, M. Amharref","doi":"10.1109/CISIS.2016.117","DOIUrl":"https://doi.org/10.1109/CISIS.2016.117","url":null,"abstract":"Toward the world, there was more works done at different levels to model and estimate the impact of human activities on the environment, in particular the agriculture impact on the environment in the USA, Japan and Switzerland in Organization for Economic Co-operation and Development OCDE. Through this works two approaches were identified: - A specific approach that considers only one aspect, such as impact on water, and studied over a wide area, or even throughout the territory of a country, - A regional approach which considers the issue as a whole, taking into account all aspects in a restricted area. However, at the national level several specific works, treating the impact of a single parameter on the environment has been made. Besides, no integrated study was conducted in a rigorous manner. As part of this paper, we opted to consider environmental issues as a whole, based on a regional approach. We present in this paper, an integrated framework for modeling environmental phenomena's based on the combination of Cellular Automata models, GIS and multi-spatial analysis approach. The approach was implemented via the development of a simulation tool to model flood, erosion, vegetation dynamics, using date from a region in north morocco to initialize and validate the models.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vlad-Cosmin Ozunu, Cezar-Costin Pirvu, C. Leordeanu, V. Cristea
Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation for some of the encryption algorithms which are extensively used in today's industry (DES, 3DES, AES, etc.), as well as some hash functions. Therefore, the evaluation platform takes on the above mentioned algorithms from two very divergent perspectives: one of them focuses mainly on CPU vs. GPU performance issues, whereas the latter tackles the problem of randomness of the encrypted results by comparison to several strict criteria. In order to achieve these goals, the platform provides a graphical user interface which eases interactions such as: tests selection, worker attachment or removal, events logging, input provision and output analysis. The proposed solution represents an evaluation platform that performs a wide range of tests on hash and symmetric key algorithms in order to deduce their performance and behavior on multiple architectures, as well as various NIST tests, on different environments.
{"title":"Distributed Platform for the Analysis of Cryptographic Algorithms","authors":"Vlad-Cosmin Ozunu, Cezar-Costin Pirvu, C. Leordeanu, V. Cristea","doi":"10.1109/CISIS.2016.139","DOIUrl":"https://doi.org/10.1109/CISIS.2016.139","url":null,"abstract":"Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation for some of the encryption algorithms which are extensively used in today's industry (DES, 3DES, AES, etc.), as well as some hash functions. Therefore, the evaluation platform takes on the above mentioned algorithms from two very divergent perspectives: one of them focuses mainly on CPU vs. GPU performance issues, whereas the latter tackles the problem of randomness of the encrypted results by comparison to several strict criteria. In order to achieve these goals, the platform provides a graphical user interface which eases interactions such as: tests selection, worker attachment or removal, events logging, input provision and output analysis. The proposed solution represents an evaluation platform that performs a wide range of tests on hash and symmetric key algorithms in order to deduce their performance and behavior on multiple architectures, as well as various NIST tests, on different environments.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiroki Taniguchi, Changshuai Liu, T. Morizono, T. Tokuyasu
The proficiency levels of using chopsticks and/or writing characters with a pencil etc. are improved by the practices continuously repeated. By the way, the mechanisms of improving the proficiency level of human skill have never been clarified. This study focused on the mechanism of our skill acquirement and investigates the change in muscular activity in the process of skill acquirement. This paper describes the experimental device we have developed, where a skilled instructor and a beginner operate the experimental device linked to a simple paddle application. We will investigate the process of human skill acquirement by focusing on the changes in the activities of brachial muscles while training. Especially, the effects of physical instruction of an instructor on the skill acquirement of a beginner will be discussed in this paper.
{"title":"Approaches to Understanding Hand Skill Acquisition","authors":"Hiroki Taniguchi, Changshuai Liu, T. Morizono, T. Tokuyasu","doi":"10.1109/CISIS.2016.145","DOIUrl":"https://doi.org/10.1109/CISIS.2016.145","url":null,"abstract":"The proficiency levels of using chopsticks and/or writing characters with a pencil etc. are improved by the practices continuously repeated. By the way, the mechanisms of improving the proficiency level of human skill have never been clarified. This study focused on the mechanism of our skill acquirement and investigates the change in muscular activity in the process of skill acquirement. This paper describes the experimental device we have developed, where a skilled instructor and a beginner operate the experimental device linked to a simple paddle application. We will investigate the process of human skill acquirement by focusing on the changes in the activities of brachial muscles while training. Especially, the effects of physical instruction of an instructor on the skill acquirement of a beginner will be discussed in this paper.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tetsuya Oda, Ryoichiro Obukata, M. Yamada, Taro Ishitaki, M. Hiyama, L. Barolli
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect or identify the bad behavior users in Tor networks. In this paper, we present the application of Neural Networks (NNs) for user identification in Tor networks. We used the Back-propagation NN and constructed a Tor server, a Deep Web browser (Tor client) and a Surface Web browser. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the Back-propagation NN to make the approximation. For evaluation we considered Number of Packets (NoP) metric and activation function. We present many simulation results considering Tor client. We analyze the data using Friedman test. From the results, we see that by using softplus activation function the system can identify Tor client.
{"title":"A Neural Network Based User Identification for Tor Networks: Comparison Analysis of Activation Function Using Friedman Test","authors":"Tetsuya Oda, Ryoichiro Obukata, M. Yamada, Taro Ishitaki, M. Hiyama, L. Barolli","doi":"10.1109/CISIS.2016.89","DOIUrl":"https://doi.org/10.1109/CISIS.2016.89","url":null,"abstract":"Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect or identify the bad behavior users in Tor networks. In this paper, we present the application of Neural Networks (NNs) for user identification in Tor networks. We used the Back-propagation NN and constructed a Tor server, a Deep Web browser (Tor client) and a Surface Web browser. Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then used the Back-propagation NN to make the approximation. For evaluation we considered Number of Packets (NoP) metric and activation function. We present many simulation results considering Tor client. We analyze the data using Friedman test. From the results, we see that by using softplus activation function the system can identify Tor client.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127672355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danish Mahmood, N. Javaid, Umar Nouman, Afaq Urrahman, Z. Khan, U. Qasim
This work analyzes major energy management solutions in terms of their practical implementation. Every EMS proposed has its own merits and demerits. Energy management solutions are based upon 4 major categories i.e., EMS by a sensor network, EMS by using optimization technique, EMS by merging sensory information with optimization algorithm to yield better energy efficiency and integrating small scale micro grids at demand side to optimize energy preservation. Load shifting to low peak or low priced hours in such a way that user comfort is not much compromised is an NP-hard problem. Nature inspired evolutionary algorithms proves their worth in solving such problems. In this work, we focus mainly on energy and cost optimization with respect to above mentioned all categories that provide energy management solutions. Extensive simulations are conducted regarding each catagory to investigate impact of each regarding cost and energy savings.
{"title":"Comparative Analysis of Energy Management Solutions Focusing Practical Implementation","authors":"Danish Mahmood, N. Javaid, Umar Nouman, Afaq Urrahman, Z. Khan, U. Qasim","doi":"10.1109/CISIS.2016.126","DOIUrl":"https://doi.org/10.1109/CISIS.2016.126","url":null,"abstract":"This work analyzes major energy management solutions in terms of their practical implementation. Every EMS proposed has its own merits and demerits. Energy management solutions are based upon 4 major categories i.e., EMS by a sensor network, EMS by using optimization technique, EMS by merging sensory information with optimization algorithm to yield better energy efficiency and integrating small scale micro grids at demand side to optimize energy preservation. Load shifting to low peak or low priced hours in such a way that user comfort is not much compromised is an NP-hard problem. Nature inspired evolutionary algorithms proves their worth in solving such problems. In this work, we focus mainly on energy and cost optimization with respect to above mentioned all categories that provide energy management solutions. Extensive simulations are conducted regarding each catagory to investigate impact of each regarding cost and energy savings.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper improves the conventional scheme of contents sharing in unstructured P2P networks, where each of the peers and content cache routers keeps contents cache as well as query transmission records, which are used to guide content searching queries and reduce the number of the queries without losing contents discovery rates. In this paper, the decision whether a content item is cached or not on the router is executed as a part of the algorithm running in the contents sharing system according to the content item's popularity and the degree of the router as a network node, in order to reduce the frequency of contents loss caused by the displacement or overwriting of caches in the routers. The efficiency of the improvement is discussed using the results of computer simulations.
{"title":"A Content Searching Scheme Using Popularity and Link Degree of Nodes in Unstructured P2P Networks with Cache Routers","authors":"Daiki Takeda, S. Sugawara","doi":"10.1109/CISIS.2016.60","DOIUrl":"https://doi.org/10.1109/CISIS.2016.60","url":null,"abstract":"This paper improves the conventional scheme of contents sharing in unstructured P2P networks, where each of the peers and content cache routers keeps contents cache as well as query transmission records, which are used to guide content searching queries and reduce the number of the queries without losing contents discovery rates. In this paper, the decision whether a content item is cached or not on the router is executed as a part of the algorithm running in the contents sharing system according to the content item's popularity and the degree of the router as a network node, in order to reduce the frequency of contents loss caused by the displacement or overwriting of caches in the routers. The efficiency of the improvement is discussed using the results of computer simulations.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuki Nishimura, T. Amagasa, Y. Inagaki, T. Hashimoto, H. Kitagawa
A large quantity of DNA sequence data is being generated at high speed and in low cost by next generation sequencing (NGS) technology in recent years. NGS influences wide range of biology, including evolutionary biology, which is the field that infers the evolutionary relationships of genes or organisms from sequence data. In particular, the phylogenetic analyses using massive amount of data generated by NGS have been actively conducted. To infer the phylogenetic relationship, a number of alignments that comprise sets of sequences need to be maintained, i.e., they need to be updated whenever new sequence data become available. However, there have been no database that support updates of alignments, i.e., addition and/or removal of sequences from existing alignments. Instead, individual researchers independently update their alignments manually. To cope with this problem, we propose a system for phylogenetic analyses over alignments of NGS data. It takes as input NGS data, predicts the orthologue that each sequence belongs to, and updates the alignments. Moreover, by describing the related alignments in tree structure, it can maintain stored alignments in a systematic way. To prove the concept, we implement a prototype web application. We expect that our system help biological researchers carry out phylogenetic analysis on large scale data including those from NGS).
{"title":"A System for Phylogenetic Analyses over Alignments of Next Generation Sequence Data","authors":"Yuki Nishimura, T. Amagasa, Y. Inagaki, T. Hashimoto, H. Kitagawa","doi":"10.1109/CISIS.2016.51","DOIUrl":"https://doi.org/10.1109/CISIS.2016.51","url":null,"abstract":"A large quantity of DNA sequence data is being generated at high speed and in low cost by next generation sequencing (NGS) technology in recent years. NGS influences wide range of biology, including evolutionary biology, which is the field that infers the evolutionary relationships of genes or organisms from sequence data. In particular, the phylogenetic analyses using massive amount of data generated by NGS have been actively conducted. To infer the phylogenetic relationship, a number of alignments that comprise sets of sequences need to be maintained, i.e., they need to be updated whenever new sequence data become available. However, there have been no database that support updates of alignments, i.e., addition and/or removal of sequences from existing alignments. Instead, individual researchers independently update their alignments manually. To cope with this problem, we propose a system for phylogenetic analyses over alignments of NGS data. It takes as input NGS data, predicts the orthologue that each sequence belongs to, and updates the alignments. Moreover, by describing the related alignments in tree structure, it can maintain stored alignments in a systematic way. To prove the concept, we implement a prototype web application. We expect that our system help biological researchers carry out phylogenetic analysis on large scale data including those from NGS).","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Elis Kulla, L. Barolli
Wireless Sensor and Actuator Networks (WSANs) have emerged as a variation of wireless sensor networks. WSANs have great potential for improving many current applications, such as environmental monitoring/surveillance, life science and rescue/support operations. In previous work, we proposed a fuzzy-based WSAN testbed that based on data provided by sensors and actuators select an appropriate actuator node. In this paper, we evaluate the performance of our proposed fuzzy-based WSAN testbed system considering depth and RGB sensors. We show the implemented realtime control applications in testbed system. From the results, we observe that our testbed have a good performance for different job types.
{"title":"Performance Evaluation of a Fuzzy-Based Wireless Sensor and Actuator Network Testbed Considering Depth and RGB Sensors","authors":"Keisuke Ebisu, Takaaki Inaba, Donald Elmazi, Makoto Ikeda, Elis Kulla, L. Barolli","doi":"10.1109/CISIS.2016.81","DOIUrl":"https://doi.org/10.1109/CISIS.2016.81","url":null,"abstract":"Wireless Sensor and Actuator Networks (WSANs) have emerged as a variation of wireless sensor networks. WSANs have great potential for improving many current applications, such as environmental monitoring/surveillance, life science and rescue/support operations. In previous work, we proposed a fuzzy-based WSAN testbed that based on data provided by sensors and actuators select an appropriate actuator node. In this paper, we evaluate the performance of our proposed fuzzy-based WSAN testbed system considering depth and RGB sensors. We show the implemented realtime control applications in testbed system. From the results, we observe that our testbed have a good performance for different job types.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, with the spread of applications such as electronic musical scores has been developed. However, existing electronic musical score applications were developed considering individual use (principally by pianists), and when using electronic musical score systems for a wind orchestra, for example, the load placed on the musical performers are effectively the same as when using paper scores. Therefore, in this study we were taking advantage of the characteristics of the tablet terminal, was carried out a proposal and trial production of the electronic musical score system PEANUTS for wind orchestra. Music of the data to be used in the PEANUTS is presupposed to reuse the score of paper that is currently being used. In PEANUTS, was focused on page turn as a load applied to the performer when playing musical piece in wind orchestra, we have proposed system of designating the person in charge of page turn to reduce the load based on algorithm of designating the person in charge of page turn for single music. However, the concert of wind orchestra usually play multiple music. In this paper, we were carried out the evaluation experiment considering the concert program. We were consider to resolve bias of the load value on the part of the performers by considering the concert program.
{"title":"Proposal of Algorithm for Designating the Person in Charge of Page Turn of PEANUTS Considering the Concert Program","authors":"Yasue Iijima, S. Fujita, S. Konno","doi":"10.1109/CISIS.2016.92","DOIUrl":"https://doi.org/10.1109/CISIS.2016.92","url":null,"abstract":"In recent years, with the spread of applications such as electronic musical scores has been developed. However, existing electronic musical score applications were developed considering individual use (principally by pianists), and when using electronic musical score systems for a wind orchestra, for example, the load placed on the musical performers are effectively the same as when using paper scores. Therefore, in this study we were taking advantage of the characteristics of the tablet terminal, was carried out a proposal and trial production of the electronic musical score system PEANUTS for wind orchestra. Music of the data to be used in the PEANUTS is presupposed to reuse the score of paper that is currently being used. In PEANUTS, was focused on page turn as a load applied to the performer when playing musical piece in wind orchestra, we have proposed system of designating the person in charge of page turn to reduce the load based on algorithm of designating the person in charge of page turn for single music. However, the concert of wind orchestra usually play multiple music. In this paper, we were carried out the evaluation experiment considering the concert program. We were consider to resolve bias of the load value on the part of the performers by considering the concert program.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}