Browse Definitions :
Definition

Fourier synthesis

Fourier synthesis is a method of electronically constructing a signal with a specific, desired periodic waveform . It works by combining a sine wave signal and sine-wave or cosine-wave harmonics (signals at multiples of the lowest, or fundamental, frequency) in certain proportions. The scheme gets its name from a French mathematician and physicist named Jean Baptiste Joseph, Baron de Fourier, who lived during the 18th and 19th centuries.

Many waveforms represent signal energy at a fundamental frequency and also at harmonic frequencies (whole-number multiples of the fundamental). The relative proportions of energy concentrated at the fundamental and harmonic frequencies determine the shape of the wave. The wave function (usually amplitude , frequency , or phase versus time ) can be expressed as of a sum of sine and cosine functions called a Fourier series , uniquely defined by constants known as Fourier coefficient s. If these coefficients are represented by a , a 1 , a 2 , a 3 , ..., a n , ... and b 1 , b 2 , b 3 , ..., b n , ..., then the Fourier series F ( x ), where x is an independent variable (usually time), has the following form:

F ( x ) = a /2 + a 1 cos x + b 1 sin x + a 2 cos 2 x + b 2 sin 2 x + ...
+ a n cos nx + b n sin nx + ...

In Fourier synthesis, it is necessary to know, or to determine, the coefficients a , a 1 , a 2 , a 3 , ..., a n , ... and b 1 , b 2 , b 3 , ..., b n , ... that will produce the waveform desired when "plugged into" the generalized formula for the Fourier series, as defined above. Then, sine and cosine waves with the proper amplitudes (as defined by the coefficients) must be electronically generated and combined, up to the highest possible value of n . The larger the value of n for which sine-wave and cosine-wave signals are generated, the more nearly the synthesized waveform matches the desired waveform.

Fourier synthesis is used in electronic music applications to generate waveforms that mimic the sounds of familiar musical instruments. It is also employed in laboratory instruments known as waveform generators or function generators. These devices are used to test communication systems.

Compare Fourier analysis .

This was last updated in September 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close