Browse Definitions :
Definition

chorus

In audio production, chorus is one of the two standard audio effects defined by the Musical Instrument Digital Interface ( midi ). The other effect is reverb (reverberation). Chorus adds a swirling property to a sound that it is applied to, thickening the sound. Chorus is commonly used with instruments like the electric piano and guitar and with synthesizers. Most sound cards that have an onboard MIDI sound set contain both chorus and reverb.

A digital signal processing ( DSP ) algorithm that combines digital delays and at least one low-frequency oscillator (LFO) produces the chorus effect. The delays add a time offset and the LFOs vary the pitch. Varying the number of delays used in the design of the chorus DSP algorithm changes the quality of the chorusing effect. In addition, the number and speed of the LFOs used in the algorithm design also contribute to the overall effect. In general, the more individual delay lines and LFOs that are part of the DSP algorithm, the thicker and more complex the effect can be.

Here's how it works: An audio signal that is to be processed with chorus is first delayed by a small amount. (Typical delay times are small, in the range of 5 to 40 milliseconds.) This produces a doubling effect. Each delayed signal is then sent to the LFO. The LFO takes the delayed signal and moves its pitch up and down, changing the tuning from sharp to flat. The LFO usually runs at a slow speed; 1 to 5 oscillations per second are typical. The output of the delayed and pitch-altered signal is then mixed in with the original audio. This blending completes the chorusing effect.

This was last updated in March 2008

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close