Browse Definitions:
Definition

lux (lx)

The lux (symbolized lx) is the unit of illuminance in the International System of Units ( SI ). It is defined in terms of lumen s per meter squared (lm/m 2 ). Reduced to SI base units, one lux is equal to 0.00146 kilogram per second cubed (1.46 x 10 -3 kg / s 3 ).

One lux is the equivalent of 1.46 milliwatt (1.46 x 10 -3 W) of radiant electromagnetic (EM) power at a frequency of 540 terahertz (540 THz or 5.40 x 10 14 Hz ), impinging at a right angle on a surface whose area is one square meter. A frequency of 540 THz corresponds to a wavelength of about 555 nanometer s (nm), which is in the middle of the visible-light spectrum.

The lux is a small unit. An alternative unit is the watt per meter squared (W / m 2 ). To obtain lux when the illuminance in watts per meter squared is known, multiply by 683. To obtain watts per meter squared when the illuminance in lux is known, divide by 683 or multiply by 0.00146.

Illuminance varies inversely with the square of the distance from the source on a free-space line of sight. If the distance is doubled, the illuminance is cut to 1/4; if the distance increases by a factor of 10, the illuminance becomes 1/100 (0.01 times) as great.

Also see candela , electromagnetic field , lumen , steradian , watt per meter squared , and International System of Units ( SI ).

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • wear leveling

    Wear leveling is a process that is designed to extend the life of solid-state storage devices.

  • storage area network (SAN)

    A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of ...

  • SSD TRIM

    SSD TRIM is an Advanced Technology Attachment (ATA) command that enables an operating system to inform a NAND flash solid-state ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close