Browse Definitions :
Definition

reciprocal meter

The reciprocal meter is the standard unit of wave number for electromagnetic field s (EM fields). In terms of International Units ( SI ), the reciprocal meter is equal to m -1 . The wave number is the number of complete wave cycles that exist in a linear span of 1 meter (m).

At the speed of light in free space, 2.99792 x 10 8 m/s, the frequency f in hertz ( Hz ) is related to the wave number y in reciprocal meters (m -1 ) according to the following formula:

y = f / (2.99792 x 10 8 )

To cite a few examples, an EM wave at 300 megahertz (MHz) in free space has a wave number of almost exactly 1 m -1 . If the frequency is doubled to 600 MHz, the wave number also doubles, to 2 m -1 . If the frequency becomes 1/10 as great, that is, it is decreased to 30 MHz, then the wave number is reduced to 0.1 m -1 . As a point of reference, it is easy to remember that the wave number of a 300-MHz signal in free space is very close to 1 m -1 .

In general, if the speed of propagation in meters per second for a specific medium is given by c , then:

y = f / c

where y is in reciprocal meters, and f is in hertz.

In radio-frequency ( RF ) transmission lines such as coaxial cable s and waveguide s, the speed of propagation is less than 2.99792 x 10 8 m/s. This increases the wave number, although it has no effect on the frequency.

Also see frequency , electromagnetic field , meter , wavelength , and International System of Units ( SI ).

This was last updated in September 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close