Browse Definitions :
Definition

volt per meter (V/m)

The standard unit of electric field (E-field) strength is the volt per meter (V/m). An E field of 1 V/m is represented by a potential difference of 1 V existing between two points that are 1 m apart. Reduced to base SI units, 1 V/m is the equivalent of one meter kilogram per second cubed per ampere (m ? kg ? s -3 ? A -1 ).

The volt per meter, or some fractional unit based on it, is used as a means of specifying the intensity of the electromagnetic field (EM field) produced by a radio transmitter. Although an EM field contains a magnetic (M) component as well as an electric (E) component, the relative field strength of radio signals is easier to measure in free space by sampling only the E component. The magnitude of the E component from a distant radio transmitter is often much less than 1 V/m, and in such cases, fractional units are preferred. One millivolt per meter (mV/m) is equal to 10 -3 V/m; one microvolt per meter (? V/m) is equal to 10 -6 V/m; one nanovolt per meter (nV/m) is equal to 10 -9 V/m; one picovolt per meter (pV/m) is equal to 10 -12 V/m.

The magnitude of the E component of a radio wave varies inversely with the distance from the transmitter in a free-space, line-of-sight link. If the distance is doubled, the E-field intensity is cut in half; if the distance increases by a factor of 10, the E-field intensity becomes 1/10 (0.1 times) as great. The E component of an EM field is measured in a single dimension, so the intensity-versus-distance relation is a straight inverse rule, not the inverse-square law.

When expressing the intensity of EM fields at infrared ( IR ), visible, ultraviolet (UV), X-ray, and gamma-ray wavelength s, the watt per meter squared, or one of the fractional units based on it, is more commonly used.

Also see electromagnetic field .

This was last updated in March 2011
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • cyberstalking

    Cyberstalking is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close