Browse Definitions :

volt per meter (V/m)

The standard unit of electric field (E-field) strength is the volt per meter (V/m). An E field of 1 V/m is represented by a potential difference of 1 V existing between two points that are 1 m apart. Reduced to base SI units, 1 V/m is the equivalent of one meter kilogram per second cubed per ampere (m ? kg ? s -3 ? A -1 ).

The volt per meter, or some fractional unit based on it, is used as a means of specifying the intensity of the electromagnetic field (EM field) produced by a radio transmitter. Although an EM field contains a magnetic (M) component as well as an electric (E) component, the relative field strength of radio signals is easier to measure in free space by sampling only the E component. The magnitude of the E component from a distant radio transmitter is often much less than 1 V/m, and in such cases, fractional units are preferred. One millivolt per meter (mV/m) is equal to 10 -3 V/m; one microvolt per meter (? V/m) is equal to 10 -6 V/m; one nanovolt per meter (nV/m) is equal to 10 -9 V/m; one picovolt per meter (pV/m) is equal to 10 -12 V/m.

The magnitude of the E component of a radio wave varies inversely with the distance from the transmitter in a free-space, line-of-sight link. If the distance is doubled, the E-field intensity is cut in half; if the distance increases by a factor of 10, the E-field intensity becomes 1/10 (0.1 times) as great. The E component of an EM field is measured in a single dimension, so the intensity-versus-distance relation is a straight inverse rule, not the inverse-square law.

When expressing the intensity of EM fields at infrared ( IR ), visible, ultraviolet (UV), X-ray, and gamma-ray wavelength s, the watt per meter squared, or one of the fractional units based on it, is more commonly used.

Also see electromagnetic field .

This was last updated in March 2011
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • security token

    A security token is a physical or digital device that provides two-factor authentication for a user to prove their identity in a ...

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.