航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ) c# L4 }. t6 `/ O* j2 n4 E, j% HCOMSEC Communications Security. % I i3 M" i5 Y! J+ }Concept 2 D) Q6 M# U" ]7 m8 {4 @Exploration & . J+ @# G0 F4 h2 N2 }3 ^Definition " A2 h# M7 z- { z0 M0 l: _The initial phase (Phase 0) of the system acquisition process, beginning at 9 D- N% v: c9 HMission Need Determination. During this phase, the acquisition strategy is 6 x" c9 }$ |; Pdeveloped, system alternatives are proposed and examined, and the system + p& b) `& E. k' m3 Gprogram requirements document is expanded to support subsequent phases.! E. h: o; {: y3 c- o5 k+ d/ z Concept of + p. h/ H' i- R5 j; X9 COperations( z/ E# u4 Y6 j6 u2 A! n (CONOPS) ! U7 Z6 p/ s$ W* b" m+ d6 }(1) A statement, in broad outline, of a commander’s outline or intent in regard to O5 d4 U0 B) Z an operation or series of operations. The concept is designed to give an overall 0 I& d) d+ E* s9 q. D9 [picture of the operation. (MDA Lexicon) 1 R ~3 W9 H5 L5 g. @3 O# a5 [(2) A verbal or graphic statement, in broad outline, of a commander’s( V' t/ a: h& f7 g2 S: b assumptions or intent in regard to an operation or series of operations. The3 P W$ \ m; M$ B concept of operations frequently is embodied in campaign plans and operation 4 } u: P; n( n o" l. }8 k6 Z/ Iplans; in the later case, particularly when the plans cover a series of connected3 ~8 N6 B% t( e9 @; z operations to be carried out simultaneously or in succession. The concept is - i3 I% D. c6 J; A+ a/ Qdesigned to give an overall picture of the operation. It is included primarily for ]% H9 q0 b. `( j) W b6 \ additional clarity of purpose.( {5 h1 e. }/ R Y4 H. Y' a Concept Plan An operation plan in concept format. Also called CONPLAN. ( u. C/ q# \. q: yConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of " V* g' P7 R8 U( L8 K6 Tthe acquisition process, or combines development T&E with operational T&E.9 Y9 i( O+ S- k. ]& H9 o0 [, h Concurrent. u- }1 w- e$ O Engineering & r/ ]" l" r `4 e# pA systematic approach to the integrated, simultaneous design of products and 3 Q! k4 v1 I! F Etheir related processes, including manufacture and support. This approach is% ^' L" C' D5 { intended to cause developers, from the beginning, to consider all elements of: ~: w4 X: E/ ^ the system life cycle from requirements development through dispersal, including ' r" C* X8 W* o( E% v) S' pcost, schedule, and performance./ U8 \8 w Q. U/ N CONEX CONOPS Exerciser.# @: _# P: i$ a' T Configuration A collection of an item’s descriptive and governing characteristics, which can be5 i9 K6 H+ M! r& F' r" e% m expressed in functional terms (i.e., what performance the item is expected to3 G M3 Z$ u% @ achieve); and in physical terms (i.e., what the item should look like and consist of : T& a' ?2 t6 gwhen it is built).( g9 v$ t r t MDA GLOSSARY, VER. 4.0 C$ j& j3 ] |( {5 h; ~ 59 2 O) r0 P1 |) e5 x( ?/ PConfiguration+ g# O1 {) Z: H( @; M$ X% A0 C6 E Audit9 V: K$ e8 i7 m7 a% P1 c5 y6 T One of the Configuration Management tasks which includes a functional , L1 n% N+ ]# c5 e9 T3 S( q econfiguration audit (FCA) to validate that the development of a configuration item- T# f' {8 G0 K0 |$ ^ has been completed satisfactorily and that the configuration item has achieved 5 o0 s/ D- g3 J8 M. ^4 tto specified performance and functional characteristics, and also includes a 6 b2 l2 Z2 w% o3 ?) E- }# Ephysical configuration audit (PCA) to verify that the configuration item “As Built” 4 Q( k- B& j& O( u, A. ?1 uconforms to the technical documentation which defines the configuration item. ) H. {+ Y9 b. Y% D' z9 a0 @! \8 `0 vConfiguration* N E+ X. x! o4 t4 a& q( k. ]0 M4 Z Baseline 6 v# K' P; Q! L5 I* |7 JThe configuration documentation formally designated by the Government at a% K, a+ P# I/ z/ W' w specific time during a system’s or configuration item’s life cycle. Configuration2 Q8 c6 B3 h# Z3 A2 p baselines, plus approved changes from those baselines, constitute the current 8 Z2 V* {; X% D8 K- _configuration baselines, namely the functional, allocated, and product baselines.2 }( M' w) ^. o' [3 y+ l; G' A. g Configuration * M* l7 ] l- f5 o0 ?" A; RControl+ Q/ d! ^9 x7 V3 P/ s# q. O- H: I3 b One of the Configuration Management tasks that involves the systematic$ n) F X7 H |. G evaluation, coordination, approval, or disapproval of proposed changes to the$ o ~0 o, B8 T( y design and construction of a configuration item whose configuration has been" x; h1 ?: Y" h! c* o4 I formally approved. ! u2 X/ j. x% \; e# S1 z! mConfiguration+ b0 g: }+ t. | s Identification $ t5 ?' u+ K( x& r' b( DOne of the Configuration Management tasks, which require that for every 0 M g4 a; X" A0 x% L; B( Cchange that is made to an Automated Data processing (ADP) system, the design 8 o/ a* f# @. c" land requirements of the changed version of the system should be identified.& F: W, d- w, D6 z8 a& n Configuration , \* [6 I; R1 N# N( QItem (CI) ! K9 `9 X. A F4 h2 t3 Q J) c1 D0 bAn aggregation of system elements that satisfies an end use function and is" p( H: L3 d$ |" P designated by the Government for separate configuration management.0 s# ?, o3 j/ Y; k; h* w Configuration items vary widely in complexity, size, and type. Any item required ; T+ ?$ b/ n7 {. D, S+ z2 Y c6 efor logistic support and designated for separate procurement is a configuration " V, {# c7 Y- y2 ?) J* C5 \; i3 yitem. Configuration items are traceable to the work breakdown structure (WBS)./ l7 r7 x* L: Y Configuration % O' D5 b% c" M# }% XManagement7 c, I. R& Y. w; T (CM)! i! `) m! p c In computer modeling and simulation, a discipline applying technical and0 L( n8 F3 I+ W# U, P' ? administrative oversight and control to identify and document the functional+ e0 ]6 G" M$ s; q; ` requirements and capabilities of a model or simulation and its supporting / Y( i, v6 V ~6 y9 V" Adatabases, control changes to those capabilities, and document and report the0 e m" p" {3 d' F h changes. See also Accreditation. 3 L8 i Z9 R) B; }CONOPS Concept of Operations. # Q. J9 z2 Q( V. a- aCONPLAN Concept Plan& `3 Z! o: d$ \0 d5 H% P% U8 Z CONS Contracting Squadron.4 K% @" x0 V" ]+ X$ } Consolidated7 |( b2 @% z0 T- h. U5 o Command Center # R5 t/ e4 C# o! V* m- [' _(CCC)- M% s8 s, @( v- r+ p A single command center from which USCINCSPACE/CINCNORAD can direct all( \! F; Y# }% `+ [2 I, |$ G9 U: ~6 Y his assigned missions, to include BMD. (USSPACECOM) Located in Colorado% l( n+ I5 j' h! m! R) {% M Springs, CO.3 o, U2 E# l D: E Consolidated ) `, g5 m2 d1 z$ ]8 @Intelligence5 X4 Q. Y# C9 z Watch (CIW) " P6 a9 ?- ~. @# S* \$ v9 {A consolidation of intelligence watch functions within the Intelligence Operations 1 }" W+ F. U' y6 _$ K9 B( kCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD 9 |- B* c/ ^* y/ \) m4 E/ s& H8 eAerospace Defense Intelligence Center (ADIC), and the Air Force Space ( O/ O E3 H! j5 _Command Space Intelligence Element (SIE). & H6 J. Z+ }, ^1 dConsolidated) [7 r+ h* y# G8 p7 {7 T Space " F/ z* U, l) H D" ^7 U- X* yOperations % L! j6 e/ E% `2 hCenter (CSOC)* L( C* a- T' n! q5 C1 B; ^ Series of centers at Falcon AFB, CO, which operationally control and maintain 6 L$ a. e, q8 U0 }$ rassigned DoD satellites. n: ^7 D( U" a6 s( { Consolidated # e1 R+ @1 N3 s6 F" PSpace Test 6 q5 f( ~3 s) n( P+ fCenter (CSTC)& \6 l" B4 \5 w- I Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and# E/ v9 }! t2 {9 j initial on-orbit checkout of operational satellites, operate R&D satellites, and : M5 s4 g! _6 t4 gserves as a backup to CSOC for operational DoD satellites.: |" d h) h8 I' U MDA GLOSSARY, VER. 4.0 C5 O! y! _, O' N3 G2 J$ _' Z 60 0 M4 X/ n2 V6 ]' ~5 o$ z, _Constellation* t5 e, a& E" B, r8 T6 L. h Size (CSIZE) 2 u+ y- M" h, Y* g$ A) J" QThe number of satellites of a particular system placed in orbit about the earth. . Q0 I/ B2 O) UContact Fuse Device used to detonate warhead on physical contact with another object. 5 n1 \3 K1 @! K; `Contingency 3 z3 R2 @( [) N2 M$ B4 Z1 iDeployment Plan * i* I$ j% y9 n# f- f1 |(CDP) 9 a+ B1 z% R! A, I1 WAn executable plan designed to deploy an early missile defense capability and: _$ X2 E9 D# b B reduce deployment time. The plan provides specific executable deployment$ w7 U. A) i& r2 ~8 Y. E options and describes activities required before and after a deployment decision.7 w5 s, V$ P: |9 P8 o The plan also allows decision makers to have oversight on technical progress,* i8 |0 S, ], @; S cost, schedule, and risks associated with a deployment system. 1 C: d/ |8 t$ VContinuity of; \6 u% c7 `- v6 l9 a$ e3 m Command 0 h% V" L0 s5 M9 g/ y7 J( RThe degree or state of being continuous in the exercise of the authority vested1 Q8 R% w, O' U in an individual of the armed forces for the direction, coordination, and control of 8 F+ V' l5 i' L6 x1 N6 _$ hmilitary forces.3 b' m. Y: B3 c* g5 p' f1 `% C Continuity of; B" q6 |( V' O3 R8 Q. d" O2 X6 d Operations# y H1 x Z" U2 J { The degree or state of being continuous in the conduct of functions, tasks, or % q$ ?# B! J2 w5 Y6 V' nduties necessary to accomplish a military action or mission in carrying out the1 W ?& i* Y5 G. y5 N national military strategy. It includes the functions and duties of the commander,( g" E4 W2 h3 i- ]4 c% P1 w# ^0 C as well as the supporting functions and duties performed by the staff and others ! b+ z/ `; m h$ ]" G1 K# nacting under the authority and direction of the commander. " t3 \3 F# L0 @1 Q+ Q7 H& ~Contract X3 A8 A6 f7 {( D$ x Administration - [( f- f# k9 b/ kOffice (CAO) + C! x! J. E \" x. Q( |The activity identified in the DoD Directory of Contract Administration Services ( y, f* @& [8 E/ a: t* lComponents assigned to perform contract administration responsibilities. It is a5 j5 K: x) M. n general term and includes Defense Contract Management Regions (DCMRs), - {# K9 S5 r2 L6 {+ j' Y1 W |Defense Contract Management Area Operations (DCMAOs), and Defense Plant 3 \' `+ Q. k! o {+ O6 d# q/ w: ?Representative Offices (DPROs). (Defense Systems Management College ( [: [. x+ b2 ~* `+ F6 E; M: oGlossary)' v/ _4 @7 [) ?7 k) p. u1 @ Contract Data . I( O5 ^8 h, _Requirements- }: w3 ^7 Z! U List (CDRL) 4 ]. e& Q1 u0 |$ n) R' C9 |# sDocument used to order (“buy”) and require delivery of data. Tells contractor1 [7 Z& [5 R) r& V' q. O what data to deliver, when and how it will be accepted, where to look for- j0 m( p3 V9 n) T3 q D7 P instructions, etc. 5 ^4 Z" H8 B) c% mContract ' N! R( ^, p! @8 LDefinition ) d, f% x: u. \' k1 S# m; WA funded effort, normally by two or more competing contractors, to establish/ D, b. Z2 N" o9 x+ A specifications, to select technical approaches, to identify high-risk areas, and to , O2 r. G) d" w; W, n, |) F6 Kmake cost and production time estimates for developing large weapons systems. $ b# Q+ y: H! ZContract Work$ }, _' t/ { [* s4 ^6 x. ~3 m Breakdown( [" f* e& v! w$ R: O' K1 E Structure * Z( e- ?- q6 G- A" Y' S+ dThe complete WBS for a contract developed and used by a contractor within the ' M! {' j2 _+ H4 F/ }) |guidelines of MIL-STD 881A, and in accordance with the contract statement of- t6 ^- X( v9 X! E" f6 z work.2 R) [6 T e% w; a Contracting 5 g: @% g3 y* | q% e& VOfficer (CO) . {# m4 F' w0 X; Z. d" X- F oA person with the authority to enter into, administer, or terminate contracts and : t( z" n9 f* b$ X' K, \" J& h* Ymake related determinations and findings. The term includes any authorized ! E$ o0 i% n3 {( \8 l: rrepresentatives of the CO acting within the limits of their authority. A CO whose 6 N' Y V" Z% Aprimary responsibility is to administer contracts is an Administrative Contracting 7 N5 r3 J+ \$ M7 X( O5 QOfficer. One whose primary responsibility is to terminate contracts and/or settle 9 t. r/ [+ R$ B+ t7 f6 y7 gterminated contracts is a Termination Contracting Officer. A single contracting 3 J9 H6 @1 d. t' O5 _7 V+ ?officer may be responsible for duties in any or all of these areas. 0 a1 |. K& H2 M1 x+ ^7 lControl Authority that may be less than full command exercised by a commander over# a+ Y# V- g" c part of the activities of subordinate or other organizations.' O$ |1 C/ T" t) {9 v# I Control; ]8 H6 J% P3 H) T0 N( _ Abstraction 3 q3 x' H, i8 _) k+ G# J(Software) The process of extracting the essential characteristics of control by0 h9 D, \3 s `- L defining abstract mechanisms and their associated characteristics while " Q0 u& e6 C2 j+ f- x1 F, {7 E. K3 Udisregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C/ f6 W4 j" {8 H8 Q) f 613 l$ V4 U8 q- f0 }6 a0 ~ Control and " M: ^. S6 u, P! R! T7 UReporting Center % N8 C$ ]% p rAn element of the US Air Force tactical air control system, subordinate to the 2 X( i# P6 D8 a+ `! e, e+ G ]+ Dtactical air control center, from which radar control and warning operations are ! N4 n6 ^* V" {% b g; g* G9 w! Lconducted within its area of responsibility.: y0 {$ g* V4 }9 N( n Control and* }! Y1 I: ^1 s' c# K Reporting Post 7 T$ S. y* ?# _2 ]An element of the US Air Force tactical air control system, subordinate to the' L- P6 O p# d( o9 h/ ~( Y control and reporting center, that provides radar control and surveillance within) L: r, F# B/ X- z. J; B its area of responsibility. 5 t. }1 ?8 i: C2 WControl Area A controlled airspace extending upwards from a specified limit above the Earth. ( i* X4 A1 X7 t3 a8 |5 W# ~ hControlled- K% E& \1 }, z% M" S Environment ) D' g! h. L* c+ _( g* W0 MArea where entry into the radiation hazard area is controlled. 6 p& k5 E5 W: ~) O$ K( MControl! b- b1 p D& ?& B$ A Procedure1 \# |% L6 V% W( ^# e. | The means used to control the orderly communication of information between . {0 P; {) J3 T% O6 ^1 cstations on a data link. Also called line discipline. ! O9 [5 \1 X+ c4 U% n6 uControl Station The station on a network, which supervises the network control procedures such H! V6 ?. t8 [6 R- T as polling, selecting, and recovery. It also is responsible for establishing order' j" P1 n7 K0 P$ _1 V7 f on the line in the event of contention, or any other abnormal situation, arising : N3 Y: O, C! _/ ?$ X' `between any stations on the network. ) v( I# V P3 GControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to7 b" o6 y3 A% ]3 Z4 I process sensitive defense information and that is under sufficient physical and ' @: ~. O% U9 I$ d. Ttechnical control to preclude an unauthorized entry or compromise.2 h$ S/ J6 D( K: p6 U CONUS Continental United States.: k% p, S/ m6 g( L8 V- p Conventional Co-6 U( _( m9 ~9 N& x9 l/ \: N3 U Production 8 @/ @/ K7 J8 s9 j) J$ Y1 t pAn effort between governments to produce the same end item, or components5 D, ~/ p6 Y* Z of the same end item, in concert.0 {, \0 l6 Z6 S/ F& e Conventional 9 b! V4 e# p7 JWeapon/ `/ g. ^" m! }: V) y A weapon that is neither nuclear, biological, nor chemical. * K' n1 B/ F* M7 gCoop Cooperative ' D- h# I7 h2 x8 b! T5 Y/ T! [Coordinated4 G' i/ r! g, a8 V2 i H; h Engagement . X8 j" ]# \& |5 o O, B4 R |2 xPlanning/Actions 6 q6 @6 O. i. |& g! |: {; I+ `' oNecessary coordination among engagement components to ensure maximum ' I* F- D5 o! \4 ^! Zeffectiveness of the SDS and resources are not wasted on targets already ; n, \$ f6 \9 Z2 r/ Ltargeted. q- _0 c" |+ ACoordinating7 v/ J, \/ t# P9 y6 Z* D* R! i Authority * v. {! x7 o! k' e5 F- r7 R9 AA commander or individual assigned responsibility for coordinating specific 4 \1 O# y8 T8 E! nfunctions of activities involving forces of two or more Services or two or more : J9 D; B2 \! _/ C" E' ~forces of the same Service. The commander or individual has the authority to 2 \# J3 ?5 L# C) I) T* Xrequire consultation between the agencies involved, but does not have the9 o9 {6 u0 c3 n/ L1 R$ F4 B authority to compel agreement. In the event that essential agreement cannot be " N. r3 k/ r& ireached, the matter shall be referred to the appointing authority. 0 X( o& p" i% ]COP Committee of Principals . x# w, y! U2 C2 B1 h! SCOR Contracting Officer’s Representative. Contracting Officer.7 D: O; E8 A* v: U% z; K7 I9 t) J7 S& Y CORBA Common Object Request Broker Architecture.0 \, k/ j+ i4 d; p) i( @& E7 y CORM Commission on Roles and Missions. 0 v& y8 r0 P2 n; t* b- lMDA GLOSSARY, VER. 4.0 C ' G: n9 \6 N- `" N: S( c" P+ t62 ! |+ z! I8 _( F! ^Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens( ^" ^( A) a9 m1 T/ j* F9 ~7 J perpendicular to one another, designed to act as a radar target or 3 v3 i( }& B; ^, _ r7 _7 }, ?* r9 Ymarker. ' x: F9 V( b t$ L6 F(2) In radar interpretation, an object that, by means of multiple reflections/ ^5 A# v6 {1 U; ^ from smooth surfaces, produces a radar return of greater magnitude than 1 T2 D' E3 F4 N2 P+ pmight be expected from the physical size of the object.6 p- ]0 w$ z9 H9 H Corps SAM OBSOLETE. See Medium Extended Air Defense System. + U" d2 f! O. iCorrelation (1) The process of relating observations or tracks from one set of data to; W6 s% u q) B' K( W9 p observations or tracks from another set of data, i.e., collecting data from" c# z9 M+ X' t& ^3 i2 n different frames or sensors that presumably relate to the same target. (2) 8 j# n# W: u* FIn air defense, the determination that an aircraft appearing on a ( N8 U# z, D* dradarscope, on a plotting board, or visual is the same as that on which , n! N5 t3 C$ }- yinformation is being received form another source. (3) In intelligence3 x b2 S% o- a" i' @5 a$ Y usage, the process which associates and combines data on a single 7 ]7 h8 r% i- E l0 jentity or subject from independent observations, in order to improve the & }3 a( `4 y5 z& W4 Xreliability or credibility or the information. 3 a* V9 b$ X" s7 F9 \5 ^COSEMS Evolving architecture operations support tool. ( N5 h7 R+ F* } CCOSM Computer System Operator’s Manual, P" r P" l/ i; p6 W( v2 l9 z" ^ COSMIC NATO security category.2 z0 Y0 [% d( M2 I _% R& }& ^ Cost Analysis 3 b! H3 ]% {* qImprovement8 R7 n7 }( w1 k% f: C# }# k Group (CAIG)7 H; f& n7 z6 A6 J" b$ Z An organization within the office of OSD Director, PA&E which advises the DAB # y1 W7 U# l. t+ `- e# Von all matters concerning the estimation, review, and presentation of cost, g6 C. r6 k% F9 _3 x analysis of future weapon systems. The CAIG also develops common cost3 |$ v0 x, C! d7 m4 i estimating procedures for DoD. $ w+ n" T2 H& d9 k2 Y! TCost Analysis $ `4 C' ]7 e" @9 }& DRequirements0 G& v7 V( z7 W7 R' g Document, K/ z/ K$ n& J (CARD)3 ~3 ]3 D; z& V$ v! j The document describing the technical baseline, which is a subset of current1 Q7 T! f4 f$ p; a3 H2 i3 @$ w system technical data and is used to generate the baseline cost estimate for an. `) G% n( z7 _) M+ f! w SDS element. It includes, but is not limited to, the element description,/ \7 a# r) ^- h# b7 n interfaces, operational concept quantity requirements, manpower requirements,3 u- G' H- U% m/ _9 Y activity rates, schedules, research and development-phasing plan, and facilities( M7 B% B3 ]5 ^. o# | requirements. : D2 A6 j: Q+ m- w/ |# }: cCost and4 r5 M% \$ L: K Operational( u) W( d9 `" f; N7 ^% t0 V Effectiveness3 X8 O4 z. Q" x! m Analysis (COEA)& i' c m6 r- H) J+ F7 _- S- J! I An analysis of the estimated costs and operational effectiveness of alternative 5 ^6 g; h. y2 g, Nmateriel systems to meet a mission need, and the associated program for - d3 v% q- F, j& Uacquiring each alternative.4 M# [2 k( K$ |6 r Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk: [& P8 N2 f& X' Y due to cost estimating errors and the statistical uncertainty in the estimate. + ~2 M( u! w+ Z `7 J0 M6 M% jSchedule/technical risk is risk due to inability to conquer the problems posed by $ B- ^1 P, O B3 E& ^7 jthe intended design# j" I% ?& m& q+ x( g COTR Contracting Officer’s Technical Representative. See Contracting Officer.' j* f: a, B6 m) n COTS Commercial Off-The-Shelf. 8 k0 C" b" |# t" O+ p$ b9 f5 Z: C5 | ?8 jCounterair A US Air Force term for air operations conducted to attain and maintain a desired 9 K. o2 x) F6 K1 ddegree of air superiority by the destruction or neutralization or enemy forces.8 g' |3 q: \' t0 R( P: c Both air offensive and air defensive actions are involved. The former range S2 e" T* Z: {+ U2 ~- Pthroughout enemy territory and are generally conducted at the initiative of 9 @3 J7 p5 b! {4 ]1 {* @/ Ofriendly forces. The latter are conducted near or over friendly territory and are 3 S. L- J" E: ggenerally reactive to the initiative of the enemy air forces. 0 e! }$ J/ s2 |; ^4 q* [MDA GLOSSARY, VER. 4.0 C ) r+ W" v% ?! h. H* h: t63 / n7 I8 T! R g# y( |: V5 m+ G+ b5 g" w) UCountercountermeasures 7 f, Q- s4 f6 v2 I7 Q2 \9 k3 _( A(CCM)& |# {$ ?- f' M* r/ Z3 j p' a Measures taken by the defense to defeat offensive countermeasures. 6 G: ] C7 Y2 s# U& }: ~Counterforce The employment of strategic air and missile forces in an effort to destroy, or& w! g7 U. X! b& T. V3 w render impotent, selected military capabilities of an enemy force under any of the ?* c& {3 Z4 q* o, [9 R6 fcircumstances by which hostilities may be initiated. " C0 A0 k/ w" f6 C6 F! M6 N- ~/ ACountermeasure A design or procedural measure taken against covert or overt attacks.' Z& I& l4 Z. ]" X8 d% d Countermeasure5 N: Y% ]+ _7 o* O" m s (CM)0 M. @- w2 t. C% ~& p' K, g That form of military science that by the employment of devices and/or X6 T4 `2 g3 r techniques has as its objective the impairment of the operational effectiveness of; N, A& k7 A9 v; e, }, M enemy activity. ( y9 ^$ ^2 J# H' \: f$ T+ k* iCountermeasure 9 O# x5 a, D- s* m5 \! v5 v& j" |s Rejection1 f* a. {" K/ l (Surveillance) % S- K# U K( jImprovement or rejection of an object signal in the presence of * [7 a; Y/ ^: w; I; kcountermeasures. ' p# k* j' c1 r$ ^* [. e& \Course of Action 6 F; D: M/ J; u4 ^. Z- y(COA)- u3 D& a, s1 i" a c. d$ X (1) Any sequence of acts that an individual or unit may follow. (2) A possible s7 r$ k1 `* H, [* S# hplan open to an individual or command that would accomplish or is% g3 C; |/ o9 \9 g+ E9 @7 o B& C' V5 s related to the accomplishment of his mission. (3) The scheme adopted + E3 E4 [. a$ F2 Vto accomplish a job or mission. (4) A line of conduct in an engagement. $ c, s+ n# V9 n& E- z# R(5) A plan to accomplish a mission. It describes the execution concept . n3 _( o3 K1 l! P5 H3 ?for BMD of North America. It will specify the engagement priorities," d- \/ h; G, z" C resource allocation and desired results by Area of Operation (AO). " v( y2 u0 F6 P6 t3 F(USSPACECOM) (6) The scheme adopted to accomplish a task or 8 M9 l9 _1 w$ T0 H. u7 M. ]1 xmission. It is a product of the Joint Operation Planning and Execution& W Q. \$ h8 c! }; y4 \% D, m System concept development phase. The supported commander will 2 B/ T4 z# ~! g0 H; m3 einclude a recommended course of action in the commander’s estimate. 4 I7 X b- {% r- w: U( |! rThe recommended course of action will include the concept of & v* t3 N" l+ s3 Moperations, evaluation of supportability estimates of supporting 2 r, ^4 r) _. \$ D1 O7 j+ dorganizations, and an integrated time-phased data base of combat, , h% h# O& n! Lcombat support, and combat service support forces and sustainment./ Q; N! I4 h2 P3 m% H4 f Refinement of this database will be contingent on the time available for* ?& w; N' I1 z# \' W course of action development. When approved, the course of action ' w+ E* s" J7 ?7 e, y) ubecomes the basis for the development of an operation plan or 5 t- p3 {$ B) Zoperation order. 6 _$ F& G- U% @# I+ S4 iCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps,# v: v; W3 w; m- j/ D& |9 t9 v and other geographical presentation systems. (2) Cover or protection, as4 Y9 I/ s0 I( X# f* t+ b* G0 B the coverage of troops by supporting fire. (3) The extent to which- w. p& V- \) d( F! Y$ M& z- ^ intelligence information is available in respect to any specified area of, ~6 V: e$ e. t9 ]$ h4 U4 l interest. (4) The summation of the geographical areas and volumes of8 z6 }- e$ y! Y$ H7 P aerospace under surveillance. ) h/ s" x4 {: R' eCovert Timing1 [) J" O4 L/ s+ ? Channel 9 P+ c. E) f- v9 k2 V+ oA covert channel in which one process signals information to another by+ G2 x5 k4 M- e# @& S modulating its own use of system resources in such a way that this manipulation9 |: S. z: g& V4 H/ n* L: @ affects the real response time observed by the second process.+ i5 ~3 T- R" Y9 z CP Command Post.5 t5 P) s8 A* p, g& O7 L CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. + M% Y- } Q% t1 s# {( Q7 c1 nCPAF Cost Plus Award Fee. 5 M7 r! N. }4 H' TCPAM Chief of Naval Operations Program Assessment Memorandum (Navy) % D9 k1 [5 M' p4 C5 O% }MDA GLOSSARY, VER. 4.0 C ) U2 p+ N9 s" W64 , t; i" C5 \# TCPAR Cost Performance Assessment Report., B. Q( p. R. q9 o) a CPAT Critical Process Assessment Tool ]3 g- }& D5 r% mCPB Charged Particle Beam. a1 x! S, u2 BCPEV Communications/Processor [Network] Experimental Version. 8 i& {% k: Z8 mCPFF Cost Plus Fixed Fee./ r/ y9 }6 | O/ R3 T$ X2 O" E7 Z CPIF Cost Plus Incentive Fee. ! f1 Y: i2 R$ K- _: g1 nCPIPT Cost-Performance Integrated Product (Process) Team. 0 x r9 S. g1 X" m3 K0 D1 C8 q2 @CPM (1) Critical Path Method. (2) Contractor Performance Measurement. 3 f' m2 j$ A+ F- z7 v* ?CPP Critical Performance Parameter.' i# f0 V/ M0 S6 Y CPR Cost Performance Report.; H/ l7 N" a6 _: {# f CPR/NC Cost Performance Report/No Criteria (Contract management term). 4 V; X! V% K! `# x0 s1 [; @CPS (1) Consolidated Program Summary. 7 t0 ^% Z' d+ ]+ H+ o(2) Competitive Prototyping Strategy.. a- g8 w4 c i6 w. H (3) Current Program Status.8 F# ~; ?1 a/ w: @2 g% f- e0 \2 Z' R- S CPU Central Processing Unit (TelComm/Computer term). & y* v! Q& l" }$ Q2 _CPX See Command Post Exercise. 6 w$ V& [1 X% G2 y7 ]3 b: S8 `+ CCQAE Chief/Contract Quality Assurance Evaluator. : e3 z: ?8 e- w" a! }% Z* _4 UCR (1) Computer Resources. (2) Continuing Resolution (US Congress term). 8 L4 Z2 D( x% P2 J6 A2 k1 I8 qCR-UAV Close Range Unmanned Aerial Vehicle.( F' P, Q2 f( Y+ @& |& X5 s8 h, Y CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement0 r4 o" W+ Q. f, q CRADA Cooperative Research and Development Agreement.' J" v9 W! H6 [! f8 ]* |0 [ CRAM (1) Control Random Access Memory.( c5 K( E9 c& d. Z' ^+ }' V (2) Cross-tie Random Access Memory (Computer term). . l% Z' z" M2 [+ d9 o& aCRB Configuration Review Board. ( i) n/ K' T4 h% R$ OCRC Control and Reporting Center.. d. Q' x1 I. Q# a CRD (1) Capstone Requirements Document. 1 y! P6 t9 J. ]: G6 Z(2) Component Requirements Document. 4 D+ H8 Q: [$ ]& H8 y" t& \7 L1 tCRDA Cooperative Research and Development Agreement. # F0 P! i6 G0 D9 G4 [CRG Communications Relay Groups (PATRIOT).: R' E! M; S+ j- c+ C6 Z0 h/ l CRI Classification, Recognition and Identification. 6 d" A8 \; D* HCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C; x* I$ `, q" b2 R o J 65* n6 S' ^* x9 `0 f9 A3 V, P9 M9 p1 R Critical Design 3 l0 ]& k1 ?. k. g: V: QReview (CDR) 6 d; E: i1 @% H: `' e. i* IA review conducted to determine that the detailed design satisfies the 7 v- g, H/ v: f2 c5 l! _performance and engineering requirements of the development specification; to/ I- l1 u3 C" W' N' D9 D0 h establish the detailed design compatibility between the item and other items of' y% D$ z& ^" @* F# C3 d equipment, facilities, computer programs, and personnel; to assess producibility 6 K; M6 L; C kand risk areas; and to review the preliminary product specifications. Conducted" g* e3 w) d5 M! y* s4 V# M during Phase I, Demonstration and Validation (for prototypes) and Phase II,: n* M( G* K9 \' m. i Engineering and Manufacturing Development. 8 f" E5 |7 ^# n. a9 hCritical 5 R- g5 E! |& i! D* P3 p$ QInformation . C) ]* \& t# H0 H) ESpecific facts about friendly intentions, capabilities, and activities vitally needed7 l/ q4 ?, q* o+ X9 M4 a( t by adversaries for them to plan and act effectively so as to guarantee failure or $ m- t# l4 _4 h0 n& n- cunacceptable consequences for friendly mission accomplishment.6 w2 q% K1 r" m& p5 }- \ Critical # W3 w! A( C% g& |1 eIntelligence % }$ r4 {$ d5 K0 T; H3 V0 L9 KParameter; O0 i+ ]& k% x, z( G+ ` A threat capability or threshold established by the program, changes to which* p2 i) d! ~; I( y9 r$ v could critically impact on the effectiveness and survivability of the proposed ! M1 |5 @4 z/ v% z2 U; y5 hsystem.6 M$ ]5 S2 r4 G Critical Issues Those aspects of a system’s capability, either operational, technical, or other, " s& q: _3 [! e: }& ~7 @8 ethat must be questioned before a system’s overall suitability can be known, and * A( k9 R# x3 t; _, j; Cwhich are of primary importance to the decision authority in reaching a decision , w5 K3 v& V) Kto allow the system to advance into the next phase of design, development, 1 `: _. l) K* a. Pproduction, or post-production." m& @4 B$ T- @% @6 G Critical ' W' O! B* `* pOperational 4 o. l1 w8 O o9 q! ^# Z- M+ yIssue 3 c, W2 K: ~3 {, l3 R! P* r% v: z. }A key operational effectiveness or operational suitability issue that must be2 i! S4 P) s- Z* Z examined in operational test and evaluation to determine the system’s capability 6 Z% D0 W/ f/ n3 v/ c I2 sto perform its mission. A critical operational issue is normally phrased as a * ~0 j% F* [6 d! n8 V1 V/ X. cquestion to be answered in evaluating a system’s operational effectiveness ) h3 n+ n d2 G, S, k- j1 ~7 fand/or operational suitability.# t4 W5 k d# n3 C3 |# B Critical Path - A8 E& G+ ~4 q1 nMethod + a" ?& R! Q6 g7 U5 p0 iA technique that aids dependency of other activities and the time required to' U$ k5 w3 s- ^! E+ M complete. Activities, which when delayed have an impact on the total project " I# @3 J8 C: {' E: k5 e& v$ c8 uschedule, are critical and are said to be on the critical path.) t( R4 P3 }8 [# s Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to 2 }- `4 C* D) o1 Athe viability or the operational effectiveness of the SDS. $ c$ l' i0 A3 Y! k; }" pCritical Security & I* l4 [+ j) g) i$ V: N2 |Risk9 i Y4 b% I8 e The existence of a security vulnerability that, if exploited by an adversary, could ) Y/ a' I( p( X5 ~1 C) q. [, |" Ocause exceptionally grave damage to the viability of the BMD or the operational 8 a; }8 U+ A z; O- A% veffectiveness of the SDS. Critical risks assume an adversary’s capability to ' s- ^% E5 j' v. `, }+ icause major system disruption or degradation (e.g., single point failure), 0 |1 D! H- z- cdestruction of mission-critical components, or usurpation of system functions. . c+ a* l$ s# B+ y# a. xCritical& i5 J: l6 B. J$ x5 S! y Supporting & E( ~* `/ X' HTechnology8 {4 A( f8 K7 N# F$ [) C! Q- {! C A technology that program management personnel consider a critical part of the0 J+ F3 n3 p' X0 N$ C program being described.6 x; i) n- T' S( n3 Y' \2 n CRLCMP Computer Resources Life-Cycle Management Plan. 7 ^5 }1 c( g+ W' ]2 N7 y4 nCRM Computer Resources Management.5 x" [9 k2 y: @) u. N- ^6 d3 g3 Y CRMP Computer Resources Management Plan.: c: t1 H: B }* D CRO Chemical Release Observation. 3 g% J8 p7 `) DCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC9 H& A; N5 B; m# s8 C* g term.)# L/ |4 u2 O& \ MDA GLOSSARY, VER. 4.0 C# J& S, a: ?: m6 O# x* W, {+ g 663 ^/ E, H2 ?0 s7 |6 u2 z CRS (1) Computer Resources Support. (2) Congressional Research Service. (3) ; U0 f+ h2 u1 ^: C- QContractor Reporting System. " Z- U0 U9 U ?, v2 Y7 K, H0 lCRT Cathode Ray Tube.* a* x3 C( \8 ~5 i8 e- ` CRWG Computer Resource Working Group.- ?# I( t2 ~4 `2 Q3 ?7 t Cryocoolers Cryogenic Coolers. 9 S! U, ?9 s& ?7 ~+ L; L* \Cryogenic Of or related to cryogens (substances which are used to obtain low/ q- a9 h/ g$ A6 H( b) v1 f' [0 W temperatures).# [+ v2 v" V" ^2 Y4 V Crypto A designation or marking which identifies classified operational keying material, A, W/ ]) f6 ]/ A% {8 Mand which indicates that this material requires special consideration with respect / j$ G! C. ^1 Yto access, storage and handling.; R1 [/ n- F7 n6 F7 u) J5 a Cryptographic. \# ~" l8 H3 H& i+ d4 t- ?/ U5 L8 o System) l- @( s+ L- `5 }% j The documents, devices, equipment, and associated techniques that are used . z3 q( m! b# ?. M7 ias a unit to provide a single means of encryption (enciphering or encoding). & C3 @/ Z; C0 i+ B, Y' j, w6 uCryptology The science that deals with hidden, disguised, or encrypted communications. It ! n& t4 ^6 G, f3 y5 Nincludes communications security and communications intelligence./ H( _2 w$ H; J8 u) Y# z, o/ ] CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. ) g0 y* X, _" a. vCS/CSS Combat Support and Combat Service Support (USAF budget term).7 q% L- |; t' T/ C% I. @ CSA Chief of Staff of the Army. . g3 D' G) ^- rCSAF Chief of Staff of the Air Force.' n0 b: M$ [2 I CSC Computer Software Component. 8 N1 K3 F7 j$ G+ Y! M( k9 s T) CCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)- f' u; {: R3 y* S CSCSC Cost/Schedule Control System Criteria.( X$ B5 O( G* ~6 B/ W* {8 G% u2 O CSD (1) Constant Speed Drive. (2) Critical System Demonstration.0 {% }- w; b3 n' q, H/ R+ F CSE Center for Security Evaluations (DCI)., {1 z: r: L! G* I( Y CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon; e- p# T% h7 I* T System, located in Cherry Hill, NJ.; v9 o3 J2 e" V$ _, F" I CSF Consolidated Support Facility, Arlington, VA.9 y' ~- ] j7 M9 L% U/ F CSI (1) Critical Safety Item. (2) Critical Sustainability Item.' }6 H' j; k s/ U' C CSIP Current Systems Improvement Program.! c) {: u! q2 U, m CSIZE Constellation Size. 4 U3 e- g8 O1 m0 HCSL Computer Systems Laboratory.& b2 S) d# N: a9 k CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. ! g0 O5 V" w& N ~5 wCSNI Communications Shared Network Interface (NATO term). 2 g! x8 ~: p ~% M7 G8 A7 vMDA GLOSSARY, VER. 4.0 C' A& T1 P2 {& U6 ~- I2 d 67- }2 N: q# q" Q z4 X CSO Closely Spaced Objects./ j- ~7 e3 {' V: A! ^ CSOC See Consolidated Space Operations Center. ?6 a7 U) \' @8 T' j CSOM Computer System Operator’s Manual! I5 b$ T8 o# w9 q* {4 w CSOSS Combat System Operational System Sequencing6 Z0 s$ e7 b: Z/ ~/ J CSP Communications Support Processor (numerous locations, including USAF Air * W: f) m( x; Z: W; a% e) w5 IDevelopment Center, Rome, NY term). ! s/ u/ U+ L7 o3 {. O7 {CSRD Computer System Requirements Document.& v( v t X5 H/ h" m CSS (1) Cooperating Space System. (2) Communications System Segment. (3)) V B* X/ D# [4 r& V Contractor Support Services. (4) Common Sharing System. (5) Communications. `0 v) `1 L y d. a- q6 u Support System (Navy term). (6) Common Support System. (7) Combat Service+ {& g+ l- W) N Support./ U5 z/ D$ h, t8 o CSSCS Combat Service Support Control System (USA term). " D/ f. O0 d: d7 F. Y8 p/ x: ]CSSPAB Computer System Security and Privacy Advisory Board. # G- c* ^" N3 M3 @CSSO Computer Systems Security Officer. - u: p- B$ s) m+ B* o/ i4 G7 `9 gCSSTSS Combat Service Support Training Simulation System (US Army term).. |2 B+ _2 V6 z9 y9 u8 S CSTC Consolidated Space Test Center.+ [' ]4 i: ` T# q CSTI Civil Space Technology Initiative. 4 h: G3 i# V5 ]" a3 R1 ]CSU (1) Computer Software Unit. (2) Communications System Utilization. , H! t) d I& W- jCSUR Communications System Utilization Report., |( K+ j6 H; V) G. e) a ? CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. . _2 q3 ?) c7 u8 _" V) A" G* i% `' ~(4) Cryptologic Technician (Navy occupation specialty). 8 G3 ]( u5 M: ~1 sCTACS Contingency Theater Air Control System (JFACC term).9 e+ p& V% N: n* f CTAPS Contingency Theater Automated Planning System (USAF). # \# l" |# y% M h, k( p6 Y6 eCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ; G! |4 L0 D2 y8 S& KCTBM Conventionally-0armed TBM./ v" k9 N' |. q1 e7 E# T2 o: F8 e CTC Combat Training Center, Ft. Leavenworth, KS. + Y: k; N1 R$ H5 p* NCTCC Critical Technology Coordinating Committee.' p% c1 y/ ?/ \, G5 B5 { CTD Communications Test Driver. # f; ?* W: g$ T4 ]; W& v5 hCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. " c0 i* o7 }! j4 I8 `% j( ECTEIP Central Test and Evaluation Investment Program. A DoD program for centrally 3 X- ^2 t. r6 y/ B1 H7 k' ~funding selected test investments proposed by the Services and Defense ' w6 c( u( n/ G9 Y: |/ e- TAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C ; m" A& Q: R- P2 [+ w4 u1 @68 . M6 }, X i8 }! lCTF Controlled Test Flights.* s) K0 j& Z' x% R7 T/ y' Q/ ? CTI Concept Technology Insertion.5 w$ H4 e* l. ?$ ? E% Z CTN CALS Test Network. ' F& A5 z2 n0 L/ qCTOC Corps Tactical Operations Center. r8 u) d3 H2 J2 J9 C( H: }CTOL Conventional Takeoff/Landing aircraft.' h$ O) m, e! O3 ?/ M CTP (1) Critical Technical Parameters. & p& F0 z. V# b4 g( k(2) Communication Tasking Plan. : i. m' F% W' Q% m(3) Consolidated Targets Program. 8 [8 A* \. F0 ZCTPE Central Tactical Processing Element. 7 t$ `* M5 ~6 z* C5 zCTPP Consolidated Targets Program Plan. # A: ?+ F% G; Y' L ]$ T) M/ sCTR Cooperative Threat Reduction (Treaty negotiation term).& ?! G w+ }$ o$ N9 z, ` CTRS Centers; N' i9 Y! q+ b8 `5 l% g CTS (1) Clear To Send (TelComm/Computer term).! ~, U. [0 E7 n0 l9 f (2) Contact Test Set (USA IFTE term). : R I1 p0 T8 j' zCTSS Computer and Telecommunications Staff. 2 v2 `' }' S0 F6 ZCTT Commander’s Tactical Terminal (US Army). : K, E2 q' o- N& o! NCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).9 L4 F- H5 `0 m1 J" ?$ Q$ D CTV Control Test Vehicle(s). ) Q' V1 P: h7 eCUDIXS Common User Digital Information Exchange System. ) @( ^+ s8 r8 { @+ h+ E& z6 M/ LCued Operation The directing of one sensor based upon the data received from another sensor. # \" e/ s9 ]: Q9 MCueing Command The command within a tactic, which specifies the sensor element’s coverage, G$ F2 i4 \/ F/ M' C volume. 1 _0 u% w7 @' g8 s. L9 dCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage5 |4 `2 A+ Y1 Y: R' { volume. 0 u: g$ f9 s+ @: GCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. 1 o Y3 _" w4 R/ i+ O2 M6 lCV/BM Carrier Vehicle/Battle Management. 2 D2 ]. x( ^2 u3 rCVBG USN aircraft carrier battle group. " B9 f7 @1 f) T6 OCVHG Carrier, Aircraft (V/STOL), Guided missile. ( O6 p# `) ^9 G8 v0 j- `- W, i1 |CVISC Combat Visual Information Support Center.5 |* B- b4 b. G7 y9 W6 X6 G7 }- S CVL Copper Vapor Lasers.* M& g& l6 M9 ]& ^- I CVN USN nuclear powered aircraft carrier. + b2 ~- v4 l7 ^4 G) C& ^MDA GLOSSARY, VER. 4.0 C ' I. t; S( X+ t5 n8 d8 f0 o a69 5 r0 m/ P ?1 O( N9 ~% B% DCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 7 t7 U* k) h! m9 U9 s+ }CWAR Continuous Wave Acquisition Cycle (Hawk).+ \; c8 |, \$ j$ h% x2 f CWBS Contract Work Breakdown Structure. 2 ^$ Z0 T- z9 \% p5 C9 ~# [CWDD Continuous Wave Deuterium Demonstrator.& K4 I6 p7 F; b* I CWIPT Cost Working group integrated Product Team. 7 w w' q' p, z+ V* {9 \5 YCY Calendar Year.: k. P* p7 \- [% a: D MDA GLOSSARY, VER. 4.0 D ( z E. m/ I8 d7 Z/ z5 m71! }$ h1 O1 N% d D Deuterium 6 F% g+ v, n$ q# n6 J0 w8 D: XD Spec Process specification.& A% m- O% t9 S/ K. T D Star Measure of infrared sensor sensitivity. ! J9 G; s0 P3 g1 n* ^- AD&D Design and Development0 C! i1 Z- E! n; H D&T Detection and Tracking.4 q J1 y% |# N' Y0 { ] D-IFOG Depolarized-Interferometric Fiber Optic Gyro.. v% O; `2 T# N9 V2 e+ a8 D1 M D-Level Depot Level (ILS term). ; F% E1 R7 S/ X8 |7 x" H2 \D/A Digital-to-Analog; W2 V9 h0 k) M h D/V Demonstration and Validation.# q* [8 F0 k \4 H4 e D2 Projective (interceptor) in the Hyper-Velocity Gun program.$ ~' {- Z3 G2 ]5 _1 G DA (1) Department of the Army.* j& R$ F4 `) |8 Q! Z% X (2) Department of Administration. $ m/ W, h% u2 g3 h6 U(3) Decision Analysis. " U$ }$ b) I" x0 A$ m(4) Developing Agency/Activity.. F, B- b N: o, @# ]- F- n* G. t4 \ (5) Data Administrator. ( B ?2 o8 u/ P; ~5 `- P7 }(6) Direct Action. " V c/ _. U3 ~# L' K(7) Data Adapter.- Q# Q; Z1 k b F% K8 \, A# ] DAA Designated Approval Authority (DD 5000 term).. \' V2 }# J' j- W$ o; h DAASAT Direct Ascent Anti-Satellite. 4 O2 P* y) C% d1 @2 y5 kDAB See Defense Acquisition Board.+ K# k1 l0 S1 @8 O( Q3 f DAC (1) Days After Contract [Award].! x" j7 R; v9 W8 ?* \/ J) r (2) Department of the Army Civilian.2 K2 f M# e' t" a M7 g5 D (3) Directed Attack Characterization. 1 F6 E6 x' F! y(4) Deploy ACCS Component. / N& H% X1 z0 Q4 s(5) Digital-to-Analog Converter. 5 ^! e, k4 W; p: X+ I: ?DACS Divert and Attitude Control System. ( j% N0 y4 K' I! NDAD Defense Acquisition Deskbook./ H, W8 i4 r" x DADS Distributed Air Defense Study (1993). " ], V8 S6 q! X8 R1 vDAE Defense Acquisition Executive.3 `/ z; U, s' S4 J6 o9 k- @6 u- ` DAES Defense Acquisition Executive Summary.! H0 P( Q! c2 @2 u. ]; j" i DAGGR Depressed Altitude Guided Gun Round.; @* ~' Y8 z$ F$ Y9 e' S DAHQ Department of the Army Headquarters. ) r, G; Z' x& ~' `$ `DAI Damage Assessment Indicator (targets). , k6 V% ^2 S1 n) wDAL Defended Asset List./ ]3 |1 _0 L. z' E0 ^ MDA GLOSSARY, VER. 4.0 D3 Y: y" h r, n' ^, B( y$ Y& w; D+ V 72 / x' ]7 j* b: P: Q3 W* g' JDAMA Demand Assigned Multiple Access.+ I2 g2 ?& D- n$ d& z4 s" |7 u DANASAT Direct Ascent Nuclear Anti-Satellite.- l7 [$ m( L8 X( s DAPR Director’s Annual Program Review (SDIO term)5 g& G3 q7 u$ [ i1 ?$ e/ K! e; `& P DARO Defense Aeronautical Reconnaissance Office (OSD). 1 P7 Y/ e! M- @+ h1 MDARP Defense Aeronautical Reconnaissance Program. * Q% G3 P* w. n7 u4 ^# U2 O' TDARPA Defense Advanced Research Projects Agency. See ARPA. ! {1 \6 u5 ?0 Z. @DART OBSOLETE. Defense Acquisition Review Team.2 y+ U" l; ~" [( a' X4 T DASA German Aerospace. Member of the MEADS Program Team. 2 q1 J" I" p) S- e% lDASC Deep Air Support Center (JFACC term). & c- G: b0 Z/ [! JDASD OBSOLETE. Deputy Assistant Secretary of Defense. : X5 b" \4 k- V* U! [DASD (C3) Deputy/Assistant Secretary of Defense (C3)/ e9 M3 N2 B" H9 d& K% D DASO Demonstration and Shakedown Operation. 5 B/ d: C& n( e6 m6 uData Integrity The state that exists when computerized data is the same as that in the source+ N" @* ~0 A4 Z4 R) T j$ `4 I documents and has not been exposed to accidental or malicious alteration or3 D( x2 Y. h$ s0 o! C, M2 S& B destruction.# j+ b) m/ r u) `& [6 `& Q y& N( _" `" e Datalink (1) The means of connecting one location to another for the purpose of " P! s, a( Y& ktransmitting and receiving data. , t$ {7 _' |4 n(2) A particular path between two nodes over which data is transmitted. It + g9 ~; \2 e' g2 G1 s9 |includes not only the transmission medium, but also digital to analog6 d3 C4 Y3 Y, [) D5 t) D! h converters, modems, transmission equipment, antennas, etc., associated % q+ \* z+ R/ S& F, Vwith this path. In the SDS backbone network, it was a path between two + o; }0 o4 B6 v3 cSDS elements. In space these datalinks were microwave or laser. On 5 b( X* V! W$ b6 Y, ~- L1 Qthe ground, they could have been wire line, microwave, or optical fiber. & x( E8 t7 @6 _9 {% x( I# j% L/ ~! dDAU Defense Acquisition University, Ft. Belvoir, VA.! G* s1 M W7 R+ ]1 E8 Y* v DAVID Development of Advanced Very long wavelength Infrared Detector (USAF 1 l( ~2 m5 t+ xPhillips Lab term).8 d( r) E2 ?8 k% D- l0 Y8 ^ DAWS Defense Automated Warning System.! T) ^4 P/ f/ B% n" X Dazzling The temporary blinding of a sensor by overloading it with an intense signal of! e! v1 j- ~/ o electromagnetic radiation (e.g., from a laser or a nuclear explosion). ) `# V, c2 }' t8 LDB Bata Base 6 s1 F% m7 e. Q) s1 j* F2 {! VDBME Database Management Environment (Computer term). j* i: l4 o8 wDBMS Database Management System. , q0 ]% L% T* l6 ^( I0 |5 pDBOF Defense Business Operations Fund. ' ?2 r# k- x$ a6 ZDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D 8 g# h- Y7 G! o% o73 9 }: `% c1 s& J& a* x; T1 x& K2 yDbsm Decibels per square meter., T9 K6 _! f5 Q$ J* v6 {* E7 b DBSM Database System Management. # w* Z0 K, I% K' N9 RDC (1) Disarmament Commission. (2) Direct Current.# T% F* ~) i a DC-X Delta Clipper Experiment. ; E* M& _0 d$ O; ^; u/ \DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications ' R# H! `! M# s: T; z# h# ZAgency. (Now known as Defense Information Systems Agency (DISA)). 7 a3 ?5 d9 V. g* \& ?DCAA Defense Contract Audit Agency.1 z7 a/ C9 W0 q1 f& W$ \ DCAS Defense Contract Administrative Services. 8 V! h) I F) R2 SDCCO Defense Commercial Communications Office (of DISA). # V) s k, L; T4 u; E* K/ HDCDS Distributed Computer Design/Development System. . d2 d, p1 u8 l( bDCE (1) Data Communications Equipment (TelComm/Computer term).0 f% Y2 v. z9 P" a2 k (2) Distributed Computer Environment." {7 `& N0 x0 }& k& O DCEC Defense Communications Electronics Command. + i% C" ~& u/ Y& J% l) \DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. ]7 {1 J: @5 N X6 f' W SDCINC Deputy Commander-in-Chief. 0 S7 W3 U }+ W( P6 [DCM Defensive Counter Measures.8 K a4 ?% D6 [ DCMC Defense Contract Management Command5 e" O4 v: g6 z0 u DCN Document Change Notice., m& E1 e c, Q$ I0 G6 {/ w6 _9 Z DCO Director of Combat Operations (JFACC term)." j" f" C8 s* K1 a DCP (1) Decision Coordination Paper (see ADM). 7 }7 N4 ]0 E: ?( F: O2 d(2) Director of Combat Plans (JFACC term).: _+ \ `& L& X6 `( O$ H7 ^2 V E DCPG Digital Clock Pulse Generator.+ J) G6 j/ y5 _' [ DCS Deputy Chief of Staff. : X4 {# o3 _3 ]: _DCSOPS Deputy Chief of Staff for Operations and Plans (Army). M8 M' ~2 f( E' p5 W9 g3 V DCT Digital Communications Terminal0 S ~( W! w6 C* Z! R; M DCTN Defense Commercial Telecommunications Network.9 B9 A7 v* G% g5 O. O DD Variation of DoD. ( T. H9 \. s9 v2 z# T# Q0 U4 W# _' I+ \DDCI Deputy Director of Central Intelligence. & b4 E! D# a% H) [ g* ZDDEL Dwight David Eisenhower Library, Abilene, KN (army term).+ i2 n8 t8 N* J, v% U: _5 Y DDG USN guided missile destroyer. , D- [! z& Q" o( U) SMDA GLOSSARY, VER. 4.0 D" M( s$ v2 ?# c6 B 74 : D }' ^$ @% bDDL Disclosure authority letter.5 w+ K" `, `1 {0 V4 Z" R DDN Defense Data Network. ) D( l4 E4 R! p) _DDR&E Director, Defense Research and Engineering./ Z+ t* v- p8 P& n, W DDDR&E Deputy Director, Defense Research and Engineering.0 K7 S+ q6 |5 s DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). # @/ P3 B3 ^) U; A7 H4 g$ c0 z RDE (1) See Directed Energy. (2) Delay Equalizer.0 d/ L9 n/ [1 G# ^5 a0 F9 F DEBRA Debris, Radiance Model. 6 j4 p4 x# J. i7 Y6 L0 SDecentralized 1 t$ o) z4 I. pControl4 Z, K( I$ n! P+ m$ B- d In air defense, the normal mode whereby a higher echelon monitors unit actions, & T4 g' ~$ k& |making direct target assignments to units only when necessary to ensure proper * N& E2 F; }# `fire distribution or to prevent engagement of friendly aircraft. / r- T$ \$ d( h0 c# kDecentralized : U: ?& K! j7 f1 f! A: A$ TExecution 3 p% N& U7 E+ Y+ @: i0 SThe distributed and integrated implementation of USCINCSPACE direction by- ~6 }$ b. D' T, A9 t$ l) M the BMD forces. (AFSPACECOM); S& ?: x @* w+ |3 r Decommissionin) H& r. d2 t) [/ \: s4 |* [ g 1 f) k7 g# H( G! KThe removal or the rendering useless of obsolete or no longer needed 5 L, B+ R; k; v7 S. rcomponents of the BMD system from service. # f/ O+ X4 B/ K8 ~5 j9 fDecrement A directed funding level reduction for an acquisition program. ' Y) s: S$ t. y0 B8 ?DED Data Element Definition (Computer term).; {. R/ F/ U& R9 \6 n: d6 {8 L' r Dedicated Mode2 u- Z/ i# {' Q1 `$ v of Operation1 I$ w! a2 K' C' T6 N! T8 J4 t5 o: } (ADP Security) " v& s5 V W) q+ VA mode of operation where all users of the AIS possess the required personnel1 ~* E0 w8 K9 ~ security clearance or authorization, formal access approval (if required), and a$ M( Z* O s3 D6 W. u Need-to-Know for all data included in the AIS. ?3 F" N4 r5 v3 H/ S1 K; F& aDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about7 }; S6 C6 P5 y6 D6 m, {' R 5,600 kilometers) above the earth’s surface. 5 U! D* ?7 Y5 aDef Definition. * X- s# O1 a$ S2 ~8 G ADEF (1) Defense. (2) Demilitarization Enterprise Fund. 5 ?! B* p; C# B/ \7 EDEFCON Defense Readiness Conditions. , o5 \" F# G* c. b2 ?& KDefended area/ u8 q; h# @8 [ C: j coverage N* U7 [; I4 t1 q8 @* Y3 r5 R- l Defended Asset 2 v; p! J* ^! w* \2 j1 CList (DAL) % G5 s# \1 F1 ]$ M% X2 G8 [2 `1 \The geographical region that the BMDS can protect from ballistic missile attacks. L/ h# @. Z X; } with a specified level of probability of negation. May be specified for a particular' q; T: @' Y$ a- a3 ^, k; V% P threat type, launch point(s), launch regions, raid size, etc. 4 S7 a) N+ {0 h6 o; z0 B5 wA ranked listing of facilities, forces, and national political items that require4 p7 V8 y% N/ M, B protection from attack or hostile surveillance. The list is compiled from Federal$ i. T: e7 b7 i departments and agencies, Unified and Specified Commands, and the Armed + Q& y( [9 H$ O* iServices to ensure National Security Emergency Preparedness functions.5 g) C8 F: s/ H/ e, b MDA GLOSSARY, VER. 4.0 D 6 L' m! Y3 W) A9 X5 J75+ Y/ J& U1 _1 a$ t6 E Defense* E3 ]6 f% m$ l" Y Acquisition / ^) U9 P" _; r7 k& F7 PBoard (DAB)8 U- e# B# t. a% s' ?* F The senior DoD acquisition review board chaired by the Under Secretary of. S* S. |4 ^: d; w! z9 ^2 t Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the3 L: x1 G5 O' S0 h9 x& I/ l Vice-Chair. Other members of the Board are the Deputy Under Secretary of: u- b4 B8 K! D' B3 H4 l! u Defense for Acquisition and Technology, Service Acquisition Executives of the3 `1 i4 {$ I7 g. W \# F Army, Navy, and Air Force; the Director of Defense Research and Engineering; " c5 D2 Z# L% A9 ~% nthe Assistant Secretary of Defense for Program Analysis and Evaluation; the : ~" N2 U0 |4 S" B2 Y3 W4 uComptroller of the Department of Defense; the Director of Operational Test and 1 K- G- d/ z$ T. z6 A/ YEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the4 ^3 C8 C" A0 X; x6 I Defense Acquisition Board Executive Secretary. Other persons may attend at , o) f( d F) ]+ S8 r' ?. |the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition5 S. q$ K( U( V2 x( h+ [5 R2 y. H Board.”)9 m+ K' q( i4 v Defense: Q( w+ i/ F! g( Y* u$ l Acquisition ) [. X* C' {$ O* e' ]' H* KBoard Committee6 e. u3 l2 m2 w$ h9 @4 Q: Q Advisory review groups subordinate to the Defense Acquisition Board. The/ w8 D$ x# ]$ a$ Y Under Secretary of Defense for Acquisition determines the number of& `) W1 G% [& B% t Committees. The purpose of the Committee is to review DoD Component 1 I4 \- b/ B- a- d. B4 [& Lprograms prior to a Defense Acquisition Board review in order to make an& @4 o0 _7 ^8 D6 H- e0 m( \: M independent assessment and recommendation to the Board regarding the( d% Y. P: ^) e! I- X' k2 M6 m N program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense5 _- y) l/ e7 Z9 z& Y Acquisition! R' q: d8 b' {- K/ T; ]: g( r& X Executive (DAE) 6 R7 I' u* E9 C, BThe principal advisor to the Secretary of Defense on all matters pertaining to the ( ?( y! M, p! Q9 D D! S/ J2 z' V1 |Department of Defense Acquisition System. The USD (A) is the DAE and the# a5 _ I8 t: O& H _2 D$ t/ S Defense Procurement Executive (DoD Directive 5134.1). & A3 H- [- B8 v& m. BDefense ; y9 G" j4 X9 D8 LAcquisition' d% i6 {" V7 f4 E! N Executive ! \# {/ @0 Y% `Summary (DAES)/ g5 }, X8 E& v: v# Z0 r The DAE’s principal mechanism for tracking programs between milestone' q, @( f' F( h* v6 [" g reviews. Includes programs subject to the Selected Acquisition Report (SAR), * y( _4 _' J% hand any non-SAR programs subject to review by the Defense Acquisition Board." G8 S! [3 K8 U- s: h Defense1 r( n2 V+ l- |9 r2 T t/ J0 ` Employment 3 h' I; p( v! v2 J2 w( M% JOption (DEO)7 x' I0 z- ^# Q' @! G, g Engagement strategy provided to USSPACECOM component forces to achieve 1 |, m; Z7 N4 {& C5 r0 p3 Vspecific military objectives against a ballistic missile attack. It defines hostile u2 J! r6 w2 F9 g9 m8 z7 x& | target priorities, provides assets to defend, and allocates SDS resources to be I1 s. y& S! J6 m, W3 s0 { employed. A number of DEOs may reside in a particular Preplanned Response / M/ H! o' Z+ \6 [Option (PRO). However, default DEOs (those believed to be best suited to + T4 i+ t9 ?2 }% N Icounter the threat initially) will be automatically processed and executed when . t/ I! K# ~# z, w0 r1 PDefense Activation Authority (DAA) is given by USCINCSPACE. 0 S; O% P- y/ s6 X0 aDefense 4 D# L( t- C# b6 w/ V& _Enterprise & }' [: x+ b. d$ W% v+ _9 ^Program (DEP)& q2 ?$ x3 N. z( | An Acquisition program designed to streamline the acquisition process by waiver: ]8 x# ~& q E of selected regulatory requirements. 5 V, H! D2 e" P2 e7 IDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb5 M4 g% E" n6 w and progressively weaken an attack, prevent initial observations of the entire 1 V( [$ j0 ~4 Z& ]4 ?7 X6 bposition by the enemy, and allow the commander to maneuver his reserve.+ K% s6 D3 p; Z! D Defense ) U8 M; v, |0 r% w1 x N" v5 |Meteorological7 I6 T- k3 s3 g Satellite Program 5 E. H. M. M; V- V(DMSP) * P% s* `% n3 xSatellites designed to meet unique military requirements for weather information. 1 U4 ^3 ]7 Z( ~6 w, q/ H' GUsed to detect and observe developing cloud patterns and follow existing% _5 z# |6 c( q* T, P weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.! F5 ^( L7 H+ V- c8 D+ x, m Defense Planning& h) S* L' P: j and Resources & b3 ^( s9 S" q3 \& s1 k4 ZBoard (DPRB)3 i2 @# Y( s y2 Z$ v/ h A board, chaired by the Deputy Secretary of Defense, established to facilitate 5 g8 K/ L0 f/ e! e7 {decision making during all phases of the planning, programming, and budgeting / L) o$ e8 W2 M8 N* A, rsystem process. Board members include the Secretaries of the Military7 v, ?& j# T# S U. x8 j( ?4 u8 T Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of# s, W7 \, |1 A& D1 G6 d Defense for Acquisition and Technology, and Policy, the Assistant Secretary of . L! Q3 ]$ T( [Defense for Program Analysis and Evaluation, and the Comptroller of the' a& X4 n& I1 ~9 Q( @+ K! |1 O Department of Defense.6 C; d7 D; |1 E$ g MDA GLOSSARY, VER. 4.0 D 6 M! H1 B A* g2 m; |6 X6 N$ H) ^76: R4 s- e- Z: z# s1 u) t* E Defense Planning / \& q( V+ q1 j% t- hGuidance (DPG)0 b. J+ T V1 H/ ?! v6 T Document issued by SECDEF to DoD components providing strategic framework, \* M6 u0 S0 b1 p for developing the Service POMs. Result of planning effort by Joint Staff, OSD,& O; ` S7 Y4 C$ n& i4 E6 A4 n and Services. In connection with two-year budget process, DPG is issued every ; L0 D: u: I& Z( ~8 [1 J \other (even) year. ! V& U+ W" V- ]* i. N# E0 J& o8 yDefense Priority: k' z, g' o( j1 \: n5 M and Allocation5 O$ U. g3 \ A" i# [: ? System (DPAS) / Y3 V. [9 D L- q6 m3 dThe implementation of a statutory requirement where contracts in support of ) l# B2 l6 I$ M0 f$ ?; D7 w7 O3 Lnational defense must be accepted and performed on a priority basis over all , V) |- D: y( c/ M3 ^$ Qother contracts, and which requires the allocation of materials and facilities in( O% M6 I# f- S' ] |5 V such a manner as to promote the national defense. See “DO” and “DX.” 0 M; g* w! C% o3 K$ {$ M3 ?% _Defense: s4 o7 d( |- ^4 C+ ~ Readiness( g& y7 b9 s8 }# D9 N Conditions+ N5 L' F! z9 ]' l (DEFCON)6 b3 Y+ a g/ h' @0 i$ Y4 V5 } A uniform system of progressive alert postures for use between the Chairman of ' g8 w) v% e/ p% C* {the Joint Chiefs of Staff and the commanders of unified and specified commands e6 w" K0 ]7 U7 N! `: U3 M3 _and for use by the Services. Defense readiness conditions are graduated to& D# E! G& a3 t match situations of varying military severity (status of alert). Defense Readiness & L: @- n7 ?* f2 B: H% fConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as ; m5 X `9 w ]7 w& tappropriate. 4 V! H) q1 w& n" J2 nDefense Satellite% o# ^+ H7 M; c! z2 Q Communications. W3 Q$ I- {& D8 ~1 C Systems (DSCS) , z% N5 Q. C* ^. U; f% h6 q, N, hAdvanced communications satellites in synchronous orbit around the earth.+ r6 ^7 X! y9 A) p8 x Provides high-capacity, super high-frequency (SHF) secure voice and data links ! T6 j" r' \2 q) ^) r* Kfor the Worldwide Military Command and Control System (WWMCCS). They) W P& |0 ~' T. |. e support terminal deployments for contingencies; restoration of disrupted service4 Z# l; o V7 k8 J overseas; presidential travel; global connectivity for the Diplomatic : a( E; S8 J+ J5 T% [Telecommunications Services; and transmission to the continental United States. ]; }) ?# M" p/ K7 y of some surveillance, intelligence, and early warning data. ' t6 B( K9 H( m( \% v' w8 BDefense Satellite5 G1 b( H) |7 X (DSAT) Weapon. d. B9 i4 y. Q0 N A device that is intended to defend satellites by destroying attacking ASAT 6 ~: i1 I# e* Y4 S& \& {' W9 q. mweapons., {2 Q& h2 l, U: E v1 {$ ]7 F! s Defense Support7 s" J) f4 _# h8 U Program (DSP)+ F( `5 n9 { p& f9 q) O" W A system of satellites in geo-stationary orbits, fixed and mobile ground# J8 }6 W3 k, @0 d- v processing stations, one multi-purpose facility, and a ground communications 4 l! w9 }/ n$ X( Q: N" G1 ] x, unetwork (GCN). DSP’s primary mission is to provide tactical warning and limited$ O3 [$ H! m+ G3 n attack assessment of a ballistic missile attack.3 k+ [5 R8 n6 W/ i/ w" K Defense* r8 s+ G0 @% }7 Y# \ Suppression % U% X$ E8 u1 Z+ A0 pTemporary or transient degradation of the performance of a defensive system " i/ P: x5 K9 G6 d+ K9 vbelow the level needed to fulfill its mission objectives, by an opposing force. ) ` `" [5 C1 D% D$ z x( c/ A(USSPACECOM) 8 y6 ^6 Y G: w& z( fDefense Tier The arranging of a defensive system to correlate with the phases of a ballistic7 A P: o/ ?- O" \0 { missile trajectory; i.e., boost, post-boost, midcourse, and terminal., I6 L% [' D9 I. F0 G6 T Defensive( o" N+ e5 K/ v8 n7 x Counter 7 W) I0 E- ^: pMeasures (DCM)7 B: k$ {' O8 @0 ?0 V3 I Actions taken to eliminate an ASAT attack.0 ]5 D- X- O5 p" X6 ~ Defensive! X( v6 E" y- a( k5 K6 b' Y, @ Technologies- x- O. ^) F. N/ p0 Z6 O* k Study Team% }: G5 k# ?. D (DTST) % L( c2 Z1 a- V' n w6 a0 QA committee, generally known as the “Fletcher Panel” after its Chairman, ; [! P+ |) R; c1 n4 kappointed by (former) President Reagan to investigate the technologies of : R1 b. I: x. Upotential BMD systems., y2 N3 a6 o6 g DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. + ]+ |% m6 u; x- N( ]& l# Q* JDEIS Defense Enterprise Integration Services (ex-DTIS).6 ~0 d! e, z$ ^ DEL Delivery. . [5 H; h( w. F# U& p5 {Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion * ~- ?, i$ q8 d8 b6 h! F7 |' e* aof shots about the aiming point. See also Circular Error Probable.$ ]& A- n6 R8 T MDA GLOSSARY, VER. 4.0 D: N, a! Y; r1 g: `! l. U, p! c 77 8 O* a, M4 O1 j& i# U( z, _Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the+ H! P {$ }" E% [6 A1 M0 D4 a maximum change in velocity, which a spacecraft could achieve in the absence of& ^8 Y+ r4 M' J9 j( m a gravitational field. - m9 N. ^* x; t$ _) g! EDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). / N+ x1 n. l) n, U- c9 v$ {Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its- ?7 p" _' a0 f# u7 c7 ` desired function (matching RV characteristics, screening RV, etc.) . R2 x# ]# n% @+ v: sDEMO Demonstration. 6 j" ^& P0 d. h$ DDemonstration ( g; _# c9 f Z) @% |and Validation " ]4 ?2 k4 k4 p% L6 t1 O' q+ ](Dem/Val)4 {# X& @/ P4 u7 F( i" L# X2 @* L; \' { The acquisition phase when major program characteristics and product designs z$ F8 y( m$ g- }) U/ S/ j6 s2 T are refined through extensive study and analysis, hardware development, test,4 q2 V# z; X' F& M2 A and evaluations. The objective is to validate the choice of alternatives and to 0 G- J+ F- C. B' M$ o' [provide the basis for determining whether or not to proceed into Engineering and / R+ p5 n1 U( T$ t* ~Manufacturing Development (EMD).& y( A' W1 V5 B) k- \# t& S Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. ( J) v% x) y: p9 q# h7 x" MIt may include destruction, removal, contamination, or erection of obstructions. t) ?% N+ j- ^" Q% \+ lDEO Defense Employment Option.8 ?0 R1 U$ V& ^( Z- K$ t4 ^ Department of ! l' o' P# K- s- c. pDefense ~7 A- i; {" V) n8 T) ZAcquisition- y$ F; [8 h5 e System & `3 x. ?- A! I5 h/ I4 PA single uniform system whereby all equipment, facilities, and services are" o1 e+ N. T8 M, J) \3 @( V" U planned, designed, developed, acquired, maintained, and disposed of within the$ e) u/ ?* v8 e' H W8 Z Department of Defense. The system encompasses establishing and enforcing ! {' p+ h" S9 q9 upolicies and practices that govern acquisitions, to include documenting mission, i9 e1 H$ H5 |2 g needs and establishing performance goals and baselines; determining and 4 Q. i& k* U9 N i! W9 }prioritizing resource requirements for acquisition programs; planning and & i$ y2 {# D# T* kexecuting acquisition programs; directing and controlling the acquisition review Z% I4 D& c3 E6 C+ y4 e8 }/ j process; developing and assessing logistics implications; contracting; monitoring ! w- p u; m) @1 [the execution status of approved programs; and reporting to Congress. (See ! }4 U+ f. ?6 f9 M* dDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)7 y6 F {/ {2 D: ~5 @1 C5 B Deployment (1) The placement of force elements in battle positions to obtain a higher 6 v' n( o3 k& ?: a. `2 b9 ?1 {state of readiness. + T/ a- ?; L5 t( q4 D" I' d) ](2) The movement required to place force elements in battle positions. U' R" H& c. b/ H' r0 a% X(3) Fielding the weapons system by placing it into operational use with units3 _/ E9 N1 b! G i. B" F( S) ~, k in the field/fleet.7 x7 _, H' v! m (4) To arrange, place, or move strategically.& u' v7 i0 |+ }. o/ ~( F& ^ Deployment 8 u$ D4 B( g! JPlanning ' W3 L8 [! B4 y W' q(1) The development and maintenance of plans required to initially deploy,1 |* i% z- F: n0 z d% l B maintain, and evolve the operational system in accordance with 2 v! j% C5 W* E# P' oschedules and priorities. It includes factors such as launch facility 4 r: C* Y5 N5 H' d' S* Q# xavailability and planning for the availability of other required elements8 R g; D% D7 {! P' l+ x such as trained personnel or units. In addition, it identifies the impact of: y) E' Z& {1 j( v" R) R4 ` deployment on operational readiness and any testing constraints$ P ~' ]) F# M5 R/ z L9 Z# n associated with deployment.4 e2 o! s( l. {$ R; B) } (2) Encompasses all activities from origin or home station through- p% K: i. c A0 Q destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding . l8 J7 W) }, {2 t$ }areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment ' A7 M2 w3 k6 a6 m' W/ tTesting * v6 E+ N- t S$ _% MThe testing and/or simulation of system assets in the physical and operational4 Z5 m5 ]2 x# n0 n/ n, u& ?0 l1 f* [ environment in which they are expected to perform.& Y. i' O$ c0 Z8 v# C DepOpsDep Service Deputy Operations Deputies.% u7 r: H6 i. U MDA GLOSSARY, VER. 4.0 D ; B3 H" P z' B) d2 @- f# g4 h+ S e" Y78 : W( w+ i* m) S9 e1 H2 DDepressed * M5 S. w8 Y( [# ~Trajectory# b/ D) V2 b/ T& Q1 G Trajectory with an apogee below that of the minimum-energy trajectory. : h/ ]5 X$ ?: y7 z$ RDEPSCoR Defense Experimental Program to Stimulate Competitive Research. 3 H8 b8 f+ F E2 g: f+ F; d9 J; ZDEPSECDEF Deputy Secretary of Defense. ' C+ ]6 ?1 k. ZDeSecState Deputy Secretary of State.0 _4 m E9 j! q2 x( X DERA Defense Evaluation and Research Agency. Consolidated research and + y6 [" m' Z# h( [. sdevelopment resources of the U.K. Ministry Defence. Headquartered in) ^( i4 O8 _9 Y A3 y Farnborough, England.6 Y- h* A/ J- n$ \/ M% c Derivative$ k# y8 d% [& M' H Classification' D, A0 j$ m( x; Q1 m# s- z+ D5 U A determination that information is in substance the same as information : S* \* x7 M& q0 i6 X/ n f1 l0 i* Lcurrently classified and the application of the same classification marking.: V7 Q6 a) b& P" K3 G, J DES Data Encryption Standard. 1 h4 j( S( d% U f, aDESC Defense Electronics Supply Center (DLA term).4 A% u6 \6 P" B) U# a Design % {& U* ?/ m& r3 hConstraints ' C$ ^: ?* [) e$ W3 F- zBoundary conditions within which the developer must remain while allocating8 b' k$ m6 B% j1 l' j4 h performance requirements and/or synthesizing system elements.' U$ v9 m. O' N Design ; W, j- x5 Z$ d8 O9 n, N0 G% `5 E; {' vParameters( \, e9 ^! R. x8 N& T0 K9 { Qualitative, quantitative, physical, and functional value characteristics that are ( E4 c. V; l0 @( ninputs to the design process, for use in design tradeoffs, risk analyses, and ; v; q M+ O) r+ B' fdevelopment of a system that is responsive to system requirements.2 y2 T$ E( S y2 B Design Phase A period of time in the software life cycle during which the designs for( d6 w/ u; n1 \; ^: X) t architecture, software components, interfaces, and data are created,2 C6 b4 e% J" Z1 c' o' X* j documented, and verified to satisfy requirements. $ q% X& C) @* J6 ?8 ]Design-to-Cost& {( P5 t. k2 I. f( U! [ l% Y (DTC) Goal o+ X. ~5 J8 o$ a6 dManagement concept wherein rigorous cost goals are established during * Y/ O( H; d+ @) e+ z. xdevelopment, and the control of systems costs (acquisition, operating, and " ^( k% K6 P \support) to these goals is achieved by practical tradeoffs between operational |# N" U9 N- i capability, performance, costs, and schedule. Cost, as a key design parameter,3 ~* P0 {& y a is addressed on a continuing basis and as an inherent part of the development 9 T& }9 g6 s% L# Jand production process. A DTC goal should be in the form of average unit" C) ]! Q$ E t3 Y5 C flyaway cost. Also, DTC parameters for operation and support will be + ]5 x/ P1 I# m( Pselected—parameters that are design-controllable, significantly affect O&S costs,/ X5 I. p0 p! F& U# j and can be measured during test and evaluation. Parameters may be - }, n0 B8 k1 D: H, z, q, Xexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or5 ^( X2 H0 v; `7 P: u! f0 V8 o, k maintainability. Firm goals and thresholds will be established no later than entry 9 g& S* A2 F5 b6 v S1 y) } ginto EMD (Milestone II). This is an in-house goal, almost contractual in nature, ; n; z1 R |3 I! }# i8 Ebetween the PM (Service) and the SECDEF. Allocations from this goal will 5 N/ x% Y' Y( d+ Rbecome the contractual DTC goals for contractors supporting the program.- }0 N, m; h5 {+ b- Z) v Det Detachment.8 |- _' c% P j2 j DETEC Defense Technology Evaluation Code. - ?8 @+ i L8 g+ P. {1 h: VDetector A passive IR, visible, UV detector turns photons into an electrical signal. The 0 J0 |- ~. h7 q0 Y0 DIFOV of the detector is its solid angular sub-tense. There is sometimes ! }. Q0 v- M( a. D0 qconfusion between the detector sub-tense (size) and the pixel (picture element) E6 ~: w2 G2 t size). They are the same for a staring sensor, but in a scanner it depends on6 h6 c7 u# I2 n9 j. K% }- U the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area." i9 u9 Y' z4 ]2 z; o MDA GLOSSARY, VER. 4.0 D& g8 Q( _6 B4 q, I 79 6 t# o+ i% H4 l6 c1 P# NDEV ENV Development Environment.- R. O; X4 L3 c3 e! V& K2 R Development* }+ J" p3 C( J$ o Test (DT); q3 y% x9 w8 `! H3 q$ S4 ? Test conducted by the development test organization to achieve specified test/ I9 A9 ]7 s: d2 n# U0 B6 O% n# A4 b objectives. It may be a complete test, a subtest, or a phase of a test. / a) i& A0 N% i( L' vDevelopment 5 l! Y2 F# y9 i# E. m/ eTest I (DT I)1 H( a" K7 L) q' T, [: D3 i A series of tests conducted during the demonstration and validation phase./ c& X2 t3 ^" |* j. s% A' `9 v Components, subsystems, or the total (or full) system are examined to determine# J2 S5 z' T% _! t. ^ whether the system is ready for EMD. State-of-the-art technology is addressed ( b7 K7 P/ h, C2 {4 g% ?! @in DT I. $ K( u9 s; r! |5 vDevelopment " }! S7 n2 O/ S0 C# h" F# WTest II (DT II) $ j3 D& f' R1 U& QA series of tests, normally during EMD, which provide the technical data 3 D+ T) G& y2 F1 H: T+ C- ~5 vnecessary to assess whether the system is ready for low-rate initial or full . y* X& T- z1 u- t* I5 Xproduction. It measures the technical performance and safety characteristics of8 x: R% Z) ?# c% x the item and evaluates its associated tools, test equipment, training package,+ i4 k$ v( B) {1 B" j and maintenance test package as described in the development plan. DT II0 p2 S2 d+ t: z+ ~) W# } addresses accomplishment of engineering design goals and the fulfillment of0 }6 v1 Q g( o contract specifications. w, b7 S1 _" U* j* Z Development+ Q+ {) o% M9 }1 q- R8 ]- P Test III (DT III) / W- M H) a( q4 W6 ETests conducted during production. 8 t9 k4 I' L0 K$ {* xDevelopment+ v% D$ N3 O0 ^$ h% M Test and ) M1 s, P) v3 d9 j2 U! C$ uEvaluation; n6 l! f) K; t9 G& F) [ (DT&E) - R6 L8 ~! K% Q% b XTest and evaluation conducted to measure progress, usually of. v; q5 h& o! T0 x0 v9 E component/subsystems, and the proofing of manufacturing processes and4 {7 b' Q$ A5 r* { controls and to assist the engineering design and development process and * j2 ^! H4 _/ ^- Bverify attainment of technical performance specifications and objectives. Usually , Y% t E% U1 Wconducted under controlled or laboratory conditions. Can be conducted before1 o( p- c, E c5 L; U2 f8 \5 t; \# | or after production begins.8 h; S1 q0 T/ W1 i Development S O G- A5 R) p& C6 Q Test (DT)$ Q' U1 M9 `5 D3 P; S2 {: T5 N& f Test conducted by the development test organization to achieve specified test7 @ E4 D! I7 t+ U: k objectives. It may be a complete test, a subtest, or a phase of a test. 5 Y( u* x7 q5 L9 p+ nDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost,( f5 Y* H4 S' c4 u: r$ E c5 e" C schedule, or performance without authorization from the milestone decision" H1 u6 }9 r# V4 Y authority. Acquisition Program Baseline (APB) thresholds represent these 6 `( P$ T2 d$ m. x0 m; |parameters.5 k; ]# u, O( T, y Devolution of( x# n& C# m9 B4 v+ H Command 2 h6 Z% Z% q3 N9 t) |Minimal essential operational capability to perform C2 provided in an orderly and" W: z: O3 _ k timely fashion to a duly authorized successor./ L8 g( |; {/ x- I5 w: b DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. ! T. |# R. T e7 y5 mDEW/D Directed Energy Weapon/Discrimination.2 ?; v$ I# G* x3 V; U# h DEWG, O Directed Energy Weapon Ground, Orbital : b2 Q& G9 P* @) |* \) ~' |8 `DEWL Directed Energy Weapon, Laser (thermal or impulse). 3 \+ @. t: G+ U, a8 ?DEWP Directed Energy Weapon, Particle Beam (neutral or charged). _% n. R8 b$ g3 ~4 L' iDF-KBS Data Fusion Knowledge Based System.& i9 D% ~8 b6 c6 q6 c DF2 Deuterium Fluoride.# O& X3 y3 V* t% q# I DFAR Defense Federal Acquisition Regulation 8 L% K& }( U* uDFARS Defense Federal Acquisition Regulation Supplement.2 J% j9 K5 t( S+ b, I MDA GLOSSARY, VER. 4.0 D . T: M1 }# B- y$ S% S' {809 w, i9 D1 n E# [' f DFAS Defense Financing and Accounting Service.$ f$ Q0 u' U, N5 _& U3 h DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. / U; x! j: t4 Y3 i* |& X: ^DGA Director General of Armaments (France).( V: V# d' p* D DGP Defense Group on Proliferation.* e( \- \) T7 K# I% X+ k# l DI (1) Data Item. (2) Developmental Item.1 e% ?2 i8 y, D2 g8 @ DIA Defense Intelligence Agency.8 w, v- A* p7 }- {, m7 }1 S2 W DIAC Defense Intelligence Analysis Center. % J6 p: c* j+ w9 @1 G' ~- j! Y7 I/ ZDIAM Defense Intelligence Agency Manual & Q/ w% b5 } ]* v) kDiameter (Optics) The unit of measure of the light gathering power of a lens. ! N, @4 d* d+ W1 IDICE Digital Integrated Combat Evaluator.) I) _; o. g* v. ]. r. Y( U DID Data Item Description. 7 a2 q. s* h- m. VDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The % }, x2 |$ s/ j) Fangle of spread, which cannot be eliminated by focusing, is proportional to the 7 }* e% Y2 z$ ]5 c4 u% ?ratio of the wavelength of radiation to the diameter of the aperture. * m4 v- {1 T4 m3 j. N! pDigital6 y- V2 @4 U2 E Processing# g1 B; i. X1 T7 G& U* d R The most familiar type of computing, in which problems are solved through the$ K0 ?: W# q+ G; Q: i; e; ` mathematical manipulation of streams of bits.; M: I2 z6 u3 Y0 L" o" C DII Defense Information Infrastructure : {5 D! K0 t7 PDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to ( z5 |1 y8 J3 ^" N1 J12 km) between wake termination and de-sheathing.& [9 N8 ]. y9 n DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).' k. R* w1 d Z. \ DIR Director. 9 o: F: c; B8 V1 G2 ~' a! l* ?Direct Air 7 N# n5 U6 A+ S" i! ^Support Center% ~" w' `# }/ k7 u A subordinate operational component of a tactical air control system designed$ J1 f* \0 K+ H" W$ r/ b$ u! [% m for control and direction of close air support and other tactical air support 6 h+ f" P! N0 S5 C- p; A& c, moperations, and normally collocated with fire support coordination elements. ]6 V) a1 \" _! y5 p; U Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not, |( E9 Q+ J5 e* j necessarily limited to items that are incorporated into the end product as labor or3 W: W/ f9 z" H' B# C* r" z( B material.6 o! e- A& ]6 p" C8 D2 F8 t Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing4 g! z2 d' {/ v" c6 p- p, J direct labor includes fabrication, assembly, inspection and test for constructing 2 `' l' S3 Q" f3 o( vthe end product. Engineering direct labor consists of engineering labor such as, [6 ]$ P v4 N+ T reliability, quality assurance, test, design, etc., that is readily identified with the( c% S$ v, \8 _3 X end product. 4 k+ M$ {: Y$ M ~: DDirected Energy ! I3 v: @ M! S# g(DE) 9 D# O8 v% i( x* y6 G3 Y+ P1. Energy in the form of atomic particles, pellets, or focused electromagnetic, k( z7 A7 ^" C( h9 R+ I5 e beams that can be sent long distances at, or nearly at, the speed of9 \2 H+ {9 |$ z3 U/ M1 s light.; i$ r3 E/ E; c, S! F8 i- T 2. An umbrella term covering technologies that relate to the production of a8 W# ]2 B# f1 q& I9 | beam of concentrated electromagnetic energy or atomic or subatomic particles. ) }- X7 j% @) z& U9 ~9 eMDA GLOSSARY, VER. 4.0 D 1 j |. |+ i* S* O. y: o( O+ [81 / ^# g! [( m: v1 ?Directed Energy. c# h# p- n) s+ x b Device ; o3 V/ w( p- V2 _; h4 J) v6 pA system using directed energy primarily for a purpose other than as a weapon.3 J( j3 R$ Q1 ` Directed energy devices may produce effects that could allow the device to be# x, e: y1 [6 f, F used as a weapon against certain threats, for example, laser rangefinders./ H# ]( {' t7 R8 H d* y Directed Energy " C f' q& Q8 m' `; xWeapon (DEW) ! O$ w8 _2 R6 Q0 ?3 x$ Q" r6 M4 sA system using directed energy primarily as a direct means to damage or destroy [ b- W9 J* S. f3 O$ qenemy equipment, facilities, and personnel.1 g# i& j! T1 x! [$ X3 P* z DIRLAUTH Direct Liaison Authorized. 7 f/ g& U9 B) i& o+ ]! C+ zDIRNSA Director, National Security Agency. " _) L2 N7 a" J/ Z- ADIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.# }/ T! ?1 a+ T DISA Defense Information Systems Agency, Washington, DC. (Formerly known as " a) O/ ]' Q* L3 m- C: S' MDefense Communications Agency). 5 z0 R3 l/ u+ {& p1 \DISCO Defense Industrial Security Clearance Office' ~8 ^. ?, S; A% F( s DISCOM Division Support Command (US Army term)./ H5 ~2 i% l% ?: D5 K9 @ Discretionary; l# f0 L! q j Judgment % V% A( ]6 h b6 FThe authority given USCINCSPACE or his duly authorized representative to3 \- L% f5 }4 g& J: S6 C z perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination 5 Q: a$ ?4 r7 U, \DISN Defense Information System Network (DISA term). 0 v- k% ?7 K4 ^, u2 W* IDISSP Defense-wide Information Systems Security Program.& n. R: ]2 I) l% T/ M9 H4 ~ DISUM Daily Intelligence Summary (JFACC term).+ h/ }% _+ |$ d- u; F4 x, Z: L# O DITDS Defense Intelligence Threat Data System. / E F9 N/ |$ U' V4 f) kDITP Discriminating Interceptor Technology Program. The objective of DITP is the 3 [8 c9 P8 i/ U+ U6 J5 J5 @, `9 Kdevelopment of advanced interceptor seekers to counter advanced threats.9 w/ F) l7 c1 R) k/ s% i DITP will integrate passive and active sensors into an interceptor seeker that , R! _ n8 K* P/ v5 w2 m$ fintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP+ x' S5 Q# d& n+ u0 u, G# q flight demonstrations will involve the tracking and interceptor on-board 1 Z& k) |% O" Ediscrimination of targets of opportunity while providing fusion processor data . f: T( j* o+ a3 G' ^telemetry. (See also ASTP).9 e# _5 F9 k, d* F; L DIVARTY Division Artillery (US Army term). ( h' Z, d* ~* |& u6 WDIW Defensive Information Warfare./ o1 y7 h1 \/ |2 I, [7 s" c2 k* D DLA Defense Logistics Agency, Alexandria, VA. 8 q; B A. D" uDLSC Defense Logistics Services Center (Battle Creek, MI).. g& W- Y3 o- |; N; f0 h* a DM Data Management* _: K/ ?4 v/ I DMA Defense Mapping Agency, Fairfax, VA. ! W0 z( x3 M' F( ]) {DME Distributed Management Environment.1 }5 B7 j% k$ G" J" ^ DMI Dual-Mode Interceptor. % O: B* P$ ]' i# N5 w( EMDA GLOSSARY, VER. 4.0 D9 }- Q' _- j4 y+ Q 82 ' a z; s+ L6 x' E, {0 v2 iDMRD Defense Management Review Decision. ) K1 s9 L4 d& O* }; j% e; hDMS (1) Defense Message System.% B& t$ i3 W/ y. E, Z (2) Dissimilar Mission Simulator.7 g3 Q& T( _/ e DMSO Defense Modeling and Simulation Office (OSD).- D- V( P" r# s1 j5 ? DMSP Defense Meteorological Satellite Program. 4 V8 v$ A, R9 t: K/ YDMU Disk Memory Unit. A/ R5 r: _# ~$ `DNA Defense Nuclear Agency, Alexandria, VA. 1 O' P+ W' C# O3 \9 `0 v' k1 nDNMS Distributed Network Management System. 1 t& y1 I& c. a1 ]* RDNSIX DoDIIS Network Security Information Exchange+ J/ O' g& h# Y$ I" Q DNSO Defense Network Systems Organization. |! R: ]$ }& S/ o- a' G( k7 wDO The lowest rating under the DPAS. All “DO” orders take preference over unrated) H3 v# F1 l3 u7 x: H orders to meet a required delivery date. & j+ G* X) |/ v2 j7 ?; `9 nDoc Document+ ?6 Z' z/ S( v8 } DOCPREP Documentation Preparation.; ~! f3 w5 Z% V" b1 ~ Doctrine Fundamental principles by which the military forces or elements thereof guide* g3 M; ~! Y/ r( E0 C" p/ l( ^ their actions in support of national objectives. It is authoritative but requires 0 H& a0 R$ b S6 c* d' kjudgment in the application. See also Combined Doctrine., B6 U. \6 C: N3 ]0 Y DoD Department of Defense 3 t& u( X& o# _8 EDoD Component $ q2 {: m" l3 m1 W. E. `% XAcquisition $ R* ^ L% L" J' }Executive , d& o2 k3 x) {1 @+ X2 rA single official within a DoD Component who is responsible for all acquisition @4 X. S! {( x4 o functions within that Component. This includes Service Acquisition Executives & I: P; G4 I: h7 k, h% E7 dfor the Military Departments and Acquisition Executives in other DoD 8 L" Z4 f3 f" U5 X; ?Components who have acquisition management responsibilities.) x* ]8 B& \/ ^ DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, ( M/ Q0 L' v% |3 w6 B$ ^Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the $ m4 W/ l: l( y3 {% h, b$ wDefense Agencies; and DoD Field Activities.6 ~! l1 V0 M, _9 O2 S3 g( K DoDD DoD Directive. 0 R2 t/ V, [8 q" B1 `+ q8 BDoD Directive' k. C: o/ X5 N; q& A" s B 5000.1 9 p) B7 e" X% ^ Z. o“Defense Acquisition.” The principal DoD directive on acquisition. It establishes4 v/ k' F2 i' U6 v a( z" _7 h policies, practices and procedures of governing the acquisition of defense: f) r7 \ t# o; U8 S0 O acquisition programs.8 a0 p6 L+ Q! n1 |' a3 M8 u DoDI DoD Instruction.1 V5 |5 p& X, f DoD Instruction 8 O( O) R+ d! q" J' w+ p. n5000.2* X- _6 Z. A% b: M “Defense Acquisition Management Policies and Procedures.” Implements DODD + Q1 O& L: z2 \1 {1 R+ y F3 N: Z5000.1.% H2 ` h* e9 G9 L DoDIIS DoD Intelligence Information System.8 v6 i, ^% `$ m5 ]: A; t DoDISS DoD Index of Specifications and Standards. , x3 R2 \# ?8 ~0 z6 pDoD-M DoD Manual. - l! ]! [, Q' g, WMDA GLOSSARY, VER. 4.0 D ! ?( ~9 l# }5 ^* ^: R83 2 d! l" v H7 g$ g4 ?DoDR Department of Defense Regulation. 7 z& n5 h9 Z% W! QDOD-STD Department of Defense Standard.; c p) B y- ~2 d: d DoE Department of Energy. % |+ c. D7 c0 I/ y D. vDOF Degrees of Freedom.# u2 c) E2 }5 c1 v/ Z Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system % i+ Q2 }# o9 T2 S* Q( Zhaving a detection range of approximately 3000 km. It is believed to provide 5 V% h/ a; X# y8 k) ] \battle management for the totality of Moscow defenses. 9 Y; ^; p4 P# V2 E, l5 y0 b& oDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). 8 J7 f4 p& d5 X* {2 Z: aDOPAA Description of Proposed Actions and Alternative (environmental term).4 v/ @+ c$ I: E8 \ Doppler Effect The phenomenon evidenced by the change in the observed frequency of a' h- i9 [; X8 B( A/ D7 B8 t0 v sound or radio wave caused by a time rate of change in the effective length of6 }' R/ A) [3 c7 `) c! }! R- r; L the path of travel between the source and the point of observation./ R( K6 |# t6 U; Q4 H DoS Department of State (US). ) _6 U% }; B! z( s! m7 T% gDOS Disk Operating System (TelComm/Computer term).$ D e; ?! }$ P9 S) R% e Y" L DoT Department of Transportation [US]. Q, s' ]% v1 c9 b! o' HDOT Designated Optical Tracker. * t0 t+ j5 I- g0 x: NDOT&E Director, Operational Test & Evaluation. 8 M8 k, q$ e) M1 _7 N1 f' p; r. WDOTH Defense of the Homeland. 2 b% X' n+ L- b$ g2 }Down Select To reduce the number of contractors working on a program by eliminating one or ! c6 L w' U1 `2 [' j, bmore for the next phase. : g5 ~ f% n2 ~: @6 `; BDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.+ F0 O* R# n, o" l9 v DPA Defense Production Act. + Z9 A. ?: b) _5 g% N. Y- pDPA&E Director, Program Analysis and Evaluation. 5 D8 j u7 h. |! ~! n1 \6 h8 kDPAS Defense Priority and Allocation System./ Z8 ?1 V, M8 ?) v, S DPAT Dynamic Program Analysis Tool.* y* q% @. c2 f8 g6 ] DPB Defense Policy Board.9 L& k8 a5 R$ ?% l- C DPG Defense Planning Guidance. # [ [. d& Z( l9 t3 DDPM Deputy Program Manager. 8 p: P0 r9 o& N& HDPML Deputy Program Manager for Logistics " T3 k- {$ ?0 B5 B `( NDPP Distributed and Parallel Processing (Computer term). " S" s3 v3 z+ H$ ~: o3 {DPR Defense Performance Review. / N; o+ l t% O3 v& F" Z5 i5 mMDA GLOSSARY, VER. 4.0 D. `1 T; K. @+ T6 l! }: k- b- Q 84 ' Y7 j# v9 S2 d, O: [DPRB See Defense Planning and Resources Board./ r! P0 I4 \ a: I( |% _8 a DPRK Democratic People’s Republic of Korea (North Korea). . p" c" z% X' g( n, YDPRO Defense Plant Representatives Office.* \0 P1 a5 a( @: P1 t4 l DPSSL Diode-Pumped Solid State Laser. % ~( u$ [$ N* W+ L7 ?5 N, e$ xDR Deployment Review. R7 B9 y4 e' n DRAM Dynamic Random Access Memory.. J! u( S' C4 u' @9 `- ^/ i9 M Draw-down Curve A method used to encapsulate the overall performance of a BMD system that& v+ o: x4 x' { v* R6 N' Q8 ^ plots the probability of survival on the vertical axis versus the number of attacking , y7 N1 a5 g) xRVs on the horizontal axis. Used in conjunction with attack price, they are the. n. [# ]4 U/ N; { most important expressions of a BMD capability.5 @3 t& f8 _' u W/ Q) k9 Y DRB Defense Resources Board.; ~# L3 A# {0 }0 Z- @ \ DREN Defense Research and Engineering Network. : ^8 |3 Q6 |! G, o* YDRFP Draft Request for Proposal. ! {4 R0 q) M' C' b: WDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from0 s8 [$ T. v, ]4 s gravitational and atmospherically induced torques on the spinning projectile. 9 t& H' M: W! \; b. f) ZDRM DAB Readiness Meeting (DD 5000.2 term). : G! h- a5 A" V" _2 q" J9 y% QDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also , N C$ r: `5 m0 ^8 RRemotely Piloted Vehicle.6 U2 [+ `; Y! R6 w$ ^ DRP (1) Deployment Readiness Plan (US Army term).8 W/ W5 Z' J7 E; t. A- A | (2) Deployment Readiness Program.% s y& V( w: D( S DRR Digital Receiver Replacement (USN term). $ D5 o+ r7 p: J0 WDS Deep Space. ) k* A1 `5 o- a4 \DS-1 Category of telecommunications circuit capability.9 T. r! r% _: P7 w) a B+ h DS-3 LAN Category of telecommunications circuit for a Local Area Network. 5 [* `0 s# ~ {, ^DSAA Defense Security Assistance Agency (OSD). " x% a$ l3 B# bDSAT Defense Satellite Weapon. ( K# t4 y; g$ NDSB Defense Science Board.) s) a% r) `, i. y5 j5 T) D DSCS Defense Satellite Communications Systems. # t3 X( R% G( a5 V5 SDSCS-3 Defense Satellite Communications System Three. # T. R/ _% O+ m* J( N: g$ M: }DSCSOC Defense Satellite Communications System Ops Center.) g9 c3 V3 `' S* ^ DSI Defense Simulation Internet ! J8 P9 E9 y# i- y9 \MDA GLOSSARY, VER. 4.0 D C2 H6 l& Y7 I; G- l# T85, x' F3 D9 S% I" Q DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet# ^7 L4 f" h, Q+ m0 g System. 8 x% ]( s3 c0 y% R4 l1 W9 `DSM Decision Support Matrix) H' T$ m5 ~5 r0 J( ?: \ DSMAC Digital Scene-Matching Area Correlation.& n. H$ E+ O& q6 b# M& Q6 ^: b9 ] DSMC Defense Systems Management College.! A5 I+ X5 S/ J5 R; S% x DSN (1) Defense Switched Network (formerly AUTOVON). 7 H) q, y: h( j' @(2) Deep Space Network (NASA term). + n9 |* o2 m p& W+ T* UDSP (1) Defense Support Program. (2) Defense Standardization Program. $ W$ l+ A! h) _6 L: x" EDSPRTM Defense Support Program Real-Time Model. & a: {! Q" d4 Q$ y! Q5 g! X" YDSR Data Set Ready (TelComm/Computer term). 2 U' N4 q9 R! d* y, w- b+ F- JDSRCE Down Scooped Radio Control Equipment (TelComms term).8 }: q% J# s. t3 `9 ^+ p( H DSS (1) Defense Supply Service. (2) Digital Signature Standard.1 Z- p) J ?, i, ^ DST Defense Suppression Threat. - G' @. f) `1 S) w* XDSTAR Defense Strategic and Tactical Array Reproducibility. ; w# _% b1 R5 X: m' TDSTO Defence Science Technology Organization (Australia). / |3 f/ h b4 w3 t8 F& IDSU Digital Service Unit (Telecomm/Computer term). ( ~* g' b8 U# k/ U& O+ w- l) oDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to ( A0 Y, n! e8 X- l2 v4 e O! z& ?- Cthe DNA.# f0 v( ]- Z+ {' x; D' J8 d! J7 ? DT (1) Discrimination Technique. , Z- s A9 d3 F) M(2) Development Testing. - P$ w* j9 ?. C(3) See Development Test I, II, III.# h, z) t, N! b" Z) w& L (4) Down Time (ILS term). 9 ~( x+ H9 F7 l$ X% G(5) Depressed Trajectory.. g/ }" v7 ]: v, X# M (6) Dedicated Target. 9 t+ T& s; y2 z. A* B2 \DT&E Development Test and Evaluation.4 B; m3 u& w+ I8 Y% w DT/OA Development Test/Operational Assessment.. H! `6 L P! N6 g DT/OT Developmental Test/Operational Test.5 \$ p A" H# Z4 V DTAP Defense Technology Area Plan.) F: h c( [+ E# o8 Y) I8 Z DTC Design-to-Cost. : X2 j& u9 ^0 [8 H5 }DTD Digital Transfer Device (TelComm/Computer term).& E, {$ j* p; I8 K) M# C+ J9 d) b3 ~, H DTE Data Terminal Equipment (TelComm/Computer term).! h- v8 @* a6 \- b DTED Digital Terrain Elevation Data.5 I' ^% \1 Q* c% y DTIC Defense Technical Information Center, Alexandria, VA.# T; a% P+ |' I: r/ o9 L# l3 _; i MDA GLOSSARY, VER. 4.0 D % p* ?2 x9 \: U* N& Z! p* [( O862 ~& z* S1 U& g0 n% O1 A DTIS Defense Technical Information Services (now DEIS). 0 i, w* r6 L) J$ T" _DTLCC Design to Life-Cycle Cost.$ ]0 K _6 X1 y0 s+ a" N& M, ^ DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL. B6 l' t) z, z7 O+ p term)./ b2 v* K; u3 M DTLS Descriptive Top-Level Specification. - d& X1 i: y5 W$ hDTMF Data Tone Multiple Frequency (TelComm/Computer term).6 w4 q' j# t) g* L3 l- d DTO Defense Technology Objectives., W$ t1 Z+ V! \' W8 ?' P' z3 M8 g DTOC Division Tactical Operations Center.& z: ?( b8 |3 P% T& w# \$ Y- L DTR (1) Demonstration Test Round. (2) Development Test Round. ) _/ [- |' G3 d) X4 \% iDTRM Dual Thrust Rocket Motor. , | U/ n' I4 _+ O0 Z9 {/ hDTSA Defense Technology Security Administration.- x6 h6 E* B1 n$ @3 z6 y7 { DTSE&E Director, Test Systems Engineering and Evaluation. $ w" c" c- B+ `5 nDTST Defensive Technologies Study Team. 8 d- U3 ?0 F; L8 D; x$ Z4 ~- ADTT Design-To Threat 5 h3 T2 |! j$ N+ T- R; Z4 ]DTWT Dual Traveling Wave Tube (Electronics Engineering term).4 A, {* z7 F4 T: [' |1 I+ \ DU Depleted Uranium.6 @5 L- B* \" Z, Y6 f DUA Design Upgrade Assessment.+ h- R6 r5 {9 I R @! q Dual Source Two contractors producing the same components or end items for the same " z9 c& p0 R+ D( Dprogram.& H' Q& w" T- x5 H DUNDEE Down Under Early Warning Experiment (MDA/DSTO term).: y! M) W1 z* }! v% C DURIP Defense University Research Instrumentation Program.8 y) p4 A- ^( C& a) K DUSD Deputy Under Secretary of Defense.8 E7 |# ?1 g+ Z% T DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).: U9 ~# f; |& a; f( ?' g2 s DVAL Demonstration Validation.# A2 U. ~( X R3 k DX The highest rating under the DPAS. It takes preference over all other rated and0 E% P% D3 M. `. k* y- \$ q9 s3 l h not rated orders on a contractor’s production line. The BMD program carries a $ i! ^" _" s. h8 X4 P! @6 o3 F( q“DX” rating. ) j6 K1 S) Y& WMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 ( T& i r! n( \, eE East) h- `/ d' B5 _( O; i E2 I See Endo-Exoatmospheric Interceptor. . h/ p; `% ]0 ^8 S! {) O: NE2SRD Effectively Two-System Requirement Document.4 l9 J5 ^' w+ @) I! W1 ] E3 (1) Electromagnetic Environmental Effects. . N. r3 q: y; m1 e/ O- f; C(2) Electrical, Electronic, and Electromechanical. E" g" \6 _( S% }* m E Spec Materiel Specification.' W4 c! b) K: @' x# { EA (1) Environmental Assessment.# W5 ^$ y. ?( ]7 Y (2) Engagement Authorization. + }5 C3 o4 s- R6 ~9 c" ~' l" k/ _(3) Executing Agent.# j# L1 k3 y: f! N7 F' J (4) Evolutionary Acquisition.: E5 A9 k: n+ A+ @' {) t; i& O7 L (5) Environmental Analysis (environmental term). ' L. E8 s! K; V! v(6) Executive Agent. ( ]- Z- i1 h) C q0 M& }- D8 y( U: @EAC Estimated Cost at Completion. 6 ~. L6 b8 K6 ^EAD (1) Engineering Analysis and Design. (2) Extended air defense.$ }' I$ p$ T# J3 ] EAD/D Engineering, Analysis, Design and Development.$ C% @9 {8 }, v, w6 h+ w( z9 f EADSIM Extended Air Defense Simulation.. }: [% f# p6 S+ l) c* z: i; n. G EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing ! M: Q( r# L3 }; D& o8 u |$ B% Pusers to model military response to airborne and ballistic missile threats. ! d/ p: X# T' N. O, XEADTBP Extended Air Defense Test Bed Program.; t5 E$ R6 N+ r5 D& _3 Z EAGLE Extended Airborne Global Launch Evaluator. 1 T# R3 K$ O+ v) I, u! y$ v$ M9 X5 qEAM Emergency Action Message. v/ a, ?* q6 i. C+ o/ YEAR Export Administration Regulations.- ]1 b2 ? H! n Early Operational * S2 c' o) `) S1 b* n- [, u" @Assessment ( W( J" {; t" v# _+ e( \An operational assessment conducted prior to, or in support of, Milestone II.: i3 {. f$ i3 Z Early User Test % O% c' k) L/ s. ]2 J; T8 B/ ]/ z(EUT) * N6 m# a2 P! K- r/ q+ k" T/ jA test employing representative users to examine materiel concepts, training or- W, V& q6 J. n, g F' u7 u logistics planning, or inter-operability issues. EUT can be accomplished during / M+ U! {3 f0 I( i2 I8 Z7 H. nDEM/VAL on brassboard configurations, experimental prototypes, or surrogates ) T! W3 n/ n% Z0 s) P" B0 oto provide data leading to the decision to enter full-scale development.) v: [3 H6 G, x Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of& V. M+ p( g3 V6 O. \ surveillance satellites and long range radar.) Y1 R9 V* R; x (2) Early notification of the launch or approach of unknown weapons or 5 ?# ~) e5 W/ L; ?. Q! c) yweapon carriers. & s7 S8 U6 b w) X7 x* ^: s& V2 nEarth Limb The apparent outer edge of the earth as viewed from space. $ S! ^7 k' q+ n3 eEastern Test \" t! h! N/ ^" y4 }2 O) U Range (ETR) . h% ?' S4 Z$ H) `Beginning at Patrick AFB, FL, this range stretches halfway around the globe* W& d, `5 p0 ?3 ^/ E0 D1 b where it meets the Western Test Range. An array of launch complexes, sensors, 8 u( E" N3 P3 a3 x! _and tracking sites make up the Eastern Test Range. The ETR is now operated/ K% }, t2 M7 u7 W by AFSPACECOM as shown in WTR definition. 8 [" s0 B+ ]9 i9 E# ]. d/ [5 [' W" WMDA GLOSSARY, VER. 4.0 E2 L6 N) c% D0 ] 88 ' ^2 y' \6 h* IEB (1) Electron Beam. (2) Enhanced Blast. * `, e3 L/ b; a! Q C7 V6 hEBB Electronic Bulletin Board. 2 U, `4 G& R& ]5 Y/ |EBCDIC Extended Binary Code Decimal Interchange Code., J. C" s% Q, a B) l) u5 P# n EBW Electron Beam Welding.2 d3 ?$ t2 `" h5 d! F. w* ^# _, [. d EC (1) Electronic Combat.2 n" b8 O, l1 H- C% V3 ], U (2) Error Control.2 T9 `3 F9 ^9 y6 D7 K0 e: ` (3) OBSOLETE. European Community. Now known as the European Union % [, r$ c- |$ z+ \" h(EU). 5 {' ^4 O7 E1 k S8 G9 ~EC/EDI Electronic Commerce/Electronic Data Interchange% k9 e( I/ g! A) ~ ECAC Electromagnetic Compatibility Analysis Center. ! a4 E- T1 r S7 p+ |" gECB Engineering Change Board.- P2 O; S" y% D ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 3 b( J# c) r7 `# P& CECCM Electronic Counter-Countermeasures.( l6 }! o# b B" Q. ] ECDs Element Control Directives. - o- S$ |* q" h+ z- T9 t5 W5 oECLS ERINT Command and Launch System. 7 l2 x5 C$ {3 E4 r7 K) fECM Electronic Countermeasures. n& ], v, a/ x; o2 m2 Q3 hECN Engineering Change Notice.5 h3 N- E2 v" c/ A2 z9 a ECO Engagement Control Orders. & i8 P% n- m6 t! O; NECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.4 h+ b1 x; R8 @7 F( x; \# } ECPMO Electronic Commerce Program Management Office.( N: h! j2 F9 G& f$ J! l! E- p" v0 u ECS Engagement Control Station (PATRIOT). & @4 T, J6 }2 ]7 d# x, W8 s2 }$ M+ _ECU Environmental Control Unit. : U5 z: H2 j, d9 v8 z$ _5 DEDAC Error Detection and Correction ( Y% o8 E3 Z" vEDGES Electronic Data/Guidelines for Element Survivability.5 ]2 E9 W! v0 u) W( q3 O8 T% H: k EDL Electrical Discharge Laser / Z2 K2 l% [) H" vEDM Engineering Development Model. / D. x7 S! H3 P4 @EDP Engineering Development Process 4 b( F% ?. ]* [5 F* yEDR Embedded Data Recorder (PATRIOT).* L) o1 b2 _. m/ L/ z/ y EDS Electronic Data Systems Corporation 3 u8 I4 g- A! k @ R8 M4 EEDWA Engagement Determination and Weapons Assignment (PATRIOT). 5 m m# R ]) v( {/ [) PMDA GLOSSARY, VER. 4.0 E ! J: I8 w. t% E899 j9 `5 T o6 {( A4 L8 r+ K EDX Exoatmospheric Discrimination Experiment 7 i: c% {. n$ |+ yEE (1) Electrical Engineering. (2) Engineering Estimate. 2 s$ H9 N6 m3 f! d* g- IEED Electro-Explosive Device.. l) R) ~# G& ~5 D! b G4 s EEEV End-to-End Experimental Version.' ?% E# _/ ~% Z% M1 ]* M6 g# {+ ? EEFI Essential Elements of Friendly Information.( {2 G. w0 c" y/ n EEI Essential Elements of Information. 7 ^$ q9 \ p `5 U7 s. V* J/ EEEIC Element of Expense Investment Code.$ B8 ?9 e( e7 v. x EELV Evolved Expendable Launch Vehicle (USAF term) / \4 n; V, `; d% n7 N0 pEEU Electronic Equipment Unit., J- D P M8 i/ ]- T EFEX Endo-Aeromechanics Flight Experiment. / k5 ] S* R9 nEFF Electronic Frontier Foundation.+ _5 M! y Q4 Q& t8 F Effectivity A designation given to the BMDS configuration and demonstrated capability at( @. m/ s/ A4 F/ A a point in time, becoming effective at each increment when an element or( n. i0 Q) l( e. c- h component is inserted into a particular Block.3 X7 S1 Z8 ?$ E1 s Effective Damage That damage necessary to render a target element inoperative, unserviceable, : f8 u; e, P. }' Z+ f2 y7 Knonproductive, or uninhabitable.+ F8 T4 @8 m# i1 E) H7 S' c7 f Effluent Plume The pathway of movement of effluents through surface water or air. & }2 t) ~& |) {$ Y/ _3 P5 w4 PEFP Explosively Formed Projectile.4 t: A6 W; o) [ EGP End Game Processor. " m3 \# Y3 l) l z$ K7 u+ t HEGTR Eglin [AFB] Gulf Test Range.% p* c- S! H6 P$ _: {% F EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). 4 N) l6 r( D9 T+ n4 `7 V, GEHF Extremely High Frequency.6 k5 w/ F1 m; I: P( w" `( V/ u- c ehp Equivalent Horsepower.) ]" d5 X5 l. H. D8 z" N) C EIA (1) Environmental Impact Assessment. 2 j5 V+ d- ]2 |# b(2) Electronic Industries Association. & I6 s* q2 m/ ~EIAP Environmental Impact Analysis Process. q3 x( Z1 r- Y/ x EIP Exoatmospheric Interceptor Propulsion.9 V- e3 x1 y! d4 t EIPC Electronic Information Privacy Center.$ I. H' x* X# J8 ~) a, r6 H EIPT (1) Element IPT. (2) Engineering IPT.: p3 A, j! m( h! h& U. l' B EIS (1) Environmental Impact Statement. (2) Explosive Initiation System. 0 d. l; w$ ^$ D% iEISA Extended Industry Standard Architecture (Telecomm/Computer term). 9 @" h1 w/ k$ W# w: u$ t( TMDA GLOSSARY, VER. 4.0 E 4 r- H( L7 z' Q( J' Y H9 _( [: K900 a) x, S) ^0 e _ EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.% P0 e: m1 h1 Y/ N }" ]! m Elastic Range The stress range in which a material will recover its original form when the force5 \& q# b' |8 q& E; T (or loading) is removed. Elastic deformation refers to dimensional changes; @1 }3 ^0 w5 S. f1 I$ |1 s& \& `( L7 n occurring within the elastic range. * I; N3 M) D4 Q4 ~Electro-Optics6 y- X7 V3 u9 r$ N, [7 r3 Y3 B Infrared (EO/IR) # L" Y5 j3 w& ETechnologies/techniques employed by optical sensors in the wavelength / l( @/ B5 D3 d; Espectrum slightly longer than visible but shorter than radio. 6 Z* K. _% c5 O' U+ x% a$ ?9 B: ^Electromagnetic 4 M: g' y$ \8 h4 B, G% h. U( @Compatibility 9 r7 p9 s8 m7 L; ]' `(EMC) 8 d8 c A1 }/ [: O+ q+ }A condition when all electromagnetic emissions from electronic, electro-magnetic,8 Q4 \0 o" ]/ K) O1 @ and electro-optical components of a system interact without interfering with one" @, d' u* B& U4 l) f0 [# |- \0 R3 P another. 1 |1 A8 z9 n0 N% K# i& m; `) x! eElectromagnetic f% i' S0 c. Q$ NEmanations # q" g9 K# x* d% MSignals transmitted as radiation through the air, through a vacuum, or through - ~! ^" q. n# |% _% {1 W/ d/ Uconductors. P" w6 P7 C0 s' d% \7 ]" ZElectromagnetic0 p6 ]1 K. @) ^* {" Y Field (EMF) - G% G5 s0 H5 L0 c: JAn electric or magnetic field or combination of the two, as in an electromagnetic3 F; h4 F& Q! B- l/ J! j wave. Created by electric charges in motion, having both electric and magnetic ; @8 K1 T! H, n+ |0 i# f/ l$ ccomponents oriented at right angles to one another and containing a definite& U5 a* Q) w; }! j1 z6 {+ | amount of energy.6 n' c Z* b( X$ g( M Electromagnetic4 A) B$ x ]; X+ A; ^( H. I1 b" M( t( A Gun (EMG)2 P: @9 ~) j( u A gun in which the projectile is accelerated by electromagnetic forces rather than) ~" G0 u1 T8 T& c# a/ q0 r by an explosion, as in a conventional gun. / D' w3 u, ` ?) e; V1 g. e# SElectromagnetic/ E0 B6 ?/ {( ~' T" I0 E" r Interference (EMI)4 j& o0 G1 }) A6 F+ Z Any electromagnetic disturbance that interrupts, obstructs, or otherwise2 u6 E8 i/ z7 m) B" H1 D7 W1 h0 F degrades or limits the effective performance of electronics/electrical equipment.* j' Z3 y& I* o# l It can be induced intentionally, as in some forms of electronic warfare, or3 H; j7 F0 J6 A9 Y \9 T6 U unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like., i) A; F" A" }5 Q Electromagnetic; g! N* z7 s! H+ D9 j* @/ X Pulse (EMP) , K9 I" M2 M t4 Q5 _" nThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of% p! I p+ A: w7 R9 v D( y the nuclear device or in a surrounding medium. The resulting electric and . v# d9 o. C, t7 _magnetic fields may couple with electrical/electronic systems to produce- x& v2 i$ L" J5 _5 h damaging current and voltage surges. May also be caused by non-nuclear6 @ S5 j5 V$ N. x means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic) t% v. B, ^: M* S Radiation (EMR) 8 H2 d6 Z$ D+ B; K9 q, Q(1) A form of propagated energy, arising from electric charges in motion that # Q D* \+ u. aproduces a simultaneous wavelike variation of electric and magnetic9 G4 B4 h! ^9 F$ D fields in space. The highest frequencies (or shortest wavelengths) of3 p* C5 x% a( Z& T/ S such radiation are possessed by gamma rays, which originate from . [9 W2 t$ M9 ?/ Gprocesses within atomic nuclei. As one goes to lower frequencies, the 9 Y9 D5 X$ ?; i$ N7 T! yelectromagnetic spectrum includes x-rays, ultraviolet light, visible light, 5 i* p: @+ V. ~infrared light, microwaves, and radio waves. 2 n! L5 @8 c& R+ [* I) c! m(2) Radiation made up of oscillating electric and magnetic fields and% H2 I8 F2 l [ propagated with the speed of light. Includes gamma radiation, X-rays, 4 f2 b8 M4 A8 ]5 U% ?ultraviolet, visible, and infrared radiation, and radar and radio waves." W% c" F) v. F$ v& T/ S5 v Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices4 x9 X. r( Z5 Q! j# e. z% Z% \ used in system/subsystem design, excluding employment in the RF spectrum. ) s- o# f( e4 l& YElectromagnetic # i. F9 U5 j$ Z+ w9 \. N" J! YSpectrum 8 I% q4 j& }* Y) h! y6 {: A) x7 B" f. JThe range of frequencies of electromagnetic radiation from zero to infinity. It is " \2 R4 A* A, E q+ E- e4 N! Ddivided into 26 alphabetically designated bands. ; c- h0 ^( U, l) e) C: Y3 L3 a0 dMDA GLOSSARY, VER. 4.0 E) j" F( |1 c1 a4 f, r- z8 F) e 91 " ~& N, ?+ w5 ^$ rElectronic5 j- J, H6 t- b2 r% L1 { Counter- $ Y6 @5 Y4 J, m' GCountermeasure9 R* Y; @% g/ R; `" i s (ECCM) 0 U8 }% y/ ^0 x, H$ t+ I* `4 CThat division of electronic warfare involving actions taken to insure friendly0 w$ | x+ [$ @7 s& z8 D. p effective use of the electromagnetic, optical, and acoustic spectra despite the 3 [3 e6 h( P1 |& eenemy’s use of electronic warfare to include high power microwave techniques. . D) Y( A, U* j% H8 q. J6 r$ HElectronic . f% M/ w: [( v" c+ M' }, XCountermeasure* X8 ~9 C/ j- S! R- w+ G) } (ECM)+ `4 S1 h) W1 n: Z3 h' s1 ` That division of electronic warfare involving actions taken to prevent or reduce an ( v, B4 g+ i9 G" {( eenemy’s effective use of the electromagnetic spectrum.6 e" d. `$ z0 j2 a) d Electronic, u S' z2 K+ F3 s" `5 V& u" w3 M Industries & c& @+ x* V- b1 [Association (EIA) 6 {7 n1 S+ ~! \A standards organization specializing in the electrical and functional & Z7 I7 X: V* Q# y" Zcharacteristics of interface equipment.- t7 L7 ^ ] V0 w$ e( s2 N Electronic # h; f" q0 @6 o3 y: |9 p: DWarfare (EW)( q) [/ t4 o8 X3 `4 ^4 D Any military activity involving the use of electromagnetic and directed energy to C' a/ a% t! p& Q" y) z: mcontrol the electromagnetic spectrum or to attack the enemy. The three major , b- X5 Q+ R4 V9 i. zsubdivisions are: " G4 d T9 A) k5 i•Electronic attack – Involves the use of electromagnetic or directed energy to& C+ T4 }, d: o2 X attack personnel, facilities, or equipment with the intent of degrading, G( v% F6 H+ a5 Q" H3 y/ P2 bneutralizing, or destroying enemy combat capability. Also known as EA.$ X3 l1 C3 W* e) F Includes: 1) actions taken to prevent or reduce an enemy’s effective use of 1 {, X) _0 r) v+ i$ K& q. Gthe electromagnetic spectrum, such as jamming and electromagnetic( ?/ f2 I- Z4 Y9 J deception, and 2) employment of weapons that use either electromagnetic or 0 x! E( ^( v' G1 J. Pdirected energy as their primary destructive mechanism (lasers, radio+ Y& D( ]$ i2 L5 e/ R% ~/ V frequency weapons, particle beams). ) ?1 O) A( w& Y& t9 ^+ M) {, v•Electronic protection -- Involves actions taken to protect personnel, facilities,' p2 u7 g' F' b/ s* |6 a and equipment from any effects of friendly or enemy employment of * s4 R2 ^- u, y U: aelectronic warfare that degrade, neutralize, or destroy friendly combat ; @5 p4 `2 z( I- I, p& I/ L9 vcapability. Also called EP.# a& q! C6 C8 I M* Q •Electronic warfare support – Involves actions tasked by, or under direct # e1 m# x& p+ E4 E+ @5 `; j0 S/ ?control of, an operational commander to search for, intercept, identify, and( x5 `0 |3 o1 ]6 H+ \( o( O locate sources of intentional and unintentional radiated electromagnetic, f) T# A( x9 l9 q) _# { energy for the purpose of immediate threat recognition. Thus, electronic! o, M9 m8 x- z" Z- s) P2 ` warfare support provides information required for immediate decisions ; ^$ K! `: }: a1 Ginvolving electronic warfare operations and other tactical actions such as; R: z5 w, ?" |0 b; F threat avoidance, targeting, and homing. Also called ES.7 c4 [/ L1 ` E$ A Electronic. p; n `+ r/ z5 N% { Warfare (EW)( Y$ X9 @- @# z# w, \ Environments % C6 a$ Q& K% H" \+ l8 B0 ZElectronic warfare environments result from radar and communications jamming 0 B$ N) V2 x: Y6 N I; uand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD ! u3 o* F w, v# b6 w8 asystem.# w) B) p* H6 g; |3 v Electronics " X: f( t& t6 z0 {6 i- E9 A1 vIntelligence$ P+ E8 }' k6 J6 w' @3 j (ELINT)! t# B1 w3 p9 k4 F0 b Technical and geo-location intelligence derived from foreign non-communications , Q& b: k& a& u. W2 ^: ^electromagnetic radiations emanating from other than nuclear detonations or9 T3 s* D% _' L" Q: [8 ^ radioactive sources. 4 i1 _; L# d* ^% W# [Electronics. X! h4 n) C) A) p Security (ELSEC) 5 P' J3 }4 g$ n$ @$ G9 @6 lThe protection resulting from all measures designed to deny unauthorized 8 y; x4 V) f0 @5 M, [& G/ }persons information of value that might be derived from their interception and* T6 F. o! y* I7 q2 g study of non-communications electromagnetic radiations, e.g. radar." _9 P4 g# R. ]3 u5 u Electro-Optics: K p) A) y) Y+ Q% i7 h! f8 N9 A8 C Infrared (EO/IR) ! A; Y) H8 y7 ?+ X' {9 STechnologies/techniques employed by optical sensors in the wavelength7 ^( j5 B+ |2 e% C1 e3 F/ c. o spectrum slightly longer than visible but shorter than radio. 3 e. Q7 S1 `; i$ eMDA GLOSSARY, VER. 4.0 E! ]7 f* `4 |0 j7 ?. o 92 \- |9 b) j# l( rElement A complete, integrated set of components capable of autonomously providing # v/ N5 b$ V1 E! v7 u% eBMDS capability.' h8 A4 D, C$ p- o5 j+ a4 k Element; W6 x* R# o$ x k1 K) q$ D+ | Capability 9 U$ o4 x4 e, i' M* L9 S0 |1 A. oSpecification# h7 q9 B: B1 v (ECS)$ u8 J7 e5 x7 e9 i+ S: s L A document that identifies the element-level BMDS capabilities and1 y+ v' `( Q" r* M, h8 L# W/ s& _ specifications necessary to achieve the system capabilities identified in the SCS. W( p+ G9 W% J+ I+ o The ECS further defines the SCS-apportioned mission/technical performance& L. I% C7 e& e& X: z7 D& Z capabilities and allocates these capabilities to the element’s components.* w4 ^9 k5 o; T! C Element Control $ o! X' M" Q6 ]! VDirectives (ECDs)6 \) Y) U1 _2 ?- u% d4 j- K The command and control data instructions to control the conduct of the3 y4 K( s' O G; `8 g# V engagement. ECDs are developed by command and control software based * R1 w' F5 y) J1 \- C& p# Z; mupon variable parameter input by the operators (both pre-planned and real time), 7 O1 J- x8 F5 p' l, Vand operator defined rule sets embedded in the software. The individual battle: j/ _) T, t) O; I management processors use these instructions to accomplish the assigned tasks& m" I) O8 h! u8 {" } from the operations order. ECDs are contained within a Task and represent the * _# C$ Y0 \. g* [form of parameter values that influence the resource management processes of 4 \/ _9 \9 d3 y6 qWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and1 o; E6 H+ _8 I- R0 p Communications Management (CM). There will be numerous ECDs per Task. ! G; s. D. D' `Element 2 B) F6 L4 P# H8 V( k. c( x% HOperations $ G k' V: f { E" s- WCenter (EOC) * \- c$ U8 K4 B! a" I) l# A/ yAn Air Force operations center, which operates and maintains a BMD weapon or/ n( n- T$ c) |: Q. E3 `9 d/ V sensor suite. (USSPACECOM) ! ?5 U; q! E+ j' _ELF Extremely Low Frequency.0 ~% z6 |0 b- h3 u) L; B ELIAS Earth Limb Infrared Atomic Structure. . f% l) C6 W& ]4 Y- IELINFOSEC Electronic Information Security. 5 M& b E% U; u vELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2024-6-18 17:31 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部