航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ) {6 o$ }* C: w7 J6 G, `COMSEC Communications Security. " d: @9 m9 t$ G s; f# f+ wConcept1 Q4 y& @0 m! d. D, H/ ^ Exploration & # \# R) F( G9 x' r8 ODefinition . {2 @4 D3 ~( P/ g$ SThe initial phase (Phase 0) of the system acquisition process, beginning at" N* E/ X, u# w" m: Y$ G9 i Mission Need Determination. During this phase, the acquisition strategy is ( y, }4 }! H$ L* O D; Vdeveloped, system alternatives are proposed and examined, and the system% ^. x: u7 r+ ] program requirements document is expanded to support subsequent phases.7 L( e6 B. m& e6 M0 G Concept of4 T( N% z/ k# s8 i0 l Operations& b: h: D# j( D3 Q0 @% A (CONOPS) , l/ k' k& H" \: V(1) A statement, in broad outline, of a commander’s outline or intent in regard to # } d f/ s1 {) |" |% Pan operation or series of operations. The concept is designed to give an overall 8 _- b: f: e0 u3 ^2 \6 z- @picture of the operation. (MDA Lexicon) + s; w/ i, F* `# @# q(2) A verbal or graphic statement, in broad outline, of a commander’s . u) N4 D' F: O, c# z9 e' Bassumptions or intent in regard to an operation or series of operations. The! n1 K; e& V1 W7 x4 p concept of operations frequently is embodied in campaign plans and operation: \3 A2 u6 K% f: E* g$ H plans; in the later case, particularly when the plans cover a series of connected& g# ^7 ^" t* G2 R+ k operations to be carried out simultaneously or in succession. The concept is6 ^4 ?8 h& @" p% P& n% D( f/ K- M+ n+ s designed to give an overall picture of the operation. It is included primarily for, g. P3 Z7 k: X Z additional clarity of purpose. * W; b' J6 Z9 p0 O# l4 v& RConcept Plan An operation plan in concept format. Also called CONPLAN.( ^) X8 @1 I7 F6 u Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of. D+ ^& D6 Z: v3 e3 X9 G the acquisition process, or combines development T&E with operational T&E. - n3 f. p% P! `% B9 d' ZConcurrent3 b: t/ q) ^+ y# J6 d- E1 [ Engineering4 S3 s6 ?' Y1 t( v& p8 N6 ~/ F A systematic approach to the integrated, simultaneous design of products and + L( b0 \. b, g$ I8 K% A& ~their related processes, including manufacture and support. This approach is; ], X; W( A5 o3 B; J7 X' m) K intended to cause developers, from the beginning, to consider all elements of 4 h& i9 Z% L" B" ]! }0 x8 N9 n* q/ Wthe system life cycle from requirements development through dispersal, including2 b& Z7 m5 |( J0 H) c cost, schedule, and performance. : ^3 d7 i0 g2 T' y1 oCONEX CONOPS Exerciser." ?2 l6 V( ~( I1 i3 F$ t s* l5 f# g Configuration A collection of an item’s descriptive and governing characteristics, which can be 2 R! h4 q% S6 t, H0 vexpressed in functional terms (i.e., what performance the item is expected to! \% J" G: P& W. o achieve); and in physical terms (i.e., what the item should look like and consist of ; n6 c3 e5 | Z$ |/ g$ w& hwhen it is built). ! g) M+ p3 T( I! d7 TMDA GLOSSARY, VER. 4.0 C . L5 s, L, I& F& I4 z* ]592 k0 k/ ]" @7 v8 ]9 U Configuration; B' b; r# k/ C9 o; [8 E Audit; Q# b0 Q, W5 l6 O6 m3 y, C One of the Configuration Management tasks which includes a functional1 u( x( x! O9 Z0 i; S+ V configuration audit (FCA) to validate that the development of a configuration item2 M4 y' Y4 P9 d/ f has been completed satisfactorily and that the configuration item has achieved : ]2 L" h( q! O _to specified performance and functional characteristics, and also includes a3 `5 \- v% [- k1 |+ w physical configuration audit (PCA) to verify that the configuration item “As Built”: n! n$ W9 x' N/ o& x conforms to the technical documentation which defines the configuration item.6 e% W3 b1 b. w! v Configuration + M% f7 Q: C( C9 b1 g+ @Baseline- a* B1 E0 a" }% D( |* u4 C4 U The configuration documentation formally designated by the Government at a ' K' Y6 w/ Z4 p7 X$ rspecific time during a system’s or configuration item’s life cycle. Configuration: S, H Y ?# n baselines, plus approved changes from those baselines, constitute the current 0 J) o5 U! o( \: A& J, {configuration baselines, namely the functional, allocated, and product baselines./ u2 n- i, a1 L7 ]. a3 i Configuration # E6 C0 e; l9 F' k5 Q' O) QControl6 I/ v k5 | E3 N& D, ]% N5 U One of the Configuration Management tasks that involves the systematic3 `4 @) w: s4 ^# ~" Z: H evaluation, coordination, approval, or disapproval of proposed changes to the) j: P0 e% ?, }8 t( \2 x3 f! w design and construction of a configuration item whose configuration has been & p0 r! g& H u8 Z8 R: Bformally approved. 8 ^$ s5 ~2 e5 a2 \: kConfiguration j7 E: Y$ J2 l# [Identification g9 O# h4 u: b+ }3 \One of the Configuration Management tasks, which require that for every ) \: t, Q" c* h, p9 fchange that is made to an Automated Data processing (ADP) system, the design6 }, w( Y/ T X and requirements of the changed version of the system should be identified.0 j9 s# i' b4 ]. j( n6 q, S4 d& E Configuration+ ^* {& I6 _3 O4 t+ d Item (CI) 9 B, n9 `4 w2 {. KAn aggregation of system elements that satisfies an end use function and is: r5 [" Q$ s# y9 ~* L designated by the Government for separate configuration management.6 F5 @2 }2 j, I" ^) w" \! Z Configuration items vary widely in complexity, size, and type. Any item required # M; |1 M9 W* p/ R# G* kfor logistic support and designated for separate procurement is a configuration 7 }3 Y: S& R6 E; D2 nitem. Configuration items are traceable to the work breakdown structure (WBS).5 w" s' h# d7 V3 [; z Configuration7 x; G# [( ^2 |, [/ w# S( J Management ' ]$ A6 p' k) b1 O(CM)5 k; F% u* `- n/ N" I V. ~) A2 s In computer modeling and simulation, a discipline applying technical and 4 p% M6 T5 O/ ~( Kadministrative oversight and control to identify and document the functional 3 l$ J" p& \6 j, |4 X) O" jrequirements and capabilities of a model or simulation and its supporting2 `" l. z. z. `, o. H databases, control changes to those capabilities, and document and report the $ N, f' q9 b" i9 o% K; Nchanges. See also Accreditation. 4 M$ z' v/ y$ |4 XCONOPS Concept of Operations. ( e0 Q1 |' X5 ]CONPLAN Concept Plan$ _8 O/ i( V( }6 ~ CONS Contracting Squadron. g# J7 Q' n1 b Consolidated+ o1 y2 N: R' ?" M( M' V0 S3 E Command Center- k. k7 x: Y1 r# [; j4 O U (CCC) ! L' r( N8 `* N0 _7 W8 EA single command center from which USCINCSPACE/CINCNORAD can direct all( N+ l$ q6 g V6 z9 a his assigned missions, to include BMD. (USSPACECOM) Located in Colorado 0 z5 A. v# X0 c S- pSprings, CO.% m3 s% {7 m8 [% [8 j( x3 p# R Consolidated ; _. D9 n& d$ i+ p+ l) fIntelligence 3 A( j" a, _1 W+ C9 {' \5 r# n% zWatch (CIW) 4 t( {) i5 ]$ m! C* x1 [A consolidation of intelligence watch functions within the Intelligence Operations 7 L) Z5 H+ J7 s4 A ]( I+ _) kCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD + c! F3 c+ ]' V' FAerospace Defense Intelligence Center (ADIC), and the Air Force Space 9 k1 M8 O' ^2 b7 R: z+ dCommand Space Intelligence Element (SIE).) b {- q! r: Z' N' P; x Consolidated # z- g$ M8 ?6 T. \) iSpace ; C4 R3 {! W& r7 u9 D" {* i- L+ p r! i4 fOperations . l7 K. G0 X5 U! H, D2 pCenter (CSOC) - g4 `" y7 P4 Y$ y6 B, s& }Series of centers at Falcon AFB, CO, which operationally control and maintain& {/ @# M$ ?( ~+ c assigned DoD satellites. 3 ]1 G( u' G Q' R$ [Consolidated" o5 _) f; @/ O) W. a Space Test5 x: ^7 i" \/ V Center (CSTC) . {/ ?2 v3 l( `& D, ISeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and ( J8 q: V; ^0 e3 ?/ ], winitial on-orbit checkout of operational satellites, operate R&D satellites, and 1 a3 v/ S5 s+ G( |serves as a backup to CSOC for operational DoD satellites. 6 }, O4 i5 i/ c) x, ~3 Z; i6 kMDA GLOSSARY, VER. 4.0 C # v5 u2 P. e/ E1 Z) m601 f/ E# F9 T6 [6 U& r Constellation2 `- m% O8 ?4 e6 \2 R- L0 u7 \ Size (CSIZE)1 T+ @% D# Q, C5 W8 p f' z! U The number of satellites of a particular system placed in orbit about the earth. " }$ n" H* ?& O+ IContact Fuse Device used to detonate warhead on physical contact with another object.5 f$ P" p# s: m! w6 o ? Contingency3 T% [% _7 T' B) p Deployment Plan 9 r# N' y. q4 B( Y8 y, l(CDP)" e* a/ ]6 k0 I; ^ An executable plan designed to deploy an early missile defense capability and 7 }/ ~( m% t& Kreduce deployment time. The plan provides specific executable deployment+ k% a0 C1 F; i* P! W: C4 f5 ^6 A options and describes activities required before and after a deployment decision. : G4 r% y7 N: }0 G P" O+ S9 h5 zThe plan also allows decision makers to have oversight on technical progress,# v# D. {* d, D1 X+ r+ M cost, schedule, and risks associated with a deployment system. 3 T3 G0 s2 k- e j- z1 i: ^; A0 XContinuity of; q+ B8 }1 A% K5 ^ Command " {, U) @5 s; l) LThe degree or state of being continuous in the exercise of the authority vested 9 |$ T, i) ~3 Y: Vin an individual of the armed forces for the direction, coordination, and control of 8 k0 B' T+ ]+ A) e3 Zmilitary forces. . ?8 N+ M! Q9 `Continuity of " T! H# o& [( O: c: q! D" g! k8 SOperations / O/ J; D9 o5 \. _1 e, S$ \/ g" _The degree or state of being continuous in the conduct of functions, tasks, or ! k! c9 }, f( {0 ^6 ]3 C; j- n8 Eduties necessary to accomplish a military action or mission in carrying out the1 I+ u6 i1 q$ t& D+ W) S' _5 P national military strategy. It includes the functions and duties of the commander,6 Q! ]5 B0 ~ o2 P. C! r# H as well as the supporting functions and duties performed by the staff and others + b* C$ R9 b: k3 {0 x; l# M* l" bacting under the authority and direction of the commander. 8 q" b- i8 r# A" U6 IContract - P0 J& t8 w& T- o) i' }5 IAdministration ( y2 l* d8 A: _# [6 ]% d' aOffice (CAO)8 X$ }5 N6 G9 I The activity identified in the DoD Directory of Contract Administration Services* \# T `* Q1 c% K0 @7 h! a7 @7 y Components assigned to perform contract administration responsibilities. It is a* F/ [% T/ }6 q! H9 w general term and includes Defense Contract Management Regions (DCMRs)," g! g, j0 v4 g3 I, X7 R. `& C Defense Contract Management Area Operations (DCMAOs), and Defense Plant : N* K- i% h; @ w. WRepresentative Offices (DPROs). (Defense Systems Management College 7 Z0 L* n# _# f& Y: f# P9 mGlossary) 8 T! y* a9 u: r8 \) `; WContract Data( ] ]. L9 I$ S( ]% A Z Requirements+ I: W- y; S5 v, O( J' t List (CDRL)- A, G6 H" i0 i Document used to order (“buy”) and require delivery of data. Tells contractor 3 Z) G# ?+ v" e0 y" g6 Mwhat data to deliver, when and how it will be accepted, where to look for4 i7 }# M/ g; c4 h instructions, etc. % N S/ b9 i7 ^! J; r( lContract$ H4 N' ? Y+ g0 f1 \ Definition + }% @' V) G. A0 y6 qA funded effort, normally by two or more competing contractors, to establish G! Y9 v8 k2 R3 Ispecifications, to select technical approaches, to identify high-risk areas, and to - ?) L- x8 T; E5 g: nmake cost and production time estimates for developing large weapons systems.7 G. m9 J2 n- N! n o) x Contract Work " z0 X( o3 d/ A, p0 b6 S& CBreakdown0 `' [- q, I3 X5 C/ M; D- f Structure ' C# T# W& {4 X7 o9 \# G+ FThe complete WBS for a contract developed and used by a contractor within the 0 A+ n/ b$ }$ _" M6 K) Oguidelines of MIL-STD 881A, and in accordance with the contract statement of , C; C. H1 V. f* Dwork.& l) D7 Y- k5 l: u; R% V' o Contracting # w# p8 f& W6 f* Y2 `* w4 NOfficer (CO) ' ^+ S0 c! w( G- @% A) [6 X4 V" RA person with the authority to enter into, administer, or terminate contracts and & y+ W+ ]# o. ~# zmake related determinations and findings. The term includes any authorized& l5 Y/ y5 C$ K: L9 e o& z1 r representatives of the CO acting within the limits of their authority. A CO whose8 B, p6 _# B$ N- b# d primary responsibility is to administer contracts is an Administrative Contracting' I: b0 P2 C1 D Officer. One whose primary responsibility is to terminate contracts and/or settle 0 u6 @/ Z( B8 @& Y3 a( e- Sterminated contracts is a Termination Contracting Officer. A single contracting 2 K+ ] L( y- p0 [' x# ^; bofficer may be responsible for duties in any or all of these areas. 0 n4 m( a6 k E$ pControl Authority that may be less than full command exercised by a commander over2 O t' |3 x$ C! U' q- j) K3 v part of the activities of subordinate or other organizations.: d: r: K) \& y" u Control * w3 ^! e- S8 X2 K4 _" c: ^9 bAbstraction( h3 \9 t; F) M; x8 b/ @ (Software) The process of extracting the essential characteristics of control by : i6 T- e" Z& gdefining abstract mechanisms and their associated characteristics while1 u5 U; V5 Y1 J% B4 ^/ J disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C 9 j1 {0 R! s3 ]$ h2 v1 n4 W61 , w3 H0 E# O0 v, T. YControl and . k+ ^! ^ ~! dReporting Center . d5 m# }5 S7 o5 DAn element of the US Air Force tactical air control system, subordinate to the3 O5 _+ `# ^' e4 a) L tactical air control center, from which radar control and warning operations are 2 [& `) P6 g2 _7 Sconducted within its area of responsibility. 8 @2 \1 U" H3 {8 U# s, @! F5 UControl and , |+ u' Z* N0 m o0 E- n) h8 CReporting Post * D% @2 @$ ]/ @& _9 O y6 eAn element of the US Air Force tactical air control system, subordinate to the 5 w* P+ y) A& F$ I$ O3 u: c) u/ t% Ycontrol and reporting center, that provides radar control and surveillance within; e* d) I3 i/ |& a& ?$ v' ` its area of responsibility.: o9 e P+ f8 P9 }8 |9 f1 l& O/ i Control Area A controlled airspace extending upwards from a specified limit above the Earth. " x ~. y' o ^3 F' s, m7 Y1 ]: R4 {Controlled$ ?. _8 M! d& a; i# u. _ Environment 0 o' T `8 i6 Q, \Area where entry into the radiation hazard area is controlled.' }5 ]/ J: q- r$ D& \; G Control Y2 J- m6 o1 Q e! u! wProcedure) w; D. ^2 e, g* y; P! j, |4 ? The means used to control the orderly communication of information between W/ ~, A. F0 d; T( I- n, astations on a data link. Also called line discipline. 6 {" S8 d1 n& z" xControl Station The station on a network, which supervises the network control procedures such$ g- n% I. V+ d4 T7 { as polling, selecting, and recovery. It also is responsible for establishing order( F) |% t, X7 A$ U* l on the line in the event of contention, or any other abnormal situation, arising 2 o1 E7 {2 ~6 P5 T% g6 j4 zbetween any stations on the network. - }0 b% q+ v. j+ a& {Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to 7 h2 l# J% N3 V6 y2 C+ nprocess sensitive defense information and that is under sufficient physical and 3 \4 S# i3 \5 X) dtechnical control to preclude an unauthorized entry or compromise., p$ c" I: c% }; |, }" B CONUS Continental United States. + [! M. b$ M7 P8 M/ k2 AConventional Co- D( l$ Q3 ]% Z2 HProduction / ]! E! v0 |& H1 KAn effort between governments to produce the same end item, or components( h( N% L; n0 Q" ~, j! S! h of the same end item, in concert. & q- N# D% n. IConventional) C' U0 L1 B) J4 _ Weapon / D! Q. g' N' y O* E' NA weapon that is neither nuclear, biological, nor chemical. + _4 J4 r/ B/ \9 |% d# U1 \: sCoop Cooperative 7 i% w* y; R. tCoordinated & h/ o9 b: @3 G: JEngagement ' \6 X% Q2 X" e2 [" r m+ S0 }Planning/Actions 1 i& c3 }% l! TNecessary coordination among engagement components to ensure maximum ) f% ]; P$ }$ ~% l3 Zeffectiveness of the SDS and resources are not wasted on targets already $ v+ ^ O1 _9 k1 N) v: e; }% p; ^targeted. . R* L- o1 `6 V% S: L! YCoordinating6 I5 I" W- o, ?. ~ }8 x% b Authority * x$ d( ]% t* t: eA commander or individual assigned responsibility for coordinating specific * j+ Q4 v1 f* w9 g1 V# s3 s9 W; I& E6 Ffunctions of activities involving forces of two or more Services or two or more 0 H, F( S# G! F4 @( Q r3 d+ sforces of the same Service. The commander or individual has the authority to0 ]8 Q! o) Y' F2 g( K3 C' V require consultation between the agencies involved, but does not have the) W3 W' F1 c. _/ c$ m, M authority to compel agreement. In the event that essential agreement cannot be( d1 q- k3 ^* ?8 E reached, the matter shall be referred to the appointing authority. * r/ @0 D/ @6 h" mCOP Committee of Principals' I9 f. y8 J& X8 K0 i: h COR Contracting Officer’s Representative. Contracting Officer. " `# Q" V; p9 Y% ?3 ACORBA Common Object Request Broker Architecture. ' c! l) R0 p8 E9 ]( g0 N- ^CORM Commission on Roles and Missions.' Q5 \* ]" X# {: C, o) S MDA GLOSSARY, VER. 4.0 C ! j4 G# |$ z: z4 O r2 b62 G7 z7 f3 ?8 q. S# h# K; r6 ] Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens( v$ E/ [8 o ~6 F perpendicular to one another, designed to act as a radar target or! L) E' c$ M* ^6 G$ k+ o' P marker. 0 z# l" ^# L) |5 W5 g' v7 |(2) In radar interpretation, an object that, by means of multiple reflections . `0 y+ f' }4 l5 J Wfrom smooth surfaces, produces a radar return of greater magnitude than" J) P3 Q, t6 H. J! V& v might be expected from the physical size of the object./ ^ x$ s8 x) t* y$ v% N4 S6 q& G Corps SAM OBSOLETE. See Medium Extended Air Defense System. : H$ P* K. n1 k1 FCorrelation (1) The process of relating observations or tracks from one set of data to) `5 z; ~6 E. Q, ^( a" ` observations or tracks from another set of data, i.e., collecting data from ; \7 s9 s/ L" a( m$ xdifferent frames or sensors that presumably relate to the same target. (2) 8 G6 B; ^6 [) N1 fIn air defense, the determination that an aircraft appearing on a% S$ r8 O) K o# {7 ^2 K radarscope, on a plotting board, or visual is the same as that on which 0 v" S/ n' P! `- Q' A5 ]5 dinformation is being received form another source. (3) In intelligence + L3 b5 X) L& I- w' v# kusage, the process which associates and combines data on a single L, ^0 ]5 V! l4 p# |2 Q! U entity or subject from independent observations, in order to improve the $ Z4 T' E4 f9 t9 x! ~reliability or credibility or the information. 9 ^4 h- s. p# mCOSEMS Evolving architecture operations support tool. $ s4 o, b* U* s- I3 H4 E% z0 h" iCOSM Computer System Operator’s Manual 2 x+ ]& s. W+ GCOSMIC NATO security category. 6 Y4 ^+ E* F* {% H- H" TCost Analysis ( v: y# }- ] G8 [Improvement 5 }, z" W* {9 }$ j* PGroup (CAIG)* D8 s6 P+ }4 p An organization within the office of OSD Director, PA&E which advises the DAB% Y9 z+ B# N( Y+ V on all matters concerning the estimation, review, and presentation of cost / R/ E( @2 f2 R- i5 n, Aanalysis of future weapon systems. The CAIG also develops common cost * K7 b: g9 K- e# w; ]' M+ [& pestimating procedures for DoD. # I; I( w0 K* m6 a% K( Q# ICost Analysis) a# G' _+ h& O9 J2 q8 f: J5 y Requirements0 g9 Z. X9 m! t: B Document2 l, H- _9 E( a3 B, c$ M (CARD) . l7 b$ w- X4 z( e3 Y) t, E$ BThe document describing the technical baseline, which is a subset of current" H* q0 z8 \: j4 u6 W" H6 x system technical data and is used to generate the baseline cost estimate for an ' F9 k2 K7 y! ^( RSDS element. It includes, but is not limited to, the element description, / @: _0 f8 W0 X, _, W$ xinterfaces, operational concept quantity requirements, manpower requirements, . D, x& b0 h3 qactivity rates, schedules, research and development-phasing plan, and facilities0 s8 y1 u& E2 g/ x; E M, B requirements. 6 A+ S J& Q% W& b6 X, hCost and9 ]! _# G* H( V Operational 3 g. B. `2 o$ |+ Y/ n& A! ^$ x6 oEffectiveness; a9 L" `/ g0 h9 a, w' { Analysis (COEA)9 v9 G: W0 ]: z/ j/ i An analysis of the estimated costs and operational effectiveness of alternative 5 O7 d3 N* M$ Vmateriel systems to meet a mission need, and the associated program for ) ~0 @. h3 ~ r) n; W& `acquiring each alternative. 8 G( w) J: E& x6 L( O1 F7 @. @2 GCost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk8 |. k- `; ?( T+ U1 U& A due to cost estimating errors and the statistical uncertainty in the estimate.& u) K/ g2 b4 @. W Schedule/technical risk is risk due to inability to conquer the problems posed by ! \4 y/ t3 {" L$ o8 x7 G8 S* j1 bthe intended design' ]3 s' M& H! a8 e* N% ` COTR Contracting Officer’s Technical Representative. See Contracting Officer. 7 H) _5 V5 u+ ~: oCOTS Commercial Off-The-Shelf. . u) L6 U" O4 ^7 Y' A. C- K& [Counterair A US Air Force term for air operations conducted to attain and maintain a desired ( w% e5 u% p8 Q6 Y9 Wdegree of air superiority by the destruction or neutralization or enemy forces.6 F" d+ t9 O& ^; j3 F6 e Both air offensive and air defensive actions are involved. The former range: d; k, j+ ?% \2 U; s( z$ l# F throughout enemy territory and are generally conducted at the initiative of0 w! n1 t4 j! T# A: o! g friendly forces. The latter are conducted near or over friendly territory and are ( `( N: K3 \& U1 ^generally reactive to the initiative of the enemy air forces. 8 K) \: e1 {2 F Y: l- q6 V$ |6 ^MDA GLOSSARY, VER. 4.0 C 3 o1 j9 N/ J, Q63. x# }% h/ K4 a3 t Countercountermeasures: E# e% }8 d' ]' [6 S1 l (CCM) - c# R+ {& O! m& k0 j6 ?Measures taken by the defense to defeat offensive countermeasures.1 X( @" r' ?, p A+ b! f8 ? Counterforce The employment of strategic air and missile forces in an effort to destroy, or 4 R8 N9 I- x; b& W1 B* lrender impotent, selected military capabilities of an enemy force under any of the # D. W7 D; m/ Y w% ycircumstances by which hostilities may be initiated. " p2 j0 f) }, N" u3 TCountermeasure A design or procedural measure taken against covert or overt attacks. : S& r$ [2 V( w3 U- F5 CCountermeasure ! g# l+ Z+ p" m0 X; X' u$ cs (CM) E3 d; u9 _ N3 v2 Q$ GThat form of military science that by the employment of devices and/or8 k/ Y+ `3 G: T8 @" ? techniques has as its objective the impairment of the operational effectiveness of B/ ~6 w! }' w5 ?) L enemy activity.9 G( r+ c2 Y( e3 J+ {! [4 A5 o w Countermeasure$ X$ K# }5 r! H" }* _" V s Rejection! g, q& ^; [! t' r8 l- I (Surveillance)0 p7 x+ P2 r8 A Improvement or rejection of an object signal in the presence of% y" S) _, L! p0 ] countermeasures.+ v c2 i6 X. F! g# j2 N, k: f Course of Action3 h+ C: l% v w (COA) 4 r+ [8 Z, F9 {" m, i9 [5 H$ Z# a I(1) Any sequence of acts that an individual or unit may follow. (2) A possible ! c& y( e- `9 L! I4 S! \1 qplan open to an individual or command that would accomplish or is % q! R5 o7 U$ S3 `/ }: Wrelated to the accomplishment of his mission. (3) The scheme adopted 8 h$ O7 T7 d/ w9 c- n [to accomplish a job or mission. (4) A line of conduct in an engagement. / T3 ^; |3 U5 k0 d(5) A plan to accomplish a mission. It describes the execution concept * t7 o3 f3 f+ ?: g) M. tfor BMD of North America. It will specify the engagement priorities, * ~" \# b9 u. C+ u1 w0 g. [resource allocation and desired results by Area of Operation (AO). . u+ B8 Z# s% V- V(USSPACECOM) (6) The scheme adopted to accomplish a task or5 K1 v4 W1 k3 D3 Y: J$ J+ h mission. It is a product of the Joint Operation Planning and Execution: N2 S) j0 G3 D System concept development phase. The supported commander will 7 D0 W+ G! J6 h! v5 D5 o% Xinclude a recommended course of action in the commander’s estimate.2 W$ Y- Z( i; }6 D The recommended course of action will include the concept of & Q% g, u) [7 k* J5 [) foperations, evaluation of supportability estimates of supporting ; s* Z$ Q% b% U% Corganizations, and an integrated time-phased data base of combat, . t0 Z# B5 M! ^9 Q! A% Fcombat support, and combat service support forces and sustainment.7 b# ~! W7 \' y" E4 }; ~1 u3 @* L Refinement of this database will be contingent on the time available for; U6 L [2 M$ K( O& ~ course of action development. When approved, the course of action, ^* \- C* e& z becomes the basis for the development of an operation plan or , v3 q# a0 b I) n/ l; ?( q) Roperation order.9 u( c h; F2 K6 v Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps,3 h/ J- x+ i! @! w9 n) N* ? and other geographical presentation systems. (2) Cover or protection, as( y; O/ U8 }" W! b+ T5 j4 Y the coverage of troops by supporting fire. (3) The extent to which $ i0 S* x7 b5 `- ]1 {intelligence information is available in respect to any specified area of; E# `" {; J R! S interest. (4) The summation of the geographical areas and volumes of ; X6 F$ E0 P. w' Q# O6 K; I saerospace under surveillance./ r) C0 C0 ^8 k$ ?" F% d* V Covert Timing: X% ]5 R* W6 F3 Z) G/ E, Q Channel6 k% h) I8 y9 L6 C- q A covert channel in which one process signals information to another by3 R/ b( u }' S$ A8 A) C modulating its own use of system resources in such a way that this manipulation $ T0 F- @4 {: y0 R* Taffects the real response time observed by the second process.5 w% q3 z* D. G2 B CP Command Post. " F3 `+ C- _6 d: `. F, E0 T% BCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. 6 t7 |' r* K1 }" d& Q5 `CPAF Cost Plus Award Fee. 3 b4 l6 e& W3 | Z% MCPAM Chief of Naval Operations Program Assessment Memorandum (Navy)* R- C, D% w3 c6 B MDA GLOSSARY, VER. 4.0 C( ]/ {6 Y! [. g+ Z* J5 h2 J/ P 64+ G, {- L6 T% G% E r( ]% x% v+ w7 w CPAR Cost Performance Assessment Report.9 m6 d% z4 F3 g) X/ }! a CPAT Critical Process Assessment Tool3 d! D! l+ {3 F0 d" D3 y CPB Charged Particle Beam.5 N7 Z! n3 v/ g9 k CPEV Communications/Processor [Network] Experimental Version.3 l5 }- D2 i0 Q' W: u! T1 R5 Q CPFF Cost Plus Fixed Fee." N, ^7 e8 m/ I! U3 o# h N; P CPIF Cost Plus Incentive Fee.+ F( p/ C" b3 m6 z0 s4 I0 v CPIPT Cost-Performance Integrated Product (Process) Team. 8 V! A; U$ V; M# w3 q" b& Z; fCPM (1) Critical Path Method. (2) Contractor Performance Measurement. ( W+ [5 z7 @7 ?9 T2 Y2 bCPP Critical Performance Parameter. E1 F' }) I, V7 OCPR Cost Performance Report.9 z) J" Q: Z9 D, R CPR/NC Cost Performance Report/No Criteria (Contract management term).# y' _; M6 {( \3 C CPS (1) Consolidated Program Summary.) g$ H6 `+ ?2 k1 G. e+ ? (2) Competitive Prototyping Strategy., A6 U' d6 m8 V4 Z+ T (3) Current Program Status. 1 Y) p/ d8 x2 {1 _: MCPU Central Processing Unit (TelComm/Computer term). & G" `" p. r" {1 x1 I4 k6 c; JCPX See Command Post Exercise., t" h& S% j5 k5 U `% u" P9 `0 q CQAE Chief/Contract Quality Assurance Evaluator.5 C( S- B: q l9 G CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).; y% ?. k$ S. `4 U: q CR-UAV Close Range Unmanned Aerial Vehicle. $ w1 [7 c. v' z4 B! w6 fCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement9 q( v: Y. F* _( h" x CRADA Cooperative Research and Development Agreement.' K" g! W" Q# P5 q4 d+ R. @ CRAM (1) Control Random Access Memory.6 N1 ?5 c- G+ t; u1 h4 J (2) Cross-tie Random Access Memory (Computer term). P4 U" p3 O5 ^9 gCRB Configuration Review Board. ; P! e1 e% L) @0 u0 ACRC Control and Reporting Center. ; G( A, N7 z% d/ ECRD (1) Capstone Requirements Document. , _4 A$ U w* K(2) Component Requirements Document. : ^' S7 F" j' i8 UCRDA Cooperative Research and Development Agreement. 4 y; r9 c$ ]7 P! z n6 c5 \* {CRG Communications Relay Groups (PATRIOT).9 Z" a. f6 H7 \8 p2 W* n6 G1 v3 }7 l CRI Classification, Recognition and Identification. ( l0 X6 X$ b2 T+ ~: uCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C6 I0 y7 L' \/ k5 Z 65' e" T( T" |+ u# g Critical Design 7 w1 G) _. |. s. M7 z5 OReview (CDR) ! r& P7 L, G/ Z/ {2 U, I) XA review conducted to determine that the detailed design satisfies the6 \# O$ ~. _; Z2 ~ performance and engineering requirements of the development specification; to' N& W$ m# y" {3 B establish the detailed design compatibility between the item and other items of # M4 i9 s1 J9 p2 g6 F% o% cequipment, facilities, computer programs, and personnel; to assess producibility' a4 j' |2 x8 I5 z* s and risk areas; and to review the preliminary product specifications. Conducted ! N! {1 C6 g# `" Lduring Phase I, Demonstration and Validation (for prototypes) and Phase II, $ V6 n' @" k: U3 L/ ?) |Engineering and Manufacturing Development. 5 j$ i) @. b) X! a6 ZCritical. I7 \: o }5 i& h- k Information ; V5 Z0 E# [% r7 bSpecific facts about friendly intentions, capabilities, and activities vitally needed # T k7 R7 V- {. O, oby adversaries for them to plan and act effectively so as to guarantee failure or & n3 g# D+ b0 Q) T0 X8 Zunacceptable consequences for friendly mission accomplishment./ t1 H! T, ?1 b7 w0 ^( a Critical % e- Y: X/ \7 hIntelligence % |: ~1 H( X5 W- }+ l n: C# sParameter% b) b7 i0 F( |$ t t% E/ ~ A threat capability or threshold established by the program, changes to which # x2 F1 h. r( I' T) w5 E5 z5 [! R" ncould critically impact on the effectiveness and survivability of the proposed ( G, I$ E o5 a n, `; Esystem. * [( o8 a' h3 \ l& m7 J8 o) ZCritical Issues Those aspects of a system’s capability, either operational, technical, or other, " I- a: q- Z0 C' Wthat must be questioned before a system’s overall suitability can be known, and # r! L3 o, m; X H- R+ xwhich are of primary importance to the decision authority in reaching a decision- w, X8 V) s c3 U to allow the system to advance into the next phase of design, development,. `" X& P M2 v1 l8 e4 N production, or post-production.: ]" g j+ H' |. t! v, A# e Critical O' V7 ]1 j) P# Z6 b! ~ Operational m! W2 l: s5 TIssue ( n. J, s% O. f- V6 AA key operational effectiveness or operational suitability issue that must be( Q& ?8 N8 z: u7 S" H examined in operational test and evaluation to determine the system’s capability 6 F5 N Z* Q' f" [( z3 q% vto perform its mission. A critical operational issue is normally phrased as a 3 M( }+ A Q dquestion to be answered in evaluating a system’s operational effectiveness/ d8 {+ s$ h! ]$ |" h9 X) Q7 [ and/or operational suitability.7 a, E7 G/ M1 y: ^8 y8 ] Critical Path4 G U6 _0 U! r- L Method # Y$ y1 K2 H# LA technique that aids dependency of other activities and the time required to) a3 I: Y: } |! v8 l complete. Activities, which when delayed have an impact on the total project7 o/ ~1 o3 y- R* e+ q" n schedule, are critical and are said to be on the critical path.$ p' S( i) l) x0 [! x Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to* L7 C# |+ l8 }$ e9 } the viability or the operational effectiveness of the SDS. 0 a3 B R% O d8 h0 M/ u' QCritical Security& @: j% m6 n6 S. D8 S0 u9 ?* v7 [) s Risk" O9 S h Q- a( g& T0 V+ B The existence of a security vulnerability that, if exploited by an adversary, could % H; w. n, M+ Z9 Ycause exceptionally grave damage to the viability of the BMD or the operational . H" k g0 @- yeffectiveness of the SDS. Critical risks assume an adversary’s capability to $ Q- [' a+ A0 P% d, Zcause major system disruption or degradation (e.g., single point failure), 6 R4 l0 e, T, I& x N' n! D- e) H5 z; Hdestruction of mission-critical components, or usurpation of system functions. $ W$ _3 {5 T" x3 V: { {5 b; f3 TCritical g, Z0 C' e' x Supporting0 ^8 `: L! v( Y; t( Q3 t Technology 4 x5 I, s# }3 {8 r* J, zA technology that program management personnel consider a critical part of the - a$ `1 ]" R. M* J/ Qprogram being described. ) w. W2 k8 g- i, {" |3 G0 j5 PCRLCMP Computer Resources Life-Cycle Management Plan. 6 ~5 L$ [& e, m: r# _6 ?0 [CRM Computer Resources Management. + Q3 y0 N a2 wCRMP Computer Resources Management Plan. ; e3 ]- }/ `! [( ]9 k( TCRO Chemical Release Observation." z: _1 p7 a0 l, a# J6 Q' ^9 `) b3 }; y CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC : X6 N- \9 S5 _, w/ Q9 oterm.) E6 V# L! E; |6 y- \1 g2 o; N; PMDA GLOSSARY, VER. 4.0 C / q1 s9 s! A5 e7 P0 ?66 - h' J( ^* e( f8 e+ l& O9 ?CRS (1) Computer Resources Support. (2) Congressional Research Service. (3) * C, k z0 s7 l& D- _Contractor Reporting System. 1 E2 T h1 F/ Y, lCRT Cathode Ray Tube. ' ?3 r* D( L. O; l# N2 U4 T) tCRWG Computer Resource Working Group.3 J/ v# |) ?/ [$ R, `; r0 d+ e5 Y Cryocoolers Cryogenic Coolers.5 ^3 N7 p$ |" d" m$ j Cryogenic Of or related to cryogens (substances which are used to obtain low6 V* q) V) V6 M temperatures).* g0 H f# t9 v' ?- ~3 a" K8 i4 j; G Crypto A designation or marking which identifies classified operational keying material, , p8 n* u2 Q! Z; K2 eand which indicates that this material requires special consideration with respect 8 }0 U. V5 ?5 `to access, storage and handling.2 U& W. Y3 r. f9 W7 h Cryptographic ; N- g& Y ]8 j5 }& J! JSystem4 D3 G: c1 f m* p! V# S2 r The documents, devices, equipment, and associated techniques that are used 5 v8 N- C, Q$ o$ }+ p% ]! Fas a unit to provide a single means of encryption (enciphering or encoding).% X, h; S# ]/ K0 q6 q1 o Cryptology The science that deals with hidden, disguised, or encrypted communications. It! g) x- W* x$ [) `* T includes communications security and communications intelligence.: {8 F$ F' N+ h3 D1 _0 s$ m1 b& j CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.0 e8 V% o( T0 D+ s2 E; A t CS/CSS Combat Support and Combat Service Support (USAF budget term).% e4 i; z3 f8 p9 U8 i2 h: ~ CSA Chief of Staff of the Army. 9 x ^2 l; `: A1 _2 E4 ?! {" r2 kCSAF Chief of Staff of the Air Force.% ~; ~& T' s. Y CSC Computer Software Component.5 N1 Q/ \- z* E9 I& N5 E3 ?$ {8 K CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) ' J- [+ e% W, R/ m9 ?- T: [# ^CSCSC Cost/Schedule Control System Criteria.6 F( X+ q# u1 H* z y! w CSD (1) Constant Speed Drive. (2) Critical System Demonstration.) m, k- d+ A7 p" y2 ~! \ CSE Center for Security Evaluations (DCI). 9 v. s3 u! s! l5 RCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon " K* a* A# g$ j* `- ?+ e% qSystem, located in Cherry Hill, NJ.4 A9 y% J! r, [- e! L CSF Consolidated Support Facility, Arlington, VA./ _6 b4 U3 M) F1 S CSI (1) Critical Safety Item. (2) Critical Sustainability Item.6 f2 ?3 j3 \5 j3 [5 ~8 u CSIP Current Systems Improvement Program.4 e) J0 y+ h- w* f: Z9 s. P CSIZE Constellation Size.0 b3 G' }$ _3 F. M CSL Computer Systems Laboratory.) y# N2 _5 h7 q3 }. ` CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.1 \5 ~( q2 j' _( B1 F CSNI Communications Shared Network Interface (NATO term).: E% F: n6 t1 O$ \ ?4 ] MDA GLOSSARY, VER. 4.0 C. e" `' c+ E r7 e 67 $ V! z3 k0 e/ I# C4 r6 kCSO Closely Spaced Objects.$ f2 V& `8 \! A& B J& W CSOC See Consolidated Space Operations Center. 6 n7 G" M8 D( ~5 Y3 w6 V: TCSOM Computer System Operator’s Manual, D# R q7 _- x CSOSS Combat System Operational System Sequencing 6 D7 }9 W# G4 a& b1 H, b) h7 c* MCSP Communications Support Processor (numerous locations, including USAF Air0 O5 t3 E" D' E" {9 `" L Development Center, Rome, NY term).4 |6 ~' ^+ ~7 { CSRD Computer System Requirements Document. 2 a7 j% A! e y# e( Y* n( ZCSS (1) Cooperating Space System. (2) Communications System Segment. (3) : ?3 U2 G% y1 ~' v) j( qContractor Support Services. (4) Common Sharing System. (5) Communications ( W$ A3 c& ]/ a) s2 CSupport System (Navy term). (6) Common Support System. (7) Combat Service- c# O( b+ O; i% s% x2 f8 a O Support. 1 }7 A+ J. `: `. tCSSCS Combat Service Support Control System (USA term)./ E( ]; o6 C2 q& q% O$ }7 N CSSPAB Computer System Security and Privacy Advisory Board. / i* h% u; ^) U: T F+ E6 CCSSO Computer Systems Security Officer. $ f! _: I8 u; p5 Q o6 iCSSTSS Combat Service Support Training Simulation System (US Army term).6 F& T$ P6 A# v$ a V CSTC Consolidated Space Test Center.% B$ f& [* a0 W e CSTI Civil Space Technology Initiative. 9 Y& r& m' Y6 l* F3 U' R; b |CSU (1) Computer Software Unit. (2) Communications System Utilization., e$ F _+ s q+ M) @7 {6 Y; Y CSUR Communications System Utilization Report. 9 h% P4 h! i& V& d( k$ o$ O1 wCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.# R6 \3 c( E3 U$ h7 b (4) Cryptologic Technician (Navy occupation specialty).$ I0 m1 m3 _, P$ {6 Q3 U, D' Y# d- V; I CTACS Contingency Theater Air Control System (JFACC term).! Y6 O, V+ R8 Z$ a CTAPS Contingency Theater Automated Planning System (USAF).' C. F: k4 m( k9 k8 y CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ; x" e" V' I# {" _6 s/ KCTBM Conventionally-0armed TBM. 7 ]) j6 b1 W: r, ACTC Combat Training Center, Ft. Leavenworth, KS.: r5 F M# r2 Y0 k& Y CTCC Critical Technology Coordinating Committee.8 g4 u# o6 V& H: e CTD Communications Test Driver. 3 b' n4 W1 L* iCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment.1 C ]4 J) S# `: }3 M/ L6 C CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally 2 J0 P2 Y( w+ N# G$ vfunding selected test investments proposed by the Services and Defense . b _, ~ O; H0 j% |% d( QAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C # _3 m1 z; n0 n* i; a5 s6 ]68 4 c+ S$ k. L- B( C- b/ UCTF Controlled Test Flights. / B8 s" V( Z" s) [CTI Concept Technology Insertion.# t' S% W1 o8 s) N' T1 u; d CTN CALS Test Network.4 { z0 y! [: h0 Q& K6 e- E CTOC Corps Tactical Operations Center.2 w5 ?; |1 D% g* W. k0 O @ CTOL Conventional Takeoff/Landing aircraft. & [( q8 X z" R) eCTP (1) Critical Technical Parameters.6 ~' H2 B& F0 p$ L3 i (2) Communication Tasking Plan. + Q' [! p* b) q6 f% j7 T(3) Consolidated Targets Program.! L0 E9 ~3 e, U5 Z5 Z8 f+ y CTPE Central Tactical Processing Element.4 t e8 H" _ a: ^% K( ^1 L CTPP Consolidated Targets Program Plan.4 c `+ i8 f. `4 W3 g. h7 M7 z CTR Cooperative Threat Reduction (Treaty negotiation term).1 ^8 }! P, w a( n- K) V& B CTRS Centers - {8 Y2 B0 i3 w( m1 kCTS (1) Clear To Send (TelComm/Computer term).4 `5 T% _( i1 h" i' Q (2) Contact Test Set (USA IFTE term). # w, X$ A' V Y5 FCTSS Computer and Telecommunications Staff.0 J. [' Z7 _- _0 b CTT Commander’s Tactical Terminal (US Army). # a3 T/ A% ~$ ~CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term)., G& F$ p, W* u CTV Control Test Vehicle(s). * b5 n! j5 u5 f/ }6 J6 M0 ZCUDIXS Common User Digital Information Exchange System. & [* W* G, }8 R: ]! c) }Cued Operation The directing of one sensor based upon the data received from another sensor. . m. h+ c U7 m7 hCueing Command The command within a tactic, which specifies the sensor element’s coverage, c& u8 Z+ j1 O9 S volume.: y6 C) j/ c- h+ ^( v Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage % P/ K4 {: D" Z4 n, Tvolume.% T0 t/ K9 U- b1 E* v. c! q CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. f* B' E" } D' `CV/BM Carrier Vehicle/Battle Management. 6 c2 o1 x$ g+ B8 NCVBG USN aircraft carrier battle group. i; j* ~: C- B; sCVHG Carrier, Aircraft (V/STOL), Guided missile. / C# k8 E9 ]- v8 z% t# D- |, [CVISC Combat Visual Information Support Center. * }. _! Z4 n* ~CVL Copper Vapor Lasers.1 m! k1 f5 b1 r4 U, r4 w1 A4 x0 a, B* ^ CVN USN nuclear powered aircraft carrier./ C. m+ b4 f; Q7 X3 l0 p MDA GLOSSARY, VER. 4.0 C8 P0 `" z9 q2 B 69* J6 J1 n3 u$ j9 B/ M CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 8 B2 b1 v6 ~. Y! ACWAR Continuous Wave Acquisition Cycle (Hawk)., o& ^: M8 D3 t3 { CWBS Contract Work Breakdown Structure.0 n1 R) m, h% V, ~ CWDD Continuous Wave Deuterium Demonstrator. * `, r! q8 v9 F1 S$ KCWIPT Cost Working group integrated Product Team.2 j. ]% r6 B9 e c- t9 o CY Calendar Year.; L1 y; {6 s8 \ MDA GLOSSARY, VER. 4.0 D; Q6 y* I& ?' ~ 71 . k0 I8 J9 F+ s, _5 }3 `' I ]D Deuterium# _: x5 D- ^/ B! w, n" z+ l! N! _* C D Spec Process specification.5 m& h1 W0 h+ l7 N# e& S" D6 k D Star Measure of infrared sensor sensitivity.' M- K& t. g) ^ T, M, J) h D&D Design and Development: h: d, {; i' G. D2 j; \ D&T Detection and Tracking. - T+ Z6 M( `* Y6 FD-IFOG Depolarized-Interferometric Fiber Optic Gyro. 8 G& a* [ N+ g& Q6 }8 dD-Level Depot Level (ILS term). , y7 {% e! G5 q; kD/A Digital-to-Analog- _- |4 L( h3 j) T5 D7 M D/V Demonstration and Validation.1 R0 r9 U b7 v D2 Projective (interceptor) in the Hyper-Velocity Gun program. 7 n. s8 C: d* v! EDA (1) Department of the Army. ' {* @5 G% {( j: ~# ~( l(2) Department of Administration. $ X$ M/ v/ T0 b; e" L! @6 Y(3) Decision Analysis. 9 J0 L3 F1 b l3 m(4) Developing Agency/Activity. 5 W; d0 g% U8 K' `3 h2 G(5) Data Administrator. # u. j4 y# ?* H+ t+ X. D(6) Direct Action.. S% h: v. i' O6 ^3 Z (7) Data Adapter. 2 I! d" b$ ?1 Z) ?- E7 _DAA Designated Approval Authority (DD 5000 term). # T; b8 D" J" FDAASAT Direct Ascent Anti-Satellite.7 h* v+ V/ g' b/ Y; ` DAB See Defense Acquisition Board. ; X2 r+ I4 e2 t& ^1 A- I* ]DAC (1) Days After Contract [Award].$ k6 ~' J0 ?# I7 }2 x (2) Department of the Army Civilian. $ ~) t9 O6 ]% o2 O8 x9 L0 s4 S(3) Directed Attack Characterization. # V) ~9 f! U* F( y(4) Deploy ACCS Component.( V9 d$ k( X6 o* N- C0 v' s (5) Digital-to-Analog Converter./ ~9 a' X' j4 R# _3 z" }" N DACS Divert and Attitude Control System. 0 f8 H9 a' Y" M, \: Q* L8 [* WDAD Defense Acquisition Deskbook. ) z8 p8 R! T; y6 Y- U; dDADS Distributed Air Defense Study (1993).: b* i' V4 z1 k" a DAE Defense Acquisition Executive. ) L' s$ D1 l- f6 kDAES Defense Acquisition Executive Summary. ]# Q. k. E+ W, N0 r& h. l DAGGR Depressed Altitude Guided Gun Round.5 F4 Q3 C; ^" H$ f( C DAHQ Department of the Army Headquarters.( x' R9 Q4 ^+ a0 B* @( N DAI Damage Assessment Indicator (targets). 8 ]5 M- y& @- p7 Y1 z$ J4 x+ lDAL Defended Asset List.5 O# I( z% v- z( D3 H& e* ]% G MDA GLOSSARY, VER. 4.0 D , V3 W5 f7 o+ u+ G$ V+ i& ]( W72' t6 i2 P. Z. O5 ~ DAMA Demand Assigned Multiple Access.6 f- ?, S) o) V& v5 r: S DANASAT Direct Ascent Nuclear Anti-Satellite.+ Y: H/ v/ w5 s. m& J' { DAPR Director’s Annual Program Review (SDIO term). X, @: F, a! |2 {0 ? DARO Defense Aeronautical Reconnaissance Office (OSD).) h# e. g/ d( `, ^ DARP Defense Aeronautical Reconnaissance Program.% w0 z, `7 @: U/ d2 g8 u0 Z DARPA Defense Advanced Research Projects Agency. See ARPA. 8 Y$ X- W0 \" P! D4 c* _DART OBSOLETE. Defense Acquisition Review Team. ( u T0 N& M8 X" E0 ADASA German Aerospace. Member of the MEADS Program Team.& \9 a- |% T* v. E. Q" C DASC Deep Air Support Center (JFACC term).; f- I, g* z5 E7 j3 c3 ` DASD OBSOLETE. Deputy Assistant Secretary of Defense. $ r: F; H) Q1 y D* ~8 R* {3 |! v3 JDASD (C3) Deputy/Assistant Secretary of Defense (C3) " i5 x5 ]! \" e4 rDASO Demonstration and Shakedown Operation. , z+ g; N1 ~- W C- k8 O. CData Integrity The state that exists when computerized data is the same as that in the source 4 M5 N* c% ^& V+ Vdocuments and has not been exposed to accidental or malicious alteration or& q# C; t. p0 [1 Y, [0 H destruction.' K4 t' y+ L! Z2 T9 A Datalink (1) The means of connecting one location to another for the purpose of 6 }2 _* {: h/ ptransmitting and receiving data. O$ A2 \6 N1 Z (2) A particular path between two nodes over which data is transmitted. It3 [, r3 Y9 {0 t/ x( S; c+ n includes not only the transmission medium, but also digital to analog 6 s# L: i, ~' p# T6 p! Gconverters, modems, transmission equipment, antennas, etc., associated : q4 I+ s6 S7 w8 R& l5 jwith this path. In the SDS backbone network, it was a path between two , a0 \9 M' j8 o, oSDS elements. In space these datalinks were microwave or laser. On" ?4 U% W; |5 p& c2 h/ a the ground, they could have been wire line, microwave, or optical fiber.* `7 p1 P" k! A+ l; w DAU Defense Acquisition University, Ft. Belvoir, VA.3 Z" z9 j" s+ A; c( a' \+ h DAVID Development of Advanced Very long wavelength Infrared Detector (USAF4 I5 L- Q& ?1 o2 ` Phillips Lab term). ' v2 d. L% x$ i& o. i$ F0 N. MDAWS Defense Automated Warning System. ' Q' Q2 f& I) _7 E }1 tDazzling The temporary blinding of a sensor by overloading it with an intense signal of/ ^/ D6 i( l F3 i; q electromagnetic radiation (e.g., from a laser or a nuclear explosion). 2 ?0 }; `( u8 L' H) wDB Bata Base* P1 R; n/ {1 A) E+ G4 x DBME Database Management Environment (Computer term).5 B2 s. q( \" L9 k' Q) _& A4 J8 u6 g DBMS Database Management System.( ~ x* N( e- X( { DBOF Defense Business Operations Fund.) }: h7 [- M" D% f DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D, B5 V% I9 [6 T4 q1 p% h" D7 I: W: G 73 0 ]. K. m. K/ O kDbsm Decibels per square meter. / V" p. u1 n6 D2 G3 DDBSM Database System Management.0 `. p% e I/ x, g7 R$ A9 C DC (1) Disarmament Commission. (2) Direct Current. . K/ H9 v+ v, q5 K3 gDC-X Delta Clipper Experiment. ( z' F: U% l p6 YDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications $ x& J8 ]; s& s/ {8 x7 fAgency. (Now known as Defense Information Systems Agency (DISA)).1 G4 d6 r% u% i0 p7 p9 d2 a4 J, X" | DCAA Defense Contract Audit Agency.; L: B1 M" i! {( d DCAS Defense Contract Administrative Services. 1 J/ F# U; y' f5 D$ `& O. O5 xDCCO Defense Commercial Communications Office (of DISA). - _$ [* Y# J5 Q- i/ TDCDS Distributed Computer Design/Development System.8 h. W I9 v. {$ V' Y$ N5 x! L4 Z DCE (1) Data Communications Equipment (TelComm/Computer term). , e: S# B/ K3 d- T# L* m' Z(2) Distributed Computer Environment." o" E. ]! r1 o' S: N( ~ DCEC Defense Communications Electronics Command.1 b7 {# }( f0 I- Z, ]9 ` DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange." o! V3 |. |/ [) q8 C) N" B/ B DCINC Deputy Commander-in-Chief. ; r: [7 X! G' M# g. ZDCM Defensive Counter Measures.0 r8 y. j9 x. Q2 t, a DCMC Defense Contract Management Command# x6 L1 B, n H5 l4 m9 D8 C; B7 Z DCN Document Change Notice.# D( F- g& J; A( M5 G DCO Director of Combat Operations (JFACC term). 7 m% i3 B; E( yDCP (1) Decision Coordination Paper (see ADM).3 r- }: |" I. Z8 g8 y (2) Director of Combat Plans (JFACC term).0 m8 [1 ~, V0 M% D' t DCPG Digital Clock Pulse Generator.( o. c- h1 S, @, N- `, K3 s6 p. x; X* P DCS Deputy Chief of Staff. 5 U, \, a3 J1 P2 ^DCSOPS Deputy Chief of Staff for Operations and Plans (Army).: ]0 u4 k$ w: k! j3 j! d9 x DCT Digital Communications Terminal! ?/ W/ G: h; g5 O DCTN Defense Commercial Telecommunications Network. 3 R" K6 O1 Y4 g2 Q: t, t/ HDD Variation of DoD.& M% I0 N$ M) ]7 R% b9 ^9 H2 ~: e3 ~ DDCI Deputy Director of Central Intelligence.& e! V( Y/ [* d) q& h" R* l DDEL Dwight David Eisenhower Library, Abilene, KN (army term). " I* e- W; n0 q6 i; g; M; h" Q) t) XDDG USN guided missile destroyer.- ]8 b4 U+ L- ^ MDA GLOSSARY, VER. 4.0 D6 Q2 ~6 q$ L/ O6 r: G0 a 743 s$ O0 V0 e4 s1 p% ?8 U DDL Disclosure authority letter.9 d9 G# G2 ]9 S& n. E# B( S DDN Defense Data Network. 8 S% X& J; `0 e9 _( A8 ?DDR&E Director, Defense Research and Engineering.6 x% k. D$ x, I8 S DDDR&E Deputy Director, Defense Research and Engineering. , Y7 x R+ {5 B D1 FDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). * W: h2 B! x% @4 IDE (1) See Directed Energy. (2) Delay Equalizer.& B# J- J1 i" B, T DEBRA Debris, Radiance Model./ D7 A+ i8 N8 h- q3 ` Decentralized& y, G# c3 W$ U! D9 E3 s Control& q- M7 k. ^2 ~" d In air defense, the normal mode whereby a higher echelon monitors unit actions,4 _, q9 r/ L! _& B5 l making direct target assignments to units only when necessary to ensure proper# M6 y* w3 b E) a% r- D6 E3 R, F fire distribution or to prevent engagement of friendly aircraft. 1 H4 e( t4 I; Z* q& b& B( fDecentralized. n3 S' ~- M, o- r7 g Execution# {2 H; d9 {# ]- `: L6 b The distributed and integrated implementation of USCINCSPACE direction by' @, ^# Z( `' |1 |: B the BMD forces. (AFSPACECOM) + u% u) w5 }; F* D" fDecommissionin* S9 o$ _8 u) J& J' U# f g ) L; H5 W3 `- I# aThe removal or the rendering useless of obsolete or no longer needed 2 `9 H R- @- D9 L8 Hcomponents of the BMD system from service. . T& a' U+ p6 J7 [; Z% gDecrement A directed funding level reduction for an acquisition program. 4 S. o# v. S$ V m. FDED Data Element Definition (Computer term). ) K/ Z% R. o' p: |" bDedicated Mode # z+ Z& a: u, O; b9 I& j% Xof Operation 2 V! I- z/ [8 s0 U(ADP Security) , L' D+ a3 a" z8 h$ t( MA mode of operation where all users of the AIS possess the required personnel3 q! F+ F, R2 g7 j; w3 H security clearance or authorization, formal access approval (if required), and a , V% o' A( s- J9 sNeed-to-Know for all data included in the AIS.3 Q/ N+ N, \) y& r! ?% } Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about E( m! u) v* w8 ]5,600 kilometers) above the earth’s surface.* a. V8 ^- b- R Def Definition. p0 w) M6 Y- d0 Q" u) SDEF (1) Defense. (2) Demilitarization Enterprise Fund. ) @8 w& E v" F; i- n: EDEFCON Defense Readiness Conditions. ) d* \7 n n- O8 k) t2 L/ \Defended area ) a# U3 y ?# S# Icoverage : A! K' z! J3 O$ a7 \; kDefended Asset, Y0 b. W; |7 B/ [) y. r: R List (DAL)! x$ e) ~) P, g1 z5 d6 q: E The geographical region that the BMDS can protect from ballistic missile attacks5 c3 ?4 g# B4 H. h% t* m3 F4 E; F6 ^ with a specified level of probability of negation. May be specified for a particular* [, V' B, @( W threat type, launch point(s), launch regions, raid size, etc. ( Q+ j# t3 J, T F! ~2 X6 f* RA ranked listing of facilities, forces, and national political items that require0 [0 @/ P& F/ o8 [* W) g6 m: G. Z protection from attack or hostile surveillance. The list is compiled from Federal. d1 z: P5 o- P n6 U, ]1 ]" u departments and agencies, Unified and Specified Commands, and the Armed+ u$ |. V2 c0 H Services to ensure National Security Emergency Preparedness functions. , l: W; f7 i! B% LMDA GLOSSARY, VER. 4.0 D" D& }4 {. K8 w 75 # W, f5 i/ J4 ^/ f* UDefense ' J8 s* @2 T8 |& p2 m6 GAcquisition$ N& i. I; R m' s* h! ]( k4 e' V R Board (DAB) s: S3 `% i/ V The senior DoD acquisition review board chaired by the Under Secretary of 2 s& p/ R6 D( ?" Q+ V$ ODefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the) Z6 D0 M+ }8 i' |! _ Vice-Chair. Other members of the Board are the Deputy Under Secretary of 6 X' m' ~( e! w3 d) O* F: RDefense for Acquisition and Technology, Service Acquisition Executives of the - |3 Q! T8 m/ A3 B4 H3 z" pArmy, Navy, and Air Force; the Director of Defense Research and Engineering;) y1 U) Z% G7 z/ c3 x2 d- l6 x the Assistant Secretary of Defense for Program Analysis and Evaluation; the J) _% t" M+ X& j1 Q9 T w. u) VComptroller of the Department of Defense; the Director of Operational Test and 8 o' q: }% V7 g+ O9 E9 S8 w J# QEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the8 ]: K7 v$ j) i! d Defense Acquisition Board Executive Secretary. Other persons may attend at 6 J+ K# b$ r4 xthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition 4 _4 \+ ^: U, y0 IBoard.”)+ E9 S! {+ |0 w8 f& w: o Defense; g8 j% }* I- m- j1 R) z Acquisition3 s' I2 j3 `& s, ?% q0 r Board Committee6 d8 R+ i; Q O4 W# G1 F! ` Advisory review groups subordinate to the Defense Acquisition Board. The0 R$ f# U' a* k2 Y( ^ Under Secretary of Defense for Acquisition determines the number of ) |2 P( L$ m( J3 C, g- BCommittees. The purpose of the Committee is to review DoD Component " Q1 V$ L/ s) Z4 I" y/ o Tprograms prior to a Defense Acquisition Board review in order to make an; ~# j( Y. l5 h Z7 }7 y: a0 w independent assessment and recommendation to the Board regarding the! R" x, S2 k" D' E program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense, i: B" Q( i+ l Acquisition; r$ I( I* x) B Executive (DAE)$ W8 f7 |% ^6 D; ^ J- Z; K The principal advisor to the Secretary of Defense on all matters pertaining to the 6 I! i ^: _( ` R0 Z- N4 ^/ k6 CDepartment of Defense Acquisition System. The USD (A) is the DAE and the 0 ~1 Q; x) f: N+ Y) Q" tDefense Procurement Executive (DoD Directive 5134.1). 4 z( } |( P4 W% ~* n1 TDefense k6 S7 n' o ?* E) s Acquisition 1 M' h5 L J W( I- g7 LExecutive / |1 {( ^9 p/ ASummary (DAES)/ T8 ]. h6 T$ W+ i The DAE’s principal mechanism for tracking programs between milestone 8 t0 U8 ?# s' j8 l$ qreviews. Includes programs subject to the Selected Acquisition Report (SAR),! P4 V8 L ^( `; n2 R/ G and any non-SAR programs subject to review by the Defense Acquisition Board. , Q5 a d8 \7 q G8 t8 |! ^) j- F6 fDefense+ `$ K9 H+ ?/ G* R9 E% ^2 X# n: X Employment4 M% `8 [7 d; r( w! O! T Option (DEO)* M `7 ]. `) O% |* w8 b# X Engagement strategy provided to USSPACECOM component forces to achieve+ U$ g; o5 Y7 @: E8 ?7 v1 ^ specific military objectives against a ballistic missile attack. It defines hostile 3 w& b; J, f' B |, jtarget priorities, provides assets to defend, and allocates SDS resources to be ' R" E' C- U7 m" f$ P% I! Jemployed. A number of DEOs may reside in a particular Preplanned Response6 D8 j2 h# A% L2 C7 C9 a$ Q, O Option (PRO). However, default DEOs (those believed to be best suited to : M, | ^3 z. W' ?% k3 `counter the threat initially) will be automatically processed and executed when& G6 }3 q9 q& g8 d+ M% y0 e4 U Defense Activation Authority (DAA) is given by USCINCSPACE. 9 q5 x8 O! E( A$ q2 o3 t' tDefense8 K: |7 o# a U. f1 o+ z Enterprise3 [* l: I. d& s* I( R( o Program (DEP) - d3 _! I( v8 o5 ^" OAn Acquisition program designed to streamline the acquisition process by waiver 2 T' a" c, M+ tof selected regulatory requirements./ F1 ]/ k2 S+ y) |% k Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb ! s1 [+ ]: D8 |; P# A: @and progressively weaken an attack, prevent initial observations of the entire9 l5 o1 i0 u y5 { position by the enemy, and allow the commander to maneuver his reserve.) N8 Z& S( s7 s( {" @' Z! ] Defense 8 b! N3 A! A6 F# U/ dMeteorological ; @$ q. ~8 W+ ?" k0 ]" m% YSatellite Program q, N- x; V9 \ h6 U (DMSP)$ p/ i: G) L+ h& w Satellites designed to meet unique military requirements for weather information.2 A3 S: ^' ^# M" H Used to detect and observe developing cloud patterns and follow existing ' `2 S1 o, b8 Z p8 ~: B+ V7 yweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. # Z5 J) l4 ]8 ?9 t1 j2 a1 LDefense Planning ' p& {- F% n0 }1 E6 I$ z$ _and Resources & w! b- }3 H- }6 H9 X; u9 z. fBoard (DPRB); P8 u: h M9 `. j A board, chaired by the Deputy Secretary of Defense, established to facilitate ) s$ g" @; A1 N- s! fdecision making during all phases of the planning, programming, and budgeting / Y8 b$ t3 d# a& ?$ ksystem process. Board members include the Secretaries of the Military1 w7 A3 p4 S; L8 y6 n Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of/ w; J. ~! E T) L, U, K. E$ v Defense for Acquisition and Technology, and Policy, the Assistant Secretary of $ A* u( D3 f8 l# NDefense for Program Analysis and Evaluation, and the Comptroller of the# j: b" o1 D4 ?! B- X" h+ l$ ^ Department of Defense. ! I, ?1 @- u6 t7 t t. mMDA GLOSSARY, VER. 4.0 D 9 A {% |! X V r2 l1 f7 D$ j76. {8 G; ]" s# C ^. ]% ]6 D. r; C Defense Planning # {. d/ X: Y+ u4 @# JGuidance (DPG) ! O4 b% p6 N! Z! R% DDocument issued by SECDEF to DoD components providing strategic framework, R6 h+ Y0 y2 U for developing the Service POMs. Result of planning effort by Joint Staff, OSD,, o* X( B* S/ j and Services. In connection with two-year budget process, DPG is issued every 8 b1 O7 g8 W. y9 Cother (even) year. 9 V' U$ b7 {) r! T0 mDefense Priority0 J; N/ n9 a/ d/ o, W! ~ and Allocation6 |: S' Y; d6 W' v4 W S System (DPAS)! z- A! O0 D, e; e3 s0 m! _ The implementation of a statutory requirement where contracts in support of . T+ `" X3 W9 x1 D) nnational defense must be accepted and performed on a priority basis over all . m- ?* b6 b; I4 q: k1 Uother contracts, and which requires the allocation of materials and facilities in) b' |" f% V J9 s such a manner as to promote the national defense. See “DO” and “DX.”, ]& L9 S6 I" a- f( V% U }0 u7 F7 F Defense 2 ?7 p7 O3 B# D( OReadiness' S' H0 S+ B% V8 L Conditions * u7 y8 g' e5 }* w n(DEFCON)( n; _/ f7 C, H5 H9 t' ? A uniform system of progressive alert postures for use between the Chairman of u$ K7 T2 @8 M7 M/ y1 m+ F the Joint Chiefs of Staff and the commanders of unified and specified commands : f( f- r8 ]4 |. _! p% W' T3 [and for use by the Services. Defense readiness conditions are graduated to, \/ a6 F; w+ V1 F B2 _ match situations of varying military severity (status of alert). Defense Readiness& P4 M8 k0 S( F0 ?' R Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as' I( B8 e% b6 Y& d8 q appropriate.$ o8 R; Y! I) e9 `: N Defense Satellite# o+ i5 K9 O- B, e; l Communications* A ]) u) Q' w% J6 n Systems (DSCS) 1 `3 R# ]7 b- P: t! G# DAdvanced communications satellites in synchronous orbit around the earth.5 Z& l: P' j( B2 A; \+ X) i2 U Provides high-capacity, super high-frequency (SHF) secure voice and data links $ ~$ M2 S& q [for the Worldwide Military Command and Control System (WWMCCS). They . [$ _/ O" d. Z8 J7 G C) c! x! Dsupport terminal deployments for contingencies; restoration of disrupted service ?( W1 I8 _* J& Q1 M l& `/ V/ I Roverseas; presidential travel; global connectivity for the Diplomatic' z9 P Q/ \7 D3 w0 F% J$ k Telecommunications Services; and transmission to the continental United States + n$ N0 `1 B9 L, q Jof some surveillance, intelligence, and early warning data. , z! {- T* T% `9 RDefense Satellite9 r9 L: p, `& u! r (DSAT) Weapon6 Z X% D9 w. w5 F. i A device that is intended to defend satellites by destroying attacking ASAT / l" H7 B; v1 a& L' Jweapons.( j( m8 C$ }7 q; O. p$ m, f Defense Support - P" ?) \3 t, ]) o. H; n3 R" _6 n! aProgram (DSP) 1 u4 M' U2 q% o& |4 VA system of satellites in geo-stationary orbits, fixed and mobile ground- A) _1 V# H h, y2 B, ~, B! y0 A processing stations, one multi-purpose facility, and a ground communications / c& w2 f. V2 w; e1 h0 tnetwork (GCN). DSP’s primary mission is to provide tactical warning and limited/ w$ {/ k8 u1 `0 ^% u attack assessment of a ballistic missile attack.8 k& c# Y% R* l6 l+ U9 w0 [1 Q3 c. Z Defense$ E" [4 k0 K" b5 U& ~. k p0 Y Suppression! Q5 D; e9 ]6 x% e/ E* T Temporary or transient degradation of the performance of a defensive system0 A9 q2 n0 I' d2 U$ [7 P below the level needed to fulfill its mission objectives, by an opposing force. 9 K6 F4 R1 H& Q8 x(USSPACECOM) ; r2 G9 u) V. _7 k: E( {Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic% X# L* h4 D' T4 K7 Z missile trajectory; i.e., boost, post-boost, midcourse, and terminal.; Q! |. h) {6 e7 h Defensive7 N O0 X4 V7 s7 h. Z, d Counter! f8 A! ^& X1 k Measures (DCM)9 G. `; u5 {4 d1 Q+ ]$ ?! u$ g5 p+ c Actions taken to eliminate an ASAT attack. - m1 U/ K( p2 gDefensive& L! Q/ G9 t/ z; @" w Q9 a) C Technologies 7 o8 x4 a. @# v% W+ M) U F: nStudy Team , O) x2 S& a( t(DTST) 6 y0 B( t% ?' r: F: z7 P% ~A committee, generally known as the “Fletcher Panel” after its Chairman, # d; J' y! |. Wappointed by (former) President Reagan to investigate the technologies of: ~ c8 i+ M( K potential BMD systems. ) u9 i; H! s$ l! {6 oDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.' ^( S' B/ Q" T6 k. V6 W% L, { DEIS Defense Enterprise Integration Services (ex-DTIS).! N$ S& m, C* ^- w& ^7 S) r) o DEL Delivery. 2 P" e- b: }# J* F+ T! uDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion 9 }# W. B) \2 }, X+ B8 S" x# Mof shots about the aiming point. See also Circular Error Probable. 0 U- K4 a3 g& z, L+ @' z8 HMDA GLOSSARY, VER. 4.0 D ; l! U% i& X/ _- C6 ]77+ ?9 h" W8 |* U, |$ k1 a7 O8 ? Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the- P+ t# ^! M- f T! r; I maximum change in velocity, which a spacecraft could achieve in the absence of1 I8 P4 O, @' Q5 {# v1 s a gravitational field. ) d' z3 y6 ?, _" y: b0 g" mDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). 9 `- {. N$ Y T. i7 [/ L2 ?8 NDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its ; l" h* H" l7 ]4 W+ y- edesired function (matching RV characteristics, screening RV, etc.)5 N! K# Q3 r& V/ E1 J/ z A2 J DEMO Demonstration. ' i: Q R- G1 a( w& B+ ]6 B) \Demonstration7 _, p3 |- l. h4 r) z1 F* Z4 A7 W and Validation; A" w |+ a. m# _2 t& l (Dem/Val)3 N% ^8 e% a$ H( f j4 I% {. S! L- E The acquisition phase when major program characteristics and product designs; o9 s* Y* ?! o% o0 N are refined through extensive study and analysis, hardware development, test, , K" s: r q. F' z4 b! [and evaluations. The objective is to validate the choice of alternatives and to& k2 r1 E- E5 _. A provide the basis for determining whether or not to proceed into Engineering and9 b# c% l# W4 V% ^; L- W# D Manufacturing Development (EMD).; z+ z9 s# d& N+ L9 d* X Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.- o4 s: {3 p6 U4 W5 T- s It may include destruction, removal, contamination, or erection of obstructions.4 Z3 a9 n6 \- o* }. X" P DEO Defense Employment Option.( e3 a/ T+ n& S Department of , |: Y! j2 \' vDefense , k* T$ X7 U' [$ L5 hAcquisition 4 f9 K/ h$ D; D; ?7 F* q9 a& FSystem , Z5 X% \! I' m4 HA single uniform system whereby all equipment, facilities, and services are8 s6 E |% A/ t% \2 [8 x2 V+ v planned, designed, developed, acquired, maintained, and disposed of within the4 E7 G% P. q. g0 T. R( ` Department of Defense. The system encompasses establishing and enforcing % A* z d" }4 Z" j: xpolicies and practices that govern acquisitions, to include documenting mission 4 N; C$ M* s7 v/ A. T# q" ]needs and establishing performance goals and baselines; determining and: ] {% h' W! U/ K/ j- G prioritizing resource requirements for acquisition programs; planning and" z+ y% R7 u- v% w7 o executing acquisition programs; directing and controlling the acquisition review6 h" R* o: @1 T% L9 V& ~7 H process; developing and assessing logistics implications; contracting; monitoring- j: ?, S2 H, l9 r6 f the execution status of approved programs; and reporting to Congress. (See! y5 E- a' F/ a( ?+ u/ n DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)0 z/ E/ Z2 e0 \9 ~4 q# v Deployment (1) The placement of force elements in battle positions to obtain a higher D+ g- {& \" h% W: e. pstate of readiness.! f/ Z# q* P5 ~. }9 W/ d (2) The movement required to place force elements in battle positions. ' q( _" n! x% {4 }' k0 p(3) Fielding the weapons system by placing it into operational use with units( b7 }7 x& w7 j/ l in the field/fleet. , D2 x, U! c" M! l(4) To arrange, place, or move strategically.) L2 p! p( q! G" P Deployment 7 N" s6 \. W8 C2 ?6 L0 E9 iPlanning Q' V. n4 O' F2 ^ n6 N! @7 _ (1) The development and maintenance of plans required to initially deploy, 6 t/ C5 ]* {2 Y8 x2 t% F' xmaintain, and evolve the operational system in accordance with ; p t) `6 {* C9 V4 z, zschedules and priorities. It includes factors such as launch facility* K# b$ G G f; }! b$ B availability and planning for the availability of other required elements/ r+ W; B, Y" G& N such as trained personnel or units. In addition, it identifies the impact of8 x& Z+ M/ F' i( z+ E8 m5 { t7 U deployment on operational readiness and any testing constraints " q# y/ C; f( z* Gassociated with deployment. 5 S/ Q. n$ o1 S; d* m5 R0 Z(2) Encompasses all activities from origin or home station through: [5 d# I9 [) E, y( ~, J destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding 2 l7 z4 X6 r" L$ x- @; bareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment, G6 E& U: b; C1 ^ Testing 4 y" [3 |7 [1 ? dThe testing and/or simulation of system assets in the physical and operational 5 W( ^% C# |% D" T a8 G! o5 A. K1 Venvironment in which they are expected to perform./ d' ^& H' a m8 n1 v DepOpsDep Service Deputy Operations Deputies.) n8 t) v0 {! J% s MDA GLOSSARY, VER. 4.0 D( A- `, B( c) \, }( f3 a$ U5 \ 78" c* S( K( h! ?( \3 z! \ _1 x Depressed* n' ?8 O5 n7 |) N( K) z Trajectory; r% ?) x5 P3 p) }( ]( X" c Trajectory with an apogee below that of the minimum-energy trajectory. 3 H: T" ~/ M9 @% a; EDEPSCoR Defense Experimental Program to Stimulate Competitive Research.- q- X3 Z9 z* ?! F2 O. R8 M DEPSECDEF Deputy Secretary of Defense.0 J) A/ ]8 t2 Q- W+ N8 C; P$ a( k DeSecState Deputy Secretary of State. ) H* {2 y% g" A& G+ t1 ?DERA Defense Evaluation and Research Agency. Consolidated research and0 ]9 R9 v" V% r3 w4 ~; a development resources of the U.K. Ministry Defence. Headquartered in6 q7 k0 Z$ C* Q! I Farnborough, England. 4 S$ x2 j8 s- O1 @5 Z7 S! oDerivative% w9 R7 @1 ?( @ Classification 7 U; d" J; Q' i& Q% q( q& d1 g+ ?, tA determination that information is in substance the same as information x6 I- T! X; I- w; J2 C$ W; Hcurrently classified and the application of the same classification marking.- [; R1 z7 X/ L! C; ]6 M DES Data Encryption Standard. * X/ d. ~4 }& y; tDESC Defense Electronics Supply Center (DLA term). $ `! k2 C( i' y: R9 B( qDesign& ~% X8 C: I1 O4 v Constraints $ g# D) g+ A. }7 V/ i1 m' \- nBoundary conditions within which the developer must remain while allocating & h: F3 d1 A% f% t* n; Bperformance requirements and/or synthesizing system elements.2 ^; h9 M. o7 p* O Design * {1 p# A4 P3 z; C, W, m! u: h6 BParameters : `( k! V, j4 ? }) |Qualitative, quantitative, physical, and functional value characteristics that are7 D# v$ q# B0 ?% h9 E' R4 F inputs to the design process, for use in design tradeoffs, risk analyses, and 1 b' b* h0 A# n6 U6 |! V$ ^9 `/ Y6 q% edevelopment of a system that is responsive to system requirements. * g9 _$ X' n/ wDesign Phase A period of time in the software life cycle during which the designs for 7 B. O' o7 v& j/ earchitecture, software components, interfaces, and data are created, + A4 x8 c `. ]' s9 n+ a. M; j" p5 e. jdocumented, and verified to satisfy requirements.# q3 | M0 |+ g Design-to-Cost" a" z0 e2 K8 ?. x6 R (DTC) Goal9 m6 b7 Q+ p% e" x% |1 z9 l Management concept wherein rigorous cost goals are established during " i' ^) J* A7 i. ^ Pdevelopment, and the control of systems costs (acquisition, operating, and ' B9 [& w8 f& \$ P, {, Z5 C2 ksupport) to these goals is achieved by practical tradeoffs between operational* v2 Z) h# D+ X capability, performance, costs, and schedule. Cost, as a key design parameter,2 _9 X6 G& O N. c x is addressed on a continuing basis and as an inherent part of the development $ H" u3 e. e2 m! W. U5 G, P, Fand production process. A DTC goal should be in the form of average unit / R* m3 ]$ n5 k( G3 X/ Iflyaway cost. Also, DTC parameters for operation and support will be. v. [* _: J, s+ x1 M selected—parameters that are design-controllable, significantly affect O&S costs,2 X" h% K" Y, D6 {! a4 q1 D# f and can be measured during test and evaluation. Parameters may be $ u) r2 S! R' pexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or: y0 y4 Z. M' O/ U3 s! K; @. b6 h; [& [ maintainability. Firm goals and thresholds will be established no later than entry R7 o0 P2 \( T& v R: O% d into EMD (Milestone II). This is an in-house goal, almost contractual in nature,* C7 _; a1 q* Z& h n5 h between the PM (Service) and the SECDEF. Allocations from this goal will2 N2 I: a9 s4 S9 L6 u9 d' d; J become the contractual DTC goals for contractors supporting the program. ( j3 k( U7 t/ aDet Detachment.8 M- Y/ B+ ]/ C; o% W2 Z2 N& O DETEC Defense Technology Evaluation Code. 1 A3 o2 b: E9 z3 e0 a. }! SDetector A passive IR, visible, UV detector turns photons into an electrical signal. The& p4 D. ?' Y7 K, X: H IFOV of the detector is its solid angular sub-tense. There is sometimes 4 O% C6 t8 {5 v( iconfusion between the detector sub-tense (size) and the pixel (picture element % L9 f0 n4 U; F1 n- T2 nsize). They are the same for a staring sensor, but in a scanner it depends on& k, v4 I) M0 e2 P the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.$ H8 D$ d" @6 H9 k MDA GLOSSARY, VER. 4.0 D 9 i3 N6 X- h+ @5 Q/ D79- M( I$ i& x! w" x8 ~3 E DEV ENV Development Environment. + o9 O" m7 w! ?9 e5 E. pDevelopment5 n: s' \- l3 F8 D" m: g* V Test (DT)3 K/ d# h/ p, p" A2 c! c- m5 b Test conducted by the development test organization to achieve specified test# k+ u0 c3 p" X/ H objectives. It may be a complete test, a subtest, or a phase of a test. 9 b) k# T$ z% y' L. r7 [3 j3 w. |Development # ] c' F6 O( b2 L( WTest I (DT I) / ~8 i: I' X" _7 j; y- RA series of tests conducted during the demonstration and validation phase. ) }2 ^+ R: P8 b' cComponents, subsystems, or the total (or full) system are examined to determine3 B) y( o* W# k' S, u whether the system is ready for EMD. State-of-the-art technology is addressed5 h4 |) ^8 z6 [$ ?% v1 j- ` in DT I. ( i; ]5 J# B( L; V) Q# d( oDevelopment4 }- V& X7 V4 c0 Q7 K+ \" {$ S0 g Test II (DT II). F4 j) V3 l9 Z d A series of tests, normally during EMD, which provide the technical data 9 @ f) y$ G: f4 N& X3 I5 T% h; ]1 E# Fnecessary to assess whether the system is ready for low-rate initial or full ( J7 ?7 _/ L2 _& O% ^5 ^production. It measures the technical performance and safety characteristics of+ E6 f; A, f% G$ ? G5 X the item and evaluates its associated tools, test equipment, training package, ( o9 S! V# c' {( @and maintenance test package as described in the development plan. DT II) c0 Y0 S( a# U1 Z& k o8 C addresses accomplishment of engineering design goals and the fulfillment of / ^* o6 X F; zcontract specifications. 9 F0 r$ L1 U4 {6 ?" fDevelopment% _9 e: W( ]! _( {4 h; Y Test III (DT III) 3 b `: D1 g& ~Tests conducted during production.( u- _" t* w8 k6 e8 [! M6 S5 V' A Development 7 F, q3 g; X0 y# g+ O9 TTest and % F2 M- Z" ^2 v+ r5 f7 lEvaluation 6 Q' K7 E. g) A# H6 e(DT&E) / i; ^! q5 j @, E, MTest and evaluation conducted to measure progress, usually of + b" o) _% ?' f) {1 Scomponent/subsystems, and the proofing of manufacturing processes and2 T/ _9 v* P- a% r; q! C0 t+ W: k controls and to assist the engineering design and development process and $ R0 C, a* }0 `+ M* ^9 v8 r Q6 mverify attainment of technical performance specifications and objectives. Usually 4 M8 f8 F k/ P M' Zconducted under controlled or laboratory conditions. Can be conducted before ! X/ W. a! t* s) xor after production begins.& O1 h0 ]- W3 Y$ N, K0 X Development ) Z3 I! Z; g. ^ @; T- C% oTest (DT) : u. x* ]- y, |3 uTest conducted by the development test organization to achieve specified test ) ?+ t' M( d7 ?: I$ v' P/ {( G! @9 `objectives. It may be a complete test, a subtest, or a phase of a test.( K' w0 _, X; l2 m Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, 8 |3 O1 \* m E$ @schedule, or performance without authorization from the milestone decision- P# b+ \, }8 `. o authority. Acquisition Program Baseline (APB) thresholds represent these. v1 I, d- b. C parameters. 0 e: E1 e5 l6 N2 m: r3 ?Devolution of : ~8 F8 e' C% U. \1 r% J3 C3 w- vCommand0 K3 o" a( M; x/ S+ x Minimal essential operational capability to perform C2 provided in an orderly and* P/ C1 I; j r8 N7 J$ x/ [+ K2 y timely fashion to a duly authorized successor. 4 T, y( u+ o6 t# D" q) YDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. + g2 t5 f7 {2 d- bDEW/D Directed Energy Weapon/Discrimination. , X$ Y8 V" j$ J; u/ vDEWG, O Directed Energy Weapon Ground, Orbital Z) g) n1 A# ?2 qDEWL Directed Energy Weapon, Laser (thermal or impulse). 8 z3 o( ?$ Z% ^6 B' K% eDEWP Directed Energy Weapon, Particle Beam (neutral or charged). 5 M% s2 f+ `* f+ o' U8 S- tDF-KBS Data Fusion Knowledge Based System. 7 H3 e7 ]) F% _0 p% H6 w: L& l4 K' PDF2 Deuterium Fluoride. 2 g+ k( s: I9 b4 C( BDFAR Defense Federal Acquisition Regulation" J; y* s$ H' A DFARS Defense Federal Acquisition Regulation Supplement.$ ?0 a$ y: f$ t, N: g MDA GLOSSARY, VER. 4.0 D : K6 p# x& ]! J2 z80% P! ^: r( d( ~5 B5 d DFAS Defense Financing and Accounting Service.2 `6 i6 h. O/ p1 P9 f; Y DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. * S0 b+ T) T/ ?0 S/ |/ G5 qDGA Director General of Armaments (France)., r+ M8 }( L1 g$ Z# I2 t( P% b DGP Defense Group on Proliferation. ( V! C, J7 }& K, W$ N2 J# x; pDI (1) Data Item. (2) Developmental Item.: {' s% z( x. ` ?# E DIA Defense Intelligence Agency.4 {! s% Q; y2 h/ \2 w9 L, G" u DIAC Defense Intelligence Analysis Center.+ v2 }. r- X1 T DIAM Defense Intelligence Agency Manual 9 p- E+ o6 b, \$ T: D- Z2 ?# LDiameter (Optics) The unit of measure of the light gathering power of a lens." k4 ?0 |1 c4 p6 _$ Z: q! _ DICE Digital Integrated Combat Evaluator. " L, W1 V c, MDID Data Item Description. 2 d) \+ Z( D5 [9 iDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The* i: F* W+ o5 s7 r$ a angle of spread, which cannot be eliminated by focusing, is proportional to the$ \+ d) H& n$ P9 K% T& T5 ?0 ]* O ratio of the wavelength of radiation to the diameter of the aperture. ; ~: i, ^2 X8 z& g+ l6 n! ZDigital 6 b* |6 d+ N4 x3 h0 q$ ?& NProcessing 2 v: n+ x5 S* ~2 |: gThe most familiar type of computing, in which problems are solved through the8 O6 I, N! i/ v7 l4 I& u mathematical manipulation of streams of bits.( ` ?, ~) L2 |" r% w DII Defense Information Infrastructure$ ?/ U, H8 c( |6 i: k Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to 5 m y. M l% L8 \) R# P12 km) between wake termination and de-sheathing.2 ?; B3 B" ~. ? DIPS Dynamic Isotope Power System (which provides up to 10 kW of power)./ r7 F0 U; |5 O6 { DIR Director.$ G v' L. c" q% @& n1 a0 Z Direct Air c; l# j! w5 r( y" r! @Support Center0 P6 Z4 c) r s8 _ A subordinate operational component of a tactical air control system designed; L0 y8 q7 ?3 H V; u7 a7 S1 r3 n for control and direction of close air support and other tactical air support: C& Y7 w# S' J operations, and normally collocated with fire support coordination elements.; a; F) G- C2 R; a Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not6 Q3 u+ ?0 X( Z3 ^' r% V8 I necessarily limited to items that are incorporated into the end product as labor or8 @, I% U0 F, f8 T1 n" ] material. ?( \2 f6 ^+ h$ ?- V Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing 4 w) w% K" r9 x" R; Hdirect labor includes fabrication, assembly, inspection and test for constructing" [7 G# ]# S$ X' X the end product. Engineering direct labor consists of engineering labor such as : F4 r# {) I2 X% j4 Vreliability, quality assurance, test, design, etc., that is readily identified with the . V1 C% P: X- K4 B5 nend product.5 q! h5 g) S7 S' } Directed Energy3 Q" m+ y: {4 {% q; V' y& g2 v (DE) / a6 r+ ~+ X: q! I9 J4 w1. Energy in the form of atomic particles, pellets, or focused electromagnetic7 _2 G; U! x& U' m4 j0 M1 f beams that can be sent long distances at, or nearly at, the speed of5 y2 u% ], }* c, c: k light.8 N9 }# e* o" p1 x" u6 C- E 2. An umbrella term covering technologies that relate to the production of a2 ~4 U" o4 z9 U. _$ W0 t1 J beam of concentrated electromagnetic energy or atomic or subatomic particles. 3 V1 f. ]- o* x \# Y" {6 XMDA GLOSSARY, VER. 4.0 D 2 ?$ E) u5 K* _8 G811 J4 g9 }( D4 g% \3 ]& q Directed Energy, i# z! Q: F9 ? Device) Z$ A# V0 F$ N( O# a$ Q A system using directed energy primarily for a purpose other than as a weapon./ t2 _) w% F8 x+ A4 [2 J Directed energy devices may produce effects that could allow the device to be2 x6 u) I, V- d- b# `2 q' z; P" p$ i used as a weapon against certain threats, for example, laser rangefinders.0 H% {+ B. H4 ] Directed Energy) ]- J4 X/ G! P4 q8 J Weapon (DEW)% @& X/ C0 | k* d- X, t A system using directed energy primarily as a direct means to damage or destroy! O% }' T' M$ ` enemy equipment, facilities, and personnel. 6 B' Z% _/ q0 N0 A' Q) Y9 oDIRLAUTH Direct Liaison Authorized. ! k* ^ R6 Y$ I5 z: {: QDIRNSA Director, National Security Agency.6 U& C5 e% L6 W) p DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. ) n" R4 D/ _) l0 {9 Q; ]DISA Defense Information Systems Agency, Washington, DC. (Formerly known as $ ^* r/ P/ n0 R6 CDefense Communications Agency)., z, ]! C% L+ Q5 s8 w DISCO Defense Industrial Security Clearance Office , e; M1 y- E+ H1 S% gDISCOM Division Support Command (US Army term). g% A+ K3 X, i- ?5 m5 C `+ v Discretionary 2 Z) k1 F; b( T" iJudgment ) ~, n$ x, n5 s! A: oThe authority given USCINCSPACE or his duly authorized representative to+ Z) F. q* N) r j8 ^6 w perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination ' i; R {; V- V2 GDISN Defense Information System Network (DISA term). 5 k8 }. m0 c! ~% FDISSP Defense-wide Information Systems Security Program.' p2 E) A$ h7 p- S0 b$ f DISUM Daily Intelligence Summary (JFACC term).! p& T3 ] a7 [, W/ z! H5 s DITDS Defense Intelligence Threat Data System.3 d/ h7 }9 V& }/ @ DITP Discriminating Interceptor Technology Program. The objective of DITP is the: I. q {$ i9 |& R$ a d development of advanced interceptor seekers to counter advanced threats.% w m% U8 n3 I9 b DITP will integrate passive and active sensors into an interceptor seeker that - F5 t8 c* N; N4 _+ t1 a; hintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP1 J. H6 @% P7 f9 _ flight demonstrations will involve the tracking and interceptor on-board5 c) q c- _3 ?, T. y discrimination of targets of opportunity while providing fusion processor data& n6 V! F; o. s- @2 l telemetry. (See also ASTP).# r: b9 \3 S# L4 a# D$ T @+ K9 U DIVARTY Division Artillery (US Army term). $ k4 c* D8 X7 P1 `7 A nDIW Defensive Information Warfare. 5 m+ \8 f1 q. _; [$ K0 fDLA Defense Logistics Agency, Alexandria, VA. , x2 l) d* q0 Q+ tDLSC Defense Logistics Services Center (Battle Creek, MI).: d& C9 y, L" O9 n# R9 B DM Data Management! ~( p* z+ F9 `9 b9 G9 I1 `) m DMA Defense Mapping Agency, Fairfax, VA. # C: b( N. P% x3 e& XDME Distributed Management Environment.- ~! w2 t7 U0 o+ O B) h, h# M6 D DMI Dual-Mode Interceptor.$ m$ v$ i% v" {- i3 U MDA GLOSSARY, VER. 4.0 D8 s: I' S. w W' ~6 u# Q8 O( t* d 82& ?; c* D5 G, k5 ]1 w DMRD Defense Management Review Decision.% d$ a/ i$ |% U2 Y# c DMS (1) Defense Message System.* f- \+ T) q: c W (2) Dissimilar Mission Simulator. ' M |% j) Z: U) A3 IDMSO Defense Modeling and Simulation Office (OSD). 0 V- B. V% j& B. h4 M* C+ k* x5 v0 \DMSP Defense Meteorological Satellite Program.$ f$ K/ ^- _0 A. `0 _ DMU Disk Memory Unit.$ s$ o* R8 c. {2 w+ e DNA Defense Nuclear Agency, Alexandria, VA.: X6 n, z- F+ [/ P+ P DNMS Distributed Network Management System.5 m) \( L$ d$ H3 G- a* o- _ DNSIX DoDIIS Network Security Information Exchange 6 q; p. z3 L0 O; B3 m" nDNSO Defense Network Systems Organization.& r/ S7 b: e; \. M `7 Q DO The lowest rating under the DPAS. All “DO” orders take preference over unrated1 A) L9 ?9 V$ \ n& u5 \ orders to meet a required delivery date. ( l+ b6 _9 x/ ~) z( Y5 x0 h& M1 yDoc Document J# n5 T, V/ K+ @0 K. X" |$ yDOCPREP Documentation Preparation.6 ^9 C1 ]% u/ P% r( g Doctrine Fundamental principles by which the military forces or elements thereof guide & Q" m# z1 n1 `their actions in support of national objectives. It is authoritative but requires! w5 S' m% h- |4 N) ]2 B judgment in the application. See also Combined Doctrine. % J, ]9 d1 v2 y- h, h* b: `. lDoD Department of Defense0 v# A, _' C$ F: A1 y, i DoD Component V- @. A u% R# N0 u6 x2 Q Acquisition 0 ^0 N) g0 `/ J$ d. v) gExecutive ' X5 O2 q+ f7 \% ]; oA single official within a DoD Component who is responsible for all acquisition% ?8 P; o( i$ m5 o }* ?2 r+ ]' y functions within that Component. This includes Service Acquisition Executives/ W5 L" I' P9 o6 g, z6 q9 p; G& b" ? for the Military Departments and Acquisition Executives in other DoD% u% R! G6 l k; S1 Z' B8 k Components who have acquisition management responsibilities., s" @/ k/ G) }* Z7 O3 Q/ R3 c# E DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,7 r5 a9 ~" n: Y, Y( W Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the 0 B7 B/ @! [0 z3 DDefense Agencies; and DoD Field Activities. " \7 T: U4 `% k) ?( ADoDD DoD Directive. w' S, Y' [. e DoD Directive ) a& H4 a4 Q; c; {+ M l2 ^4 ]5000.16 x, o4 T0 a/ y1 s, y7 C4 L “Defense Acquisition.” The principal DoD directive on acquisition. It establishes ) ?- C' `4 z; Ppolicies, practices and procedures of governing the acquisition of defense 7 H/ p' i1 s6 Bacquisition programs.7 t6 C0 n1 y5 g" k! _7 E; P( { DoDI DoD Instruction. ! b! r" w$ M. W9 N6 r9 rDoD Instruction9 h4 P! R; l) h$ b4 q 5000.2 6 b; \9 G( L7 R6 n4 {; ?& e+ h“Defense Acquisition Management Policies and Procedures.” Implements DODD ]) g2 `1 }+ X 5000.1.6 B% V+ c6 y9 h4 j' Y% c ~ DoDIIS DoD Intelligence Information System.7 a4 C7 T7 l" g; F6 U! Z! @$ M DoDISS DoD Index of Specifications and Standards. 5 T0 O9 R9 H ?* gDoD-M DoD Manual. ; W6 w; U# F3 }6 Q( F& c. mMDA GLOSSARY, VER. 4.0 D: E' X4 _) k3 r8 r" v. X* X 833 z* W5 K' R1 D4 j$ G DoDR Department of Defense Regulation.' Q4 \- K, N# q' h+ C% `& ^2 g( { DOD-STD Department of Defense Standard.: m7 I% L- {0 T% E5 C DoE Department of Energy. / {# z8 O- @( M: [DOF Degrees of Freedom. - b+ N0 v2 Z6 ~! kDog House Large Soviet A-frame radar used as a component of the Moscow ABM system 0 Q$ E. j# g- |8 r' I' e5 w" Ehaving a detection range of approximately 3000 km. It is believed to provide( B" D) m* D) ^3 m1 ` battle management for the totality of Moscow defenses.* H( Y3 |. U# W/ U$ I1 \# s2 r7 m+ j DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). 6 r* Q$ [3 v+ |8 rDOPAA Description of Proposed Actions and Alternative (environmental term). ( s0 d+ x% n! h6 }' yDoppler Effect The phenomenon evidenced by the change in the observed frequency of a 1 C2 b* `. Y7 K7 ]6 {4 [9 q) W# lsound or radio wave caused by a time rate of change in the effective length of " k0 [# |7 A K# b4 uthe path of travel between the source and the point of observation. 4 R: G2 u: \; C0 D% kDoS Department of State (US). . M" `" C& K$ E4 ~ ADOS Disk Operating System (TelComm/Computer term).* R) }1 M6 d0 x8 Q DoT Department of Transportation [US].$ X4 n V ?4 ~+ I* S+ e DOT Designated Optical Tracker. 7 h1 s) z' x5 M5 UDOT&E Director, Operational Test & Evaluation. + q* A' R4 w( x" d- RDOTH Defense of the Homeland. 6 |1 e4 }! a/ K0 Q/ LDown Select To reduce the number of contractors working on a program by eliminating one or 3 F2 V+ g# U" I; umore for the next phase. / M' E1 P6 u3 b1 N3 |3 v5 eDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. - j [; X9 ?! W' i: v; _DPA Defense Production Act. : b7 Q6 T7 m* a- k" G+ xDPA&E Director, Program Analysis and Evaluation.2 B0 j4 E! U! A% W ` DPAS Defense Priority and Allocation System.9 }* j+ B6 |+ G9 N( W* Y, |! ~ DPAT Dynamic Program Analysis Tool. * v' O R+ w$ aDPB Defense Policy Board., {" Z8 S8 D* E DPG Defense Planning Guidance. # ?# `8 T1 ]- o* e: W: T4 RDPM Deputy Program Manager.: ~+ `: k6 u! E9 a: ~ DPML Deputy Program Manager for Logistics% a& d% q9 @& L- Z9 c$ n DPP Distributed and Parallel Processing (Computer term). - L4 @+ ]# A+ J7 Y, i) W8 FDPR Defense Performance Review.7 w: @5 |) ?, ~ MDA GLOSSARY, VER. 4.0 D' D* l2 \+ E; W8 o 84& L) d* i H/ f; w/ x# h- t8 Q DPRB See Defense Planning and Resources Board.1 E( {% a: t7 v' q7 m DPRK Democratic People’s Republic of Korea (North Korea). , c2 _4 ?/ _1 T, p& Z1 ~6 uDPRO Defense Plant Representatives Office.$ c/ A/ V2 L( ^' _ DPSSL Diode-Pumped Solid State Laser. ! a' p' R, J0 t+ SDR Deployment Review.! U" R1 F1 _+ L5 i- ?: R DRAM Dynamic Random Access Memory. 8 f" x% q$ y2 v7 N: t5 g0 Q/ V+ }( DDraw-down Curve A method used to encapsulate the overall performance of a BMD system that 2 ]2 \. r6 n2 N3 ~& S! S5 Eplots the probability of survival on the vertical axis versus the number of attacking 9 K0 b% D1 y1 ^. i4 r/ eRVs on the horizontal axis. Used in conjunction with attack price, they are the5 U- ]- a+ b% U7 F most important expressions of a BMD capability. 5 V$ t/ N6 R5 T) TDRB Defense Resources Board.# ]! S; r. w- h DREN Defense Research and Engineering Network. 9 `5 N# F) i% gDRFP Draft Request for Proposal. ' n. W2 _2 S6 h, L9 _Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from 7 q8 _9 n z$ }$ J" Zgravitational and atmospherically induced torques on the spinning projectile./ W) V& H* n B2 { DRM DAB Readiness Meeting (DD 5000.2 term). 1 v& B; C) t; CDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also # ]/ ~4 y4 l' o: TRemotely Piloted Vehicle. 6 A- f8 }9 E) s: |, h. T$ G* G0 lDRP (1) Deployment Readiness Plan (US Army term).7 t, U1 `/ y& | (2) Deployment Readiness Program.: S) l3 T4 c+ E* C+ Q& p8 p DRR Digital Receiver Replacement (USN term). 2 Q9 H+ f% H; I# K ]DS Deep Space. ' ]; \8 K4 X! g# u( \7 \DS-1 Category of telecommunications circuit capability. x( k9 Z! ^2 v& B9 Q+ {2 P d DS-3 LAN Category of telecommunications circuit for a Local Area Network.: S) [: o0 ?, Y. |4 i0 L% C DSAA Defense Security Assistance Agency (OSD).' e6 L& R! I W( x' @ DSAT Defense Satellite Weapon. & P3 h7 f6 y& H$ r |4 @( RDSB Defense Science Board. 3 o v6 b5 ? R( O) {DSCS Defense Satellite Communications Systems.2 I& W- y6 F) k4 h; V, o DSCS-3 Defense Satellite Communications System Three.) J- }8 u+ V- F* _ DSCSOC Defense Satellite Communications System Ops Center. + [$ `5 F @/ v/ Y; |DSI Defense Simulation Internet , B2 C0 {9 M8 i) ~. MMDA GLOSSARY, VER. 4.0 D 3 N2 C7 }' d) S9 I85 " m# j& ?/ \! |& FDSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 3 ]: ? O! L# U. ~System. g+ Q: Y( \( u( s! x9 }& f DSM Decision Support Matrix3 M G! c) Q3 X7 c3 ] DSMAC Digital Scene-Matching Area Correlation. w$ P' v) n5 B& N2 }9 B$ G6 Y DSMC Defense Systems Management College. * l9 Z3 q4 t2 I7 w5 t: hDSN (1) Defense Switched Network (formerly AUTOVON). 3 {$ l" E- `4 x9 D6 a( Z(2) Deep Space Network (NASA term). & h( g# v# d/ uDSP (1) Defense Support Program. (2) Defense Standardization Program.; x4 [* ~- H3 R5 b! h3 R DSPRTM Defense Support Program Real-Time Model.- u, Y2 d, X. S" y DSR Data Set Ready (TelComm/Computer term).& Z4 T+ Z& p) {) L DSRCE Down Scooped Radio Control Equipment (TelComms term).; \; _( T2 F7 v* O- C* r# I DSS (1) Defense Supply Service. (2) Digital Signature Standard. % C e; ~, _9 p4 PDST Defense Suppression Threat./ ~2 t: |% s/ T1 P/ S+ \, G DSTAR Defense Strategic and Tactical Array Reproducibility. ' G- Q7 T8 j' p+ i; S# dDSTO Defence Science Technology Organization (Australia). / t0 Y7 C3 `$ u; |0 ] VDSU Digital Service Unit (Telecomm/Computer term). + j5 U1 r; N. [; e2 ODSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to ! A3 B, T& P8 _2 athe DNA. . P; F P1 y* H, ~2 A8 bDT (1) Discrimination Technique." v' T) J; Q1 E8 I; f- |: z- I (2) Development Testing., e5 R" X1 T# W! L (3) See Development Test I, II, III. 2 y1 _( B- v8 L9 [) @) A(4) Down Time (ILS term). : A3 ], s% S1 K# i3 n3 t& J4 D- s$ {(5) Depressed Trajectory. : n( \2 t1 e6 L. m: o' F2 h7 l(6) Dedicated Target. ; e) U" [* [$ i3 aDT&E Development Test and Evaluation. 7 e$ Y D2 j* C8 XDT/OA Development Test/Operational Assessment.% @* t% J3 z& V. M( \6 J DT/OT Developmental Test/Operational Test. - Y: F# t4 P, `- {, hDTAP Defense Technology Area Plan. 1 X+ e. O z& T2 ZDTC Design-to-Cost.7 G/ W2 [, d9 K. D: i8 d* ^ q/ c DTD Digital Transfer Device (TelComm/Computer term). ) t: K* x$ J) B* nDTE Data Terminal Equipment (TelComm/Computer term).5 b8 k9 V" K$ X7 P6 L DTED Digital Terrain Elevation Data. - w0 p. J' n8 s$ wDTIC Defense Technical Information Center, Alexandria, VA. - n L6 W+ D$ S+ K+ K$ sMDA GLOSSARY, VER. 4.0 D% s @0 D* X: a, u& J 864 R+ g; |6 r; W& Z) A DTIS Defense Technical Information Services (now DEIS).# n- g1 [' I. t* e/ C+ G7 F2 ]7 w8 [ DTLCC Design to Life-Cycle Cost.6 {& k. `! T# Q, i7 {: ]' x9 | DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL 5 M( E4 \& M( b( |8 ?* f. cterm). 3 o5 Y+ }) g6 h, V: _& M9 @DTLS Descriptive Top-Level Specification.3 u0 V; {2 V, u& w0 K DTMF Data Tone Multiple Frequency (TelComm/Computer term). ; x. I* r. S+ |1 T/ IDTO Defense Technology Objectives. " k# J5 n, n# s1 \DTOC Division Tactical Operations Center. ; m$ m3 M w$ tDTR (1) Demonstration Test Round. (2) Development Test Round.# ^. z& z: W0 L DTRM Dual Thrust Rocket Motor." m: |( n/ k1 e' Y DTSA Defense Technology Security Administration.! k( V+ k8 p9 z8 P, l( B( V0 e9 P DTSE&E Director, Test Systems Engineering and Evaluation.8 r N8 q, z& }: ?" o t DTST Defensive Technologies Study Team.( P- A3 P# O. R. Z1 ? DTT Design-To Threat & m i Q' M1 U0 w7 D4 N9 \! ]DTWT Dual Traveling Wave Tube (Electronics Engineering term).; X" a! C2 ?9 G/ I7 ^ DU Depleted Uranium.% Q; X# K/ [+ [8 p% \ DUA Design Upgrade Assessment. # }/ F% y4 l+ K8 x3 E9 t2 I; TDual Source Two contractors producing the same components or end items for the same ' E6 x/ E9 T3 X' \' oprogram. ; o; _/ b/ |+ Z! X6 A1 xDUNDEE Down Under Early Warning Experiment (MDA/DSTO term). - u6 r; `8 @6 e L+ dDURIP Defense University Research Instrumentation Program.3 F% e& z% P* \" Q9 [3 p$ D DUSD Deputy Under Secretary of Defense. % X* L/ j8 m6 v) C4 WDUSD (ES) Deputy Under Secretary of Defense (Environmental Security).3 h& Q5 q, s* r. K% w& R. s DVAL Demonstration Validation. $ Y6 @2 b6 `, @3 ?, f4 K4 tDX The highest rating under the DPAS. It takes preference over all other rated and ) g3 W9 T3 p4 I* v6 r5 ` knot rated orders on a contractor’s production line. The BMD program carries a 7 W0 H1 U% R! N4 w2 r“DX” rating. % C4 h7 ^% D$ D6 QMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87) Y/ j' `9 R0 [ E East2 v8 w0 ^3 i H, d E2 I See Endo-Exoatmospheric Interceptor. 6 X* C0 V& V& o7 R/ k% S$ NE2SRD Effectively Two-System Requirement Document. ! ?- D! ]" S7 t3 O5 b0 jE3 (1) Electromagnetic Environmental Effects. 9 s$ W/ f. Z+ S) Q/ S; N# |' o(2) Electrical, Electronic, and Electromechanical.9 j& J1 I0 T3 q# G' U( G1 v& Q: M E Spec Materiel Specification. $ Z4 a7 X ~" I' s8 W, [* D; H. fEA (1) Environmental Assessment.9 l J$ F0 c& a. }2 v! ] (2) Engagement Authorization.# @( ]$ X0 X2 `/ [9 e2 Q (3) Executing Agent. : M0 n( M# w* w6 M1 ~" }2 L% U# p(4) Evolutionary Acquisition. H# O* D' O u5 `0 i (5) Environmental Analysis (environmental term). X7 I; q4 {9 [( D! T, o2 M% n (6) Executive Agent. 3 H1 l: ?/ T2 vEAC Estimated Cost at Completion.3 Z0 m4 b' t$ K3 j EAD (1) Engineering Analysis and Design. (2) Extended air defense.8 P. S* O( F$ u: C+ S5 L EAD/D Engineering, Analysis, Design and Development.7 ^0 w5 o- A. b, V9 t# B4 U EADSIM Extended Air Defense Simulation.* E2 O5 e W( | ` EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing, s3 F0 {" H5 y; M% ~! U R3 o7 [ users to model military response to airborne and ballistic missile threats. |- [+ @3 v8 `8 Y4 V! M$ q! qEADTBP Extended Air Defense Test Bed Program.2 _' _4 z6 T. L: r# t9 R EAGLE Extended Airborne Global Launch Evaluator. ) B& x2 q& e7 }" p6 e2 {% c0 ^EAM Emergency Action Message.( c: F* _: c0 S' ^3 J EAR Export Administration Regulations. 5 o0 _7 v0 ] \- _5 C$ q( K7 `Early Operational7 M2 M, V5 ^6 {2 m5 P6 S/ U! V# E Assessment 0 R5 ]; d2 S1 \$ I: S. IAn operational assessment conducted prior to, or in support of, Milestone II. 0 D- l5 V g( X$ AEarly User Test / ~9 v* |6 k Q, _0 U1 V8 a' l/ J(EUT) * ~% D4 ]; t& \$ i. sA test employing representative users to examine materiel concepts, training or . N2 \% X6 \; Jlogistics planning, or inter-operability issues. EUT can be accomplished during . O1 G* ~8 W& u7 H# n2 V: KDEM/VAL on brassboard configurations, experimental prototypes, or surrogates ( N Z2 C {# l# g" t" |$ Vto provide data leading to the decision to enter full-scale development. . u' a( l) k( _Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of6 G6 w# S, a$ {' x+ B* x surveillance satellites and long range radar. 4 b% [, C$ B) y4 R(2) Early notification of the launch or approach of unknown weapons or ; y& h8 N! E) ^weapon carriers. 7 W5 d2 H. X' p4 d- ?$ Y# ?Earth Limb The apparent outer edge of the earth as viewed from space. , d4 r; F. S! L2 b$ M7 [+ yEastern Test: q" S6 p5 v9 ~ }( O Range (ETR)1 x3 r5 `" N# W- o8 y5 J' r Beginning at Patrick AFB, FL, this range stretches halfway around the globe }0 x1 W# x J9 V7 s+ T# ?9 h where it meets the Western Test Range. An array of launch complexes, sensors,5 I8 w/ x5 ?7 r, j9 a0 k+ F$ b; @ and tracking sites make up the Eastern Test Range. The ETR is now operated 0 Z( l# K m& n+ [. dby AFSPACECOM as shown in WTR definition.* b/ R; d7 b" f7 p( ]. b MDA GLOSSARY, VER. 4.0 E# o0 I* f7 |4 @/ v; k+ ^ 88 ) _- J- I7 c; U, eEB (1) Electron Beam. (2) Enhanced Blast. 7 u7 w/ w7 R) w1 C* nEBB Electronic Bulletin Board.2 A( u1 Q4 E1 b3 j2 q: H EBCDIC Extended Binary Code Decimal Interchange Code.6 d. B) N( x/ y i$ t5 T2 j EBW Electron Beam Welding. 8 { E2 f0 g' x0 L0 x/ G. o6 W, zEC (1) Electronic Combat.7 q6 l( Y$ m! D0 C% Z# W (2) Error Control. 3 B! j( u6 P7 V! X(3) OBSOLETE. European Community. Now known as the European Union 3 @4 A9 \$ Q2 V5 P; q D2 \; b(EU). 0 R& d# a3 m3 fEC/EDI Electronic Commerce/Electronic Data Interchange 4 N1 j3 }: Q8 C- X BECAC Electromagnetic Compatibility Analysis Center./ n: l8 Z% b8 @9 [1 `! N% n* j! S1 } ECB Engineering Change Board. ' l6 X( _5 v P2 _( D m+ }, VECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 0 @. C M6 }9 I- k" _9 y; r+ H4 LECCM Electronic Counter-Countermeasures.( l4 l$ f+ E2 J$ w! l2 F U2 M. i- R/ E ECDs Element Control Directives. ! w) g5 g1 v, f: }2 V2 \5 ZECLS ERINT Command and Launch System.( }/ \# |: a: J8 v ECM Electronic Countermeasures.) l8 b1 Q, N4 g! Q ECN Engineering Change Notice. 9 s$ f0 [: C; G% e$ iECO Engagement Control Orders.1 D9 N; ?% u5 K8 ~ z ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. 8 y1 V$ ^6 J$ |# p2 |6 ^# KECPMO Electronic Commerce Program Management Office. 0 V7 S! r) a/ |3 n0 m5 l+ CECS Engagement Control Station (PATRIOT). ' ^9 l1 G! c `ECU Environmental Control Unit. / E: m1 d) C3 f* }! `EDAC Error Detection and Correction ! Q- N" o! n6 c7 A6 Q! sEDGES Electronic Data/Guidelines for Element Survivability. 9 V! m. v9 ^/ U* A8 kEDL Electrical Discharge Laser ( f" c9 b/ |( D3 e$ KEDM Engineering Development Model.3 {9 h4 }3 x7 \5 [3 `* R6 m7 _$ t EDP Engineering Development Process 7 s; P0 L5 |' ^, A" AEDR Embedded Data Recorder (PATRIOT). 2 E [/ u* p$ m0 g! F1 f: [5 ]& TEDS Electronic Data Systems Corporation $ ` k, J' a, m( \; }8 mEDWA Engagement Determination and Weapons Assignment (PATRIOT). 0 [4 g% u. e) b( ]MDA GLOSSARY, VER. 4.0 E ( Q% v; o3 n4 Q Q8 F$ u899 W$ c7 Q- G9 O. T EDX Exoatmospheric Discrimination Experiment / r0 q6 r9 X0 {9 [2 p; {EE (1) Electrical Engineering. (2) Engineering Estimate. * e! _0 U) ?) yEED Electro-Explosive Device.$ K6 x, c1 l) ~% F& s$ K* u EEEV End-to-End Experimental Version.# {8 W9 i8 E# j EEFI Essential Elements of Friendly Information.- E3 E b- P2 ~5 M EEI Essential Elements of Information.7 n2 T8 _* V, I: v* i8 w/ b7 P EEIC Element of Expense Investment Code. $ M' v5 Q$ Z, }/ g% YEELV Evolved Expendable Launch Vehicle (USAF term) 7 P% b U3 Y% m' l" }6 u$ bEEU Electronic Equipment Unit.* O. M, `. g( e& b8 Y EFEX Endo-Aeromechanics Flight Experiment. # D5 E6 \& S7 E5 Q1 h5 [6 {0 ~EFF Electronic Frontier Foundation. 4 y* V: l, a& \2 D qEffectivity A designation given to the BMDS configuration and demonstrated capability at6 P8 C0 h2 ~7 a! z% x/ o a point in time, becoming effective at each increment when an element or 2 P( t- N: q$ h; Zcomponent is inserted into a particular Block.; Y! J, _* j; N+ P" b Effective Damage That damage necessary to render a target element inoperative, unserviceable,6 F6 h" L8 r, {) }: e7 f9 ?! {8 x nonproductive, or uninhabitable.( n' `) p8 J3 d6 H, F Effluent Plume The pathway of movement of effluents through surface water or air. 3 j" c' R0 T/ a( z& B: B* SEFP Explosively Formed Projectile.5 q& X+ b& r3 P+ A) c5 q3 ?% ? EGP End Game Processor. 1 ~3 x3 q) b' v4 o0 ZEGTR Eglin [AFB] Gulf Test Range.* o4 @0 Z+ _( W; L% G& r$ V EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). $ t9 U* w6 @' \9 aEHF Extremely High Frequency. 7 @% ]6 S$ ]+ @. y# d2 x& r, Cehp Equivalent Horsepower.' I# E# c- u7 d1 O; o7 \ EIA (1) Environmental Impact Assessment.- x& a6 T( r' A9 l/ g2 a. X* e (2) Electronic Industries Association. 9 }) P* O$ F) REIAP Environmental Impact Analysis Process.7 B; y5 t( Q& _; \! ~) B EIP Exoatmospheric Interceptor Propulsion. : t1 T4 t: T0 yEIPC Electronic Information Privacy Center.+ u5 i5 n0 p% j/ w1 B0 D EIPT (1) Element IPT. (2) Engineering IPT.* Y6 ^2 q3 r! q4 {' H7 G! F( T/ N EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.4 }4 w; [/ S! S$ F5 Y EISA Extended Industry Standard Architecture (Telecomm/Computer term).- s' B% f9 V8 f( S2 E MDA GLOSSARY, VER. 4.0 E + @) k2 f2 a' q2 N5 J; |90 4 Q$ G- O4 {; CEKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.( V, x& U* U7 m* h Elastic Range The stress range in which a material will recover its original form when the force- N# g7 D4 ^# D; e (or loading) is removed. Elastic deformation refers to dimensional changes& ^7 [3 B: b9 r! z: Y5 V- k; ` occurring within the elastic range. 1 j$ A, n, f5 l+ }Electro-Optics . S3 {- d; N1 V7 @3 R% v+ XInfrared (EO/IR) # F1 e2 E J& z4 `4 F% h7 `Technologies/techniques employed by optical sensors in the wavelength # M' p5 ~1 y) e& P U# ]1 Tspectrum slightly longer than visible but shorter than radio. 2 A$ z+ q Z+ o" W8 B4 U( |! X `Electromagnetic ) x P U0 E$ c2 E9 ^1 D# VCompatibility ; ]* X7 m/ q6 H9 f(EMC) . V: K1 h# X* N- x' tA condition when all electromagnetic emissions from electronic, electro-magnetic,; p+ m* z \' X3 ^ and electro-optical components of a system interact without interfering with one ! @( c9 {- ]3 u. ~another. ; ~2 }) s8 |( l) LElectromagnetic& f8 q' l( Y$ @. I9 G& f Emanations% F, Y6 Y) z( R8 K/ v Signals transmitted as radiation through the air, through a vacuum, or through, i5 I0 r0 o: ~ conductors. 5 \9 N% g; m/ T6 U) k4 G8 oElectromagnetic g1 O, L2 ^9 o0 y8 w, S+ o2 L Field (EMF)9 Z9 }4 q& t8 c+ C) { An electric or magnetic field or combination of the two, as in an electromagnetic ) Z( n, U! \0 m& {wave. Created by electric charges in motion, having both electric and magnetic 2 p. H, Q4 N* Pcomponents oriented at right angles to one another and containing a definite3 X7 a& ]1 I i1 S! W# w amount of energy. 2 [7 {/ r0 G! B' \Electromagnetic6 h% K& G6 \5 I4 W" q7 X. c# D0 S Gun (EMG)8 N* i+ p& J0 Y( B# n A gun in which the projectile is accelerated by electromagnetic forces rather than + W8 K g$ n/ y% s2 O7 jby an explosion, as in a conventional gun.* W9 V* G, M! w$ r Electromagnetic4 U- G3 w+ H6 G9 z5 Y Interference (EMI)# g! |1 [1 w; Y8 m; R d7 o Any electromagnetic disturbance that interrupts, obstructs, or otherwise ( b5 g2 ?3 I& u$ `5 w6 P8 y0 gdegrades or limits the effective performance of electronics/electrical equipment. 0 h$ Z' u( g/ t' P, yIt can be induced intentionally, as in some forms of electronic warfare, or - E+ I) ~1 N% ^% F( hunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. ' A+ H2 Y+ t2 M* Y$ pElectromagnetic 3 t6 W% s- _0 @1 e N1 EPulse (EMP) 8 m) H+ J- _ r/ _The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of/ m6 J8 B4 u1 u8 ?+ `+ D( ^2 F the nuclear device or in a surrounding medium. The resulting electric and / N& {, i$ z! J' U8 i8 h0 fmagnetic fields may couple with electrical/electronic systems to produce 0 a1 s2 ?7 j) Y: Q# L9 a3 U& \damaging current and voltage surges. May also be caused by non-nuclear& M4 |2 R$ A% N, { means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic * |* H# d: }" Y) ~Radiation (EMR)1 F5 [/ o) K4 R* w0 d } (1) A form of propagated energy, arising from electric charges in motion that* X/ G* v+ F7 Z. X/ {' z produces a simultaneous wavelike variation of electric and magnetic ) F. B/ e- j; ]) n" jfields in space. The highest frequencies (or shortest wavelengths) of 5 r/ R8 ~. V O7 _7 S, a+ `such radiation are possessed by gamma rays, which originate from , N1 c' {9 y2 T, {8 B7 k- ^5 cprocesses within atomic nuclei. As one goes to lower frequencies, the3 E8 Y4 ~. c: w/ y) N( s+ |& }3 j electromagnetic spectrum includes x-rays, ultraviolet light, visible light,9 g! Z! d5 r1 \7 n infrared light, microwaves, and radio waves. ' P1 T' m5 R6 z& o& G" Q' c3 y% S' x(2) Radiation made up of oscillating electric and magnetic fields and / ]( |+ S& ^" Z. U. A- K+ C6 @propagated with the speed of light. Includes gamma radiation, X-rays, 0 V: k# ^( J' U9 x- T! H1 M% Z# kultraviolet, visible, and infrared radiation, and radar and radio waves.5 L5 @6 F1 [! r4 P Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices / ^2 N( `+ }& B* f) yused in system/subsystem design, excluding employment in the RF spectrum.( j3 U* I$ z0 W c Electromagnetic0 y+ r. X9 |' {/ ? Spectrum 3 {) G* s- s8 tThe range of frequencies of electromagnetic radiation from zero to infinity. It is * w) m8 f9 c7 o" [* Vdivided into 26 alphabetically designated bands. 0 n8 l: b/ n: b( N: \MDA GLOSSARY, VER. 4.0 E) I' ~& l, c1 |3 }2 X 91, u& o: ?& C! n1 ?' D Electronic9 A& E9 j# @1 ]0 w) p Counter- ' b6 @$ O" [# aCountermeasure( d* M3 N I4 z3 C s (ECCM) ; x" K0 k- z3 R! H7 d& iThat division of electronic warfare involving actions taken to insure friendly 6 }" U- q3 ?. o5 e" a9 E yeffective use of the electromagnetic, optical, and acoustic spectra despite the ; l$ Z4 h v2 _* |. l3 S: M, Oenemy’s use of electronic warfare to include high power microwave techniques. 1 W% Z# k" K) I0 J+ p D5 z9 q" ?Electronic' B" H1 x- s( }1 Q& `! J Countermeasure9 t+ L' G; s7 S+ p2 B; r (ECM)6 h% `9 g; e, t That division of electronic warfare involving actions taken to prevent or reduce an# ]! P; N8 N: | g) W$ K6 h2 ] enemy’s effective use of the electromagnetic spectrum.1 r* D5 X8 E$ ~$ I$ ^ _, Z; X3 u Electronic - r2 o' H& B4 V' `! m/ bIndustries3 z, v2 {+ r" e Association (EIA)$ b U% I/ t' o" q/ ?3 d3 D A standards organization specializing in the electrical and functional& R n- a, x8 R1 H; K& B3 f: ~3 f characteristics of interface equipment. * X, s2 p7 j6 U @2 `8 F F# mElectronic % Z% ^& Q) ?9 I4 J& F v' L) C/ IWarfare (EW)$ Y2 l$ t5 M! v5 ^# } Any military activity involving the use of electromagnetic and directed energy to 6 q" z! j& I8 ?! ^5 R# F: L- rcontrol the electromagnetic spectrum or to attack the enemy. The three major ' f: Y* H- C8 a8 |+ ]$ k& [+ }subdivisions are: 3 E+ ~/ Q) D# L. o1 j•Electronic attack – Involves the use of electromagnetic or directed energy to ( a1 P5 ]! k0 r0 c8 Cattack personnel, facilities, or equipment with the intent of degrading,- e4 C9 @' w! a0 P0 Q neutralizing, or destroying enemy combat capability. Also known as EA.5 U" f) d5 y6 k, _7 \8 a' d Includes: 1) actions taken to prevent or reduce an enemy’s effective use of , m' o X- A5 _; }4 O* Vthe electromagnetic spectrum, such as jamming and electromagnetic - Z* M! P5 C `deception, and 2) employment of weapons that use either electromagnetic or; t& w* h0 T3 P9 ^. ^ directed energy as their primary destructive mechanism (lasers, radio 3 y( M9 w: r' [frequency weapons, particle beams). ' w' U: m* p$ T•Electronic protection -- Involves actions taken to protect personnel, facilities,: A# V) g; q$ M2 P9 q and equipment from any effects of friendly or enemy employment of . F: H3 U+ |4 o: o7 b( }' |: M/ Telectronic warfare that degrade, neutralize, or destroy friendly combat $ g6 t0 u3 w6 y+ X0 D" Vcapability. Also called EP.0 q5 x/ `# T- F! r •Electronic warfare support – Involves actions tasked by, or under direct) C) _ q" x) t, }1 A control of, an operational commander to search for, intercept, identify, and ( F9 z. i% I9 S' p2 q8 Ulocate sources of intentional and unintentional radiated electromagnetic3 r: ?4 D' L% d% K9 T3 b* R$ j+ Z energy for the purpose of immediate threat recognition. Thus, electronic 7 S/ t/ A# {$ Q$ f, m( g$ }! ]7 ewarfare support provides information required for immediate decisions0 f* g4 d; Z$ h' v/ w involving electronic warfare operations and other tactical actions such as. V3 x+ D1 w6 p# ^ threat avoidance, targeting, and homing. Also called ES. h2 O9 L/ E9 W9 s: |Electronic 4 s: y5 b3 M( I' {2 OWarfare (EW)) r: F5 h# K( r8 f- L Environments4 Z; g% b' z, r7 H0 }9 h Electronic warfare environments result from radar and communications jamming 3 t- o; L. \* U3 O! M5 z- U/ Cand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD/ x. `2 i, x5 X% j7 i3 [ system.( k9 p" n6 z; I } T3 |) U Electronics 3 w( H% x0 E% f, X; oIntelligence8 B$ d0 f9 \ Y M* `0 [' ` (ELINT), P& L% H: V8 v0 Q! o7 E Technical and geo-location intelligence derived from foreign non-communications 6 _" T( b4 y+ ^6 B. A/ m( k8 R( Nelectromagnetic radiations emanating from other than nuclear detonations or. `1 u, B; [. u5 l6 @' m! Y radioactive sources.6 E( u, |* z" _$ z9 R0 e Electronics ! n# k0 W: q; l" |Security (ELSEC)4 W4 f# q* O0 G! [- k T The protection resulting from all measures designed to deny unauthorized' u/ B" g7 B7 Q7 w* o& V- [% I3 d persons information of value that might be derived from their interception and9 ]. E$ b+ R6 { `; M study of non-communications electromagnetic radiations, e.g. radar.5 b$ z. r1 G6 [7 ~ Electro-Optics Y. x! G, Q% w6 t# t Infrared (EO/IR) 5 _8 Y9 H" Y8 e" q# t- r O$ v8 ]Technologies/techniques employed by optical sensors in the wavelength8 c+ I: W; }4 q' |6 F spectrum slightly longer than visible but shorter than radio. $ \6 d1 _1 h+ c: F$ U" L) [MDA GLOSSARY, VER. 4.0 E" y! B3 ?5 F/ E& E5 v y3 J, V/ f 92( G; N6 \# E2 Z0 O* y+ Q. X Element A complete, integrated set of components capable of autonomously providing . z1 l2 X1 g# v( y. ?& _BMDS capability. , H/ ^7 W* H7 d' ]3 V" BElement2 D/ [8 E( ]8 u8 z' b- J Capability $ }1 o: W ~" vSpecification / i+ s0 u+ N3 x+ V% |(ECS)$ ^$ r- t3 h5 z9 h: y( M' J: B A document that identifies the element-level BMDS capabilities and4 h% ], u/ s0 L7 c- R; K0 V( o specifications necessary to achieve the system capabilities identified in the SCS.3 @$ {$ J+ K3 i. p4 e* z, ]: n. t: E The ECS further defines the SCS-apportioned mission/technical performance$ `. f; C1 J8 i, w+ |$ F capabilities and allocates these capabilities to the element’s components. 4 `( b8 ?. p* wElement Control 3 l) G; G' g X: N( z9 X% bDirectives (ECDs) ' u3 n! m; b9 X7 C& ^The command and control data instructions to control the conduct of the; y# U6 O# x9 B5 E9 G engagement. ECDs are developed by command and control software based5 l3 D! `3 W, c: z, G upon variable parameter input by the operators (both pre-planned and real time),0 [* l2 R+ D7 \- h- R" i. } and operator defined rule sets embedded in the software. The individual battle ! D }. S2 j/ P$ t lmanagement processors use these instructions to accomplish the assigned tasks* [, N. t2 r9 `9 n X from the operations order. ECDs are contained within a Task and represent the6 D4 @ L; X$ M0 q/ e) a+ i form of parameter values that influence the resource management processes of* [, s" ~3 d5 K) U$ y Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and ; P. M1 V) Y% B6 T5 Q2 qCommunications Management (CM). There will be numerous ECDs per Task.7 U5 Q+ a I: Q Element , w: Z$ |, ^4 E& x, ?2 wOperations1 I. K* ?# M7 r Center (EOC)" i& N' f8 G! e' f. n+ f An Air Force operations center, which operates and maintains a BMD weapon or 7 g) z' u$ q1 ?2 h/ }- K* `6 l: Jsensor suite. (USSPACECOM)4 f3 M; A5 h8 w* w0 r, l) I7 C% Z ELF Extremely Low Frequency. : F, f$ |, N& d7 |# X7 M$ `( d. {ELIAS Earth Limb Infrared Atomic Structure. / z, t6 |: J `) w/ T. n" iELINFOSEC Electronic Information Security. . A3 B; f+ { PELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2024-6-19 01:30 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部