航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation 5 K$ u7 Y9 I0 E6 N& CCOMSEC Communications Security. ' F6 d% R: X& D& l |Concept e2 x# h4 h/ }, [, w) b. E- {2 Z Exploration & ) `" a- F3 ^' Q. @4 s; F( ]) DDefinition $ D! H5 G" e; b- DThe initial phase (Phase 0) of the system acquisition process, beginning at+ `$ j; X7 T- @( U% T- h Mission Need Determination. During this phase, the acquisition strategy is1 J0 {9 {- g3 ^ developed, system alternatives are proposed and examined, and the system2 |/ b3 r( _ L! V( Y! g program requirements document is expanded to support subsequent phases.5 x! x- a$ w) l" |: Q- D5 z: L Concept of 9 \$ Z; ^- t' _4 P' R) P" yOperations 5 M1 _3 Q. @- [(CONOPS)1 e2 X2 o! M! p/ q+ o- Z (1) A statement, in broad outline, of a commander’s outline or intent in regard to * ]( }+ D" P2 r) _an operation or series of operations. The concept is designed to give an overall1 ~7 R% y4 |7 }. R: n picture of the operation. (MDA Lexicon) / S+ m( H6 T) B6 x, u2 O) Q t0 z(2) A verbal or graphic statement, in broad outline, of a commander’s ( _) J9 B4 ^ y% j& T1 v/ J, Aassumptions or intent in regard to an operation or series of operations. The / x9 ?$ R/ i. Z9 |8 k6 aconcept of operations frequently is embodied in campaign plans and operation & e3 f& T7 q1 p2 oplans; in the later case, particularly when the plans cover a series of connected " [, n* X( T! J F# a; loperations to be carried out simultaneously or in succession. The concept is - o5 {2 H Y+ c ]$ edesigned to give an overall picture of the operation. It is included primarily for* e: \% x4 t. q3 @/ ^ additional clarity of purpose. 7 u, r. k: H% Z6 z1 iConcept Plan An operation plan in concept format. Also called CONPLAN. 8 a5 Y# Y# L+ u. AConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of + m- p$ b& z- ~" g& othe acquisition process, or combines development T&E with operational T&E.# q5 F& M+ \" `# C8 o* T5 h Concurrent; C }1 o+ _, k+ ]- o: M0 I3 Q Engineering 7 j3 m6 W) a$ BA systematic approach to the integrated, simultaneous design of products and , x" i5 S% _/ K/ M) v0 ?( j! ~$ |their related processes, including manufacture and support. This approach is & x8 h% x- V1 r) [( {+ qintended to cause developers, from the beginning, to consider all elements of ( n/ _1 g7 b$ z' w+ n/ ?the system life cycle from requirements development through dispersal, including & Y7 b: S# _0 }+ Gcost, schedule, and performance. 3 V2 E+ G2 m: u! H5 F6 q6 \) bCONEX CONOPS Exerciser.7 m d* `* O0 o/ W1 O Configuration A collection of an item’s descriptive and governing characteristics, which can be0 |' n. G$ b2 g6 B6 _) T3 K expressed in functional terms (i.e., what performance the item is expected to 9 G1 o# J% D1 [0 `: o7 wachieve); and in physical terms (i.e., what the item should look like and consist of z( X. G! }7 f" s% F# M: A when it is built).3 [3 B& m3 t5 b+ W# t MDA GLOSSARY, VER. 4.0 C ) _; C, o# |; p. B59 3 i% ]7 L5 @7 a( q/ u. ~Configuration8 o* W! L' M( r6 j Audit) k$ u0 j% _; d& @% n One of the Configuration Management tasks which includes a functional1 V6 n6 n% p) E+ |6 `0 i4 J configuration audit (FCA) to validate that the development of a configuration item ( i* }- M2 x" D" W4 W) i! P: w; m' xhas been completed satisfactorily and that the configuration item has achieved 7 J: k8 [$ h4 uto specified performance and functional characteristics, and also includes a 2 m3 N, L. O# m. Qphysical configuration audit (PCA) to verify that the configuration item “As Built” 9 L& o( s+ ?4 t7 N5 j" S* dconforms to the technical documentation which defines the configuration item. ! N4 Y+ \3 n2 ~- |, {, \Configuration e2 X" `' ?2 Z Baseline5 p' m) e. U% F2 m The configuration documentation formally designated by the Government at a- d( b) _3 d0 D4 A# W specific time during a system’s or configuration item’s life cycle. Configuration ! D Y. _" e2 d1 u5 Tbaselines, plus approved changes from those baselines, constitute the current \3 k: \0 `6 \0 C: X% _5 }% n' R: T configuration baselines, namely the functional, allocated, and product baselines. 9 ^ ^" f5 R* B: p `4 EConfiguration 8 b% A2 J8 I1 {0 P8 hControl " A9 I; i1 h' I1 @" G4 l2 g4 `+ Z4 lOne of the Configuration Management tasks that involves the systematic ' U# j* a' q" u" {' D Xevaluation, coordination, approval, or disapproval of proposed changes to the3 E; o' t0 \) ?' v+ K' _( Q+ v design and construction of a configuration item whose configuration has been " [+ L0 E9 ~6 F6 q( B: H1 O% m. `formally approved. ) K& r& y& w- N A; qConfiguration " x; g5 u% Z; M" W7 YIdentification3 f; c4 g8 N: k$ @! v One of the Configuration Management tasks, which require that for every" N! u8 V$ K. X$ J0 @- j" F change that is made to an Automated Data processing (ADP) system, the design% w+ d/ r& u. h/ Q and requirements of the changed version of the system should be identified. 0 `4 w' M- @4 E* H2 wConfiguration - z2 E! w a) G O4 m: B* ZItem (CI) 3 E' s& S) V# V/ `9 UAn aggregation of system elements that satisfies an end use function and is ! p$ D N+ V; V; L8 X: ~. V8 i3 jdesignated by the Government for separate configuration management. + c9 w8 @+ }7 QConfiguration items vary widely in complexity, size, and type. Any item required ! D" w `, @2 g8 U1 A! ufor logistic support and designated for separate procurement is a configuration : t' W P2 O1 U9 o$ \3 O1 [item. Configuration items are traceable to the work breakdown structure (WBS).' c/ G) y) Q6 [* q4 e Configuration 1 D# Z2 Q. o4 e$ y7 V2 e& NManagement 3 \ h# ~8 |' ^(CM) 2 {* ~: A, F8 x' J1 m0 HIn computer modeling and simulation, a discipline applying technical and 2 K( c; [! W+ _4 l, U/ e, L4 J$ Y) Nadministrative oversight and control to identify and document the functional ' H6 [* j. l, Z* N' H/ irequirements and capabilities of a model or simulation and its supporting 4 f# |6 w( `+ \databases, control changes to those capabilities, and document and report the + Q) Q* v$ W8 Qchanges. See also Accreditation. | s! n$ u p' s CONOPS Concept of Operations. + A1 x+ k) @( x/ r: nCONPLAN Concept Plan 2 B. W8 o1 c4 L9 \6 d6 Z6 `3 L- ?- TCONS Contracting Squadron.* d$ z. d0 R; W* U- V. a) P6 z1 ` Consolidated$ h, R7 _1 W; N$ @7 } Command Center ! p6 K' O& ^5 x, U! f(CCC) ! h8 l6 M0 O, A v% y5 J, WA single command center from which USCINCSPACE/CINCNORAD can direct all % u% _& w |" i! t+ zhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado: ]* T/ f4 r! _4 r9 Y Springs, CO. - ]6 {) E8 ^0 s; R# k0 CConsolidated 3 p h+ f, \8 k+ X/ [" E( [" H$ I# @Intelligence 1 C% `! W2 A* F/ _! [Watch (CIW) ; n6 r3 L4 i0 V; B+ P: i3 f4 nA consolidation of intelligence watch functions within the Intelligence Operations ( O R' d! z* B1 \+ ACenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD ; J: Y1 Q% Y3 l: {; h* q* {) tAerospace Defense Intelligence Center (ADIC), and the Air Force Space$ x3 W" Z; c+ \5 E2 x. p4 u4 y Command Space Intelligence Element (SIE).# [0 V4 P# `4 I Consolidated % K; ]+ b1 B! ~1 ?Space2 R& K. I& R* U% K Operations ) {1 N# ?0 z0 s( k& l0 xCenter (CSOC) 1 \ K% s3 A: N& fSeries of centers at Falcon AFB, CO, which operationally control and maintain; q) B/ [4 R0 w! C8 D* B# p assigned DoD satellites.% x( Q0 ]3 w: V0 T+ X Consolidated + c$ Y1 l3 h6 m$ o" x6 YSpace Test! c) y- t; @" b S/ `* }; r Center (CSTC) 0 t3 T$ m4 I9 K! L& M: {# s( jSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and% ^1 Q7 p/ W, b) e- j initial on-orbit checkout of operational satellites, operate R&D satellites, and0 g4 P6 d' J$ x/ T0 H0 P9 D8 S- w serves as a backup to CSOC for operational DoD satellites. / L3 P: D7 q- `3 d6 @. oMDA GLOSSARY, VER. 4.0 C % o f$ U b" \8 S60 6 G) T7 H. b; G/ @Constellation $ y$ |9 w& M0 F! Q& dSize (CSIZE) 7 T2 h* a' a1 G8 @1 y$ \! Y, TThe number of satellites of a particular system placed in orbit about the earth. " {3 Q, n G1 j3 FContact Fuse Device used to detonate warhead on physical contact with another object. 4 W2 g. ? i( B/ cContingency 2 i( B1 b9 W) ^, [/ M* j1 YDeployment Plan6 q/ |, K9 u1 q* C (CDP) $ D5 U9 Z6 O% W6 j) qAn executable plan designed to deploy an early missile defense capability and- ~" U3 ^: ?& ~+ F, }" | reduce deployment time. The plan provides specific executable deployment ) \. k/ b" [5 Y5 T' I8 Y9 Poptions and describes activities required before and after a deployment decision. u; l/ P& C& N! gThe plan also allows decision makers to have oversight on technical progress, 5 |# l+ ~( {4 Z1 }cost, schedule, and risks associated with a deployment system.: K" ?- U8 }5 M e Continuity of# c& a; z) q& n2 a5 [3 b! ] Command 4 P; ]! h5 ~. I( x: `5 VThe degree or state of being continuous in the exercise of the authority vested 9 L' \! j" p, ]2 x+ }! z p# A. Nin an individual of the armed forces for the direction, coordination, and control of ) v0 H2 o1 }/ Q/ o% d# Ymilitary forces. 7 f# n9 } [ _1 n2 A3 z" j0 e" ~' C0 fContinuity of# G" w Z5 @; e; l Operations 5 X9 `. u6 e, [8 IThe degree or state of being continuous in the conduct of functions, tasks, or 0 [) c T1 g1 l; B0 Y# F5 Vduties necessary to accomplish a military action or mission in carrying out the , B$ h1 U$ G! Q3 D1 Q Lnational military strategy. It includes the functions and duties of the commander,$ E+ M' ^" E1 M; H; i as well as the supporting functions and duties performed by the staff and others" P8 M+ W- G$ L7 U" e& L acting under the authority and direction of the commander. 7 D7 x: Q* T7 qContract8 f3 a, q% o9 E Administration L; A5 H8 @0 e9 R* g5 iOffice (CAO)' \* _' F' \% R5 O$ S6 a( b The activity identified in the DoD Directory of Contract Administration Services & u5 s( B$ o8 v* V; o. X. v oComponents assigned to perform contract administration responsibilities. It is a' N/ N6 y0 `& Q& x' t/ A general term and includes Defense Contract Management Regions (DCMRs),& \, F( ~% X0 `7 ?4 F Defense Contract Management Area Operations (DCMAOs), and Defense Plant 0 u$ R( F3 q7 j. g, `Representative Offices (DPROs). (Defense Systems Management College: v% i* U9 |" L9 { Glossary) " q" J! l* {- c' o& u& w" p" ?Contract Data ; H/ F7 D2 n2 Y. W# b. b# F3 F+ q7 y+ O- DRequirements 0 z @" _1 j4 r+ U4 wList (CDRL)# V6 B9 y9 x3 u, Z3 k X Document used to order (“buy”) and require delivery of data. Tells contractor* k& x( q. ^/ F what data to deliver, when and how it will be accepted, where to look for* o. {" C2 u) o instructions, etc. 6 x" }, |3 T4 Z) T. \' h$ dContract: @$ z& t- O7 |: B G Definition 6 H5 }' u( D2 u* E' E9 RA funded effort, normally by two or more competing contractors, to establish * y9 o! I' A5 Y0 xspecifications, to select technical approaches, to identify high-risk areas, and to ( a& H' D8 s, k8 P% M0 _- vmake cost and production time estimates for developing large weapons systems. 8 @0 S& F' q4 _# ?; R8 sContract Work 4 H! j% m# x4 O! A7 ~4 l4 N6 SBreakdown% `' h. G; X' H Structure, z1 J0 [+ z& E. Y( l The complete WBS for a contract developed and used by a contractor within the9 M$ b3 q; a" B: q guidelines of MIL-STD 881A, and in accordance with the contract statement of1 C" R. e' r. r. r& D i work. 9 ]8 b; N+ ]6 ^) \& c. Z, S# q& ?Contracting k1 f& h' w- \1 j' I4 {( \6 JOfficer (CO)* U% ^& s: c7 |- w9 S' W9 g A person with the authority to enter into, administer, or terminate contracts and " B1 f5 L \0 smake related determinations and findings. The term includes any authorized9 y% W; Q0 A0 O0 N; v- Y5 i+ \5 E representatives of the CO acting within the limits of their authority. A CO whose1 X5 G% ?- H% J# @* W- `2 x4 Z primary responsibility is to administer contracts is an Administrative Contracting/ K: z. ]# p( H; E Officer. One whose primary responsibility is to terminate contracts and/or settle # M% C) }, B, g8 hterminated contracts is a Termination Contracting Officer. A single contracting# [/ m9 V. J$ v officer may be responsible for duties in any or all of these areas. 6 c; a1 z8 }+ o; T, e7 N) RControl Authority that may be less than full command exercised by a commander over 9 f& p2 B* {8 T0 ^, E/ f Bpart of the activities of subordinate or other organizations. 8 S8 y: \. f" E( XControl + g) X" R1 I8 _3 MAbstraction6 o! S' v& K) }, S) Z (Software) The process of extracting the essential characteristics of control by0 F" ~! ?7 {2 p; A. C& T a defining abstract mechanisms and their associated characteristics while4 z" e6 R5 Y, l w1 P disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C 5 I9 ]5 O8 r* w615 N* I/ |9 j, b. A Control and , D6 x8 x/ }- B' \# b+ o2 i0 C+ hReporting Center \9 f5 V1 d/ q. z8 D+ f3 ` An element of the US Air Force tactical air control system, subordinate to the % R1 n9 B' o) q* D) @; ^( Utactical air control center, from which radar control and warning operations are7 v+ e" x# x3 O conducted within its area of responsibility. # }2 g, H9 h- f9 D' OControl and$ n6 ~0 `. A" k* ?6 K( P4 F$ \ Reporting Post8 Q9 e1 c; ?+ t4 u- y An element of the US Air Force tactical air control system, subordinate to the & j: |7 B3 u. n0 o0 T* G; Q% Fcontrol and reporting center, that provides radar control and surveillance within " r5 w6 k' D) |9 X+ n& J1 |its area of responsibility., ?5 h' ]- o9 ?6 J" R Control Area A controlled airspace extending upwards from a specified limit above the Earth. , M5 i- v( k! ?$ s1 |Controlled- _5 Y1 R$ L2 u Environment 0 D, M8 V" b0 X7 U* o8 o0 }3 J3 wArea where entry into the radiation hazard area is controlled. - P; E, \- v, w1 TControl6 M1 ]7 R- {5 {9 u# R Procedure" X; p+ i- V9 o: e The means used to control the orderly communication of information between ) c" |& l+ D; N3 |5 r: ?4 astations on a data link. Also called line discipline.- _' d! v# R, q z( j Control Station The station on a network, which supervises the network control procedures such Z' V+ [& r. u9 q% p5 R( H3 h4 ` as polling, selecting, and recovery. It also is responsible for establishing order 0 A1 N! S: T9 R1 son the line in the event of contention, or any other abnormal situation, arising 4 o3 f! n0 I5 S. Z/ Ybetween any stations on the network.1 a! j7 k- v3 ^ Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to % I4 [8 I' i& K% {3 Dprocess sensitive defense information and that is under sufficient physical and 6 p/ P* |! R0 h; ?+ I* a j. v: D. Ttechnical control to preclude an unauthorized entry or compromise. / S7 c) p. t5 D: L' lCONUS Continental United States. # R0 Z2 i' V6 H) QConventional Co-! W5 c& @1 F3 r$ M Production ! T* A) j+ F; H0 R8 `6 ZAn effort between governments to produce the same end item, or components, ^! J! e# l5 ^$ w of the same end item, in concert." Q% e* q1 ?" ~ Conventional : [1 ]; g* M. C- _8 j d3 T6 M+ } k' SWeapon/ n; u- D& K% w. ] y A weapon that is neither nuclear, biological, nor chemical./ k7 V# u. R2 ~1 w( `* ~( m: y( Z Coop Cooperative $ y; B6 K6 r! L$ L# T5 r- CCoordinated8 g6 ?$ |( l4 ?* k! { Engagement : s) F* M$ g9 e, ePlanning/Actions - |1 A6 h) c6 @7 JNecessary coordination among engagement components to ensure maximum6 P q- K" \! |) @' E$ B effectiveness of the SDS and resources are not wasted on targets already& w4 D8 _: y; |3 R4 J" A targeted. , n" Z# R; z( H8 l$ Q/ ?$ [' vCoordinating ' K4 G$ R( j, I" h0 w3 LAuthority ' b# O% V. }8 u; L: wA commander or individual assigned responsibility for coordinating specific9 d& o- N/ y7 d. Q+ C functions of activities involving forces of two or more Services or two or more 8 r! h. j9 o* j/ c* j- `4 cforces of the same Service. The commander or individual has the authority to7 x( O& M% ?" ?! I4 g. H1 s require consultation between the agencies involved, but does not have the 4 [9 k( c( S& H1 [% A% j$ S/ V0 C$ ^authority to compel agreement. In the event that essential agreement cannot be [* x# B& @" | reached, the matter shall be referred to the appointing authority.% O" W4 P$ V, j! L4 t% v- Y, Z COP Committee of Principals4 f5 t2 ~8 e! ~) h" K* Z COR Contracting Officer’s Representative. Contracting Officer. 2 s# m- ^! l# D fCORBA Common Object Request Broker Architecture.' i% u3 B) S" R1 s CORM Commission on Roles and Missions. ' [8 q" e' Q' o/ W) SMDA GLOSSARY, VER. 4.0 C4 h- E1 V. G# @ 62( w; y+ S2 B2 h. W- C- W Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens + X! V/ _+ d! T2 m) hperpendicular to one another, designed to act as a radar target or $ a. L+ o% A- z! \' M7 J& B3 omarker.! I) o8 o( j g! m* z* g (2) In radar interpretation, an object that, by means of multiple reflections 3 S1 f% T: N* ffrom smooth surfaces, produces a radar return of greater magnitude than3 B: k; l* h. J* @% h: |% [ might be expected from the physical size of the object.) j& W' D- j# g; l4 S% R Corps SAM OBSOLETE. See Medium Extended Air Defense System. 0 f: J4 j- `2 a4 W& G' J Y4 e( ~: hCorrelation (1) The process of relating observations or tracks from one set of data to 0 U1 J$ W9 X" k8 y4 Iobservations or tracks from another set of data, i.e., collecting data from: R, f& p, E& h- H different frames or sensors that presumably relate to the same target. (2) ; y' ?5 o6 D0 K" {4 c& ?* Q/ s/ \In air defense, the determination that an aircraft appearing on a/ w8 h+ r* W- {) v. Y radarscope, on a plotting board, or visual is the same as that on which7 g/ d9 U- Y$ D6 ?$ b information is being received form another source. (3) In intelligence# G! c! ]) D0 J" R4 n$ K usage, the process which associates and combines data on a single% o8 X8 L2 U6 N$ J* }3 F entity or subject from independent observations, in order to improve the2 U2 Q6 f$ P$ H1 R! X6 P R6 K reliability or credibility or the information. E2 z; G7 q+ P% C2 w4 l8 m. {9 @ COSEMS Evolving architecture operations support tool. / S" d: j7 \" d' D d5 tCOSM Computer System Operator’s Manual( I0 z# M7 k( M- f0 p) h7 ?; G3 w/ s COSMIC NATO security category. 3 B. n! L8 F( Q4 _- T0 F3 ZCost Analysis; P+ P1 A: ~6 m) h! g, P Improvement s, r U% K4 u Group (CAIG) ! b+ L: ^- N' |% I* `An organization within the office of OSD Director, PA&E which advises the DAB% n8 b" l3 |) C: G2 C9 H on all matters concerning the estimation, review, and presentation of cost - o$ C" n1 J! A4 |, Canalysis of future weapon systems. The CAIG also develops common cost7 A* T% Z; S; K: N6 A estimating procedures for DoD.5 t0 W Q' z+ U0 J# ]* G8 e6 ] Cost Analysis : F4 W) }. Z" L- }, k- Q2 IRequirements& s6 e( i. G# f+ m) y! ?) o Document 2 y: s3 S4 |* E& Y/ E" M0 g) t(CARD) * J) U$ t. C9 e, ^( kThe document describing the technical baseline, which is a subset of current$ e @8 p$ H1 [ system technical data and is used to generate the baseline cost estimate for an ! C8 }. l" r, `( V) A3 i+ R: ^SDS element. It includes, but is not limited to, the element description,9 R& g& c' j. h( S |. |! V. f; a interfaces, operational concept quantity requirements, manpower requirements,0 X: t0 c- h \! ~* F activity rates, schedules, research and development-phasing plan, and facilities, V, A1 n6 o8 n$ r requirements. - l. o5 p! ]% xCost and 5 Q; w* e8 G4 P+ u$ A/ POperational) a5 X/ E. k7 m p Effectiveness; x$ s+ y( B+ U8 c3 v Analysis (COEA) 3 l: {$ z* `6 }4 }* CAn analysis of the estimated costs and operational effectiveness of alternative / ?8 I/ N3 y5 | ~: Y$ Ymateriel systems to meet a mission need, and the associated program for 8 D+ w6 V" R6 o) W# @acquiring each alternative.$ |: u" g. t: _* x. M- ] Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk, d# J* d$ ^' f1 ?4 G7 u+ C5 C2 ~ due to cost estimating errors and the statistical uncertainty in the estimate.2 l/ m7 y8 O" c Schedule/technical risk is risk due to inability to conquer the problems posed by ' k. q8 A9 e* O0 n3 K1 fthe intended design / K: A) \3 S- O8 D; wCOTR Contracting Officer’s Technical Representative. See Contracting Officer. + ~* o" M) w/ R ^COTS Commercial Off-The-Shelf. z. Q3 w' J6 ]) l' V1 `$ C0 ?; KCounterair A US Air Force term for air operations conducted to attain and maintain a desired 5 G/ k& o P* U9 R+ k$ f. R( bdegree of air superiority by the destruction or neutralization or enemy forces.' s6 J! r* v; v6 b0 ^ Both air offensive and air defensive actions are involved. The former range , m+ U# w0 |# V1 `throughout enemy territory and are generally conducted at the initiative of/ u6 i+ v- X7 z# R, n friendly forces. The latter are conducted near or over friendly territory and are & I7 q( `/ ] f8 l: zgenerally reactive to the initiative of the enemy air forces. - j/ i: _! y" k: [! u; OMDA GLOSSARY, VER. 4.0 C. z1 R$ ?: p. b2 b 63" ?' \: u5 O% B O' u' E$ _ Countercountermeasures : M! P8 V8 X6 Q& ?(CCM) + O! v1 ~ }5 j+ O/ e, T z7 @; B: ~Measures taken by the defense to defeat offensive countermeasures.6 `; v( D9 }. i: l9 o1 e Counterforce The employment of strategic air and missile forces in an effort to destroy, or 5 t. n: w3 Z+ f* `( P2 @9 o$ orender impotent, selected military capabilities of an enemy force under any of the* x$ d" a6 B1 {0 J5 o circumstances by which hostilities may be initiated.* [( z; y6 j/ K, M+ w" a Countermeasure A design or procedural measure taken against covert or overt attacks. ! [0 S3 K! L% g# `& \Countermeasure : `8 y+ t. i9 S8 e; @0 |- L3 Q. Rs (CM) , `6 e/ ?9 I3 k6 C$ xThat form of military science that by the employment of devices and/or * J! J8 K, c; _: Jtechniques has as its objective the impairment of the operational effectiveness of1 @1 b) [/ @! \- ?! f f enemy activity.9 @, `2 Y8 s) S1 d# z; Y Countermeasure: @% Y" Y" ~) b s Rejection" I+ r/ E, i6 s8 e1 ` (Surveillance) & v! E8 n5 g& T; rImprovement or rejection of an object signal in the presence of 0 l; t! v" [0 a3 qcountermeasures.% I+ m8 m ]/ ]2 W! D4 ~' p Course of Action 3 q+ P& T. I' w+ [(COA)( U _8 `- Y8 N* ~8 l% o (1) Any sequence of acts that an individual or unit may follow. (2) A possible / ?8 v/ y! T, ^, b+ K2 L9 \+ c3 a* gplan open to an individual or command that would accomplish or is 3 o4 k; L2 r0 o% {related to the accomplishment of his mission. (3) The scheme adopted" `. f% c$ ]5 c$ D2 ]; t to accomplish a job or mission. (4) A line of conduct in an engagement. 8 T* |4 Y2 ~( U# w4 Y9 W: ](5) A plan to accomplish a mission. It describes the execution concept! ]6 j. b& z# U9 S+ r# {' O for BMD of North America. It will specify the engagement priorities,- q7 [/ n" \" r3 ?# d" x resource allocation and desired results by Area of Operation (AO). 7 S0 \$ L+ L" A( e f: ](USSPACECOM) (6) The scheme adopted to accomplish a task or % `! Q8 G4 I" {mission. It is a product of the Joint Operation Planning and Execution 7 G% j7 [- l8 z# V; N% _System concept development phase. The supported commander will- C" j3 N: |9 k$ T, g4 ?) z include a recommended course of action in the commander’s estimate.2 r! \9 r I; j$ N+ `1 g The recommended course of action will include the concept of. w/ z- C B' G2 E' P$ k/ { operations, evaluation of supportability estimates of supporting, p( w# `9 b. t t organizations, and an integrated time-phased data base of combat, 0 Q5 z) O( Y- @1 Wcombat support, and combat service support forces and sustainment.; C7 w. D9 V$ f) f; Y Refinement of this database will be contingent on the time available for ' I' `9 C1 X1 d/ Pcourse of action development. When approved, the course of action$ y$ c0 G& x/ M9 c6 J* ^- A5 v6 h becomes the basis for the development of an operation plan or ) K. I, [# S+ X$ h) b7 N2 m2 eoperation order. , y0 s4 H! ~, [# F8 p7 P* ^& |6 c9 }: UCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps, * @# h/ q) p8 Y F- v7 F0 |and other geographical presentation systems. (2) Cover or protection, as8 G) I+ J6 _" e# o0 [ the coverage of troops by supporting fire. (3) The extent to which7 K5 D; L' x! q0 c2 T: s intelligence information is available in respect to any specified area of3 x% Q$ _/ k% p( W) f8 e2 H interest. (4) The summation of the geographical areas and volumes of ( I6 A" E- M& S& m2 c, r1 I6 Caerospace under surveillance. ' v X) N$ i! A& P, T {Covert Timing 8 }4 W( h6 ~; \Channel7 Q! g5 ], I) E8 J8 m6 @9 V9 k A covert channel in which one process signals information to another by ( p% \9 Q4 T. A6 z4 |3 r1 P Emodulating its own use of system resources in such a way that this manipulation 5 C$ B) Q9 }* Uaffects the real response time observed by the second process.' V3 c+ r' L4 H CP Command Post. - Q' u3 u: @/ a) iCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach." G7 u; |0 R% V L, b/ W% J0 _ CPAF Cost Plus Award Fee.0 m* V! G: ? Y CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) & K" q5 A6 R2 J& w* P1 ~" }MDA GLOSSARY, VER. 4.0 C: n% H( P7 e: T! m% N) R2 z 64 ; E: N8 n. F, ]# wCPAR Cost Performance Assessment Report.0 [+ W. ]: S# x1 { CPAT Critical Process Assessment Tool* y, o9 U; P" e7 } CPB Charged Particle Beam. % n! l; }: ] ~9 {CPEV Communications/Processor [Network] Experimental Version. 2 J/ K: k, u' [CPFF Cost Plus Fixed Fee.8 x, \0 |) i& U3 N9 z& v CPIF Cost Plus Incentive Fee. - H4 P0 W: K G! |3 K" v! ^) UCPIPT Cost-Performance Integrated Product (Process) Team. 2 G. g' i$ M3 H0 d- \CPM (1) Critical Path Method. (2) Contractor Performance Measurement. ! g; ~9 }% i" D7 B" ZCPP Critical Performance Parameter.1 H' j( e5 s( h! \8 Z8 Z. g CPR Cost Performance Report.* s, ?% v" B6 p' a2 E CPR/NC Cost Performance Report/No Criteria (Contract management term)./ ^3 V/ O! n& D1 Z h CPS (1) Consolidated Program Summary. * n6 w3 ]7 i; x# F2 c5 ~% `(2) Competitive Prototyping Strategy. / V; T6 _$ N K. r4 X& t(3) Current Program Status.8 ] n$ g- B) h2 ]8 @, @7 e CPU Central Processing Unit (TelComm/Computer term). 2 ?! y; k4 Y4 z3 j5 {+ c0 }CPX See Command Post Exercise.5 ~, m3 m( M, B5 ]" k. N/ W* S CQAE Chief/Contract Quality Assurance Evaluator.7 H! ^* `( q e- Y CR (1) Computer Resources. (2) Continuing Resolution (US Congress term). ( ~3 |, r/ S) i# y3 F/ O% FCR-UAV Close Range Unmanned Aerial Vehicle.6 Y0 u# K, v6 y) M CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement 0 z2 B4 ^6 j' U6 \! hCRADA Cooperative Research and Development Agreement.# f, J' Y2 G: F1 t CRAM (1) Control Random Access Memory. ( l* {5 J k g4 O(2) Cross-tie Random Access Memory (Computer term).( ^7 d' @' u$ G- z" V* f) L CRB Configuration Review Board.9 C7 o/ F; }' b CRC Control and Reporting Center.: k+ r. A/ O$ \9 q1 e3 X& e: [ CRD (1) Capstone Requirements Document./ E- Y" _ U; D (2) Component Requirements Document.: u; p( C( r1 N+ W4 O \5 ~$ ~3 h7 H CRDA Cooperative Research and Development Agreement. y T; O0 D S* j, L9 B4 K$ ?CRG Communications Relay Groups (PATRIOT). 0 m/ l, B% W8 j- UCRI Classification, Recognition and Identification. $ F# b. l" A% x" WCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C0 C) S+ p% Q7 x* } 65' Q& ^9 n5 w4 X$ ]4 o( t Critical Design ! j: X. ^3 o1 v$ YReview (CDR)+ u% N2 w7 V% c/ m L! ? A review conducted to determine that the detailed design satisfies the 7 y5 v0 `6 u* fperformance and engineering requirements of the development specification; to - Z. f. t) f$ Oestablish the detailed design compatibility between the item and other items of 6 V& `3 R) S, y7 k# v3 \, i) tequipment, facilities, computer programs, and personnel; to assess producibility$ ^2 H& ^3 `+ \0 L8 |- n- N* H and risk areas; and to review the preliminary product specifications. Conducted - y2 H) d' n+ o) G3 H" X. Yduring Phase I, Demonstration and Validation (for prototypes) and Phase II,9 i2 D# i) m: t6 [& h$ W Engineering and Manufacturing Development. & g* Z5 g0 o1 K7 R/ g: @Critical' }" V- [7 h" F+ y6 d3 I$ h" I* w' A Information& \5 j* A2 v5 A! ]; p Specific facts about friendly intentions, capabilities, and activities vitally needed, `4 j5 R: h) l* X) |/ j by adversaries for them to plan and act effectively so as to guarantee failure or 0 k# _* \$ X q1 O1 |1 Tunacceptable consequences for friendly mission accomplishment. U8 X7 l' K- {+ d9 V- Q, i4 rCritical( k5 Q L7 t% T: G- G Intelligence 4 Y" U$ j. b) n) eParameter' J! J, p# S* t: X7 R A threat capability or threshold established by the program, changes to which 1 [( J7 ]" {: d' c7 zcould critically impact on the effectiveness and survivability of the proposed 3 X0 a+ d/ ?$ i1 ?. Fsystem.+ m+ B: x" e; _" o# ~) J2 o3 D Critical Issues Those aspects of a system’s capability, either operational, technical, or other,- n. H9 M. D' N0 d$ \! l that must be questioned before a system’s overall suitability can be known, and 9 M: f4 g) U3 t Zwhich are of primary importance to the decision authority in reaching a decision% r$ g9 O, P8 r! X0 ~8 X to allow the system to advance into the next phase of design, development," P0 R) b, u7 X9 w O" y! Z" F; C production, or post-production.- M# F$ g" s8 o1 B" J Critical" ^( G7 V0 ~, J5 y; s2 [ ~ Operational 0 p5 h3 A- [; eIssue ( e1 L; S1 v* f8 MA key operational effectiveness or operational suitability issue that must be# q$ C2 t! X" n. K; h8 m8 j7 e examined in operational test and evaluation to determine the system’s capability& S' m6 s8 M3 M: W, l, L) m to perform its mission. A critical operational issue is normally phrased as a$ [" U7 b4 ~; v6 D: s5 O question to be answered in evaluating a system’s operational effectiveness 8 a G( y3 l+ E+ Kand/or operational suitability.1 C& o1 b, C: b4 g6 G Critical Path " t! Y( l& s7 f; D$ r" l. Z2 d6 q" @Method & Y& w* ], c: R. m& MA technique that aids dependency of other activities and the time required to : J) H2 r( }3 }3 wcomplete. Activities, which when delayed have an impact on the total project " D% T! |. D3 o% yschedule, are critical and are said to be on the critical path.5 ~- P4 B) g. W; s) C- s/ |4 @1 f/ j0 O Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to , y0 @. ^5 X% n& |5 c. xthe viability or the operational effectiveness of the SDS.3 B% m- f$ _$ Y/ B0 h4 A7 y9 ~" ^: Y! b Critical Security 1 y' y4 L& `0 A1 P; ] B' P; yRisk( ^3 X' {9 ]- Y N0 u The existence of a security vulnerability that, if exploited by an adversary, could 2 Q1 l ]% }1 u. ?, ?cause exceptionally grave damage to the viability of the BMD or the operational " x3 v! ] D; eeffectiveness of the SDS. Critical risks assume an adversary’s capability to/ @2 f7 w( X% R6 v) H9 }0 E cause major system disruption or degradation (e.g., single point failure),% j3 i* R2 w6 _1 u1 Y" ? destruction of mission-critical components, or usurpation of system functions.3 s# @( }6 G5 Q/ A Critical $ d/ k, w( ^& J8 r9 nSupporting, ]- e6 G, G: f R( _/ ?0 v; {9 x+ v Technology + T# l7 ]" D' s5 ~A technology that program management personnel consider a critical part of the & p. C6 \: a4 ^6 j* h9 tprogram being described./ H7 O) _7 I* O* ?" h" R, M5 w CRLCMP Computer Resources Life-Cycle Management Plan. " c! q8 p1 m7 j* h: ?- [" kCRM Computer Resources Management. 8 F) h6 V# P. n f" F- sCRMP Computer Resources Management Plan. 0 B' w [2 b* g5 D1 K2 J3 SCRO Chemical Release Observation.( H, Q% u- B# |% b CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC1 g; g) K2 r2 Z. j! ^ term.) 5 @5 X' T! p- Y" d! G0 WMDA GLOSSARY, VER. 4.0 C $ A0 n6 O6 q4 ^& V4 U$ r66' R$ J& [; C( C- X1 V CRS (1) Computer Resources Support. (2) Congressional Research Service. (3)6 F; [% G8 `) u' f$ t( e$ |: u Contractor Reporting System.& ^" d g1 z) F6 t" N3 \ CRT Cathode Ray Tube.! y6 u. i" n3 n2 m }8 O. x5 N CRWG Computer Resource Working Group. , }! ?$ g2 R' {* F3 n" sCryocoolers Cryogenic Coolers.& x/ h$ {2 b& x- |4 R6 y Cryogenic Of or related to cryogens (substances which are used to obtain low: O' i s% a: l1 `- G temperatures).4 t9 }8 R2 B# ?, T" O9 Q2 v) ^ Crypto A designation or marking which identifies classified operational keying material, - _( G) i& u$ M9 Yand which indicates that this material requires special consideration with respect / ~" J/ m& H" T0 [' Xto access, storage and handling. ' A' z, e$ q; ^1 T: Q4 CCryptographic ) ?) Y& B. ]& T0 K* HSystem: m' a, g" j" F) M% @ The documents, devices, equipment, and associated techniques that are used/ y" ]! @ i) T, r" c" Q as a unit to provide a single means of encryption (enciphering or encoding).: [1 g# U# m" S1 J8 r. f8 P2 _0 Q Cryptology The science that deals with hidden, disguised, or encrypted communications. It ; [! q4 `9 L. ^. yincludes communications security and communications intelligence. 7 \: G8 ?4 f+ Y9 e& M9 t. qCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. , W1 x' }" P3 X; U: G3 t7 OCS/CSS Combat Support and Combat Service Support (USAF budget term). 5 c) _2 b! K" e* h) A& hCSA Chief of Staff of the Army.% P) w: T& _! q3 W# W7 `8 l g2 q* ? CSAF Chief of Staff of the Air Force. Y' Q7 v6 i) o CSC Computer Software Component./ t# i R$ p$ ~- A8 { CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) 7 E# w6 e2 l7 I/ W$ G+ y( xCSCSC Cost/Schedule Control System Criteria.* k7 v% `% Q+ S! ?8 a% c( b CSD (1) Constant Speed Drive. (2) Critical System Demonstration.; F8 b' W9 K4 J CSE Center for Security Evaluations (DCI). + _7 v4 |/ T2 W+ QCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon ( u% e2 s- c' n$ ^5 `System, located in Cherry Hill, NJ.- E+ h7 S; s( x; X( i CSF Consolidated Support Facility, Arlington, VA.' T6 f# N: H$ R CSI (1) Critical Safety Item. (2) Critical Sustainability Item.3 U$ C! ^1 V5 ~- P* y CSIP Current Systems Improvement Program. 6 m S. o3 B5 C& ~CSIZE Constellation Size.4 A, \4 G S+ @* s! r3 z CSL Computer Systems Laboratory.) P5 \1 _( C" a8 L1 j# {( [ CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. p8 z/ E1 m; Z; L2 z: i3 KCSNI Communications Shared Network Interface (NATO term)." x5 e @. H( p+ t% i8 H MDA GLOSSARY, VER. 4.0 C# A/ @* E" |9 D" D6 J2 u0 {* H 67 3 w6 n6 n. L7 o8 \% B9 oCSO Closely Spaced Objects.( M* S: q' \+ d CSOC See Consolidated Space Operations Center. + Y! ]; h7 o7 ?# LCSOM Computer System Operator’s Manual8 c+ k" G2 d# O/ u CSOSS Combat System Operational System Sequencing E2 Y# q$ K1 {& G1 f4 h1 ECSP Communications Support Processor (numerous locations, including USAF Air 0 z5 {% e: Q) I; Q3 ~( F qDevelopment Center, Rome, NY term). ' A9 }) B/ V; k2 y0 `! aCSRD Computer System Requirements Document.. s2 n% r+ H9 v5 z# ? CSS (1) Cooperating Space System. (2) Communications System Segment. (3)" x1 t0 l8 M, J) f5 g( ~ Contractor Support Services. (4) Common Sharing System. (5) Communications ) F0 }. m) f! ?7 i0 Z) jSupport System (Navy term). (6) Common Support System. (7) Combat Service ) V2 C7 [, ^" k7 Y MSupport. # B r4 [( D' P( V$ [4 eCSSCS Combat Service Support Control System (USA term).+ O5 {; ]0 p8 q' p/ g CSSPAB Computer System Security and Privacy Advisory Board. / i( Q" A& [8 l N$ KCSSO Computer Systems Security Officer.8 Y2 `8 B4 v% d CSSTSS Combat Service Support Training Simulation System (US Army term). ( h: g5 W$ p( `2 L) K- B; fCSTC Consolidated Space Test Center.1 O. X. ?2 a! g" M; z CSTI Civil Space Technology Initiative. ) q7 O6 `' U4 N7 J" y! g( G) yCSU (1) Computer Software Unit. (2) Communications System Utilization. 8 u' l/ K1 m9 l! S7 lCSUR Communications System Utilization Report. . a+ f3 T( O: e/ PCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.9 L' o* g9 Y5 q. Y* T- c (4) Cryptologic Technician (Navy occupation specialty).( L8 I: p0 Y9 z5 ` CTACS Contingency Theater Air Control System (JFACC term). ( d3 w! ^* l6 M% H2 y$ o5 w' ^CTAPS Contingency Theater Automated Planning System (USAF).5 I% Y. @( J8 I9 r- X% B% ^ CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. 9 ]5 B% h0 L8 b& g& hCTBM Conventionally-0armed TBM.% N3 \' V! A5 H4 D5 }; H CTC Combat Training Center, Ft. Leavenworth, KS.' z# L' U: T* n$ s" k CTCC Critical Technology Coordinating Committee.) J4 X$ ^5 P% ~8 @6 P) A+ @+ b$ g6 p CTD Communications Test Driver.! i8 B) _6 V; s& o* v4 @ CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. . L, A) `- O7 {" U) a5 y4 gCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally % K8 G% d4 z' O( H# ~6 ^" Ufunding selected test investments proposed by the Services and Defense. q: ~3 c7 a1 a. H4 @: ~6 X% i Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C E& S- _, g+ I2 ?68- f/ o/ e0 M- y6 _9 s CTF Controlled Test Flights. % H/ X# ?# Q+ K! kCTI Concept Technology Insertion.2 Z* X) b$ F) [2 Y CTN CALS Test Network. $ z) G6 {( g/ g8 W0 K1 {, JCTOC Corps Tactical Operations Center. " q, H$ I% X8 X1 a3 S) HCTOL Conventional Takeoff/Landing aircraft.- V! O R S0 a7 L7 d CTP (1) Critical Technical Parameters. 8 q9 M! |3 u" ^6 k7 ` M(2) Communication Tasking Plan. ( U/ L% N- p% _8 }* l(3) Consolidated Targets Program.. E- y8 _8 `2 j4 o CTPE Central Tactical Processing Element.; ]) |% n* O: M5 i5 G6 r CTPP Consolidated Targets Program Plan. ?5 E9 G9 X1 m+ [& {. \! @' ~$ PCTR Cooperative Threat Reduction (Treaty negotiation term). ( m4 @! Z2 S; h5 Y5 J) V" q- W+ hCTRS Centers) i" {6 n2 @% @( f CTS (1) Clear To Send (TelComm/Computer term). 4 p0 t+ f/ o6 a$ e(2) Contact Test Set (USA IFTE term). # Q/ ^; g8 j4 v, [CTSS Computer and Telecommunications Staff.# x4 y* `' {# D5 T2 x CTT Commander’s Tactical Terminal (US Army). 4 U! D1 B9 w# K' T- J5 _9 L2 jCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).0 U- V3 t( b, R4 J, y2 F CTV Control Test Vehicle(s). 9 L+ B( Y f0 `5 |0 uCUDIXS Common User Digital Information Exchange System. 6 A& q! p( {8 ]! iCued Operation The directing of one sensor based upon the data received from another sensor. ; U" [* Z$ E; d9 N& SCueing Command The command within a tactic, which specifies the sensor element’s coverage , q- l1 o R/ [/ F: Qvolume.& R, G; Z2 G- k/ J Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage% m: n. X. v @# L0 ] volume.( i% q( I; r2 k; [ CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.% b9 q# Z4 E9 X8 _. ^7 L* a CV/BM Carrier Vehicle/Battle Management. 1 L. s) ~' V. i S3 `9 ]8 v! x1 QCVBG USN aircraft carrier battle group. 3 @! h0 C, [6 mCVHG Carrier, Aircraft (V/STOL), Guided missile.* o& p; D% Z+ e3 z CVISC Combat Visual Information Support Center.' _ l: T8 s. `2 d* B5 b5 v CVL Copper Vapor Lasers. ( T8 G$ w; i9 u+ CCVN USN nuclear powered aircraft carrier. 9 ^5 J: q1 ] p4 ^$ t/ s- C8 b/ L) tMDA GLOSSARY, VER. 4.0 C " `. M0 ?: s0 f4 s69 0 U; Q9 ]% w" _. N% m; ~$ w* q( O$ VCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. " o! ^0 ?% W" FCWAR Continuous Wave Acquisition Cycle (Hawk). I# o( ]$ K2 T5 n5 Q CWBS Contract Work Breakdown Structure.6 G: m; a2 m' P4 o$ c CWDD Continuous Wave Deuterium Demonstrator. ( j4 X- c3 x2 n2 b& y3 YCWIPT Cost Working group integrated Product Team. _6 \" N# f; ]3 B! R5 n9 U5 v CY Calendar Year.5 @9 D4 H% L& d MDA GLOSSARY, VER. 4.0 D 8 z4 t- |6 s8 j. g/ u& |7 Y715 @2 I& v$ j6 @ x4 M D Deuterium3 L8 n7 u0 n) D+ v D Spec Process specification., L, @' ]1 x$ E0 t7 } D Star Measure of infrared sensor sensitivity. ' ~0 E9 {6 N9 K! `D&D Design and Development 2 A0 }, E2 t. LD&T Detection and Tracking.5 `' p/ y) Q1 r D-IFOG Depolarized-Interferometric Fiber Optic Gyro.5 f m$ M6 R( ?# K D-Level Depot Level (ILS term). - L1 f* \1 w' t9 c) qD/A Digital-to-Analog 1 N/ a4 w; H6 _2 ~D/V Demonstration and Validation.7 b/ `# |3 j, q" \ Y) r9 R+ U D2 Projective (interceptor) in the Hyper-Velocity Gun program.4 v5 }0 F: y- |8 H# R DA (1) Department of the Army.& K8 H' q+ M# O (2) Department of Administration." _% \# c, w8 U( T (3) Decision Analysis. ! q0 \& |: j- `. P: Z$ I9 H(4) Developing Agency/Activity.5 w/ H8 t! @1 h2 ?, N (5) Data Administrator. 7 f& y2 U* L" U+ P(6) Direct Action.& z7 A6 o) D; P2 X- l* f (7) Data Adapter.5 _! B, Q7 s$ F3 l- D% c9 q DAA Designated Approval Authority (DD 5000 term).1 H' z2 x. J) ~% S Q) ^ DAASAT Direct Ascent Anti-Satellite. & _0 o: ^" D" \/ CDAB See Defense Acquisition Board. 6 d5 B, o3 N( ]( \DAC (1) Days After Contract [Award]. + [+ C, ?2 f9 V5 z(2) Department of the Army Civilian.5 H" s4 }1 {; v$ `6 t% _ (3) Directed Attack Characterization.% I2 h" a8 W5 P; }) d, a (4) Deploy ACCS Component. ) @9 |4 [: G% \: P" Z/ P* `7 q2 |. a(5) Digital-to-Analog Converter.0 e% F; J m( C5 f# ]* e* g DACS Divert and Attitude Control System. 0 x' ]' x4 Q4 |) n5 o' [" G9 p' {: MDAD Defense Acquisition Deskbook.% R! j$ n! W) j DADS Distributed Air Defense Study (1993). 0 p8 `) A2 j+ Z+ {8 D! oDAE Defense Acquisition Executive. 7 p: z# h) @. Y* `DAES Defense Acquisition Executive Summary. ' d2 l" N4 W- n0 [3 mDAGGR Depressed Altitude Guided Gun Round.! Z# x3 l! l/ H1 b5 s7 b DAHQ Department of the Army Headquarters. ! D0 L/ x" v* ADAI Damage Assessment Indicator (targets).& N" K8 q, i( h+ h: r DAL Defended Asset List.& ]0 D+ ^6 @; v8 _. s* a3 h5 Q) G: a" T MDA GLOSSARY, VER. 4.0 D4 B1 j) T& R( y# ^6 w6 N3 z 72 . a5 X; ]- E/ ~- E. H* QDAMA Demand Assigned Multiple Access. ; k4 ~5 D) t( x- H7 aDANASAT Direct Ascent Nuclear Anti-Satellite.$ B( B0 f. ]- X) c3 G; O DAPR Director’s Annual Program Review (SDIO term) 9 D2 o! p3 P& K- ]DARO Defense Aeronautical Reconnaissance Office (OSD).' `+ ~" m6 X+ R! @- o DARP Defense Aeronautical Reconnaissance Program. . I+ V5 W% b; N8 bDARPA Defense Advanced Research Projects Agency. See ARPA. 7 ?$ R7 G! j9 J- |6 [1 IDART OBSOLETE. Defense Acquisition Review Team.2 b* n1 \+ i6 U$ a$ _8 z DASA German Aerospace. Member of the MEADS Program Team. 6 _' J3 G6 u6 U: w) ]# W/ T) a: W+ m" jDASC Deep Air Support Center (JFACC term).- v. Q; f! R9 P/ D9 W& D8 N$ v- X DASD OBSOLETE. Deputy Assistant Secretary of Defense. ! Z/ f8 j+ B' [& MDASD (C3) Deputy/Assistant Secretary of Defense (C3)6 t1 g( {% X3 e3 s DASO Demonstration and Shakedown Operation.- H& J8 z. R8 N! c Data Integrity The state that exists when computerized data is the same as that in the source 8 ~! `+ \- E2 @1 cdocuments and has not been exposed to accidental or malicious alteration or 3 Z1 z( V2 d ]destruction.2 U9 n; G+ R! C. M H9 F: H Datalink (1) The means of connecting one location to another for the purpose of8 c" K8 o# c$ [( s) r. w1 w4 X transmitting and receiving data. ! `6 k& i/ W; M(2) A particular path between two nodes over which data is transmitted. It2 X6 h% R3 n& z7 r8 b includes not only the transmission medium, but also digital to analog " I& t( ?* i* O3 `9 cconverters, modems, transmission equipment, antennas, etc., associated + G4 ^4 Z/ c3 k y. U; dwith this path. In the SDS backbone network, it was a path between two & {: |7 C. ~+ V5 @9 G+ W3 ]: ESDS elements. In space these datalinks were microwave or laser. On + g+ P' p5 @8 W4 t# C' ~the ground, they could have been wire line, microwave, or optical fiber. - Q6 P7 X" q5 [4 \DAU Defense Acquisition University, Ft. Belvoir, VA.- a* y+ [, |5 k5 }0 J; r DAVID Development of Advanced Very long wavelength Infrared Detector (USAF # e, O9 x/ R$ u2 L; s8 p7 A/ VPhillips Lab term).1 s; B+ T$ G0 k9 g" Y DAWS Defense Automated Warning System. ' e, ?" p* d& I3 l2 }% f' N9 WDazzling The temporary blinding of a sensor by overloading it with an intense signal of $ C* I( x/ j$ Helectromagnetic radiation (e.g., from a laser or a nuclear explosion). $ b. k( \( ~" O# o2 FDB Bata Base # ^8 Z: o) f% [5 K, t& y# Q+ [* ]DBME Database Management Environment (Computer term).0 S) x7 L) X2 B% c DBMS Database Management System. I' P/ _' d& X6 Y1 D Q( }, k3 C3 S DBOF Defense Business Operations Fund. / Y K, a2 f1 j: QDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D6 d L9 ]( V9 S+ i$ H4 P* r 73 * _4 d% k+ b/ I/ Z" g9 qDbsm Decibels per square meter. 1 ?: p; M- L# F0 z+ }8 |DBSM Database System Management.5 N7 w; d) T' {- R4 k: J DC (1) Disarmament Commission. (2) Direct Current., N. t9 l4 T0 f, G( m* S DC-X Delta Clipper Experiment. 9 f+ F0 p7 R2 M+ w c/ o: q8 }DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications1 O& ^0 y* p+ W7 w6 f Agency. (Now known as Defense Information Systems Agency (DISA)).1 O6 _. H; o$ j, f5 n: z: q DCAA Defense Contract Audit Agency.5 v3 R# G$ S5 \9 l8 x, A/ [! Z DCAS Defense Contract Administrative Services.2 G; d3 }2 e: P5 N6 t* q2 q+ P DCCO Defense Commercial Communications Office (of DISA). ^' t5 ]% K1 L, b DCDS Distributed Computer Design/Development System.' n: A! j9 N: t9 `* h DCE (1) Data Communications Equipment (TelComm/Computer term).% O7 i( L- s+ q( C! |$ i1 c (2) Distributed Computer Environment. ) l" x- Z! N+ p; B9 i/ P, lDCEC Defense Communications Electronics Command. 9 Q$ Y% s3 n' |; ^+ j6 ^) E" ADCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.; A& E5 r0 `4 r) h DCINC Deputy Commander-in-Chief.. ^2 _. ]- Y( v DCM Defensive Counter Measures.! t" m0 [; h- c DCMC Defense Contract Management Command : D. _+ l5 L! }8 w- Q5 @DCN Document Change Notice.- ~7 ` p1 L5 U, L& f& @ C DCO Director of Combat Operations (JFACC term).' V4 l) K- i" M7 s+ A7 | DCP (1) Decision Coordination Paper (see ADM). 1 G) {1 a1 R( N/ d4 r(2) Director of Combat Plans (JFACC term).7 J/ t6 o1 R) |. N/ A( L+ B8 ]" } DCPG Digital Clock Pulse Generator. / X1 t( \0 C0 e0 X5 L7 lDCS Deputy Chief of Staff. . Z! e, K) e: W+ G8 l7 q" }DCSOPS Deputy Chief of Staff for Operations and Plans (Army).5 L" c3 Y$ R1 T2 ]: g DCT Digital Communications Terminal, l% W9 x* y% h# D& i8 E DCTN Defense Commercial Telecommunications Network. % D# v6 F8 o7 u6 vDD Variation of DoD.% }* Q2 q b( y" T U7 G DDCI Deputy Director of Central Intelligence., e- ?* |% _7 `2 y5 z; ?+ t8 w* s DDEL Dwight David Eisenhower Library, Abilene, KN (army term). 4 I1 H8 Q- w8 a" p& e. JDDG USN guided missile destroyer.3 K% d4 g! \ \ MDA GLOSSARY, VER. 4.0 D& N* W( o+ d5 ^. b; T0 Z( N 743 ]/ T( s/ R2 [& [- n DDL Disclosure authority letter. $ |$ w/ ^* w. t5 B+ ?: \DDN Defense Data Network. * |% _4 @& P% N! h1 nDDR&E Director, Defense Research and Engineering.3 c2 Q4 y0 Z* }% p DDDR&E Deputy Director, Defense Research and Engineering. 2 R8 T; {! C* V( tDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).( G4 ` o7 O: D. r. A DE (1) See Directed Energy. (2) Delay Equalizer.& w3 L o6 Y* U. c" ?/ @ DEBRA Debris, Radiance Model.. @5 O T# [# m' P b6 ` Decentralized) R, ^0 n0 ?6 S% L7 ^* C$ l Control+ Z% o6 Q1 U1 @8 h In air defense, the normal mode whereby a higher echelon monitors unit actions, : h3 [2 l/ R6 N. e# _& ~- g6 [making direct target assignments to units only when necessary to ensure proper' P! Z3 n i5 z1 |& z fire distribution or to prevent engagement of friendly aircraft. ! |+ m8 |( p( A* o+ y& |Decentralized $ y/ X+ w# R a5 bExecution , n/ Q% r/ b' TThe distributed and integrated implementation of USCINCSPACE direction by 6 p9 t# A6 u7 G7 Bthe BMD forces. (AFSPACECOM)0 t$ J% m* j) G' n Decommissionin# \9 Y [1 Z& n g* |/ R; o2 N9 x4 S4 L& [ M# D1 { The removal or the rendering useless of obsolete or no longer needed ( n2 W5 n+ v5 r+ z8 `components of the BMD system from service. ( W/ f9 `5 n8 p. X3 |; ^# FDecrement A directed funding level reduction for an acquisition program. ' }7 s3 a; s P% B1 B z3 B* ]DED Data Element Definition (Computer term).% L n0 M5 f% E# x8 w; h. B* O* \ Dedicated Mode . y( s3 O+ a vof Operation 9 K4 Y* J; {. i- |8 [7 D* v(ADP Security) % s0 G6 j1 c; S1 O$ h, U- F4 E0 RA mode of operation where all users of the AIS possess the required personnel ) l5 S! N9 X* I+ i$ U$ S. m& H/ hsecurity clearance or authorization, formal access approval (if required), and a7 J5 x/ {. F" ~. {7 i1 h0 S, t# H Need-to-Know for all data included in the AIS. " Z& @- `/ }3 L% d6 ^Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about " \- j9 C2 B, h: B5,600 kilometers) above the earth’s surface.# L; r( n+ Z+ K8 E/ ^ ~. g2 _ Def Definition. 3 T' R* Z' K7 y1 \9 s3 c) ODEF (1) Defense. (2) Demilitarization Enterprise Fund.; U: }' ?$ t. U. D8 @/ Z DEFCON Defense Readiness Conditions. $ S) k/ b; r$ n' qDefended area $ T) `0 m; j* }! I' V+ C7 y3 Acoverage, \6 g: R' U1 h' H' d Defended Asset 6 C* D0 `( }% C' M/ t c4 Y) GList (DAL)6 {+ N* ~1 ?4 {2 m The geographical region that the BMDS can protect from ballistic missile attacks . Z. Z& P3 S$ L. w1 ~2 X. X# Mwith a specified level of probability of negation. May be specified for a particular- M) l" @0 [$ l' C threat type, launch point(s), launch regions, raid size, etc. m" @* z, L" u) p A ranked listing of facilities, forces, and national political items that require # X6 g4 q" Z4 W. W2 O X/ Xprotection from attack or hostile surveillance. The list is compiled from Federal& ]% Y6 P3 b* {& Z# m2 A. x departments and agencies, Unified and Specified Commands, and the Armed 3 I# e( C! w+ s9 H0 OServices to ensure National Security Emergency Preparedness functions. 0 Z: W. m8 H* YMDA GLOSSARY, VER. 4.0 D& d* M7 k" o6 I, L 75 6 ?" M. K& G9 m' H6 LDefense' [9 k: I2 a# j c4 a Acquisition- c2 m" I3 W0 Q4 V" i% O Board (DAB)1 K0 J( b6 l2 r# W5 }1 `# a- P7 D8 E' l The senior DoD acquisition review board chaired by the Under Secretary of + ^* p$ ?! R& R0 ^, n5 fDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the; M; J# p: Y8 b2 F9 E$ j" G" X6 V Vice-Chair. Other members of the Board are the Deputy Under Secretary of. x9 X! `: A# E( B g2 k2 b Defense for Acquisition and Technology, Service Acquisition Executives of the 7 }& h5 U6 R' E& AArmy, Navy, and Air Force; the Director of Defense Research and Engineering; ( r9 ]; Z0 d" a2 V# F; ^the Assistant Secretary of Defense for Program Analysis and Evaluation; the" q" G( ]/ \5 F8 u2 H1 _( b4 X Comptroller of the Department of Defense; the Director of Operational Test and ' e7 A" [2 A7 A; s0 d" z6 @, |Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the" X: M2 T% `* p Defense Acquisition Board Executive Secretary. Other persons may attend at 0 J! S1 f) N, g- J9 g( `the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition- Z8 L9 d1 x7 K# [ Board.”)) b8 S e( n$ A% F Defense1 i g, K' y" [5 e2 }+ Y Acquisition& s, T( {$ |+ Q5 C Board Committee 0 b$ C. C* C2 w1 p% vAdvisory review groups subordinate to the Defense Acquisition Board. The 7 k! }* U% F' f+ @% n+ z3 ^4 v m% z$ pUnder Secretary of Defense for Acquisition determines the number of 5 s3 L3 t) K/ ~7 g% @" a$ f" t1 TCommittees. The purpose of the Committee is to review DoD Component9 T" p/ A: I6 |* A' L programs prior to a Defense Acquisition Board review in order to make an & p) V3 G; B# y1 \7 l) O7 \independent assessment and recommendation to the Board regarding the ( }# `1 B# N% ? i& ?7 ~program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense ! g2 a8 \$ F" ~$ r1 q0 O5 gAcquisition" s5 S' r. `3 u# C' Z) g& L Executive (DAE)* {5 ]0 g2 S& v% z3 ?6 j The principal advisor to the Secretary of Defense on all matters pertaining to the + z& G5 O* d' M) O5 j gDepartment of Defense Acquisition System. The USD (A) is the DAE and the' B8 @3 h. P! ~$ s& Z( Z2 S* L5 X: q Defense Procurement Executive (DoD Directive 5134.1).1 i* f1 X2 s" y5 j6 ~2 Y/ I7 d( G Defense + N8 N: ~% H* O L8 |$ R; N2 FAcquisition * D9 z' b0 f7 M& }Executive # ~- P: I7 K+ d! e# k% PSummary (DAES), t4 L0 E2 H7 X6 p: i6 x6 E9 E9 F7 b The DAE’s principal mechanism for tracking programs between milestone/ ?, t5 R" a9 U6 W+ N reviews. Includes programs subject to the Selected Acquisition Report (SAR),2 W. G# u |5 ^- R! t& W2 z and any non-SAR programs subject to review by the Defense Acquisition Board. 5 v4 |" q8 p' D: {! y- t# Q$ Q4 mDefense7 z9 f e- l* G# L9 S+ M Employment9 E7 H5 D- i7 ?3 G% e( {6 v; r Option (DEO)! ]6 u& U9 O5 ~6 J0 M# P y# G/ h Engagement strategy provided to USSPACECOM component forces to achieve5 R) W) S5 F, E2 A) B5 N% f A4 z specific military objectives against a ballistic missile attack. It defines hostile + d6 S$ D5 T0 x' R# \: R atarget priorities, provides assets to defend, and allocates SDS resources to be 8 N; g8 p* ], V5 A! z4 K3 y4 { }employed. A number of DEOs may reside in a particular Preplanned Response |) }5 o5 u' v) g# A- M; T$ ]4 g Option (PRO). However, default DEOs (those believed to be best suited to( _. u" m( `/ I5 Y) T counter the threat initially) will be automatically processed and executed when ! p5 x9 h' j8 x3 N/ DDefense Activation Authority (DAA) is given by USCINCSPACE. ; }) {: A+ a: ~5 ]% CDefense ( g2 f& K: x4 t5 b. zEnterprise & V0 t0 {6 [( w6 p3 k/ ?Program (DEP) ) |4 d/ G/ X" a. c2 YAn Acquisition program designed to streamline the acquisition process by waiver. E$ w- A2 @; c. I; k: l of selected regulatory requirements.% G; M4 G' _, g2 E8 x: j' W Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb . z* {+ d! q3 A3 Y ^( _1 Aand progressively weaken an attack, prevent initial observations of the entire. ~; p# x2 ^% W# E4 X position by the enemy, and allow the commander to maneuver his reserve., S" W/ b1 F9 w" u Defense/ Q4 N. T/ I0 y5 j Meteorological 6 s) J1 T- _% ?9 {4 {Satellite Program$ S8 e$ S7 ]6 Q. s (DMSP)* ^! J. j- I) F2 {: m Satellites designed to meet unique military requirements for weather information. - m' a9 u) G' d* l* CUsed to detect and observe developing cloud patterns and follow existing 2 K/ [4 X# x: ]4 O4 \! D; \0 }weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.7 t2 g Y3 R! U7 |; r9 u% l. ] Defense Planning ! M$ |' G, ~- ?' G- rand Resources 7 z: y# b7 q! A: f6 yBoard (DPRB) 0 x$ u% `* ^$ iA board, chaired by the Deputy Secretary of Defense, established to facilitate ! b( |6 @# C# L5 e$ x) q/ k. l0 rdecision making during all phases of the planning, programming, and budgeting. b9 i2 {5 ]1 F7 y: w% A; r( } system process. Board members include the Secretaries of the Military7 V" {0 A+ }! C2 J9 \ Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of1 J# |0 O, `1 S! ]( o( C+ H Defense for Acquisition and Technology, and Policy, the Assistant Secretary of 1 C' K2 X4 ]3 u$ g) PDefense for Program Analysis and Evaluation, and the Comptroller of the $ X! Z2 Y2 ~3 I. t! u7 c6 ?Department of Defense.) Z7 U v# E: v& s; H MDA GLOSSARY, VER. 4.0 D v; q7 b- W' a7 f, m4 C76$ t1 K+ s+ x: v X! Y Y1 W Defense Planning " q4 w/ ^5 [ P+ w6 _ OGuidance (DPG). n. y# v* [2 S: I7 ^5 S Document issued by SECDEF to DoD components providing strategic framework - u! G6 S- j0 J. bfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, 8 x+ [. ]* }; l7 S) Xand Services. In connection with two-year budget process, DPG is issued every. d9 u+ j c: m7 z+ J; i" G other (even) year. ! q7 C: u2 u P2 R" W- dDefense Priority ) k+ V5 m! F3 ]3 F% uand Allocation3 \# |% t6 f" W! n4 X' X1 t System (DPAS)' }' C0 \ D& \ The implementation of a statutory requirement where contracts in support of 5 a! d/ a1 x1 v1 E- O- Knational defense must be accepted and performed on a priority basis over all4 @3 S; W# z, T5 t7 { other contracts, and which requires the allocation of materials and facilities in/ d4 _, X# ]( F6 E5 C! E$ n such a manner as to promote the national defense. See “DO” and “DX.”( s1 Q. V/ x6 |! ~. X Defense0 I) n( C$ q& f- Z" l. l: c3 _ Readiness- k' [! x6 {' ~ Conditions; `6 r6 V+ f1 P1 H& W (DEFCON)/ P; N. }/ H" [8 Z0 d/ H A uniform system of progressive alert postures for use between the Chairman of! o# w7 l0 n1 C7 U the Joint Chiefs of Staff and the commanders of unified and specified commands 5 \! `" C. u x C5 N3 M, c9 H1 @& Qand for use by the Services. Defense readiness conditions are graduated to, a" i: e/ q0 l) O match situations of varying military severity (status of alert). Defense Readiness 9 o4 h; I$ y) |; ^2 m1 v/ E3 ^2 o6 H# bConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as6 X3 @8 J7 o: D1 z4 m9 L3 H appropriate. 7 W. y: r! Z0 a" aDefense Satellite 0 P( Y Z+ h+ L. sCommunications 2 G+ b5 W% u, ySystems (DSCS) % h! g1 ?% G3 w) o/ z! D S7 h |Advanced communications satellites in synchronous orbit around the earth. ' J! Y7 b* `5 I# t- I/ g [, B+ }Provides high-capacity, super high-frequency (SHF) secure voice and data links6 D: B$ W$ K' n for the Worldwide Military Command and Control System (WWMCCS). They7 ~ u/ x" f; p support terminal deployments for contingencies; restoration of disrupted service- ~, b" x* p6 c, r overseas; presidential travel; global connectivity for the Diplomatic 0 n1 U1 u( o& ]. s: I5 _# u% Z; vTelecommunications Services; and transmission to the continental United States2 ]# i- S; V6 M9 L! }) e- T of some surveillance, intelligence, and early warning data. K; @# N, v, \, c% w2 [ Defense Satellite 3 I1 T' @- _+ s& a, U# }, s& q8 a) ?(DSAT) Weapon 8 n( z. C8 L/ L5 _. UA device that is intended to defend satellites by destroying attacking ASAT 8 `; A3 _1 ?3 N- p2 vweapons.3 F7 {' V4 c8 d, a+ U( t9 V Defense Support $ A9 c+ H+ e3 z# H9 D& `5 Z0 gProgram (DSP)- P9 c5 `8 l' ]: ?* ]+ b A system of satellites in geo-stationary orbits, fixed and mobile ground; }4 m1 t+ @# W+ R processing stations, one multi-purpose facility, and a ground communications / M7 z. P9 a$ e2 c3 p. Anetwork (GCN). DSP’s primary mission is to provide tactical warning and limited3 {2 q2 P8 g7 d/ ~5 y- X attack assessment of a ballistic missile attack. 4 a2 I5 _9 K `$ pDefense4 Z& @6 t ]: e/ | Suppression : F; _: t9 G+ g$ UTemporary or transient degradation of the performance of a defensive system 7 k# b- d; \7 V. fbelow the level needed to fulfill its mission objectives, by an opposing force.( D y! n+ o! l" ^6 K (USSPACECOM) : G( b8 U* Y! |+ S$ ~/ X8 W0 `Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic . L U" Y. p# Nmissile trajectory; i.e., boost, post-boost, midcourse, and terminal.7 k ^+ ^7 {. ^: ^! F4 a Defensive 7 C7 i5 ~2 a7 g: }Counter 0 D9 O4 D/ ]0 ?" K1 o( SMeasures (DCM)# t1 Z [6 U+ D( ~7 L% T Actions taken to eliminate an ASAT attack.0 w G5 h3 v+ y( F6 C! ~; j! n L2 F Defensive ! K4 C4 S/ z- \9 ?+ W5 \+ C7 F0 I5 ]Technologies; F$ O* ^ \8 W6 ?$ ]; m Study Team & y5 h8 q( d2 z' p1 _(DTST)4 t1 s. o- T" F+ l; t A committee, generally known as the “Fletcher Panel” after its Chairman,, x) _2 J" V. B4 I1 m appointed by (former) President Reagan to investigate the technologies of& O5 y- M! V2 ^- z potential BMD systems. N k6 @+ M: m2 c# |' gDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.. F& Y- }3 F( j3 o9 k DEIS Defense Enterprise Integration Services (ex-DTIS).1 e t5 d4 G" K. c1 j- x9 \3 t DEL Delivery./ b: T5 _' b' A' J# F: I9 C Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion 3 f% C4 n& R$ @) ]0 _6 eof shots about the aiming point. See also Circular Error Probable.9 a$ |+ ~, w+ N1 n% D MDA GLOSSARY, VER. 4.0 D X! F5 K: h3 e: n: E/ _ d77 ; G- Y$ D& @: T- UDelta-V A numerical index of the maneuverability of a satellite or rocket. It is the: b/ a6 {5 q1 V8 _' G maximum change in velocity, which a spacecraft could achieve in the absence of # b5 A" Y' \; wa gravitational field.; u4 J( x u o+ x6 g3 ~: l% c Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). - `, b( @' f/ z! k* A4 v1 V aDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its5 l$ Q- n+ W$ @( n desired function (matching RV characteristics, screening RV, etc.)3 ]$ Y E C& V3 O6 N* o+ p DEMO Demonstration. d, U3 F1 v3 ]! I& s' YDemonstration & t* X& ?( h _! a fand Validation / t9 Q; u; _6 b; Y8 ?& \8 F9 v(Dem/Val)6 T7 ~# x6 b: d& \1 A The acquisition phase when major program characteristics and product designs " W9 a. Q4 e" A: C1 qare refined through extensive study and analysis, hardware development, test,! ]" e) h U6 u/ C" H6 k( h% G/ u and evaluations. The objective is to validate the choice of alternatives and to ' U( G" O2 S7 @" {provide the basis for determining whether or not to proceed into Engineering and3 t/ s& F# S8 r7 `7 D* P$ R( Q: t Manufacturing Development (EMD). k( x- J. h; x& |- I6 n. JDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. - R+ l" t6 Q% }" T' v1 [$ kIt may include destruction, removal, contamination, or erection of obstructions./ r% i- {9 K2 _. _( ^2 Z DEO Defense Employment Option.+ U6 J" {, d0 D, |' c/ J Department of - d# ?% s5 E: d. t6 G6 U8 {5 ~Defense 2 N' {* U$ d+ z- u ?/ S( ?4 [Acquisition ( |% s) q- Y% e! L! YSystem6 V# I/ ?0 T% ~. H$ Q# |$ K A single uniform system whereby all equipment, facilities, and services are# n- ]5 F5 G7 f+ d8 B' I planned, designed, developed, acquired, maintained, and disposed of within the 6 e' z2 ~7 c+ K xDepartment of Defense. The system encompasses establishing and enforcing5 i. K3 \" P1 `, _! s/ s Y policies and practices that govern acquisitions, to include documenting mission , Y& E$ A9 q$ Z3 n7 R" T Yneeds and establishing performance goals and baselines; determining and6 y! j( t" \6 Z& Y% e9 a# Z prioritizing resource requirements for acquisition programs; planning and ; S& D1 ~2 K9 R; R$ Gexecuting acquisition programs; directing and controlling the acquisition review8 Q, p" d/ l# r1 l5 [0 ? process; developing and assessing logistics implications; contracting; monitoring |6 R1 J7 e5 x$ V1 v) v the execution status of approved programs; and reporting to Congress. (See 2 e* G$ V; b) o* ^8 I1 RDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) $ C# a8 L, L! ^4 W) }6 ^Deployment (1) The placement of force elements in battle positions to obtain a higher2 _% c C7 P2 M3 x state of readiness. . k9 J/ Y6 p2 P(2) The movement required to place force elements in battle positions. & z9 q# `1 |9 i+ Y3 S(3) Fielding the weapons system by placing it into operational use with units' z) M- }: N1 F6 H- H7 K$ g+ @ in the field/fleet. ( V% u- Z+ o9 B( y( a6 \% T1 o(4) To arrange, place, or move strategically.( m5 ? a, H4 h: u! t! u- w2 @9 o4 K Deployment0 l" q, n A3 R0 x) x# C+ | Planning : m; N: a( P; `(1) The development and maintenance of plans required to initially deploy,$ E3 Z- D4 _ Q) c8 e7 l maintain, and evolve the operational system in accordance with# f2 K; `8 D7 x% Q. G+ Z, p schedules and priorities. It includes factors such as launch facility - I) s) o# k$ P4 T# E" Xavailability and planning for the availability of other required elements' U8 i9 u7 a& a. R) K/ V such as trained personnel or units. In addition, it identifies the impact of2 [+ d4 S, L1 U+ ]5 b7 b# L3 U8 J deployment on operational readiness and any testing constraints . L# {2 \9 J/ c4 p5 j4 ^) kassociated with deployment.: D' h" H; \5 I/ L( I9 o (2) Encompasses all activities from origin or home station through V9 @4 P; t, N @% c1 s j destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding6 N& {1 f5 t* K areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment ! L, c7 L# l! _% _9 u: VTesting 4 R7 L4 R; a2 J* XThe testing and/or simulation of system assets in the physical and operational, l: K" U4 q+ ^ y3 p environment in which they are expected to perform. / R) T; h, K+ H' B' E! {DepOpsDep Service Deputy Operations Deputies. 0 R$ F4 A1 L4 QMDA GLOSSARY, VER. 4.0 D + z L8 B: ^: v* x0 ^% d! B78 ' h- ]% U1 Y( e/ S1 p/ s0 FDepressed 4 d9 S! s& M6 J R; `5 u0 zTrajectory4 L. F0 J$ e( y( b4 t Trajectory with an apogee below that of the minimum-energy trajectory.2 P* ]2 @- s' D3 X m% l DEPSCoR Defense Experimental Program to Stimulate Competitive Research. _4 T3 }' C8 D" c6 }' c/ u2 BDEPSECDEF Deputy Secretary of Defense. . _9 @ D, C$ T& @DeSecState Deputy Secretary of State. / Q0 o3 C0 P" W. X5 V9 \+ }DERA Defense Evaluation and Research Agency. Consolidated research and2 \7 B6 d% G4 o( [* z development resources of the U.K. Ministry Defence. Headquartered in' q% w( ]9 @+ [ Farnborough, England. 5 b8 o5 g1 P7 j+ N0 uDerivative/ F/ ^+ D l% H. | Classification 3 s, y. A2 Z2 P- V: [A determination that information is in substance the same as information k# D$ D5 {7 @2 J Q# ]- ]currently classified and the application of the same classification marking. 3 S k' V; }8 v8 J6 @- j; EDES Data Encryption Standard. / H2 ^3 y2 y" r8 n3 [5 mDESC Defense Electronics Supply Center (DLA term). 2 h, A( c4 H4 ]0 N$ a6 LDesign ; b/ V9 Q$ x I) y- a: F9 B* J: CConstraints ; ~6 y- s) N* D$ ?! a. o- v. b9 VBoundary conditions within which the developer must remain while allocating ( `- B: t6 d" U' m/ ~: _- x! _performance requirements and/or synthesizing system elements.+ n5 ]) P1 e9 m5 I9 L7 G9 `/ I Design 8 D, ] y% l. c& d# v3 D2 o3 g' OParameters* q/ }% h5 r; j4 O. o Qualitative, quantitative, physical, and functional value characteristics that are Q& [% I `4 S/ f: w jinputs to the design process, for use in design tradeoffs, risk analyses, and: B; s3 O6 A1 x! u+ [ development of a system that is responsive to system requirements.# A6 w5 }& t. ?- T% M2 L Design Phase A period of time in the software life cycle during which the designs for : _3 q2 [( m6 a- n: Uarchitecture, software components, interfaces, and data are created, 2 B, ~/ N. h* [2 p7 ?documented, and verified to satisfy requirements. 1 D2 z# O! f0 ?0 X0 NDesign-to-Cost + B' y! L8 u$ T$ C# w+ G7 W6 Y) U(DTC) Goal8 g; D9 {! ~7 f1 j/ D# R/ w Management concept wherein rigorous cost goals are established during 3 a# W8 z# q/ P( j7 r' z# w! k2 n1 qdevelopment, and the control of systems costs (acquisition, operating, and- t! l8 B; ~8 o support) to these goals is achieved by practical tradeoffs between operational1 A5 F9 O5 A9 H( g5 l2 \ capability, performance, costs, and schedule. Cost, as a key design parameter,/ B! Y3 F, u: n! H; ~% I is addressed on a continuing basis and as an inherent part of the development I/ t8 A& |3 Q* o" l) R- iand production process. A DTC goal should be in the form of average unit! t3 d7 d: f8 i, S, D3 m flyaway cost. Also, DTC parameters for operation and support will be ; A; E: _9 Y2 q9 |) xselected—parameters that are design-controllable, significantly affect O&S costs," s! p. Q4 J% B4 ^3 J1 | ~: ^ and can be measured during test and evaluation. Parameters may be $ ~/ T F; k7 v/ O+ qexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or + J; x* x; x1 Q* h3 ^maintainability. Firm goals and thresholds will be established no later than entry 3 {8 I8 ]& V( C3 p! \into EMD (Milestone II). This is an in-house goal, almost contractual in nature, ; C; F2 n, D S7 y; }between the PM (Service) and the SECDEF. Allocations from this goal will ; J5 g" b/ b# E1 ~5 lbecome the contractual DTC goals for contractors supporting the program. - V1 B+ s2 v9 b* ?Det Detachment.$ k( h( |( W1 k" R: z DETEC Defense Technology Evaluation Code.- r4 B' x! X) p+ D- Z- ~; | Detector A passive IR, visible, UV detector turns photons into an electrical signal. The 6 j0 l3 B, W* M9 l' UIFOV of the detector is its solid angular sub-tense. There is sometimes . T% g0 n: ?( ^confusion between the detector sub-tense (size) and the pixel (picture element4 I- W. M& J$ O0 A% F6 S. ` size). They are the same for a staring sensor, but in a scanner it depends on 4 b) [( J+ Y1 L' S" z3 \5 q" Dthe array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. 4 B7 K- H$ v/ @8 p+ I6 Y) g4 J! {MDA GLOSSARY, VER. 4.0 D ( L1 {, q- J/ Z: R: _7 Q) Z% o79/ ~( e# e% l, H# X1 ^* i% G+ m DEV ENV Development Environment. 8 l$ J" E( ~. G0 O4 dDevelopment 2 M9 L. V' G# Z8 u2 FTest (DT) : d7 U; p. D; O9 {4 Q4 \& k- }Test conducted by the development test organization to achieve specified test& C6 Q% ?" g- A7 m; D3 W objectives. It may be a complete test, a subtest, or a phase of a test. ' L' }1 G S/ g+ i. ?/ R% r; X; zDevelopment 9 ^$ ?' j9 E4 {: o( _* O, PTest I (DT I) 6 N. A5 `$ I. X9 M0 PA series of tests conducted during the demonstration and validation phase.' T$ W/ u' K! b: _ Components, subsystems, or the total (or full) system are examined to determine. I# f& c6 t+ F) M' K; ~ whether the system is ready for EMD. State-of-the-art technology is addressed5 G# Q( r E% r) }9 k- L in DT I. % k" N$ x# } N5 D5 ]$ b% e; Y! VDevelopment 8 ?& T% g( m' E4 b) S }Test II (DT II)$ U7 @+ C5 n7 q3 F f. X& _ A series of tests, normally during EMD, which provide the technical data9 _ ^+ v. q* Q+ { ^6 h necessary to assess whether the system is ready for low-rate initial or full 7 d- M0 v( _9 {' i( u+ Fproduction. It measures the technical performance and safety characteristics of 8 i3 W& R# a. ?3 [' Q7 p/ Hthe item and evaluates its associated tools, test equipment, training package,7 t- H! D8 m* N5 Y" b: s q and maintenance test package as described in the development plan. DT II 5 b. k. L* J2 daddresses accomplishment of engineering design goals and the fulfillment of # i3 L+ B1 U. b9 c. C1 i Fcontract specifications./ j. E- J" E) p/ k [( X Development9 D1 j h% P' f" Q Test III (DT III)# q# ~ f4 z9 w2 _( l Tests conducted during production. ' k* O2 l7 l. L b) s, SDevelopment2 [& |2 J4 K1 J6 A0 i( o; O! G Test and % Z) V/ J+ j* mEvaluation + j+ @! J5 G, V: a* i(DT&E)5 D' U) r' c4 s" k7 U1 ^% ? Test and evaluation conducted to measure progress, usually of! G4 s0 T2 a% O! N component/subsystems, and the proofing of manufacturing processes and : O' W4 u* W$ A5 J0 M* m' ~controls and to assist the engineering design and development process and " g c- C2 O: D G. s8 Mverify attainment of technical performance specifications and objectives. Usually* X4 O v- z) S# X+ h6 } conducted under controlled or laboratory conditions. Can be conducted before& f) L! z3 u l0 _& ^7 _ or after production begins.4 `8 Y$ j7 h( E5 J# A% G; s/ Q Development 1 ^( C; }; a. t) j& C# ]5 oTest (DT) 2 O% m7 B8 j- U. t9 F! hTest conducted by the development test organization to achieve specified test ! t1 \8 z, N' o& l `$ @objectives. It may be a complete test, a subtest, or a phase of a test.8 J3 x2 ]" h+ I Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, . Q# D7 D8 d( ?7 H+ t! Kschedule, or performance without authorization from the milestone decision V6 v! r5 y8 ]2 Qauthority. Acquisition Program Baseline (APB) thresholds represent these 4 y* E9 q+ h. b2 w2 F5 jparameters. $ Y6 S3 ?4 j: h7 k3 p1 N5 {0 BDevolution of8 G1 ^# \7 \- T6 m; Z- c5 t. p Command 2 W9 t" v' J5 S! l6 tMinimal essential operational capability to perform C2 provided in an orderly and5 _- Z/ w, f' C6 s% B timely fashion to a duly authorized successor. 8 R% |! O5 W0 y/ JDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. 4 Z1 Z% O, `1 I: NDEW/D Directed Energy Weapon/Discrimination.% y8 g ?4 [( o s: r! \ DEWG, O Directed Energy Weapon Ground, Orbital - J2 l1 g( _) bDEWL Directed Energy Weapon, Laser (thermal or impulse).( D2 R; ~; `8 \1 I DEWP Directed Energy Weapon, Particle Beam (neutral or charged). 7 b; y7 \6 U1 UDF-KBS Data Fusion Knowledge Based System. & X4 S, z* @2 D+ L6 L/ KDF2 Deuterium Fluoride. 3 M8 J* K4 h' x$ w" IDFAR Defense Federal Acquisition Regulation + E4 l$ ]; H' X% N. O" f3 V. `DFARS Defense Federal Acquisition Regulation Supplement. 4 M- y1 r! }6 KMDA GLOSSARY, VER. 4.0 D # I- l% }: z3 T& g80 ) e* D. z) O- h" ~ ADFAS Defense Financing and Accounting Service.3 n( g; a9 w% d* E: E$ c DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. 6 p0 U. k5 m! z3 {DGA Director General of Armaments (France). : u* X% x% Y) h3 S2 ^+ zDGP Defense Group on Proliferation. 5 s$ s: m$ E" h9 l) p3 WDI (1) Data Item. (2) Developmental Item. 9 c' g) o# E$ S9 pDIA Defense Intelligence Agency., l; l8 q8 S1 |3 W2 ? DIAC Defense Intelligence Analysis Center.% \6 X6 u8 w& x. l DIAM Defense Intelligence Agency Manual3 r* V% w9 P2 t/ g5 t( ?, B Diameter (Optics) The unit of measure of the light gathering power of a lens.! o8 m8 p% k+ u& S DICE Digital Integrated Combat Evaluator. 8 n* K6 B- s' m8 h9 _* T! m) \0 |7 jDID Data Item Description. 4 {3 x/ q) `. YDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The % C( G4 n! ^2 H3 A ?angle of spread, which cannot be eliminated by focusing, is proportional to the" R# V+ A+ k# I+ X5 Y) W# c# e ratio of the wavelength of radiation to the diameter of the aperture. 6 w3 A' c _9 h# JDigital/ P1 N. b2 s' w$ \* Y Processing0 g$ j v3 f% _. U The most familiar type of computing, in which problems are solved through the6 F' t) j5 B' p( e mathematical manipulation of streams of bits. ' |& M* Q1 ]- [3 q6 iDII Defense Information Infrastructure% I2 A# O4 y$ H+ r4 j' w8 g5 `, v Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to 1 Q, J4 l9 g! y+ D& v2 X1 h4 U, W- Z12 km) between wake termination and de-sheathing.* D1 _/ X$ s; b* J4 l1 E! b DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).0 d! Z/ x8 N. m5 O! E DIR Director. 7 o2 @- s; x$ D9 W8 A& o6 jDirect Air3 c0 h) q3 k% [! b1 @7 ~5 j Support Center 3 r, |% u1 `* z) c' k, gA subordinate operational component of a tactical air control system designed5 d6 }; |$ Z i3 j for control and direction of close air support and other tactical air support 5 [3 C! G2 N; `' C' v. J0 ?+ Soperations, and normally collocated with fire support coordination elements. ' a$ T5 j: y% A& U4 _( I/ LDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not g9 t0 N+ M/ S6 E/ b* O1 s necessarily limited to items that are incorporated into the end product as labor or 6 L) W3 I3 L" q2 p% B" s: {, gmaterial.( w: d. N5 c7 d Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing ) Y& k' O; U1 y/ w fdirect labor includes fabrication, assembly, inspection and test for constructing- D2 T. ^" U, m; Q- h, |$ d3 e the end product. Engineering direct labor consists of engineering labor such as 6 q9 a/ \8 v0 U* l, C$ M/ lreliability, quality assurance, test, design, etc., that is readily identified with the. G( A: Z. R1 U( f4 n end product. ! D: D2 {, [9 N! D) @6 ODirected Energy ( C: k" H2 s" e(DE) - @" R: k% p( ^2 H$ i1. Energy in the form of atomic particles, pellets, or focused electromagnetic 5 i4 }+ j5 B8 I3 p% `$ rbeams that can be sent long distances at, or nearly at, the speed of 6 e- p. I9 z* Z/ C4 g1 h6 Clight. / s: G$ N. k: I, A I( i Z2. An umbrella term covering technologies that relate to the production of a8 V2 p2 I( i& P beam of concentrated electromagnetic energy or atomic or subatomic particles. # I/ x ?. E! z8 _6 QMDA GLOSSARY, VER. 4.0 D. [( P: I8 k; T! q* b! K, M) Y, z 81 G" O+ l- f9 O& I7 WDirected Energy 9 K1 Q! b* w+ }& ^' S; aDevice# u& K0 W4 p0 a A system using directed energy primarily for a purpose other than as a weapon., d3 ?" ?% I+ a# j4 L& G0 J Directed energy devices may produce effects that could allow the device to be 0 Q0 U2 P7 ^) g6 i7 Iused as a weapon against certain threats, for example, laser rangefinders. ; \/ i1 `# V2 O" I' m) q) J$ b; aDirected Energy# w+ z/ k& }( j5 h. J4 z7 U' x6 u0 s Weapon (DEW)- ]5 T; H8 y9 [+ q6 M+ V' m$ ] A system using directed energy primarily as a direct means to damage or destroy' o) O, l$ K* K; Y) g enemy equipment, facilities, and personnel.- \' p, N$ c1 N% {0 }% M DIRLAUTH Direct Liaison Authorized. - `7 W4 @# b3 {9 d1 a+ qDIRNSA Director, National Security Agency.0 c- ~1 ~) [; G$ t: ]$ {/ E$ o9 z( @! C DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.$ G9 Q% W; Q$ H! I DISA Defense Information Systems Agency, Washington, DC. (Formerly known as5 _2 \" H6 a# h0 d5 e# m) L Defense Communications Agency).& \1 f$ c* w7 s1 _& W) V DISCO Defense Industrial Security Clearance Office - n7 g) @* H1 Z- T6 CDISCOM Division Support Command (US Army term). $ b7 U7 y; {. i) m/ T# IDiscretionary % x0 r5 D1 F" X, D4 e) RJudgment + z4 H! Q' }& \. Z4 NThe authority given USCINCSPACE or his duly authorized representative to 9 K) m7 |3 v! e) d* f; e y( [perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination / M7 D1 i! j: c( J K' ^DISN Defense Information System Network (DISA term). 2 a( }* h. n8 |8 a' H SDISSP Defense-wide Information Systems Security Program.0 x2 U p) z+ U$ j9 _& p* A) g8 Z" u DISUM Daily Intelligence Summary (JFACC term).- x, l# v: z9 g, D DITDS Defense Intelligence Threat Data System.* b n H% R/ r; Z$ |+ F3 ]; b- a4 o DITP Discriminating Interceptor Technology Program. The objective of DITP is the& E. [5 }) ?) u+ q; h& r5 v development of advanced interceptor seekers to counter advanced threats.$ h# _# P4 i& ~( p$ d# J DITP will integrate passive and active sensors into an interceptor seeker that ! ^1 x$ k; \- Cintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP 5 J1 p5 m4 ~0 g& E' K bflight demonstrations will involve the tracking and interceptor on-board+ _9 H5 C8 u. |+ _; a discrimination of targets of opportunity while providing fusion processor data( }0 m: h# p, u% _# y( z8 ? telemetry. (See also ASTP).$ ?9 j) s; r/ |2 F DIVARTY Division Artillery (US Army term).- k {) L* a0 V5 l r DIW Defensive Information Warfare.3 H# V5 p- E8 S8 R- b# f* ^ DLA Defense Logistics Agency, Alexandria, VA.4 X! c z4 u W1 } DLSC Defense Logistics Services Center (Battle Creek, MI).2 N- q0 G+ s1 V9 E$ r8 k, l( b DM Data Management+ b5 ^: }7 a6 E) Q DMA Defense Mapping Agency, Fairfax, VA.8 ?$ }5 H, \. F. l! [) Z DME Distributed Management Environment.( t5 }& b, |, w1 }# ]: z4 x% I DMI Dual-Mode Interceptor.% [8 U) @; @/ R; E3 `8 U MDA GLOSSARY, VER. 4.0 D$ u" u. Q! e6 m; W' E 82 7 b1 @. E6 l( U' {4 ?) ?" _3 Q( KDMRD Defense Management Review Decision. % |# M, N4 _! N. q) ~! Y& W0 k ~- w6 wDMS (1) Defense Message System. 1 j: G; f& K3 H(2) Dissimilar Mission Simulator.' L0 x& h, I4 J9 u& {0 n1 e1 A DMSO Defense Modeling and Simulation Office (OSD). , ]# d K9 k. MDMSP Defense Meteorological Satellite Program.* ]/ _. D- V3 ?3 \ DMU Disk Memory Unit. , U. T" Y6 p9 M; x @- }DNA Defense Nuclear Agency, Alexandria, VA. 6 P* f# ~' g8 f3 M+ b/ s3 G7 S( vDNMS Distributed Network Management System. T3 I5 S( n/ L# QDNSIX DoDIIS Network Security Information Exchange 2 ?; l! O# r* a8 q+ vDNSO Defense Network Systems Organization. * I" W8 z# x0 G& a& rDO The lowest rating under the DPAS. All “DO” orders take preference over unrated , e% | @, \; `) \orders to meet a required delivery date. 5 c; A: ?% U+ Z9 v& Q3 LDoc Document8 [7 P+ E4 |5 s4 C# L DOCPREP Documentation Preparation.+ m, V7 X0 s% h4 m O7 M* W7 Q Doctrine Fundamental principles by which the military forces or elements thereof guide 5 W. n- t3 W3 @their actions in support of national objectives. It is authoritative but requires! ^7 l/ Q7 O. _# V7 k judgment in the application. See also Combined Doctrine.- G% J s/ X3 }& S- V. }) e) Q DoD Department of Defense * ^4 K# e# m7 {: y/ QDoD Component , I3 Q) d* Z. `2 d6 _Acquisition ) i2 ]3 q9 M }; I/ U7 h1 C% N! j( mExecutive 6 D+ }. o: a u$ KA single official within a DoD Component who is responsible for all acquisition + _* E) i. J+ X+ f7 Y4 ]& Tfunctions within that Component. This includes Service Acquisition Executives9 n h+ a s9 ^ for the Military Departments and Acquisition Executives in other DoD" `6 j3 b0 [4 T8 a5 G0 O Components who have acquisition management responsibilities.+ k+ v- F6 n: Y/ p& u DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,3 C# {0 X9 A) ~; I Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the$ M6 `8 A3 P3 w6 G. l. T Defense Agencies; and DoD Field Activities. 5 ] s2 k' n* P' f5 _4 U2 jDoDD DoD Directive.# L: F9 x$ l1 u; s. V DoD Directive7 d* ?+ T! H5 n) G7 g0 p% G 5000.10 `* I- i, Q" i( u) G2 J* ~. S “Defense Acquisition.” The principal DoD directive on acquisition. It establishes ; Z/ x3 T: R# n- r3 O; O) E4 X: x& Ipolicies, practices and procedures of governing the acquisition of defense0 A( L* w& `1 ^! |8 n1 c4 _5 S acquisition programs./ \. U: T- D+ U. k' _2 f DoDI DoD Instruction., b+ L6 K; v; m2 b8 Q" H DoD Instruction ( w& P' |9 Q% H9 r/ f3 a" g% N; p3 U+ B5000.2 ! v2 a: f: {+ k& [7 \“Defense Acquisition Management Policies and Procedures.” Implements DODD! Z: X$ V' n0 y1 S 5000.1. - h9 _. V T: r5 wDoDIIS DoD Intelligence Information System. 7 c9 v8 p% i7 U1 j: oDoDISS DoD Index of Specifications and Standards. " F1 C" b1 F( gDoD-M DoD Manual.1 n8 i, Y! P$ H" F MDA GLOSSARY, VER. 4.0 D + M9 B2 b \, j0 J83 / i; |% A) K2 [" m# FDoDR Department of Defense Regulation. " q5 N: b! d; Q3 uDOD-STD Department of Defense Standard.7 Y5 p) ~2 M) e DoE Department of Energy.4 Z: g& m" a2 H* [ DOF Degrees of Freedom./ Q, m/ Z' \- z2 Q8 V Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system, C6 P8 C( i8 {3 t( K: V having a detection range of approximately 3000 km. It is believed to provide 1 F& _! ~# m. }" [battle management for the totality of Moscow defenses.% A* u" w" d! U: h! F# g. k: h DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).9 Z2 A3 n3 B* y! m* C; w! \ DOPAA Description of Proposed Actions and Alternative (environmental term). " Z, X9 V/ M: @/ ?7 M/ e" XDoppler Effect The phenomenon evidenced by the change in the observed frequency of a) {1 M! t( [" e) R+ l4 p6 t! ` sound or radio wave caused by a time rate of change in the effective length of # m9 i/ M5 ?/ v! C& a5 [0 N( I# Othe path of travel between the source and the point of observation.9 ?- g" L) ~6 B8 g DoS Department of State (US)./ D/ J; f! Y ^: Q( r$ q" k( L DOS Disk Operating System (TelComm/Computer term).0 |5 k" _2 Z" ]+ J8 D DoT Department of Transportation [US]. 1 {- E$ f7 ]# |& b- o# |DOT Designated Optical Tracker. - N/ S; d1 ~2 ^* i7 K0 D& CDOT&E Director, Operational Test & Evaluation./ x6 G. z# } i, X% | DOTH Defense of the Homeland.: V/ U* o: |1 ?* k$ i6 g Down Select To reduce the number of contractors working on a program by eliminating one or 5 _* e; s E- m4 x2 zmore for the next phase. * p' W$ B( j8 N% V) {DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. " D# a. U2 V; E: r* XDPA Defense Production Act. : l, }( D. m' XDPA&E Director, Program Analysis and Evaluation. 5 b- V( |3 n$ B. o$ [DPAS Defense Priority and Allocation System. * x: ?; q ~$ _7 e( ]* A0 z3 qDPAT Dynamic Program Analysis Tool. % R8 R8 ?" s& F5 tDPB Defense Policy Board.% Z/ T: B( t+ U3 U% U DPG Defense Planning Guidance. 2 m# O9 `' P" e( U4 uDPM Deputy Program Manager.0 D. g4 K8 @$ N9 j& |5 Y; o DPML Deputy Program Manager for Logistics. X7 n0 @: Z5 `0 N+ R/ F DPP Distributed and Parallel Processing (Computer term)./ k7 q& m+ J- k DPR Defense Performance Review. 4 C- Q: l, h+ Q: F3 h: X; X+ o6 LMDA GLOSSARY, VER. 4.0 D7 y! z1 k0 ^- Q9 X1 L7 f$ y" A' j1 ] 849 x9 T- }, `1 I- }. J DPRB See Defense Planning and Resources Board.! C$ c% D' b5 y& L* G0 h% h) ?2 Y b7 { DPRK Democratic People’s Republic of Korea (North Korea). h0 a v3 W/ Q: b* ~DPRO Defense Plant Representatives Office.9 a! q( V' H, l5 ]" {" y8 `* q& Z DPSSL Diode-Pumped Solid State Laser.) d2 L/ \% b" D* ] DR Deployment Review.1 B" O6 H+ D6 B DRAM Dynamic Random Access Memory. + J$ x, y: Y* e" v! ^6 P0 [# \Draw-down Curve A method used to encapsulate the overall performance of a BMD system that! o, `/ t! w: O) m o/ t$ K7 E& g8 L plots the probability of survival on the vertical axis versus the number of attacking ( I3 {0 k$ i: f& W; V! K$ y+ ^+ x2 z2 CRVs on the horizontal axis. Used in conjunction with attack price, they are the F6 c. J$ s" V" ]0 w; l* } most important expressions of a BMD capability.3 b7 ^# h) J1 o$ V+ k5 |2 w DRB Defense Resources Board. ! O, N2 \8 o/ I/ V- I8 @# C- g, B) i$ ADREN Defense Research and Engineering Network. & [7 a! a) D" {! iDRFP Draft Request for Proposal. 6 \& H8 w2 {2 b; x1 EDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from ; @1 l( W' d$ W& o3 K* Y9 G6 U- Lgravitational and atmospherically induced torques on the spinning projectile. * Z5 l" g" d2 `# m0 N+ }% XDRM DAB Readiness Meeting (DD 5000.2 term).8 l. Y& V: |* @! l5 p7 \' j Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also- V) x7 E" {/ j5 K! _- S- z Remotely Piloted Vehicle. 7 j7 d) X7 O' V% c6 [( s$ PDRP (1) Deployment Readiness Plan (US Army term). $ q1 b& @* ^ ^6 ?# j(2) Deployment Readiness Program. , X1 h2 S# l' \) u0 ^, ADRR Digital Receiver Replacement (USN term)., ? D! n% X/ E' J* w% o DS Deep Space. 3 X. L. X- E6 q" L' Y: K# h' J$ c2 a ZDS-1 Category of telecommunications circuit capability.0 e, [+ X' v2 R" I b: A DS-3 LAN Category of telecommunications circuit for a Local Area Network. * f# j- G3 H; v% K. F; o' G" [' D# ]DSAA Defense Security Assistance Agency (OSD). " u+ K! z2 n2 i R& kDSAT Defense Satellite Weapon. * I" L+ s/ K' e2 S$ O; B( pDSB Defense Science Board.( [5 i+ z& i' A( t$ W9 ^- B- I DSCS Defense Satellite Communications Systems. 9 h7 J+ S0 R& ^! y2 LDSCS-3 Defense Satellite Communications System Three. X+ ?& k% J2 H$ a% P% v) n: { DSCSOC Defense Satellite Communications System Ops Center.1 w5 ]" q C1 w8 ?8 d0 g DSI Defense Simulation Internet 9 L) K+ e' A0 vMDA GLOSSARY, VER. 4.0 D + M5 t( v7 @/ W85- g5 e1 s9 r# C2 R DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 6 N7 z9 x! `, ~& g! o( q: vSystem. 7 M- k& t# e! [0 e1 ^/ |& fDSM Decision Support Matrix2 V9 { V( o8 y, Z DSMAC Digital Scene-Matching Area Correlation. ) a H. t4 M% q. T6 L' L) DDSMC Defense Systems Management College.5 i$ H; t* o: D/ b3 w# U DSN (1) Defense Switched Network (formerly AUTOVON).: x) v7 ^% Z5 H (2) Deep Space Network (NASA term). l2 x0 F1 k/ u# ODSP (1) Defense Support Program. (2) Defense Standardization Program. + ]3 f* C1 A4 z' h7 CDSPRTM Defense Support Program Real-Time Model.8 `( e0 y2 t+ T8 _: i! `" e DSR Data Set Ready (TelComm/Computer term). ) Y1 T+ { m& i+ m9 W- v, cDSRCE Down Scooped Radio Control Equipment (TelComms term). * H( z/ O2 b1 S8 wDSS (1) Defense Supply Service. (2) Digital Signature Standard. . w% A3 q( ?! a2 }DST Defense Suppression Threat. % Y+ `8 R. |5 v+ q; z0 BDSTAR Defense Strategic and Tactical Array Reproducibility. ' k* G7 U6 u, C+ H6 k; tDSTO Defence Science Technology Organization (Australia). ' g3 \3 N. [! G' ODSU Digital Service Unit (Telecomm/Computer term).; x0 s) u. g7 s. L0 | DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to# S @' P k/ P5 _ the DNA.; @1 ]6 h" Y( V5 ]2 O DT (1) Discrimination Technique. 0 x" n: K3 \; c(2) Development Testing. ' }# ]) J- b. B) r# O/ k: c$ @(3) See Development Test I, II, III.* q5 `% l z1 d# q% s: M7 \ (4) Down Time (ILS term). 4 K0 Y( @0 ?1 b- d) c4 _(5) Depressed Trajectory.* _: Y. X! R2 s' K (6) Dedicated Target. " o4 O7 ?7 ^7 y& @1 |* Z* GDT&E Development Test and Evaluation. ' h3 G# v# @5 J" H/ t3 ^DT/OA Development Test/Operational Assessment.2 R: D+ q/ S( S3 s DT/OT Developmental Test/Operational Test.! y, M. G% Z# |& { k* s DTAP Defense Technology Area Plan. * I% S2 B# J+ d& K }$ O, n. ?4 @DTC Design-to-Cost.$ A+ E% ~/ u6 e9 b& d4 X) O DTD Digital Transfer Device (TelComm/Computer term). 2 C' k# \! ~* H8 g M" VDTE Data Terminal Equipment (TelComm/Computer term). ( Q5 n: z( {9 K+ }DTED Digital Terrain Elevation Data. 7 g& M9 j+ o: b ?, q2 Q3 T' W. E1 EDTIC Defense Technical Information Center, Alexandria, VA. ) c. o/ t' Y) w; Z9 e fMDA GLOSSARY, VER. 4.0 D) E2 ~0 M/ r8 P( E$ B0 I7 N 86 - t6 W3 g; u9 u- ]3 SDTIS Defense Technical Information Services (now DEIS)." s5 a9 H* S2 [5 M DTLCC Design to Life-Cycle Cost.% z2 ]! y& Q D DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL* ^+ g$ a7 Z0 ^+ D3 c* j- s term).6 L. H8 A0 Y4 K/ h- e8 y- ^: c DTLS Descriptive Top-Level Specification. # j W, O+ O' [. ^6 |DTMF Data Tone Multiple Frequency (TelComm/Computer term).: ^ D/ x# K; A DTO Defense Technology Objectives. 1 j- Q' B( j+ e# u, W! ^DTOC Division Tactical Operations Center. ; @7 z. z7 |: \3 q4 DDTR (1) Demonstration Test Round. (2) Development Test Round." v+ j6 j l' X1 t& o& M' x- l DTRM Dual Thrust Rocket Motor. ( j7 w, O. H( oDTSA Defense Technology Security Administration. r$ j: Z% [- H# R, U) V9 c; pDTSE&E Director, Test Systems Engineering and Evaluation. , T$ c$ X# a G+ M0 lDTST Defensive Technologies Study Team. ( ~6 T, r' b" vDTT Design-To Threat' G( Y8 U$ K! v4 i" f! c DTWT Dual Traveling Wave Tube (Electronics Engineering term). 9 n$ q d3 Z2 ~9 }DU Depleted Uranium.8 r- X6 W7 `) [ DUA Design Upgrade Assessment.! o- K# u& J" u. X# Q Dual Source Two contractors producing the same components or end items for the same- ?' a, E* N" A% i1 H5 ^ program. ' C" V. t3 o9 w- H. Z* xDUNDEE Down Under Early Warning Experiment (MDA/DSTO term).6 o$ L; M0 V6 O: b- [ DURIP Defense University Research Instrumentation Program.) \( A, [- P; H* T/ L DUSD Deputy Under Secretary of Defense.; G* D1 t9 v$ ^/ E2 p% m DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). 3 [. e& R g3 s5 c5 h, I2 Z8 EDVAL Demonstration Validation. & f/ L9 D- K0 F" C! mDX The highest rating under the DPAS. It takes preference over all other rated and 6 c8 P. H: A, _1 P% Nnot rated orders on a contractor’s production line. The BMD program carries a; V7 q2 b9 R* ]7 b! h6 b “DX” rating.6 K Z* U" f9 w2 o MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
878 E5 c0 G7 U0 u. a9 _ E East 6 U% j y- I, k' |/ PE2 I See Endo-Exoatmospheric Interceptor. 7 O+ \/ W# T. C$ eE2SRD Effectively Two-System Requirement Document.! G( x6 L( Y0 ^: v5 [) j; e E3 (1) Electromagnetic Environmental Effects.. k% M( O- s& J5 I& I- d" N (2) Electrical, Electronic, and Electromechanical. ' L+ y G: Q% r; @* ~E Spec Materiel Specification.' u6 w8 C/ m! ?9 ?3 g EA (1) Environmental Assessment.1 |) z9 P5 M2 t8 k3 O9 s+ X! L (2) Engagement Authorization.) y! Q+ a s7 s" T+ n# H! x2 y (3) Executing Agent." V# J( Y7 P' ?. ~% c7 Z7 c (4) Evolutionary Acquisition. 6 y" I! Z( A) ]" m4 N; E: @1 @9 K(5) Environmental Analysis (environmental term). : ]3 L6 n3 j, ^" V(6) Executive Agent.0 l! d1 R" ?; j+ r EAC Estimated Cost at Completion. 2 q% D0 U* N i0 k. tEAD (1) Engineering Analysis and Design. (2) Extended air defense.8 b0 o/ o! j- y% [* r @ EAD/D Engineering, Analysis, Design and Development.0 Y7 a. @! g1 A8 N' } EADSIM Extended Air Defense Simulation.0 c) F, x! B' }& u: e( [( U EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing ' O, D* _7 Q* m: d1 qusers to model military response to airborne and ballistic missile threats. - ?; c8 D4 `, }4 S7 N! v# LEADTBP Extended Air Defense Test Bed Program. ; ^: ]/ F: [6 j$ aEAGLE Extended Airborne Global Launch Evaluator.0 S0 k5 }; U: v9 X! ? EAM Emergency Action Message." _+ @; F' s7 H/ M1 }; t' ~: T" _ EAR Export Administration Regulations.8 t0 p/ L: Q9 z1 R2 u: J. g Early Operational : ^8 G) U1 U. `- _$ M7 D7 oAssessment 1 X: Y% {6 u; V& E2 `An operational assessment conducted prior to, or in support of, Milestone II.9 ?' z4 Z% g1 b) u" ?, k3 n( F Early User Test2 h+ ~- S$ c7 ?2 c6 l+ z (EUT)' i4 z' b8 d1 B( e- V/ D A test employing representative users to examine materiel concepts, training or1 R3 y' ^5 y7 Y2 y/ T4 u logistics planning, or inter-operability issues. EUT can be accomplished during # P- ^2 m. P+ @" w6 i5 [DEM/VAL on brassboard configurations, experimental prototypes, or surrogates, s1 S$ s3 U, d5 c to provide data leading to the decision to enter full-scale development. n$ c' \4 \( A, n3 w( X7 Q$ TEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of % N" Y! D7 C. ]surveillance satellites and long range radar. , |2 G) N2 x* }1 Z(2) Early notification of the launch or approach of unknown weapons or) U; E/ K3 ]* \* O7 A9 W) t weapon carriers.; g: C; A" S" L! M3 k0 | Earth Limb The apparent outer edge of the earth as viewed from space. : I* U* w. N7 u1 S% tEastern Test , k5 Y; |: n% i2 m* e! E5 qRange (ETR)- ?) d4 H, T+ m9 K9 B8 z& i# A Beginning at Patrick AFB, FL, this range stretches halfway around the globe : b9 J& |! ~. ]where it meets the Western Test Range. An array of launch complexes, sensors,# N4 _5 U, u2 O: R* G6 V# _ and tracking sites make up the Eastern Test Range. The ETR is now operated ; {4 Q$ Q' q: G3 P' H1 |, eby AFSPACECOM as shown in WTR definition., p2 C& F, v. l9 d& i( V! q MDA GLOSSARY, VER. 4.0 E# b: r1 n' L/ L% {0 p3 ` 88 ( b& ~2 d5 W4 OEB (1) Electron Beam. (2) Enhanced Blast. 3 l! {0 z6 B6 _$ j( o9 kEBB Electronic Bulletin Board. 6 j4 A# g$ L8 J. M* o( y7 E! hEBCDIC Extended Binary Code Decimal Interchange Code. L9 p1 Z7 r! D. t) p; A4 ^EBW Electron Beam Welding.) G6 k% R8 E3 A4 t8 y EC (1) Electronic Combat. + [# _* v+ [7 y3 ^2 G5 {% @(2) Error Control. . i9 y# _9 @) C( V(3) OBSOLETE. European Community. Now known as the European Union 9 N/ r# s9 s+ J/ D5 g2 a- J; X& ~9 M# ](EU). . X, f/ s2 I7 R* Q! f1 L2 J; EEC/EDI Electronic Commerce/Electronic Data Interchange . Z5 e- m0 T7 ]1 O8 vECAC Electromagnetic Compatibility Analysis Center.4 E5 [$ R& E5 r% A ECB Engineering Change Board. / d+ i5 d9 {/ c" s: I& d+ u {ECC (1) Equipment Control Center. (2) Element Control Center (USAF term).8 c( g3 l) w$ j1 p; F ECCM Electronic Counter-Countermeasures. 5 ^ a, O/ Q9 \ECDs Element Control Directives.2 r2 a, D0 i; a% t. P. T* v5 Z: g ECLS ERINT Command and Launch System. 5 X Y4 C4 s% m) kECM Electronic Countermeasures. 8 _7 x1 L2 A4 w6 o* O/ pECN Engineering Change Notice. 9 A ^2 S3 n) H! OECO Engagement Control Orders. " a, r/ G i h7 e: YECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.* ^! s; [/ j, F( A* Q$ ?* w& G6 ` ECPMO Electronic Commerce Program Management Office. , {5 D% U+ k1 r* p9 w2 V8 HECS Engagement Control Station (PATRIOT).+ ?8 R) f5 z. ` p6 P- ?4 B4 p ECU Environmental Control Unit.+ h- j. M% i Z/ F3 k EDAC Error Detection and Correction $ c3 c8 i% Q: ]EDGES Electronic Data/Guidelines for Element Survivability. 6 [& V# A% P; g4 pEDL Electrical Discharge Laser, Y" R6 }& @: B- `* F EDM Engineering Development Model. 3 x. @& d: P* Q: g, jEDP Engineering Development Process" F6 N" R* o+ ?1 x, | EDR Embedded Data Recorder (PATRIOT). 7 c1 D- f/ U- A' E3 EEDS Electronic Data Systems Corporation0 S, o1 z: u! C( a' @+ B; M EDWA Engagement Determination and Weapons Assignment (PATRIOT).. E" D1 q0 c% r2 H7 S+ g; [ MDA GLOSSARY, VER. 4.0 E( }" a( W2 t1 `4 M+ ~ 89 , k6 `2 U q9 ?7 b" h( ^ f3 eEDX Exoatmospheric Discrimination Experiment9 a- z! b2 v8 o* ~) m4 T+ P EE (1) Electrical Engineering. (2) Engineering Estimate. & q6 I) n, B: h+ kEED Electro-Explosive Device.$ d( E1 o: W% a8 ]7 N7 _: Z EEEV End-to-End Experimental Version.8 a: l7 e- c( ?8 f! g" ?2 D+ U& o3 v EEFI Essential Elements of Friendly Information.: L* Q ?$ } e0 a8 n/ {; u EEI Essential Elements of Information.; R/ E+ N. G: ~( S7 i7 \3 u EEIC Element of Expense Investment Code. 8 O: p( I3 u; `4 b3 y0 V" D; ?EELV Evolved Expendable Launch Vehicle (USAF term)) { ?0 t+ W0 P0 C5 H1 m4 Q EEU Electronic Equipment Unit. $ m' ?, r8 a; ^- j5 TEFEX Endo-Aeromechanics Flight Experiment.& v+ p& r) r3 a. h2 W" j1 s9 n! L EFF Electronic Frontier Foundation. % J/ C" n) N$ q. } s5 wEffectivity A designation given to the BMDS configuration and demonstrated capability at . }% k. z& E5 [8 d" ha point in time, becoming effective at each increment when an element or1 d0 L7 Y5 F! S9 k1 N component is inserted into a particular Block., c; F: A, ^* I% X" e! b Effective Damage That damage necessary to render a target element inoperative, unserviceable,* Y' X# D# Z/ `/ n nonproductive, or uninhabitable.' t. c8 k' r' ? X Effluent Plume The pathway of movement of effluents through surface water or air. # ?5 a- U% _5 ?+ c1 g( x8 ]EFP Explosively Formed Projectile.! R- ]! ^6 D4 X* |/ G& i$ b3 n2 Y EGP End Game Processor.7 K2 Y! X; H% F; e; N EGTR Eglin [AFB] Gulf Test Range. # n" e! k9 S' ]1 j" g4 b( PEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). " c1 w2 I6 { R6 mEHF Extremely High Frequency.& q7 N2 a/ ]6 O# G ehp Equivalent Horsepower.5 U2 E$ f, E- e; D; j* u EIA (1) Environmental Impact Assessment.+ z8 ~# {9 y8 |) o (2) Electronic Industries Association. & E5 V0 n4 H" Q4 kEIAP Environmental Impact Analysis Process. " G6 P3 P2 t7 A; XEIP Exoatmospheric Interceptor Propulsion. 0 u# m$ U3 Z, u$ Z. bEIPC Electronic Information Privacy Center. 0 j; g; k' F/ H! MEIPT (1) Element IPT. (2) Engineering IPT. / s! Z6 ]+ p3 N9 H' LEIS (1) Environmental Impact Statement. (2) Explosive Initiation System. / q" u# A2 G0 gEISA Extended Industry Standard Architecture (Telecomm/Computer term).& I f" C6 c$ {, [ MDA GLOSSARY, VER. 4.0 E 1 g6 |* s# `) a90$ Z r( ~3 w$ X/ M0 } EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.0 ^9 }% W! E3 {8 b" C G2 N Elastic Range The stress range in which a material will recover its original form when the force! ]5 y) \# I8 `9 b& r" o0 i (or loading) is removed. Elastic deformation refers to dimensional changes : f8 t' b; W- s8 o0 r/ moccurring within the elastic range.& O) ]. Y4 k9 W2 y3 J Electro-Optics/ A' c( i" D' R3 O9 n/ N Infrared (EO/IR)8 a* `( j: |* E ^( _ Technologies/techniques employed by optical sensors in the wavelength" ?$ \9 H3 a% d& [ T spectrum slightly longer than visible but shorter than radio. ) L4 v8 J/ L/ k: [8 rElectromagnetic ; C5 w Y7 G: PCompatibility9 u: A6 c" P" Z7 J& P, U3 ~" V M (EMC)! d0 n8 p$ T! I% c8 w7 N6 \0 @( l: i A condition when all electromagnetic emissions from electronic, electro-magnetic,0 d9 W1 r4 d5 m$ i and electro-optical components of a system interact without interfering with one + ?3 w, l7 \& w) U+ Kanother. " c- |1 Z7 S4 E7 A1 QElectromagnetic : H4 P6 Z. O, U) b" I2 eEmanations 3 c+ E: l( x# R5 A, r6 tSignals transmitted as radiation through the air, through a vacuum, or through 9 @- ~6 K* J- k$ t. Oconductors.0 y8 [, Y8 i$ R: o a Electromagnetic4 e% T9 V9 G" R3 \: c Field (EMF), [) J: U+ z/ H5 X8 n0 J/ R. w An electric or magnetic field or combination of the two, as in an electromagnetic . R+ H& q0 M) A0 G5 J! Qwave. Created by electric charges in motion, having both electric and magnetic: a0 k4 o# e: ]% b components oriented at right angles to one another and containing a definite; c* \# ~* U/ ?( m. C amount of energy. " K) K* e8 w+ ]1 l) pElectromagnetic- S0 U+ t5 c" R' H: m* O+ j Gun (EMG) $ o2 G' `" G' _, o1 OA gun in which the projectile is accelerated by electromagnetic forces rather than- d9 t6 H& ]+ F6 s/ B" \ by an explosion, as in a conventional gun. 0 x: S& T1 b' d0 B3 S# U& P7 iElectromagnetic 2 x+ G& J7 s4 g: Y+ F0 RInterference (EMI)) y: j! z/ p- j Any electromagnetic disturbance that interrupts, obstructs, or otherwise ( I0 |9 L& s( C3 w# ^4 |degrades or limits the effective performance of electronics/electrical equipment.. j: y7 k2 _( l5 e$ ]6 J8 M It can be induced intentionally, as in some forms of electronic warfare, or0 L5 b6 T5 a; l6 T+ B+ L unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. s7 q4 b7 `, Q0 ~% `# K6 ? Electromagnetic ' C" Y) F% M, Z" B1 f9 L: i( x8 T- |Pulse (EMP)& U% |5 A# N6 k4 M2 T J The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of9 g& S. M0 C! ~- i the nuclear device or in a surrounding medium. The resulting electric and3 H6 b4 _: P5 J4 i: Z* O, `& p/ Q' Q magnetic fields may couple with electrical/electronic systems to produce + ] m4 L2 s# ~" Sdamaging current and voltage surges. May also be caused by non-nuclear 0 s2 r8 }1 m1 n" {% Mmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic# J) \: y9 {4 K' c7 F' K Radiation (EMR)7 Q: ^! D! v2 o- k (1) A form of propagated energy, arising from electric charges in motion that + K# k# ^! j1 v6 b3 Nproduces a simultaneous wavelike variation of electric and magnetic 2 u0 }, V3 _& @4 q8 a" f3 n j! jfields in space. The highest frequencies (or shortest wavelengths) of : {+ d" Q( B# L% _, q' D" usuch radiation are possessed by gamma rays, which originate from : O7 ]( b7 p1 ]8 Jprocesses within atomic nuclei. As one goes to lower frequencies, the- i, I! I9 i* _9 Q0 n0 l/ Z3 R N electromagnetic spectrum includes x-rays, ultraviolet light, visible light, ( K# F) `+ L4 G* W, q" H8 J- dinfrared light, microwaves, and radio waves.5 `, L2 L: ]0 i (2) Radiation made up of oscillating electric and magnetic fields and T( B) x6 [6 Y: x! k7 fpropagated with the speed of light. Includes gamma radiation, X-rays, A" g: H- _- P B5 j ultraviolet, visible, and infrared radiation, and radar and radio waves. % W0 \# a9 c5 m4 r$ U, r' Q- ^Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices 7 O, Z$ F% O( {used in system/subsystem design, excluding employment in the RF spectrum.. H: V8 n- A# \. m0 G: V+ D8 V& G Electromagnetic8 Q/ Z- H4 q9 w( d, d3 Z Spectrum! H' v4 |1 Z- q' C' c8 o$ v. r The range of frequencies of electromagnetic radiation from zero to infinity. It is* }$ A( [9 @# c3 u* g! u$ B" L divided into 26 alphabetically designated bands.% i. A1 q$ \! c8 W MDA GLOSSARY, VER. 4.0 E 0 ]; A2 y9 I7 L) g91 / \9 x' w" ^. y. n6 d& d; @Electronic- Q& N% U/ ^9 `" q- V# P Counter-$ Q7 h9 Q- r4 g: N Countermeasure & y3 ^$ d5 i: m) S( o( r! as (ECCM) 0 N5 M/ H4 ?# I7 Q; \That division of electronic warfare involving actions taken to insure friendly6 X" L! {3 @) ^: ] M2 ?* D effective use of the electromagnetic, optical, and acoustic spectra despite the/ k$ T4 E2 f2 J enemy’s use of electronic warfare to include high power microwave techniques.8 ~' K/ w- v) s Electronic# V! e$ _7 A4 ]& T Countermeasure 4 P. { q# ?4 \$ o9 b- m(ECM)! Q- \: R/ B; C# c2 q- ^: | That division of electronic warfare involving actions taken to prevent or reduce an. C/ W! ^& n5 V enemy’s effective use of the electromagnetic spectrum.& ]/ M# c8 ~4 d* u4 W% |! W# _# p, T Electronic$ r/ ^4 y6 _9 e+ I0 U8 v. \ Industries) T9 a, q8 z4 x* s! p7 G- P* n3 U Association (EIA) ) A2 L; u6 k" f4 hA standards organization specializing in the electrical and functional& S i) f! `" \# `$ q7 d' } characteristics of interface equipment.. {) c6 ^- i; h F3 Q8 Q Electronic 6 S. d2 T$ z- I+ w3 w1 e4 KWarfare (EW)( O! b: U' @ C) F; F# j Any military activity involving the use of electromagnetic and directed energy to . `4 ]0 Q* o" D/ l. K. ^control the electromagnetic spectrum or to attack the enemy. The three major& X9 J; x' ~# W* U5 _" U, X' K subdivisions are: + `. C J* [5 q4 e•Electronic attack – Involves the use of electromagnetic or directed energy to' Y0 K( r; k% }, m3 V attack personnel, facilities, or equipment with the intent of degrading,* X6 P' s2 w- I8 Q7 h J neutralizing, or destroying enemy combat capability. Also known as EA. $ C, a+ ~: T! N' TIncludes: 1) actions taken to prevent or reduce an enemy’s effective use of- F5 C$ M, @3 L the electromagnetic spectrum, such as jamming and electromagnetic + o. t Y# {! J' M. ydeception, and 2) employment of weapons that use either electromagnetic or 7 } H t2 R& \directed energy as their primary destructive mechanism (lasers, radio 4 p% H6 o. I3 p9 e# n/ v0 k- Cfrequency weapons, particle beams). 2 H* s: d) \( o* v+ ~/ u! K•Electronic protection -- Involves actions taken to protect personnel, facilities, U* N" z& Q7 D2 ~and equipment from any effects of friendly or enemy employment of. P; ?' ^$ y; K8 K( c; X2 a electronic warfare that degrade, neutralize, or destroy friendly combat . h z9 _' i& F1 {, }( `& A1 U7 [capability. Also called EP., D9 t1 X8 Z) T3 g& e2 K •Electronic warfare support – Involves actions tasked by, or under direct . v4 ^: j4 }8 K9 n ^0 ]% q; lcontrol of, an operational commander to search for, intercept, identify, and, _# s9 `- C6 ?9 N( V locate sources of intentional and unintentional radiated electromagnetic) \/ j. O0 k2 D8 x3 S z energy for the purpose of immediate threat recognition. Thus, electronic8 u2 n4 r9 w9 r1 a7 ^ warfare support provides information required for immediate decisions % G) s2 @4 z4 R" O6 @# G% Ainvolving electronic warfare operations and other tactical actions such as4 a; [, N2 u% g threat avoidance, targeting, and homing. Also called ES. 8 w; E" m) c! m8 E/ v7 OElectronic & z, L0 R/ c5 `& _7 qWarfare (EW)1 J( K& J3 {7 i3 @5 u4 w Environments3 _: M4 x: q) ? Electronic warfare environments result from radar and communications jamming / ^+ c6 F5 v0 @$ e0 s' kand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD , g% |, s X8 J: `/ _system." Q8 H' j8 F C9 P F Electronics- Q7 r6 S, X4 x! f# d w2 N9 l Intelligence- a Y9 f8 N5 R8 |' x (ELINT) ) P. Z0 N8 Z2 c) @- W! d1 ATechnical and geo-location intelligence derived from foreign non-communications( ]* v v" s o! K* `& p9 u electromagnetic radiations emanating from other than nuclear detonations or# o7 O6 @ {9 ]5 k; l radioactive sources. 3 j) l0 L9 [2 K7 yElectronics & J: v0 ^* ]+ G/ W; i1 J% k9 @5 ASecurity (ELSEC)# R( l7 c. Y' r# f# {. H8 O' I The protection resulting from all measures designed to deny unauthorized O! D8 A* v4 h0 a9 Y" S: h# hpersons information of value that might be derived from their interception and 7 K a7 ~. V' x. }/ j/ v" @study of non-communications electromagnetic radiations, e.g. radar.) w) G- w9 l/ w8 z+ M Electro-Optics) {8 L. W/ E" `/ v! _7 v1 m5 D1 U Infrared (EO/IR) + D- B% ~ }) h: gTechnologies/techniques employed by optical sensors in the wavelength; N. k# q# i; } spectrum slightly longer than visible but shorter than radio.0 f3 n) B0 ^7 ^8 y1 O2 @- K7 T MDA GLOSSARY, VER. 4.0 E " W- F+ a# u" g7 a5 B' U" Q' N92 - G" i6 g7 r6 r9 AElement A complete, integrated set of components capable of autonomously providing / q9 Y2 z5 G# ?' R7 BBMDS capability.# A; Z7 U3 t( v Element : r/ ~# |5 U1 ^& KCapability7 H" D* g m: v8 R Specification: V% A) M6 q# x7 D (ECS)' ?0 c. o, ^' h8 ^/ V) ]9 ?6 C A document that identifies the element-level BMDS capabilities and 7 }+ I, ^" o) \7 ]specifications necessary to achieve the system capabilities identified in the SCS., C) G8 V: x8 l& N: U; W The ECS further defines the SCS-apportioned mission/technical performance - z! ^& s* N3 T& ^1 ~- X+ G# fcapabilities and allocates these capabilities to the element’s components. - J- x5 m6 {; @0 y1 o( _& \/ |: nElement Control2 X8 h" U6 i4 b& c) m i Directives (ECDs)- t, {2 D9 k+ Y9 z The command and control data instructions to control the conduct of the % Q# S4 F% }( Qengagement. ECDs are developed by command and control software based+ p+ ]- J5 M# n7 J7 X! G upon variable parameter input by the operators (both pre-planned and real time), * p, H% f4 b# K) z9 r/ S4 Yand operator defined rule sets embedded in the software. The individual battle ' _3 J' ~$ f5 g5 k) S3 T+ Dmanagement processors use these instructions to accomplish the assigned tasks + p( I1 z( ~; @+ ~from the operations order. ECDs are contained within a Task and represent the 9 X/ {0 L, ~4 n8 K- N+ wform of parameter values that influence the resource management processes of 1 K3 V3 V" \% N$ Z: PWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and ! t6 W* e/ V/ S# [+ [# XCommunications Management (CM). There will be numerous ECDs per Task. 4 |# ^5 B6 z9 \Element( I- J, _0 b! c4 |! @8 H Operations $ h" f& D! z0 HCenter (EOC) 0 p6 \( `1 ], R- Q1 I( ~$ y" J, DAn Air Force operations center, which operates and maintains a BMD weapon or0 t2 {- _! R0 ~: O: L, ^6 l sensor suite. (USSPACECOM) 6 y7 q$ w! j% H" e: u1 rELF Extremely Low Frequency." E3 \2 i, Z. {0 w* A& w7 w+ f ELIAS Earth Limb Infrared Atomic Structure.* S% E% v0 O8 \! x( m3 R ELINFOSEC Electronic Information Security.3 H8 a! V$ k" }2 X$ m ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-4-26 12:17 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部