航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation9 X* T+ M/ O$ ?9 j' ~5 g COMSEC Communications Security. ) b1 P( G. x7 T) S" G; }Concept + B0 j7 V- V4 g# p+ Z% i) q4 DExploration &6 `1 L$ Y" S* |1 b Definition 0 g1 g' d# ^( ^* N* E" i! Z0 }2 TThe initial phase (Phase 0) of the system acquisition process, beginning at% H3 K r% g; k* H Mission Need Determination. During this phase, the acquisition strategy is * e' c3 H2 `* L+ d4 T0 Udeveloped, system alternatives are proposed and examined, and the system' f" V- C8 B3 o$ B& { program requirements document is expanded to support subsequent phases.: d" I0 {9 C: d: q; U; ?/ y Concept of' c& g4 L2 U! N, L# Z Operations H- M- l8 W1 z4 k: ~(CONOPS) # c# x" b8 h4 s$ {" y" X2 \(1) A statement, in broad outline, of a commander’s outline or intent in regard to & l0 k1 o( A6 j2 c0 `0 `" Q# aan operation or series of operations. The concept is designed to give an overall 0 \) O- x; Z2 b( \: x% c. ?picture of the operation. (MDA Lexicon)# u. a6 `/ z6 U5 j6 w3 g5 i (2) A verbal or graphic statement, in broad outline, of a commander’s6 m" F* y8 Y, o: [ assumptions or intent in regard to an operation or series of operations. The 4 R. e! P/ q- F$ b' X& b1 X4 c$ iconcept of operations frequently is embodied in campaign plans and operation" g% f/ e" [' K' \3 b plans; in the later case, particularly when the plans cover a series of connected- M4 c0 s' g, ` G3 _7 M1 { operations to be carried out simultaneously or in succession. The concept is; F3 m! n. n! a$ \* D designed to give an overall picture of the operation. It is included primarily for 7 u" D6 K! X5 `1 Dadditional clarity of purpose.: T' m3 W$ Q- y3 ]( n) ]6 v1 j. ~ Concept Plan An operation plan in concept format. Also called CONPLAN. b) z) F+ W! i3 V Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of* E( K, ~% s F4 A the acquisition process, or combines development T&E with operational T&E. {. |' I4 ~+ Y8 h+ EConcurrent " C8 F& q9 D' X2 g: FEngineering " u2 v) f8 W6 P- VA systematic approach to the integrated, simultaneous design of products and e( P9 {$ g" n% E6 L7 | their related processes, including manufacture and support. This approach is8 [# K5 q) u( T4 K9 E intended to cause developers, from the beginning, to consider all elements of / I: G1 M3 Q0 }% x- A- H% }the system life cycle from requirements development through dispersal, including " K9 k5 L9 x [& Z- F- kcost, schedule, and performance. ) }% X! T4 `8 G0 Y1 XCONEX CONOPS Exerciser. 4 C U+ A# v7 }+ g, t* d7 ?Configuration A collection of an item’s descriptive and governing characteristics, which can be8 F0 ^7 V8 a8 D# L! v8 v# ^1 r9 h' T% g expressed in functional terms (i.e., what performance the item is expected to 5 D* g' f% X- Vachieve); and in physical terms (i.e., what the item should look like and consist of, c+ u6 r, d4 x9 g& y# m when it is built). 1 ~3 f) a' V2 A9 A1 W7 MMDA GLOSSARY, VER. 4.0 C' I* h" X4 T' ~3 j) x 593 j8 _6 `+ a A& S; C Configuration ( f( m5 j* F& Z& }9 B1 gAudit 9 H0 c! M. A( ?# n/ a! G- OOne of the Configuration Management tasks which includes a functional 0 c# @+ i6 a) Uconfiguration audit (FCA) to validate that the development of a configuration item 4 o) x0 j) [% q" h7 p* z8 Lhas been completed satisfactorily and that the configuration item has achieved2 \8 C) t, f3 e to specified performance and functional characteristics, and also includes a $ G6 o; o( N$ ?$ S9 M! @physical configuration audit (PCA) to verify that the configuration item “As Built”( F8 b& Q7 y" d1 Z+ C conforms to the technical documentation which defines the configuration item. + i1 F0 C( `& R. _3 YConfiguration . E" U( ]( p$ g0 i/ DBaseline 8 V) ^; n0 [# K4 ?' [% GThe configuration documentation formally designated by the Government at a - b: {1 {2 B/ I6 i. Qspecific time during a system’s or configuration item’s life cycle. Configuration2 f* E9 k. B9 s( R* L baselines, plus approved changes from those baselines, constitute the current [4 i: c1 O7 \( I/ Z configuration baselines, namely the functional, allocated, and product baselines.- ^: }( o+ ?- V" e) W6 y6 a+ e Configuration& b" ~$ S! q8 r$ \0 W/ e Control! j# r& X6 ?; [8 w" S One of the Configuration Management tasks that involves the systematic ' {/ a" |6 V |& e8 n8 y( revaluation, coordination, approval, or disapproval of proposed changes to the7 M" n4 o9 N/ j: W design and construction of a configuration item whose configuration has been 4 |: M6 }# C9 [7 o j5 {formally approved. n% h* k2 @: K Configuration 7 K) D. V% y c$ z! ], ~; G8 d- sIdentification 4 F) v& O; g5 t t z% w+ ]One of the Configuration Management tasks, which require that for every ! j5 O4 Y9 N8 gchange that is made to an Automated Data processing (ADP) system, the design" I4 c9 N/ p6 k" C1 X. z% ^ and requirements of the changed version of the system should be identified. 3 k' @3 E3 K, K" T# M0 BConfiguration / }/ T) F4 h; C7 D% i6 N9 MItem (CI)6 M+ d) j, q# O: F# ?! l5 b& R An aggregation of system elements that satisfies an end use function and is 3 o$ V: v6 W5 w7 p0 Z! {, @1 sdesignated by the Government for separate configuration management. $ c; \6 _6 d' C5 h9 E$ Q3 u9 ZConfiguration items vary widely in complexity, size, and type. Any item required 1 z4 c: [# w6 E: {% q6 s6 vfor logistic support and designated for separate procurement is a configuration 8 |: z4 U- U2 }8 E4 X9 }7 gitem. Configuration items are traceable to the work breakdown structure (WBS).: h; V" Z4 ^ q [$ a Configuration" G% Q3 a4 J! Z9 H! h, b+ G Management , J7 \+ z) c, X$ v(CM) q% G$ d. x# U5 V In computer modeling and simulation, a discipline applying technical and 2 a. R% K# y2 n* a5 S0 E# N6 Dadministrative oversight and control to identify and document the functional ( I$ G( J' \# X. ]7 {* p4 erequirements and capabilities of a model or simulation and its supporting2 y, r6 h/ B' N7 f+ e0 g databases, control changes to those capabilities, and document and report the , C9 C/ w& B9 ^6 Vchanges. See also Accreditation. " _3 w& _! k$ M) lCONOPS Concept of Operations.1 p+ c# f/ [! w CONPLAN Concept Plan& ?7 G2 H b: I: {& L( G7 k+ @4 ~ CONS Contracting Squadron.8 L O w, C! R' D3 A& f Consolidated 3 C$ F: L0 p3 [2 c0 e& W# CCommand Center 6 h4 B. c# m, M, Q% a) K(CCC) 0 X+ s7 y! G' P+ k) w1 aA single command center from which USCINCSPACE/CINCNORAD can direct all 6 P8 G& J6 g+ u% s# z* n( @2 U8 ]4 Rhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado4 h& n1 y# s5 ^ C& v7 j7 ^ Springs, CO. ) z! J" `* B9 q$ b8 B+ ZConsolidated8 A& P0 m% I- R/ T8 C# h. Q" k, f Intelligence1 B; w* y& a$ W4 p Watch (CIW) ! j5 I5 R; J' |3 j4 QA consolidation of intelligence watch functions within the Intelligence Operations {3 w. i8 R4 ?) _" c# qCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD - ], v% x' G- k6 rAerospace Defense Intelligence Center (ADIC), and the Air Force Space: s3 D7 R0 a" o9 |& ^3 s Command Space Intelligence Element (SIE). 1 V' |5 O1 A% J1 F* Y$ D8 BConsolidated $ A u+ u# U& u _$ |" U5 KSpace1 G7 T# \8 q, @& w. H# s1 z- a8 A Operations 8 \5 b. s& h# d1 bCenter (CSOC) i+ h- x: R! e: M7 Z0 j3 ]0 L/ U F3 eSeries of centers at Falcon AFB, CO, which operationally control and maintain - V% R% \0 h# [/ O8 vassigned DoD satellites.7 O, e6 k7 U1 I% ~1 O! A$ v4 } Consolidated ( I- D. }. y! c, ySpace Test 0 t' D5 e0 Y9 t! ACenter (CSTC)- j# u/ S2 R8 C& n7 t, D Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and ( I1 [5 s) m' F7 b& ~4 Sinitial on-orbit checkout of operational satellites, operate R&D satellites, and ! E% C) k; |0 k/ X! q. z7 O8 _serves as a backup to CSOC for operational DoD satellites./ c7 B- s$ G: A0 g) E; r MDA GLOSSARY, VER. 4.0 C 7 y5 k3 W {& R60 8 E3 S4 M5 Y9 h0 W! I9 h8 Q) W- uConstellation # t9 L4 }2 }. e! \7 KSize (CSIZE) 0 C, o* |: @# dThe number of satellites of a particular system placed in orbit about the earth. 9 T; h( {0 W3 P+ c jContact Fuse Device used to detonate warhead on physical contact with another object. 6 w6 t9 L+ Y% {: l0 xContingency* q& B% y& @, J0 K) X& z: M; L Deployment Plan / @4 f5 a: R3 k7 ^" m) J9 k(CDP)5 {$ o, Y- Z# E+ L$ |% `2 @3 f+ |5 h An executable plan designed to deploy an early missile defense capability and! ]) W' ?1 P0 W" q+ \ reduce deployment time. The plan provides specific executable deployment `, g9 T9 @1 o/ Y! z options and describes activities required before and after a deployment decision. 7 s" _ P. V; W B: K5 K3 MThe plan also allows decision makers to have oversight on technical progress, & V2 D, H U5 P. `. N( G8 E; v4 Tcost, schedule, and risks associated with a deployment system.; D6 a& g" s* O Continuity of ( n- R8 A) ]' J8 nCommand) X- E9 \1 t4 L0 r/ \1 B The degree or state of being continuous in the exercise of the authority vested* \9 I: e$ w* [; M1 B in an individual of the armed forces for the direction, coordination, and control of4 n* C) t# ~6 m$ b. V& j military forces.1 }+ I/ a! v4 i, [: j9 Y! I Continuity of1 `+ y, I. c( e$ l0 l Operations - s! ~9 g: N* X# k- DThe degree or state of being continuous in the conduct of functions, tasks, or! d- ?7 O1 E3 o duties necessary to accomplish a military action or mission in carrying out the! h/ J3 y* _1 a5 s1 C national military strategy. It includes the functions and duties of the commander,8 h, _- b, p; Z0 e as well as the supporting functions and duties performed by the staff and others 0 B$ G8 A$ [& Z( kacting under the authority and direction of the commander." X3 ~( L+ o. E8 t- `5 l: V Contract6 u, v& K: `7 K* b: f Administration0 m7 L( t/ r; D. D Office (CAO) 7 t& c/ ?" ?! [! l$ FThe activity identified in the DoD Directory of Contract Administration Services- H( r% Y8 |; E! m d7 B9 j Components assigned to perform contract administration responsibilities. It is a 4 r: Q9 Y/ A7 ^7 p; E( j, M* `general term and includes Defense Contract Management Regions (DCMRs), / R4 s( Y$ M: H$ B& pDefense Contract Management Area Operations (DCMAOs), and Defense Plant / |3 Q T9 J6 v0 @$ Q# ^Representative Offices (DPROs). (Defense Systems Management College3 d; x4 N1 l. W) y$ `6 ?/ R Glossary) , D! N# w' V F/ k' |, z% z- bContract Data# e$ [0 T# Y9 D: M Requirements 6 j% z( c& m' O; A! ~List (CDRL)% w% O+ t* n) H2 j- U Document used to order (“buy”) and require delivery of data. Tells contractor8 Y ]: r; n4 j" P* s' c what data to deliver, when and how it will be accepted, where to look for4 @- \. K! [ l& Z instructions, etc.) @5 ?* D5 o6 l }7 [8 [1 x5 J0 [8 q* i Contract # q3 ]- J; W* J8 fDefinition # a4 u& G6 H! U# tA funded effort, normally by two or more competing contractors, to establish 9 @1 u. v- X) i! w2 R* _+ i- V2 cspecifications, to select technical approaches, to identify high-risk areas, and to0 \: }. l; E# q- ]; I; B make cost and production time estimates for developing large weapons systems.$ B2 T/ O3 a9 ] Contract Work 7 J. G- |( I! }" ~* Q( t$ ] sBreakdown ( t" S. N4 q- G0 X/ }6 B7 g# B& NStructure H H0 L: ]0 q The complete WBS for a contract developed and used by a contractor within the% L. R6 B y9 S6 A/ F$ X guidelines of MIL-STD 881A, and in accordance with the contract statement of) h1 I! ]6 Y2 h' G' U! j8 ?6 o work.7 U* B; I7 e# Q6 O6 T) L& T' ^6 _ Contracting6 b6 U0 C0 s C2 Y; ~6 \ Officer (CO) ) g/ ?$ t$ I: O7 b5 c$ sA person with the authority to enter into, administer, or terminate contracts and 6 J) a3 A* U# d! t0 ~! t) Tmake related determinations and findings. The term includes any authorized 5 g6 ?8 x0 H, ^% Brepresentatives of the CO acting within the limits of their authority. A CO whose8 T6 o1 J+ q3 _0 s9 B/ K+ ? primary responsibility is to administer contracts is an Administrative Contracting4 x8 u& C) C. j& P Officer. One whose primary responsibility is to terminate contracts and/or settle- A+ H# R0 h# O% m! j3 g d3 o. G: N. Z: N, M terminated contracts is a Termination Contracting Officer. A single contracting ( ]1 {, [2 T- ]: ~+ _! R* nofficer may be responsible for duties in any or all of these areas. " ]* T( B" r: }: yControl Authority that may be less than full command exercised by a commander over, @; M3 G7 L% i6 X part of the activities of subordinate or other organizations. 9 Z" C. _" w/ C* Y( Q H9 p3 ?3 }Control " {& I# W3 l( p2 U+ R pAbstraction% J* t+ h# ^2 Y5 ?# f (Software) The process of extracting the essential characteristics of control by ! v! _( p; [5 }; t" Tdefining abstract mechanisms and their associated characteristics while; d) N6 X) ~1 R! j& i disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C& k u- M8 i' r; D- a7 G 61( ]/ H' p7 Q# X. i! ]/ } Control and, y+ Y' Z# u7 O3 }$ @% I. l* Z Reporting Center ! Z/ V! O8 v1 K! s. H: d7 E- M: OAn element of the US Air Force tactical air control system, subordinate to the - M A4 A6 n( m: _% g3 R0 Itactical air control center, from which radar control and warning operations are & {2 W9 w; g' J6 t4 qconducted within its area of responsibility. 1 u7 s _; P/ M0 i7 x: oControl and M' f+ v1 Y3 d9 ~Reporting Post 0 j1 U7 F% q+ E3 S+ H+ ^( K* qAn element of the US Air Force tactical air control system, subordinate to the, }: ~8 ^# X/ R" x( v. d' ` control and reporting center, that provides radar control and surveillance within Z8 b8 l2 R. j: T% t: ^% d9 y6 ?. y its area of responsibility. . U( @. a. v: H! H# gControl Area A controlled airspace extending upwards from a specified limit above the Earth. 1 g, h! }0 s7 {; VControlled' {. G* T$ \/ e1 E' m1 c; v Environment / Q4 R2 Z( I3 A) UArea where entry into the radiation hazard area is controlled. S% O* [6 R0 a$ X- }* @ Control 4 b" P. ?; \- {, RProcedure& e* D' b" E) v- M& _ The means used to control the orderly communication of information between ( x6 ?9 N7 H6 r) t8 Estations on a data link. Also called line discipline.; B, ?+ ]; A" ^7 s Control Station The station on a network, which supervises the network control procedures such# \8 n" p# f4 g as polling, selecting, and recovery. It also is responsible for establishing order5 @, d: G3 a8 Z$ k9 k' y on the line in the event of contention, or any other abnormal situation, arising% U9 g3 R, N3 |3 Y* o7 G1 T between any stations on the network. # P9 e- |4 f0 Z3 Z- Q* XControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to 2 ^/ ]2 Z! y& Y+ c! q9 vprocess sensitive defense information and that is under sufficient physical and 3 z8 e" @3 t! M2 ctechnical control to preclude an unauthorized entry or compromise.8 v! [ ]$ R9 b/ c! c( A) ` CONUS Continental United States. \) m; D! ^+ |9 I6 { M! S- k Conventional Co- 4 U/ C/ n+ w: i1 j2 z; dProduction2 q) z, K1 h: S/ q An effort between governments to produce the same end item, or components( n9 S+ Q& ?& x! i( g" ~+ K of the same end item, in concert. 1 ~ a1 X) d) Z5 B" i9 LConventional7 _" h$ Z8 ^' ^1 T1 K& l1 [- H Weapon - o4 [# r7 d, z* G/ ?/ h' E zA weapon that is neither nuclear, biological, nor chemical. ; o. C/ x! d; b6 j* _$ ]Coop Cooperative ( o! L3 |! D: ]! b* M* M7 iCoordinated 6 c0 x: ?. L% j8 O! VEngagement0 Y$ o4 h2 d, }! l0 a+ S: r V Planning/Actions' p, t' R* j. U% ?, [" o( z Necessary coordination among engagement components to ensure maximum . T6 h" D& L- W# i. E+ k2 {7 F+ b* w3 |effectiveness of the SDS and resources are not wasted on targets already* \7 T' @: g' Q, a& I5 P8 c targeted.$ ~0 ^" G4 B4 ?8 u- y( W Coordinating 9 v, B9 d8 v" g: y1 H8 U# mAuthority% T% A, E# I; a* l! n- q A commander or individual assigned responsibility for coordinating specific " ?5 K! P k9 bfunctions of activities involving forces of two or more Services or two or more" y$ P/ A2 E, f forces of the same Service. The commander or individual has the authority to ' J/ ^7 E: ]$ @: r; A9 Nrequire consultation between the agencies involved, but does not have the & y2 h8 d8 R/ R7 o3 Q9 j+ Mauthority to compel agreement. In the event that essential agreement cannot be ) H8 c: b: Q& Greached, the matter shall be referred to the appointing authority. Q4 Y/ h3 h* e* K! Y& O COP Committee of Principals - A/ f. d1 p9 S& o$ u! ACOR Contracting Officer’s Representative. Contracting Officer. ( C+ X3 j$ d2 qCORBA Common Object Request Broker Architecture. % L3 t8 u1 L/ f- ICORM Commission on Roles and Missions.- n! S& p5 V6 X$ B4 q7 N! _ MDA GLOSSARY, VER. 4.0 C8 Y1 B6 l* ? T; p6 @& L! o6 Z 62+ z# V2 }4 D& H7 ~ Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens ' @+ A8 O% I, v$ [perpendicular to one another, designed to act as a radar target or$ g) r/ J6 }7 f% Q6 X marker.8 t+ z: W: z6 N% F' q; I9 C) V (2) In radar interpretation, an object that, by means of multiple reflections 7 y$ F+ D% P) z+ u6 Sfrom smooth surfaces, produces a radar return of greater magnitude than( @, I1 p2 v; H9 f1 O4 Z! X might be expected from the physical size of the object.! \3 _" X* ?0 C/ O$ f: s. E9 z4 e; N Corps SAM OBSOLETE. See Medium Extended Air Defense System.3 Z' Z5 R4 Z! V1 O- r& |! J Correlation (1) The process of relating observations or tracks from one set of data to / s2 e; H0 j! R+ K/ b/ uobservations or tracks from another set of data, i.e., collecting data from $ K# `$ b7 h4 Fdifferent frames or sensors that presumably relate to the same target. (2) % C: x! J- X* \6 rIn air defense, the determination that an aircraft appearing on a: N: k. m6 l. h% v0 F6 h radarscope, on a plotting board, or visual is the same as that on which 2 U; v& @! L9 s; Iinformation is being received form another source. (3) In intelligence1 b1 g- V- Z* H. u% [5 ~ usage, the process which associates and combines data on a single# m& b& _/ e M; n entity or subject from independent observations, in order to improve the0 E' W* O' N4 K/ |$ B- j reliability or credibility or the information.* F2 V0 k2 G3 Q0 L$ }* S+ H$ S" L% x COSEMS Evolving architecture operations support tool.& @6 C+ k& V6 E ^" `% G COSM Computer System Operator’s Manual " k6 ]: L6 _) n7 V' TCOSMIC NATO security category.9 y( a# U$ {; p8 `( Q( L {2 { Cost Analysis ! p* H: ^& A& j0 OImprovement% [9 Q. L F2 d: L/ h! S Group (CAIG)/ \2 w2 M7 b& Q" t1 x An organization within the office of OSD Director, PA&E which advises the DAB0 O: q, X. ` u, X) e$ D+ l on all matters concerning the estimation, review, and presentation of cost / k+ I* W) W# \! \: tanalysis of future weapon systems. The CAIG also develops common cost + ]7 B+ L1 e+ X6 A# A7 ~9 f; T4 Westimating procedures for DoD.* z9 i* [& z7 T% L; a0 y$ r Cost Analysis 3 f$ \) {- f/ o6 Q4 ^Requirements/ o9 k$ c8 l- C8 I8 b Document $ m/ \- A: K M0 M( J3 Y0 i(CARD) # R: V% u( s8 n/ V0 U6 QThe document describing the technical baseline, which is a subset of current& p. D n: `2 b! D% y3 p5 _) D system technical data and is used to generate the baseline cost estimate for an ' g* ?! N; g; D5 b# n6 gSDS element. It includes, but is not limited to, the element description, 7 _; j' I$ Z: @3 Binterfaces, operational concept quantity requirements, manpower requirements,, m, p# S3 H9 j8 R: o activity rates, schedules, research and development-phasing plan, and facilities& X/ H5 X$ X0 C# v# i requirements. ! X6 Q4 \' l! M$ g. Q2 ]Cost and, c3 _3 t N4 m, I3 F Operational 3 n7 R+ ]' @# T# I( PEffectiveness 1 a7 a+ u2 Y9 R% |5 {Analysis (COEA) 7 [- M: g7 f* o; w) s% @6 TAn analysis of the estimated costs and operational effectiveness of alternative Q l( }# j! m6 o materiel systems to meet a mission need, and the associated program for, G m7 c+ s ?% \ F! P acquiring each alternative.0 I/ D" e+ T6 `3 d Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk - Z& u" G: b; a# Odue to cost estimating errors and the statistical uncertainty in the estimate. 1 F$ D0 t6 [7 _2 G& ?Schedule/technical risk is risk due to inability to conquer the problems posed by $ `& f- j" z) f Fthe intended design , D& t |( a, A. B8 o( PCOTR Contracting Officer’s Technical Representative. See Contracting Officer. ) T B& V, ?7 J% k. I- B, t/ jCOTS Commercial Off-The-Shelf. p* ~% O9 z. u& k1 E( S Counterair A US Air Force term for air operations conducted to attain and maintain a desired( x5 m) ~, @" g( F degree of air superiority by the destruction or neutralization or enemy forces.4 P; p" T& E4 N: h Both air offensive and air defensive actions are involved. The former range # v( `* m. ^# q( r1 J1 pthroughout enemy territory and are generally conducted at the initiative of: B5 m% `3 T7 H$ e friendly forces. The latter are conducted near or over friendly territory and are 6 S7 k+ c$ a7 v1 y# e! \generally reactive to the initiative of the enemy air forces.$ C9 V6 h: E, u% }0 ` MDA GLOSSARY, VER. 4.0 C5 x! S/ s( N& c: d! t 63 5 x- ]& h) M/ E) aCountercountermeasures . Y4 |# I4 @& ^ C(CCM)9 T% ^3 ?5 q) j Measures taken by the defense to defeat offensive countermeasures. 0 {- t3 z; M: X1 a. [2 G/ j3 x% JCounterforce The employment of strategic air and missile forces in an effort to destroy, or( I! h- [6 C. ^$ ~ C3 B render impotent, selected military capabilities of an enemy force under any of the ! k/ b- }" `4 v& ]circumstances by which hostilities may be initiated. , e" E, [# Q: g' H, zCountermeasure A design or procedural measure taken against covert or overt attacks.! m7 N4 l4 F9 b3 w Countermeasure! \* k8 Q; L! y1 Z9 m7 T) V s (CM) + N8 Z# T1 v/ Z2 c1 V7 U; O9 nThat form of military science that by the employment of devices and/or 9 _$ e7 f8 U8 d# y6 {2 L( j) Mtechniques has as its objective the impairment of the operational effectiveness of6 V0 x& X7 H) j- n4 B enemy activity. 5 K5 d' e8 |$ Y- KCountermeasure% O* Q4 E% o5 a7 j: Z s Rejection ' N! R- J( H& ~: Q/ {* M/ N(Surveillance)5 x% X8 Y7 h( h& J Improvement or rejection of an object signal in the presence of2 |; c9 ^8 s; p d countermeasures. 4 ]; V% @+ I4 KCourse of Action $ p8 m1 V. w1 l m(COA)3 W+ M( y% t! b$ A( Q- O (1) Any sequence of acts that an individual or unit may follow. (2) A possible ! s; @7 r! F; I+ ~plan open to an individual or command that would accomplish or is - m! E7 m9 t& arelated to the accomplishment of his mission. (3) The scheme adopted) Z3 M+ Q4 i# e" }# _) ?# F% f to accomplish a job or mission. (4) A line of conduct in an engagement. ) [! E" p( d/ P(5) A plan to accomplish a mission. It describes the execution concept! X3 R3 U( y9 h- @: q2 V5 i4 w$ h% T7 ? for BMD of North America. It will specify the engagement priorities,* _1 m3 a/ T( H. X1 T1 I5 X resource allocation and desired results by Area of Operation (AO).# x( J4 u( z, G1 I (USSPACECOM) (6) The scheme adopted to accomplish a task or3 g1 F0 {+ }# V4 b3 ^( o2 v( `# l/ ] mission. It is a product of the Joint Operation Planning and Execution; y. @/ F& g. n* b/ d! W3 O1 T System concept development phase. The supported commander will 4 I; \4 c( A8 I/ ?/ W; h z }/ D& oinclude a recommended course of action in the commander’s estimate. 2 J9 A* q' f* M# G" BThe recommended course of action will include the concept of" n' Z" `% \$ s/ S" j3 E' J+ s operations, evaluation of supportability estimates of supporting - q4 M9 Q% W8 k! M8 d, Y$ `2 V, lorganizations, and an integrated time-phased data base of combat,* d5 Q8 j+ M7 z* M combat support, and combat service support forces and sustainment.8 Q/ P$ C! g: m# i: x3 s4 o Refinement of this database will be contingent on the time available for $ u |5 [) s. A- Fcourse of action development. When approved, the course of action5 u: K1 K1 b d* ] becomes the basis for the development of an operation plan or6 z7 t+ L7 Y+ `! [4 E5 h( d operation order.! s; R0 t! k8 w+ [) U Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, ! E& y0 D ]& tand other geographical presentation systems. (2) Cover or protection, as4 z! p: V+ c/ H7 C+ F the coverage of troops by supporting fire. (3) The extent to which 8 B+ [) O6 Z7 x3 @) ~; C Ointelligence information is available in respect to any specified area of* Z7 S) v) D) \9 ?( d* U9 P interest. (4) The summation of the geographical areas and volumes of $ }, N9 k! b/ k ? qaerospace under surveillance.' [% w1 h$ }: n' w Covert Timing7 ~/ {# O9 ^8 }1 x! k Channel$ o1 e c& U' P# T" W A covert channel in which one process signals information to another by . @, l5 P# ]6 _modulating its own use of system resources in such a way that this manipulation$ s! r# n5 }# o affects the real response time observed by the second process. * }- J% B7 b8 ^4 \CP Command Post. . B! y/ F+ {1 j4 g4 {CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. \7 Q8 E. E( ICPAF Cost Plus Award Fee.: _, e, k: b, _$ j# y I+ K; f) l' u CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)6 I) u$ n* h6 W1 U/ t' A; v MDA GLOSSARY, VER. 4.0 C 7 x- k0 B. S6 b" _- z2 ~& P% |64 6 y: Z9 O& @: Z* A+ \/ bCPAR Cost Performance Assessment Report. ) Q. h* j/ a2 ^# e) f! o7 F cCPAT Critical Process Assessment Tool ) e0 f7 v' k* kCPB Charged Particle Beam.9 G: Y# L9 n1 Z8 o% k CPEV Communications/Processor [Network] Experimental Version. 7 c/ \+ M3 r6 J" zCPFF Cost Plus Fixed Fee. ( g3 X& d% t$ ^( e" ~4 \CPIF Cost Plus Incentive Fee.' P* K% T! I2 I0 d+ D( T CPIPT Cost-Performance Integrated Product (Process) Team. 8 O `; N+ a2 L. l6 e* {CPM (1) Critical Path Method. (2) Contractor Performance Measurement.) h( X f: ~. u2 o7 s' ^, s CPP Critical Performance Parameter. ( J( k3 ?& q, E5 |6 J8 L4 K4 ^CPR Cost Performance Report. 2 A' B$ d( U0 ]! MCPR/NC Cost Performance Report/No Criteria (Contract management term).4 ~2 ?/ u, m" K( } CPS (1) Consolidated Program Summary. ; \9 a1 ^& @1 n- y1 ^(2) Competitive Prototyping Strategy. 2 Z$ T8 f: Z7 x7 K7 [. x$ ](3) Current Program Status. 1 J3 n/ @ }4 a4 H+ R3 TCPU Central Processing Unit (TelComm/Computer term).! u/ p& r: F1 K4 B, L CPX See Command Post Exercise. 7 L! \! T( ?, SCQAE Chief/Contract Quality Assurance Evaluator. 3 I f5 C( i0 T: B' z0 J1 Z0 dCR (1) Computer Resources. (2) Continuing Resolution (US Congress term). B/ W8 P+ P4 CCR-UAV Close Range Unmanned Aerial Vehicle., s+ F$ d' v6 y( t$ X7 F CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement 6 o$ z/ U' ]' }CRADA Cooperative Research and Development Agreement. ; _+ D( r1 M3 uCRAM (1) Control Random Access Memory.7 _2 Z% L8 ~0 Q+ F. {* I (2) Cross-tie Random Access Memory (Computer term). % u m* l) k1 \# j& U1 d/ PCRB Configuration Review Board.* h3 y* p }9 \" h. x5 a6 f CRC Control and Reporting Center. ; q( M ~8 U% R6 G' J/ W9 x) KCRD (1) Capstone Requirements Document.1 E, X% U* @& |: r# A% ?! ~' | (2) Component Requirements Document.2 b2 i9 T# W# o t CRDA Cooperative Research and Development Agreement.6 U" \( R3 E6 u* J! h4 w& [8 f CRG Communications Relay Groups (PATRIOT).7 n# {1 L. |, z2 L- o CRI Classification, Recognition and Identification.7 S5 `) ~* k% W3 t; J4 z* B CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C' v+ X4 m- @, n 655 e& T1 U; O* b9 Y+ e Critical Design' y: O! Y3 K. e* u Review (CDR)4 k3 W4 d' O% C( P* p5 p A review conducted to determine that the detailed design satisfies the : P9 O1 T9 D& s' p3 T+ Pperformance and engineering requirements of the development specification; to ' ~+ }) U# n# y9 f/ y8 Lestablish the detailed design compatibility between the item and other items of ! z4 s! `) H; H$ ~+ ~3 Zequipment, facilities, computer programs, and personnel; to assess producibility + _2 i8 n$ I5 g6 Z7 Mand risk areas; and to review the preliminary product specifications. Conducted, O. d2 [: M. ? B$ O7 Q3 I" J during Phase I, Demonstration and Validation (for prototypes) and Phase II,* @1 R# G- f8 \# e, ?: a Engineering and Manufacturing Development. # _$ U5 s/ f9 x7 X; T* z j' W3 }+ BCritical 9 V. n3 y7 E( o& x. [: _Information& r1 B4 J% W. ]: ^: [: d Specific facts about friendly intentions, capabilities, and activities vitally needed / R; T1 j! s! U0 o9 N! F3 Eby adversaries for them to plan and act effectively so as to guarantee failure or * Q& y2 c9 r3 U+ D& U- runacceptable consequences for friendly mission accomplishment.' E; s1 Y. y3 L/ B Critical 8 ~) C/ Y4 a9 n0 s! ^Intelligence : D% T1 I2 O# V' s3 \Parameter + |8 f: c- C( _% a( a; OA threat capability or threshold established by the program, changes to which3 D9 D& Y* \0 ?% g; }0 G( Q could critically impact on the effectiveness and survivability of the proposed; m! \. m9 K$ [+ k9 x/ J system.! } w' y/ d/ z8 s# Y+ J! o Critical Issues Those aspects of a system’s capability, either operational, technical, or other,+ m& _" e0 T- |; @ o" _! E that must be questioned before a system’s overall suitability can be known, and , @$ r& b! O6 U9 owhich are of primary importance to the decision authority in reaching a decision# a7 y, h& {& X0 [. Y9 N" {1 T to allow the system to advance into the next phase of design, development, 4 }4 Y( Q! d% u+ w" v; o% Mproduction, or post-production.: J0 [( I Q0 [. X7 ]6 x) R: C' `0 ~ Critical 7 F8 z: X; u7 n, A; ?Operational 6 K5 S' z, z6 G3 M' y5 l- x7 nIssue 7 X" `: H5 Q" G2 Z- lA key operational effectiveness or operational suitability issue that must be# p" Y, K8 @4 E' l examined in operational test and evaluation to determine the system’s capability # [/ b8 t3 I F4 E! Y" C& |0 Jto perform its mission. A critical operational issue is normally phrased as a: u! f' }8 Q# x" g( h$ w question to be answered in evaluating a system’s operational effectiveness + v$ H+ j) i: Vand/or operational suitability.% a& O3 A( ~9 v( K Critical Path7 F! t2 \0 t& g( K Method & g5 I n3 I5 q. JA technique that aids dependency of other activities and the time required to 1 i: N9 P2 h0 V4 z. J8 M7 t+ f1 ncomplete. Activities, which when delayed have an impact on the total project $ `" O& {4 Q R8 n, Zschedule, are critical and are said to be on the critical path.* Y4 x! x! ^' e Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to 4 S0 k: E, w5 u Y+ a/ Nthe viability or the operational effectiveness of the SDS. ' e8 H# ~; r5 ECritical Security5 N' W- b6 |& Q8 t- y2 M3 X, A Risk % `, h2 ~0 L+ P6 }The existence of a security vulnerability that, if exploited by an adversary, could - ]9 v' B; [5 P" Ocause exceptionally grave damage to the viability of the BMD or the operational . x! p! H# A# I# M/ o- X; C; e" @ seffectiveness of the SDS. Critical risks assume an adversary’s capability to * B$ G" N; t, b6 W dcause major system disruption or degradation (e.g., single point failure),5 U; {7 T" ~" S7 B destruction of mission-critical components, or usurpation of system functions.7 t7 Z9 j. K' y Critical ( ]- b: i6 ^) Z/ l% m- c: X$ H+ gSupporting3 `1 Q; |' h }- ?! n Technology% Z& c8 B' V3 h: l A technology that program management personnel consider a critical part of the: Y- \+ _5 B7 y% ~$ W program being described. " s0 x9 x) e! p# wCRLCMP Computer Resources Life-Cycle Management Plan. 3 u, A% N R! @CRM Computer Resources Management.$ K, G4 g% Y2 P CRMP Computer Resources Management Plan. % I+ @. i! N4 Z% T, L# vCRO Chemical Release Observation. $ S% s5 M0 t7 a3 f! gCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC2 ~3 Q. g' V5 V1 A t& Q term.) ' v% }1 {: f. q2 b- c( sMDA GLOSSARY, VER. 4.0 C 3 V7 l* ^' L, T5 I66: X& A8 q5 z/ _ P CRS (1) Computer Resources Support. (2) Congressional Research Service. (3) 5 b: X# K+ y( T# _1 b1 ]Contractor Reporting System. % A% k9 ?% b' A7 |# ACRT Cathode Ray Tube.1 u% t. T0 c0 P6 K9 O CRWG Computer Resource Working Group.0 N$ @( x0 K B* p8 n8 } Cryocoolers Cryogenic Coolers.9 w9 z' ~+ A/ t, A8 i$ I. Q( ] Cryogenic Of or related to cryogens (substances which are used to obtain low 7 {, Q3 N2 u3 Z0 b' e( O& Xtemperatures). $ F C, [; v2 z. a) V- B" i7 GCrypto A designation or marking which identifies classified operational keying material, ! `7 O0 M0 I( n7 k: ]and which indicates that this material requires special consideration with respect1 a% P" i4 i2 N5 W- a to access, storage and handling. 9 L% c. R8 _8 w9 V9 }Cryptographic 1 h/ Z2 r: q+ ]- rSystem & u( f1 n9 N rThe documents, devices, equipment, and associated techniques that are used& c0 W" H$ I. F& z$ F) O/ A as a unit to provide a single means of encryption (enciphering or encoding). T( d1 D, y7 P6 W- x' P4 q Cryptology The science that deals with hidden, disguised, or encrypted communications. It 0 I$ }$ @. n7 V8 W3 ?& n% ~includes communications security and communications intelligence. 1 D! d& P9 v& _7 V6 n9 v2 P; VCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. * f, ~' o, {% T4 F) @& OCS/CSS Combat Support and Combat Service Support (USAF budget term)., R. w' z- S* \$ J7 Z2 L CSA Chief of Staff of the Army. ! E) _! h! l ]/ }/ y: yCSAF Chief of Staff of the Air Force., l# g$ x( x& W2 d* U CSC Computer Software Component. $ e3 N! {% q6 p% ZCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) 8 d) J- G: F3 t' |* hCSCSC Cost/Schedule Control System Criteria. 7 B. z4 O3 b( v1 H. x, X' DCSD (1) Constant Speed Drive. (2) Critical System Demonstration.3 M0 R) ` h; ~1 W9 v" `5 a CSE Center for Security Evaluations (DCI).& E# p2 [$ p) E% b) u+ ~; _" `, a CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon' ]8 A) L* Q U5 m# X Z0 f System, located in Cherry Hill, NJ. v9 i1 V7 I0 m( R0 { CSF Consolidated Support Facility, Arlington, VA. 3 c! D e6 |9 o& b. m, tCSI (1) Critical Safety Item. (2) Critical Sustainability Item.2 y$ s8 w, C8 j& ^* x o+ r J CSIP Current Systems Improvement Program.1 V" U; T( ], Y" }! d/ i6 c CSIZE Constellation Size. : }6 n5 z& C @6 ~CSL Computer Systems Laboratory./ ^7 L# x5 v) F3 P CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.8 R0 A. E8 x m# X/ X! ~: w CSNI Communications Shared Network Interface (NATO term). Y# K2 M) u- I R7 B/ \8 zMDA GLOSSARY, VER. 4.0 C; a3 i8 S$ n: k 67. `; d/ R e( q, q# {9 f CSO Closely Spaced Objects.' [3 y: q7 o6 r' Q% s: n4 g2 u0 Z CSOC See Consolidated Space Operations Center. ' N7 j' R/ {" G. [, h, ~! W" l( uCSOM Computer System Operator’s Manual2 p: t, w. a+ j/ M/ m* o1 t CSOSS Combat System Operational System Sequencing 0 l+ T5 ]8 Y* V* H( p, ]CSP Communications Support Processor (numerous locations, including USAF Air ~( n. x7 a# l8 U% V Development Center, Rome, NY term).8 ]5 t7 f) _1 L+ s( N CSRD Computer System Requirements Document. 0 p7 i" j9 H! O3 ~& K$ TCSS (1) Cooperating Space System. (2) Communications System Segment. (3)' }, o! L G( i) z4 [* r Contractor Support Services. (4) Common Sharing System. (5) Communications . R# f8 d. V9 {7 h% l- t% J; {+ wSupport System (Navy term). (6) Common Support System. (7) Combat Service9 R7 H" E$ a! ` Support. V# W% j( t* M CSSCS Combat Service Support Control System (USA term). 9 E9 k1 X5 N& S2 l( e( ECSSPAB Computer System Security and Privacy Advisory Board.& {3 x' y" Q6 ?/ A* T4 J* z CSSO Computer Systems Security Officer. ; J; K4 E+ Q5 aCSSTSS Combat Service Support Training Simulation System (US Army term)." a' A( [8 F6 A/ s+ I$ e" O CSTC Consolidated Space Test Center.+ n4 t+ A0 w3 K4 g8 [1 p9 p CSTI Civil Space Technology Initiative.% T* V" o( H; o) o& Z. f6 J CSU (1) Computer Software Unit. (2) Communications System Utilization.. D4 N& m+ w9 ]0 x CSUR Communications System Utilization Report. ; v* ]# V+ o9 m8 T1 KCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.4 o# i! w, n p5 m# W) S (4) Cryptologic Technician (Navy occupation specialty). ; q; e/ U5 h; |8 l+ sCTACS Contingency Theater Air Control System (JFACC term). $ H$ Z2 e& T4 v1 ~) |- @# r& KCTAPS Contingency Theater Automated Planning System (USAF). 8 n9 s) D# |2 T/ C7 lCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. 6 J. b8 k4 S# w2 Q1 s. r, rCTBM Conventionally-0armed TBM.# b" @) E: I/ u( }# N" b* h$ i CTC Combat Training Center, Ft. Leavenworth, KS.# i2 n* u- Q6 X7 V( ^2 W. X z* [- \5 l CTCC Critical Technology Coordinating Committee. # N$ Q3 R8 f- Q; `7 v& W$ K+ Q' v" KCTD Communications Test Driver. 9 H8 d1 y( {; h; e$ ZCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. ) F+ l1 r! n& i! v; uCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally . l4 y4 }0 z" U) r3 g; t% l. hfunding selected test investments proposed by the Services and Defense/ K' _! [# O6 y6 V( W. Q8 l m8 k Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C ! J/ A; t3 ^; e8 S. j: Z8 l) m2 d68 $ ]9 ^/ b7 i" A5 @3 a/ t% H. C2 ]6 FCTF Controlled Test Flights. 7 ^9 M$ v! A- k4 g9 R" i6 d4 HCTI Concept Technology Insertion. % Z: D1 R" K, TCTN CALS Test Network. * m8 ]8 m% p( b3 c) rCTOC Corps Tactical Operations Center.2 n4 |; k' B' F' w CTOL Conventional Takeoff/Landing aircraft.* _: l3 r: T* f% Z CTP (1) Critical Technical Parameters. 0 w6 t( p* @( I r1 t(2) Communication Tasking Plan. / |9 `9 K B7 F+ N( h0 r. E(3) Consolidated Targets Program. # _# p& J3 C+ h+ hCTPE Central Tactical Processing Element. 9 _: M: A+ M9 T$ Z* x& jCTPP Consolidated Targets Program Plan.3 y, r. o' d) t1 ~5 d3 l CTR Cooperative Threat Reduction (Treaty negotiation term). + X' s, v u( aCTRS Centers8 V3 `1 m, Y( K0 y CTS (1) Clear To Send (TelComm/Computer term). ! Q* z9 [7 A' h" D- `1 P! V0 M6 D(2) Contact Test Set (USA IFTE term).3 a" o! _) Z! O8 [! g" G' ]: a CTSS Computer and Telecommunications Staff. $ a" o7 e. i$ \7 m; S$ v. z$ VCTT Commander’s Tactical Terminal (US Army).6 |* V& q- t' k CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).. ]6 ?5 {7 d! m* r CTV Control Test Vehicle(s). ! v+ x) P% W# t& e8 z$ NCUDIXS Common User Digital Information Exchange System.1 m& A5 \8 J2 H; Z+ z Cued Operation The directing of one sensor based upon the data received from another sensor. 3 B6 V9 a) q8 T9 a3 w; XCueing Command The command within a tactic, which specifies the sensor element’s coverage & w# F6 p; q, T% \7 y; Jvolume. j: U3 W; g0 D/ Z$ l4 T Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage - u' t. Z* H' Qvolume.# U/ t+ m- g( H3 L! y CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae./ m6 p- M& K" ]1 l+ }$ D+ p CV/BM Carrier Vehicle/Battle Management. ; A, P5 O& n2 f) b. P- S zCVBG USN aircraft carrier battle group. 1 ~3 k6 U. v( b1 w* I0 b: HCVHG Carrier, Aircraft (V/STOL), Guided missile.! A# M+ D- w# h. H7 m% m Q* o F CVISC Combat Visual Information Support Center. Y5 e, b- }1 v5 [CVL Copper Vapor Lasers. # i$ m0 A3 f8 T/ e' u( hCVN USN nuclear powered aircraft carrier.% V# @1 ]! f- W3 v# |" N. _ MDA GLOSSARY, VER. 4.0 C9 }; v6 f" C( Z0 }. o 69 & s% j9 N& ]5 X; a1 s$ \+ RCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.0 h1 D! I! s, z! {( ]( F6 \ CWAR Continuous Wave Acquisition Cycle (Hawk).* d u$ }6 R' F$ z* G L CWBS Contract Work Breakdown Structure. 3 z: @9 Y7 r, m% Q( W8 vCWDD Continuous Wave Deuterium Demonstrator. ' W. L# c7 z4 r& K1 C' VCWIPT Cost Working group integrated Product Team.* C$ ~* i' z: s4 i" D/ `3 J" M CY Calendar Year. ! F5 o" c6 _" b m/ k+ `MDA GLOSSARY, VER. 4.0 D! y" D2 e, I" U$ h 71# ^" ~* u, H: n0 k& j D Deuterium& n$ T( p: ]& J: F# v9 b0 ~ D Spec Process specification.) T0 Q/ i0 m: K) P% n% K6 u0 q5 o3 D D Star Measure of infrared sensor sensitivity.& W, S* h; t, D4 l D&D Design and Development 7 }9 j0 ~& y1 a3 y: R! pD&T Detection and Tracking.6 D9 D4 W0 F: M8 B& B* r% Q D-IFOG Depolarized-Interferometric Fiber Optic Gyro. - r2 ]. d' C5 J5 mD-Level Depot Level (ILS term). + p2 ?' f& Z" UD/A Digital-to-Analog! t- ^0 Y& d& q" p$ N' U D/V Demonstration and Validation. . \7 o. i: g3 y6 M( |D2 Projective (interceptor) in the Hyper-Velocity Gun program.: X$ ^3 `, M% F DA (1) Department of the Army.7 E. v2 }7 T% a9 R6 w" v: o% G (2) Department of Administration. $ t# |0 P4 ?9 S% q, k7 g) H$ F M(3) Decision Analysis.) A2 {5 Q% h4 T4 \9 p" j (4) Developing Agency/Activity. 1 k0 l, Z5 _- b(5) Data Administrator.) b$ B6 B& R1 V$ p (6) Direct Action.& A6 ]: X7 _- i; F' @ (7) Data Adapter. ; i* E0 a T, |# TDAA Designated Approval Authority (DD 5000 term). 0 K8 ^/ g- T5 IDAASAT Direct Ascent Anti-Satellite.; \4 `$ q$ I: O DAB See Defense Acquisition Board. " L4 _0 Y6 g% ] p9 C" O: WDAC (1) Days After Contract [Award]. ( b! @6 F& W! G(2) Department of the Army Civilian.& B @- D8 I! q6 U) G8 U) z (3) Directed Attack Characterization.9 I2 D4 k# G ]& k (4) Deploy ACCS Component. % y4 m6 M# x5 X(5) Digital-to-Analog Converter. ! c3 v Z" j' ~1 JDACS Divert and Attitude Control System.. ~ e( E6 R" w! n DAD Defense Acquisition Deskbook. - S/ a; t( j- M& ~/ rDADS Distributed Air Defense Study (1993). , O9 P8 _( u, j' T6 ]2 L. J8 yDAE Defense Acquisition Executive. % c* A& w) h2 ]; tDAES Defense Acquisition Executive Summary.) }' F) r1 Y2 ~. v DAGGR Depressed Altitude Guided Gun Round.5 ^# j5 w+ G+ b ?# o6 `6 w DAHQ Department of the Army Headquarters.5 s) }1 K& ^ l4 V* n DAI Damage Assessment Indicator (targets)., b3 d) U+ @3 V DAL Defended Asset List.5 X6 N" j2 h9 q% x% h) x; o8 I6 O3 F$ J MDA GLOSSARY, VER. 4.0 D 8 y) Y# T, i# a' o9 P R$ V0 M72 J8 W5 {; G2 e7 s4 Q& S5 s. T- _) FDAMA Demand Assigned Multiple Access.+ z" Q! y+ `) A4 O3 @6 c6 g DANASAT Direct Ascent Nuclear Anti-Satellite. # F/ |- [0 C# v% T0 U2 V* xDAPR Director’s Annual Program Review (SDIO term) v! J1 |6 ^* z' G DARO Defense Aeronautical Reconnaissance Office (OSD). ! r' M7 t2 P+ | h) sDARP Defense Aeronautical Reconnaissance Program.6 ~" M6 J' [) \, ~ @8 R, e) q DARPA Defense Advanced Research Projects Agency. See ARPA. " O7 E. @& \( Y3 \% SDART OBSOLETE. Defense Acquisition Review Team. c% F6 _) w! V" _8 N' a% ^DASA German Aerospace. Member of the MEADS Program Team.5 ^, D9 O- T* s DASC Deep Air Support Center (JFACC term).3 D5 [' C) O6 w. Y. E [ DASD OBSOLETE. Deputy Assistant Secretary of Defense. # x* _% \# E3 f" g' n! iDASD (C3) Deputy/Assistant Secretary of Defense (C3) 2 w: f7 {9 |7 [& t+ Y* Q# |" E( ZDASO Demonstration and Shakedown Operation. 2 S2 p2 s. @/ H- {9 qData Integrity The state that exists when computerized data is the same as that in the source & Q7 a- v) F; O" r( C- ydocuments and has not been exposed to accidental or malicious alteration or1 ]8 p" u" _ m& [. g destruction. & D6 V4 v* A) i! L0 i" ADatalink (1) The means of connecting one location to another for the purpose of4 m4 R% D, `& M: I( Z8 ~ transmitting and receiving data. , V# ^; J7 x+ p4 T' H(2) A particular path between two nodes over which data is transmitted. It + e+ T. |# L% Oincludes not only the transmission medium, but also digital to analog 2 S9 L: ~# X' Z5 _converters, modems, transmission equipment, antennas, etc., associated , N5 m% a( P" U: {- M. I' m# s4 awith this path. In the SDS backbone network, it was a path between two8 }. d, q: k5 l SDS elements. In space these datalinks were microwave or laser. On . f0 g4 r0 u* Y% F+ S3 K0 Ethe ground, they could have been wire line, microwave, or optical fiber.8 c/ H" ~; [. W7 w9 I" R DAU Defense Acquisition University, Ft. Belvoir, VA.6 W0 }. w) L. r2 w+ } DAVID Development of Advanced Very long wavelength Infrared Detector (USAF$ |. b, F5 J- N5 C Phillips Lab term). + {6 u) m1 |8 }# @* ^# hDAWS Defense Automated Warning System. 9 P2 E) P2 K$ s1 D. e5 FDazzling The temporary blinding of a sensor by overloading it with an intense signal of 5 @$ ?' | j: c/ Xelectromagnetic radiation (e.g., from a laser or a nuclear explosion). 8 p8 O9 o& ?6 G! K$ ?) M- X$ LDB Bata Base& K: `& Y$ t! f DBME Database Management Environment (Computer term). 2 [+ {2 |7 c9 p4 p& W6 JDBMS Database Management System. ! T1 W" \" }$ H7 @6 r% ODBOF Defense Business Operations Fund. 6 Q1 N6 W# M' ^; N( i% |" N7 RDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D0 Y$ ~6 J3 V4 } F2 b 73 , K4 P3 t/ [" P/ ~% LDbsm Decibels per square meter.4 w! e: n) P+ s# o2 Y* A DBSM Database System Management. 1 C, `+ y+ {' [/ v" ` RDC (1) Disarmament Commission. (2) Direct Current.! ~# g b8 ~/ E0 O0 C7 f+ c DC-X Delta Clipper Experiment.$ z4 p5 f; a% Y DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications # D9 a# O% l( J8 l7 X( nAgency. (Now known as Defense Information Systems Agency (DISA)).9 K; [( h) b U1 s' T DCAA Defense Contract Audit Agency.1 N5 q7 T, D* N* Z5 L& O9 s+ t6 Z DCAS Defense Contract Administrative Services.9 q! V3 s J% c: d8 f, \' p DCCO Defense Commercial Communications Office (of DISA).3 f" z2 C7 x4 i( K" H5 b& { DCDS Distributed Computer Design/Development System. . [: {7 d) J& n vDCE (1) Data Communications Equipment (TelComm/Computer term). / s$ z5 C0 z+ v3 [ k; B(2) Distributed Computer Environment.% f$ |) `/ ^+ Q, j8 C3 y; e DCEC Defense Communications Electronics Command. p" x, c5 Q1 ]' e( @ DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.; M0 r8 q7 ~: _9 e* Q DCINC Deputy Commander-in-Chief.6 X9 X9 p' s! N3 T DCM Defensive Counter Measures. ( G5 ^4 S4 J1 [& B8 XDCMC Defense Contract Management Command - C2 q( m+ z* h4 s! E5 i0 P, DDCN Document Change Notice. 5 t4 Z5 _6 {3 [/ Y1 WDCO Director of Combat Operations (JFACC term). ; A* A, P5 p" V' }DCP (1) Decision Coordination Paper (see ADM). ' }6 R8 J: Z5 Q* j, P$ U(2) Director of Combat Plans (JFACC term).2 f3 Q& N8 R4 @ DCPG Digital Clock Pulse Generator. 7 \/ r& d0 t( Y0 V- NDCS Deputy Chief of Staff. 7 [; ]6 W: o/ z9 p c9 g0 \# gDCSOPS Deputy Chief of Staff for Operations and Plans (Army).! _ _ O4 C/ ?2 P* X DCT Digital Communications Terminal T% J+ u4 j$ @/ ^/ q% |DCTN Defense Commercial Telecommunications Network. 0 G7 P* v" r ~8 `' x& v9 }! VDD Variation of DoD.: ` T: y9 \: M V! h4 Y DDCI Deputy Director of Central Intelligence.! T M* \5 H) p/ U DDEL Dwight David Eisenhower Library, Abilene, KN (army term). % G. l# @' @; e! CDDG USN guided missile destroyer.9 d1 R2 I) x V7 T MDA GLOSSARY, VER. 4.0 D; e' G W( w" w7 q8 a( f: A 744 o }, k1 }5 z' m: Y) @ DDL Disclosure authority letter. + M8 n/ `9 |; s4 CDDN Defense Data Network.) i8 d5 q% v# L# d DDR&E Director, Defense Research and Engineering.$ @4 T; C% V/ A1 Z; H A" { DDDR&E Deputy Director, Defense Research and Engineering. 8 P, S% K6 m+ u/ \DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). ( @1 C: p+ h3 H- T: i% nDE (1) See Directed Energy. (2) Delay Equalizer.( s- k1 E$ @# V3 v& ^ DEBRA Debris, Radiance Model. F* f3 @; v0 P9 CDecentralized( q2 `* ?2 f# v. O. }+ o2 r Control! y& j- u' X. j+ a' ? In air defense, the normal mode whereby a higher echelon monitors unit actions,3 a1 m* E' g r3 U" k1 C+ Z making direct target assignments to units only when necessary to ensure proper 5 B$ B2 U$ {, E" Q- |fire distribution or to prevent engagement of friendly aircraft. - `) I: G+ ]9 VDecentralized* s* [. C8 }, H0 P/ |; y Execution 4 S& u, l4 y# `The distributed and integrated implementation of USCINCSPACE direction by' K" D5 f& C1 Q. H; k the BMD forces. (AFSPACECOM) 9 F% w/ r2 D8 @/ [& s1 L$ V9 QDecommissionin ! Q1 N4 }/ x3 Cg& D/ B( M, \- c' l) C7 W The removal or the rendering useless of obsolete or no longer needed , M' |# g0 y+ e8 |5 I6 B8 _! ]* ~components of the BMD system from service.+ E7 Q+ M7 e6 {$ R3 K0 r# |" L4 B Decrement A directed funding level reduction for an acquisition program." i' G# K! K- P% V0 Y DED Data Element Definition (Computer term). & x8 U/ _5 }/ M. y0 s9 m4 mDedicated Mode 2 r/ U* G0 I+ y# v" Mof Operation1 J0 b8 L# K/ q3 S (ADP Security) R3 z! O9 }& @& d% ^8 YA mode of operation where all users of the AIS possess the required personnel# G! |9 z+ `% R% \1 ` security clearance or authorization, formal access approval (if required), and a7 U8 M9 d: n/ y: P) A+ z Need-to-Know for all data included in the AIS. ! \9 r# x* C( G2 ?& Z3 o# NDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about ' h; @+ Z1 t6 a) o6 C8 r5,600 kilometers) above the earth’s surface.# {+ B/ [. P& A& X/ W" R" f, d Def Definition.0 s; L$ u% ?0 A# n/ V. u4 c DEF (1) Defense. (2) Demilitarization Enterprise Fund. # D$ e9 E' p* w9 L. d6 O% y; `0 vDEFCON Defense Readiness Conditions. 8 y0 ?) r8 Z* [7 `' tDefended area0 M8 W( D% o; W0 o; o0 T' P coverage' U3 A) b$ G6 l8 A Defended Asset ( h9 A" {: S4 u- X2 LList (DAL)" `- c; E! A! R$ _6 c+ h The geographical region that the BMDS can protect from ballistic missile attacks! \/ N3 _* |; k with a specified level of probability of negation. May be specified for a particular4 O5 A* a4 F" i' l4 x3 {9 N' [3 h threat type, launch point(s), launch regions, raid size, etc. / A* o7 E3 y, p/ G+ SA ranked listing of facilities, forces, and national political items that require6 z4 H* `8 u5 ? protection from attack or hostile surveillance. The list is compiled from Federal : Z8 ^5 ?7 D2 T* B8 Q# u6 b: edepartments and agencies, Unified and Specified Commands, and the Armed: ?, C$ r E' M% q* i. b) a Services to ensure National Security Emergency Preparedness functions. 2 t8 b) J. g1 a) kMDA GLOSSARY, VER. 4.0 D; Y6 G. O6 h* J0 @4 M4 Q% P" H 75 ' U3 L' c- o* NDefense . X& d# W% Y4 a3 H5 V7 Y; k/ S) Q/ E$ TAcquisition) T% m6 f, |- g9 t Board (DAB) 8 \* u, n* t! W9 v! z$ VThe senior DoD acquisition review board chaired by the Under Secretary of `( \0 ^$ _* _! @ Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the' v( U- B- M1 q6 I- d Vice-Chair. Other members of the Board are the Deputy Under Secretary of5 X: o8 s/ r5 Q8 O! v Defense for Acquisition and Technology, Service Acquisition Executives of the 5 f+ S6 h. D }% N2 [! V9 tArmy, Navy, and Air Force; the Director of Defense Research and Engineering; - ] ^5 ]. n6 x$ u8 V5 Pthe Assistant Secretary of Defense for Program Analysis and Evaluation; the 4 l; M; {% F$ |$ H; \' @Comptroller of the Department of Defense; the Director of Operational Test and $ }$ a8 {- G3 {# l5 z) `Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the* r+ \* U k& @, O b Defense Acquisition Board Executive Secretary. Other persons may attend at& E# R* Z/ ], w6 i" P1 o% o. @ the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition/ o" ~8 P- P. Q Board.”)- ]5 b1 G5 G2 I# V2 r3 \) q, m1 b4 f6 L Defense, f- \6 H9 I- l5 T9 `1 V Acquisition + p: n; T2 h4 F* C kBoard Committee 6 s I8 b1 c0 V3 V2 @Advisory review groups subordinate to the Defense Acquisition Board. The ; m/ h; I, x! V/ `/ s( X7 oUnder Secretary of Defense for Acquisition determines the number of 1 c9 p5 t0 S1 m$ b- j9 YCommittees. The purpose of the Committee is to review DoD Component/ Y( X" e9 P! U6 M8 q programs prior to a Defense Acquisition Board review in order to make an- Y; I/ N; ?) S V. b8 F" r6 p independent assessment and recommendation to the Board regarding the # U& v1 k+ t. jprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense( L& m/ n5 P( G( ~ Acquisition2 L6 C( v. A1 C- n# E3 h( t3 U Executive (DAE)* h8 t. ?& x. i6 |: | The principal advisor to the Secretary of Defense on all matters pertaining to the : e M2 @ ~7 G4 F4 u, Y) qDepartment of Defense Acquisition System. The USD (A) is the DAE and the : g1 c9 b' L) H2 QDefense Procurement Executive (DoD Directive 5134.1). / Y/ p2 x4 O2 X5 g E6 XDefense / {) x1 Q3 T+ ^ R# C' U, dAcquisition 6 n+ O0 ]- D2 F# K! i e/ h. oExecutive . i0 g& u! s9 L7 @Summary (DAES) 0 Y' s& C1 q8 RThe DAE’s principal mechanism for tracking programs between milestone $ b8 ~! h8 r$ q' X; {* w8 areviews. Includes programs subject to the Selected Acquisition Report (SAR),. Q0 G) T7 p' u9 q r! k and any non-SAR programs subject to review by the Defense Acquisition Board.1 c) w9 j2 X( r' Q! n) w Defense. M- M- V# [8 S* K) r) f% R Employment c- e. h% g& }# U' B$ B) FOption (DEO) & v f1 `, i. G1 R! k4 nEngagement strategy provided to USSPACECOM component forces to achieve6 |5 \- z: f8 V' N7 P$ i/ J specific military objectives against a ballistic missile attack. It defines hostile : f* @( }6 V6 Ytarget priorities, provides assets to defend, and allocates SDS resources to be ( e- X+ T8 m5 Kemployed. A number of DEOs may reside in a particular Preplanned Response # w; k8 o/ v, q5 t4 f; E3 BOption (PRO). However, default DEOs (those believed to be best suited to7 |4 P+ X s ]9 ~! ^, g counter the threat initially) will be automatically processed and executed when$ J* p j( A5 X; n: p7 M Defense Activation Authority (DAA) is given by USCINCSPACE.+ ]4 Z& K% n4 q: C: m Defense3 J- ~+ m9 K9 ?0 G9 c( i3 z" d Enterprise r* C" a: r2 `( M; J5 d) [Program (DEP) 4 ]4 F; R. R5 B+ ~7 U% z2 p6 n1 E+ ZAn Acquisition program designed to streamline the acquisition process by waiver0 v' i# J/ A1 T# ~ of selected regulatory requirements.- G1 s( {0 R* Y Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb: Z$ r8 E- ?5 M9 A' O# ` and progressively weaken an attack, prevent initial observations of the entire ( y" I! P* M3 a0 i* U& Bposition by the enemy, and allow the commander to maneuver his reserve.% G5 {! D$ _$ ?) c$ k# x Defense 3 Z% W3 V$ k3 t# `2 [& L; OMeteorological $ ^2 y6 b" l1 F7 ZSatellite Program H- X! V$ O6 Z0 t& @ (DMSP) H. n/ Q% \: e# E% YSatellites designed to meet unique military requirements for weather information. ( H8 C+ V& }0 g3 t% u$ ~& hUsed to detect and observe developing cloud patterns and follow existing . [1 i& b( d F- g( W3 Cweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. ; H- ]5 ~+ q1 W$ k2 c, K M( vDefense Planning/ V" b. H3 ^3 E9 ]7 H$ ?0 c& F7 W and Resources8 H9 N9 l: Y* T7 w& U$ R1 E' H Board (DPRB); c5 {# ^( P8 _% Y A board, chaired by the Deputy Secretary of Defense, established to facilitate ! j' y( G+ t( D$ W/ e! udecision making during all phases of the planning, programming, and budgeting5 r! ]7 C1 r9 h: k0 `% ? system process. Board members include the Secretaries of the Military 0 Z! J! x6 \7 T1 y0 @& SDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of- s( i2 s5 U* X+ S0 S4 b Defense for Acquisition and Technology, and Policy, the Assistant Secretary of 7 k( r1 i y- L$ |1 e1 U! N% S7 aDefense for Program Analysis and Evaluation, and the Comptroller of the * A+ o R4 Z% ^4 |Department of Defense.& l" J8 E, m8 t& r3 P MDA GLOSSARY, VER. 4.0 D6 I- l# `# @2 M/ ?2 {5 A0 H 761 o X$ s" O! U Defense Planning : h8 Z9 ~ u+ @0 _. M9 {4 fGuidance (DPG)' L8 _1 |$ I6 @8 y* V }/ y Document issued by SECDEF to DoD components providing strategic framework ! } T% O0 w: ~, `4 cfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, * R) i8 k% O" }, F7 q9 tand Services. In connection with two-year budget process, DPG is issued every1 m4 S4 v6 f- B9 o other (even) year.) l" F) B. R) V& z" G5 i4 ^/ w# P: S9 [ Defense Priority , |5 S1 o! ~) h1 ]and Allocation7 d# I1 o4 Y( G/ ~7 r System (DPAS) ! g8 u" }, g q- UThe implementation of a statutory requirement where contracts in support of* ^" O9 \! V9 R- v6 E' L5 p national defense must be accepted and performed on a priority basis over all : S0 X5 B6 _ @other contracts, and which requires the allocation of materials and facilities in ' Z" q8 E6 o. J" {2 }. ^! Y. Msuch a manner as to promote the national defense. See “DO” and “DX.” 0 R7 N! h1 i* }4 _. }Defense: K3 x3 k* y/ O% i Readiness 2 T4 ?. o3 p. U5 _ oConditions3 a# [( a v' I (DEFCON)* ^+ h3 o) C6 Z, N5 f; k/ h \ A uniform system of progressive alert postures for use between the Chairman of3 ^& o( N# V( ]7 d2 S! s: p. b, m the Joint Chiefs of Staff and the commanders of unified and specified commands : n% V* |6 ^9 ~; ]+ h" M: Sand for use by the Services. Defense readiness conditions are graduated to7 c* Q) b1 f2 R, p match situations of varying military severity (status of alert). Defense Readiness0 v) w7 H( x' ^- l. C Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as( ]1 N) H. y& i8 `7 [* P appropriate.9 R/ V' Q4 I6 P Defense Satellite) H, S- r+ T1 F8 Y. Y Communications/ F% V9 _! m2 R" B. r Systems (DSCS) 4 M6 o& Z) h4 j" SAdvanced communications satellites in synchronous orbit around the earth. $ x. Q1 h. b& S8 B& e& IProvides high-capacity, super high-frequency (SHF) secure voice and data links% i0 f8 ]& s/ n- f% ^( }2 W for the Worldwide Military Command and Control System (WWMCCS). They 5 w( T6 _: Z& z% ^" t: csupport terminal deployments for contingencies; restoration of disrupted service/ p1 L$ m0 t7 V" ?' e" T0 W& Z overseas; presidential travel; global connectivity for the Diplomatic # T* n& o( x% @7 g; xTelecommunications Services; and transmission to the continental United States * Y8 x$ U, N1 S/ c3 yof some surveillance, intelligence, and early warning data.7 u! x- R) _* [2 y" Z! w# d2 d. P Defense Satellite & f; f4 }. V3 x& @6 \(DSAT) Weapon5 A0 i6 F) e7 M A device that is intended to defend satellites by destroying attacking ASAT7 X4 F0 g! X& R weapons. " T5 E3 [& w I. x) {2 f: SDefense Support ' `* W8 g& `0 @0 c* f/ q2 A. c3 j/ z, [Program (DSP) ! n( c/ v# t$ x! _A system of satellites in geo-stationary orbits, fixed and mobile ground ) x1 ?& ~% W8 Dprocessing stations, one multi-purpose facility, and a ground communications / N; N5 k& O" I+ Hnetwork (GCN). DSP’s primary mission is to provide tactical warning and limited ! {: ?$ W! b/ {attack assessment of a ballistic missile attack.9 S, N/ T/ S+ p Defense W2 B9 y) M1 K# X2 a5 c9 M Suppression' [. u0 L+ A0 r' y7 T" S: P0 R% U Temporary or transient degradation of the performance of a defensive system 2 r4 s7 K* O+ m: ?below the level needed to fulfill its mission objectives, by an opposing force. 6 L9 y6 K8 h. [+ U% B(USSPACECOM) v% b9 n2 K* }) H; \9 ?+ b) {( ODefense Tier The arranging of a defensive system to correlate with the phases of a ballistic# s1 R, u& v. } missile trajectory; i.e., boost, post-boost, midcourse, and terminal. % v$ \9 T1 a j8 o iDefensive ! N! C0 l# m3 S1 n+ B$ ^4 B3 }Counter + p$ d% K1 m$ n$ dMeasures (DCM) 4 ^" |& Q1 E9 h! }9 pActions taken to eliminate an ASAT attack.2 c- p2 M$ G7 B3 a; ` Defensive; L1 y/ `* o& b1 x' X Technologies " F+ h9 J" v2 b" [Study Team 5 E+ ]! |+ |! |2 o, P5 v9 h: N6 N(DTST) ' U8 `5 c5 z( e9 \: F1 `A committee, generally known as the “Fletcher Panel” after its Chairman, 5 p4 r, i/ @. Q1 j& _% q. v+ kappointed by (former) President Reagan to investigate the technologies of4 u9 C7 r) R( X8 W% e F: { potential BMD systems. ! a/ {: M; B/ Q! Z& o s2 m2 e: PDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. 2 N' Y: ~, B h- VDEIS Defense Enterprise Integration Services (ex-DTIS). 6 i' x5 K, l1 c6 [' c% p3 G: ]DEL Delivery. $ N5 i* y8 E, HDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion" B1 }' F, l" w0 E: [& ? of shots about the aiming point. See also Circular Error Probable.( F$ ^: J1 R U: A3 Q+ x MDA GLOSSARY, VER. 4.0 D O5 j" B k; ]0 o& W1 v# G1 `+ d77& A6 l/ B* g$ I3 W$ I5 a7 d7 w Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the* e3 A2 M, z7 E( `0 D maximum change in velocity, which a spacecraft could achieve in the absence of9 k* K. u' p8 \6 h2 B a gravitational field.; t4 ~6 Z7 n; E Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). * ^1 v8 s+ Q1 FDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its, C* o g. t0 `: ] desired function (matching RV characteristics, screening RV, etc.)- t" ?, \: u8 y2 x# V0 G/ A2 R! x DEMO Demonstration.9 k" d, o M0 S2 h0 b Demonstration $ c: {% K' i- d( |and Validation ( y, D6 N3 }! X5 i2 B- I0 k(Dem/Val)2 x4 E2 B% u2 X* p The acquisition phase when major program characteristics and product designs4 \ S. _/ W1 m# P are refined through extensive study and analysis, hardware development, test, _0 k' n6 w4 G) M5 R" Land evaluations. The objective is to validate the choice of alternatives and to # b: W7 c. p! j$ K( N Fprovide the basis for determining whether or not to proceed into Engineering and, v9 c2 ^; [! ~ Manufacturing Development (EMD). . Q7 g+ t) t5 a4 HDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.' U* z) W8 J. p0 M It may include destruction, removal, contamination, or erection of obstructions. ' s" @$ U) w2 U/ `DEO Defense Employment Option.2 l) Z/ M; a. y' X% H# P" m) J8 e Department of 7 T) }. N& N/ t! m& `, }Defense 7 y9 [0 e. o( v M L6 aAcquisition n: g _9 u7 B" T, _% r; ~ System# ]/ \$ r8 v5 u) ]% c/ D: @ A single uniform system whereby all equipment, facilities, and services are 5 A1 Q" v* n* v9 ^/ dplanned, designed, developed, acquired, maintained, and disposed of within the : M' u% G2 i z0 r9 ADepartment of Defense. The system encompasses establishing and enforcing% U6 `" D" e6 ~, y7 y policies and practices that govern acquisitions, to include documenting mission . m* a$ B% G8 [4 Y1 K {needs and establishing performance goals and baselines; determining and 3 I. V4 Y2 [2 g' X0 j7 X: \" aprioritizing resource requirements for acquisition programs; planning and1 W4 ]( S# M N( l. G: X executing acquisition programs; directing and controlling the acquisition review: G! u1 a6 f8 q process; developing and assessing logistics implications; contracting; monitoring + W: s. g0 @* W+ w8 s. Bthe execution status of approved programs; and reporting to Congress. (See % j. L# ^& R5 q" U; `- QDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) & i9 F4 K' t* {Deployment (1) The placement of force elements in battle positions to obtain a higher! g# w0 o6 c+ K: b% H state of readiness. j: y A: i# d9 z4 E (2) The movement required to place force elements in battle positions. 8 r1 E1 ^1 T j(3) Fielding the weapons system by placing it into operational use with units' }7 N# T' {/ H |* N5 d in the field/fleet. 9 d, u4 R0 V3 H/ Y: g/ w(4) To arrange, place, or move strategically.8 Q0 K. ~3 Q) E r9 k o Deployment' S' r- R; D/ }# S Planning $ k5 c" U9 ^) x8 k7 }(1) The development and maintenance of plans required to initially deploy,$ T. M' o* Z0 k8 Y* s2 ?" Y+ G maintain, and evolve the operational system in accordance with$ p" V- V. V: z- J schedules and priorities. It includes factors such as launch facility ; L& F5 [! p2 A v, E2 davailability and planning for the availability of other required elements- ? k6 J( S* { O such as trained personnel or units. In addition, it identifies the impact of A" O% u9 [5 b, \7 `$ l( A deployment on operational readiness and any testing constraints0 w |2 P3 s8 d9 F, J associated with deployment. ) ?8 q3 R( N" d7 |, {4 T, d: y(2) Encompasses all activities from origin or home station through 9 j+ u' ^+ N3 I# K) \& ldestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding 3 s% s+ E. j, W7 V* ?" u Vareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment/ Q6 ?8 v9 A6 Z, k7 I/ T X. F1 z# U Testing+ _! p" y$ ]' t$ M2 z The testing and/or simulation of system assets in the physical and operational: v' e+ i4 Z% q' ~- R/ J environment in which they are expected to perform. & j6 ]; ~8 K1 T+ `& N$ IDepOpsDep Service Deputy Operations Deputies. . O4 a; k/ M( e7 R9 p1 iMDA GLOSSARY, VER. 4.0 D) a% F2 n8 {( v% V( x: N6 @% k 78 $ d9 I; ^% i6 O& UDepressed/ Z! N, N6 Z" g7 `& q4 f3 d Trajectory $ Z& \- e- R" P* k; r+ mTrajectory with an apogee below that of the minimum-energy trajectory. ' S( e* d0 X( T2 N: {% j. CDEPSCoR Defense Experimental Program to Stimulate Competitive Research. 7 W# q0 Z6 K; I3 dDEPSECDEF Deputy Secretary of Defense.& H- E. P: V0 ~0 O, T9 `# T DeSecState Deputy Secretary of State., N! R. |' L/ B; Y: Y DERA Defense Evaluation and Research Agency. Consolidated research and 7 m2 L* a6 o3 Pdevelopment resources of the U.K. Ministry Defence. Headquartered in$ V. i/ L) m& y( p% t9 M Farnborough, England.8 A% J1 p7 R, {" _" @! C Derivative , H- r) x5 i- D7 j8 oClassification% G6 m6 u4 i2 o! ~$ O A determination that information is in substance the same as information3 ^+ h- T1 h9 R8 b& v! c/ B currently classified and the application of the same classification marking. 6 }5 `' F' V( J$ e% t+ eDES Data Encryption Standard. 8 J' ?* t7 n, H8 N8 I6 ]' ]! CDESC Defense Electronics Supply Center (DLA term).' j( y9 T" D3 [5 U% G0 L- u Design 8 C5 b' j4 p. I0 C' ZConstraints5 ]2 t& T% p4 ^ Boundary conditions within which the developer must remain while allocating T H9 Y$ ?& T performance requirements and/or synthesizing system elements.% U$ F! f, Y( i4 Q Design 7 z3 v* r+ h$ v! Z9 S dParameters / G: H; Z0 k$ }7 w TQualitative, quantitative, physical, and functional value characteristics that are 4 Y! B8 Z- u' ginputs to the design process, for use in design tradeoffs, risk analyses, and : L# F5 g0 v: G" a# C, ^development of a system that is responsive to system requirements. 3 H9 J5 S# `, _4 D& d/ V& Q$ f9 @Design Phase A period of time in the software life cycle during which the designs for # I/ d1 v- z4 [0 w Barchitecture, software components, interfaces, and data are created,! N n- a5 C( F documented, and verified to satisfy requirements. 7 c; ^3 {" T& x5 ?, C, p GDesign-to-Cost# z( F# s8 w- d/ E' \1 o" U) B (DTC) Goal5 n' H9 F4 n" s3 i! {+ V7 q Management concept wherein rigorous cost goals are established during4 }/ Q- Z: M3 b" U: J development, and the control of systems costs (acquisition, operating, and ) C* w* O* H9 h2 C2 L" \- P1 fsupport) to these goals is achieved by practical tradeoffs between operational ) J4 i- W8 N- B8 xcapability, performance, costs, and schedule. Cost, as a key design parameter, : i; W M0 ^% e( _) ?& {9 Xis addressed on a continuing basis and as an inherent part of the development ' E- V; M) \) c8 |/ g2 kand production process. A DTC goal should be in the form of average unit1 n$ k# b8 b0 r/ w( r flyaway cost. Also, DTC parameters for operation and support will be + [0 a- U0 A. G. U) fselected—parameters that are design-controllable, significantly affect O&S costs, : s3 Y. b( F9 T( C8 Zand can be measured during test and evaluation. Parameters may be6 E. Q* m% g& {# p7 w expressed in dollars or by other measurable factors, e.g., manpower, reliability, or( k: D7 W$ T$ H maintainability. Firm goals and thresholds will be established no later than entry/ [' W3 ]7 [( r, b$ y9 [4 w into EMD (Milestone II). This is an in-house goal, almost contractual in nature,: ]& E3 Z$ U5 m3 y8 z' p7 ? between the PM (Service) and the SECDEF. Allocations from this goal will 2 G# w) Z* b. O L) Q# ^become the contractual DTC goals for contractors supporting the program. & `+ M0 N% q4 O. N% iDet Detachment. 5 q' k7 l% } K' }" I$ mDETEC Defense Technology Evaluation Code.3 o/ b4 b0 W% _/ I Detector A passive IR, visible, UV detector turns photons into an electrical signal. The - }# I% j- [9 O7 x" i) l! F. l, BIFOV of the detector is its solid angular sub-tense. There is sometimes 5 c' F8 {9 A4 v1 {! w0 bconfusion between the detector sub-tense (size) and the pixel (picture element/ Y" M8 X' w. ]+ B' m/ }: |$ N e size). They are the same for a staring sensor, but in a scanner it depends on . ~$ [5 t6 ]% `, ]0 @" t' }the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.' E9 i! L& o. Y MDA GLOSSARY, VER. 4.0 D * d* u& }$ }# _79% M9 o/ {: a) K& O DEV ENV Development Environment. $ \; n$ Y' p2 w5 J4 I T/ dDevelopment * X. e6 N0 G8 ^/ E, e) c% e! G* TTest (DT) , d, x$ t' O7 C3 n% c: eTest conducted by the development test organization to achieve specified test6 W( I( \+ k1 |7 a' J objectives. It may be a complete test, a subtest, or a phase of a test.! n" t$ I$ {( X" D' q Development 0 ?1 k; v3 ^0 U# @. ~5 D' M# s) OTest I (DT I) , j% a5 g& w3 Z* r9 mA series of tests conducted during the demonstration and validation phase.* T8 L; y/ _9 d2 }6 Z. R Components, subsystems, or the total (or full) system are examined to determine. P r, E$ O( z1 Y. B5 J whether the system is ready for EMD. State-of-the-art technology is addressed$ L4 _" y7 r( T' Y! S, w in DT I. ! x8 }7 U% S, _" |Development ; \) N- B5 O/ d: S: zTest II (DT II)( w1 W" p! n5 P, }6 I' M A series of tests, normally during EMD, which provide the technical data/ U/ v4 I! x, A2 [' y; t& r necessary to assess whether the system is ready for low-rate initial or full* s: `; {* w9 K8 v6 P0 t2 e8 x+ ^7 E production. It measures the technical performance and safety characteristics of P7 p& x# N8 ethe item and evaluates its associated tools, test equipment, training package, ' z! ^. Z, C1 w* j( Sand maintenance test package as described in the development plan. DT II . }5 H% E6 f* v$ zaddresses accomplishment of engineering design goals and the fulfillment of5 I! K. S) w" m( w- G# w contract specifications. , ~( [; n; V) r+ y0 f( t) V$ ODevelopment " U) [' B# y% ]3 O3 e5 C UTest III (DT III)7 J( r) Q: P2 Y' p$ L Tests conducted during production. / H5 B c6 d! {Development3 @" N, G \7 |) l3 W Test and # K" ^ t! I1 V+ ?$ y a( O6 HEvaluation * j! l7 o0 g* q+ F: ` ^$ z(DT&E)# @' I, f( S, _* P9 ?+ c8 `( N Test and evaluation conducted to measure progress, usually of : z: `, r; e2 ?2 b. Mcomponent/subsystems, and the proofing of manufacturing processes and' M# k, `- S0 `$ I h& f8 F0 x controls and to assist the engineering design and development process and5 n/ x2 y0 g5 G, X; Q+ Y4 ]/ r, R T* s verify attainment of technical performance specifications and objectives. Usually $ d- l' t3 g! Y. g& Nconducted under controlled or laboratory conditions. Can be conducted before& w; I' C2 G1 W" x0 T or after production begins.) e- p5 m" n( i$ k6 m* _0 o& H Development ( {: m) _$ u6 yTest (DT) $ L( l5 v' D7 l2 |8 Q/ C$ R# vTest conducted by the development test organization to achieve specified test. A5 ^: a0 e8 o; t& L objectives. It may be a complete test, a subtest, or a phase of a test. # b/ X, b6 `& {8 j. u( W& I+ H9 mDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost, , a q. t! R. p2 E+ rschedule, or performance without authorization from the milestone decision" i! ~. r! _8 H$ M authority. Acquisition Program Baseline (APB) thresholds represent these( t* i3 q& e# R4 b) y+ ?( R parameters. ( U' `- i, M! r: dDevolution of; Y9 J& [" H, Z: g1 y/ h, s% o Command . |/ U; e, s; yMinimal essential operational capability to perform C2 provided in an orderly and 6 J3 V) V- m& l3 l# \timely fashion to a duly authorized successor. / P4 s a, w8 HDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.8 L$ y v3 o* ~2 Y3 ~1 K! r DEW/D Directed Energy Weapon/Discrimination. & \+ l! r0 b6 O2 |2 WDEWG, O Directed Energy Weapon Ground, Orbital 1 M8 g& R6 J1 C9 k0 FDEWL Directed Energy Weapon, Laser (thermal or impulse). 5 c ~" K/ w0 Q) l7 ^DEWP Directed Energy Weapon, Particle Beam (neutral or charged).& a# t/ j" C2 Q' \: o DF-KBS Data Fusion Knowledge Based System. , E9 [3 j6 W& l2 \$ O$ I! JDF2 Deuterium Fluoride.; h( o- Y I& I/ b( C; R DFAR Defense Federal Acquisition Regulation2 r3 T u3 ^! F1 i4 M$ B1 n- B DFARS Defense Federal Acquisition Regulation Supplement.+ l( I, j3 a+ O7 k0 v6 B) ? MDA GLOSSARY, VER. 4.0 D ! W2 c8 a% n, \9 v/ G, U2 P80 I, z: q( A( r/ zDFAS Defense Financing and Accounting Service./ t! v1 x1 U* B- W) n DG OBSOLETE. Defense Guidance. See Defense Planning Guidance." ^; i( N+ }) g3 ~/ R0 k# F" B DGA Director General of Armaments (France). 8 \8 L' v/ v3 m- hDGP Defense Group on Proliferation. ; ?3 l. |8 w0 W! WDI (1) Data Item. (2) Developmental Item.+ v" B; N j8 s DIA Defense Intelligence Agency. 1 F& r( j" r* y$ PDIAC Defense Intelligence Analysis Center.; J K8 X. ^0 T* E2 U$ W DIAM Defense Intelligence Agency Manual . _* A+ c2 @/ R2 @Diameter (Optics) The unit of measure of the light gathering power of a lens., C/ J& x. E+ V1 |# B' B% u DICE Digital Integrated Combat Evaluator.7 A3 u/ J9 Q# ^+ ]% R" p& L" v DID Data Item Description. 2 s. o" j( a$ C/ d+ S8 n mDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The + e+ A% }& t, U8 S$ u" k, C5 Oangle of spread, which cannot be eliminated by focusing, is proportional to the$ t+ Y% Z B( a5 l# r ratio of the wavelength of radiation to the diameter of the aperture.2 o2 `/ c) @" @, m Digital# ]: ?: L) L4 A9 R Processing6 ^% S1 B+ y. ^( ~ The most familiar type of computing, in which problems are solved through the" t* D u6 L |( ^! p* R mathematical manipulation of streams of bits. * T+ G$ H- L6 K/ ^DII Defense Information Infrastructure 0 Y4 g8 T" y3 L( \$ YDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to + }* K9 R+ `. ]. g12 km) between wake termination and de-sheathing.+ H- u/ e; @- T' u2 j2 Q' C* V DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). 3 A, x2 n$ J/ S( b$ z# D6 DDIR Director. 4 Y- W" i# K$ X: E0 F8 lDirect Air- U1 l& h; `! E# L. t Support Center2 l) R1 V# ]; T( f) d( x+ ~1 b& b" Y A subordinate operational component of a tactical air control system designed. [0 Q7 u# u' `8 J, V for control and direction of close air support and other tactical air support 1 q- O. K6 G) G0 }- k# e" m, E7 uoperations, and normally collocated with fire support coordination elements. , V$ b& g/ X4 ~2 c+ kDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not " l* l3 i) m: l4 t: [) o. ynecessarily limited to items that are incorporated into the end product as labor or ; X. i! \" S2 B( W( Hmaterial.: H% M0 ]( c7 M% ~! T8 V Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing; T6 g- F; m- y$ M direct labor includes fabrication, assembly, inspection and test for constructing 8 w' A+ }1 q0 k6 x* B2 Athe end product. Engineering direct labor consists of engineering labor such as 4 f- o+ }3 c7 s; z. ? Treliability, quality assurance, test, design, etc., that is readily identified with the 6 K9 F3 Z& ?2 R9 Hend product. ' @- Y/ ?3 [% F! O' `Directed Energy; J4 [5 u) x+ w S (DE) ! S; @: w* e- @7 v2 p1. Energy in the form of atomic particles, pellets, or focused electromagnetic2 M4 D F7 P' I/ ^, k: `* f beams that can be sent long distances at, or nearly at, the speed of+ J- `& A3 k: `) F2 X9 x+ h& n0 ]- W light. $ g# R8 c; ^. P. n2. An umbrella term covering technologies that relate to the production of a* V- I9 T2 k4 y$ \1 X1 x5 y beam of concentrated electromagnetic energy or atomic or subatomic particles. : z1 J" J% I- [+ y; J4 qMDA GLOSSARY, VER. 4.0 D/ a: Q6 ^* Q+ j 81 7 @4 X% h( R+ p. }! hDirected Energy " L s; W$ M# D9 K6 S5 Q1 V; o: UDevice E/ X5 }8 g% q A system using directed energy primarily for a purpose other than as a weapon.* U ] h/ m' g Directed energy devices may produce effects that could allow the device to be 8 E- J0 `% I4 o1 b5 `3 s2 qused as a weapon against certain threats, for example, laser rangefinders. / q H6 o' c5 _- ~Directed Energy9 \6 d2 B# \, i5 p; q Weapon (DEW)2 D& x' t" r: b A system using directed energy primarily as a direct means to damage or destroy1 O' o2 [' I: F5 v ~! K enemy equipment, facilities, and personnel. # E% p% M1 q5 [DIRLAUTH Direct Liaison Authorized.) m2 {% `3 q& S DIRNSA Director, National Security Agency. Z0 g) @7 R0 j5 r DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. , [1 @4 @" u( TDISA Defense Information Systems Agency, Washington, DC. (Formerly known as; R/ U4 p; } s& r% r1 x. T9 \ Defense Communications Agency).. B* @0 N5 ` O, U DISCO Defense Industrial Security Clearance Office 6 Q& r& g7 o6 C4 R8 y; zDISCOM Division Support Command (US Army term).4 M4 Q, @5 c; b& X: C7 k/ t Discretionary 0 j3 Q1 Y9 i0 Y7 TJudgment ) ]6 z$ }# y1 ^. r; c; V4 }( R! Z' MThe authority given USCINCSPACE or his duly authorized representative to 1 \1 \+ w$ i. V. p8 vperform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination- K2 m/ Q2 Q/ I7 a; ^$ j DISN Defense Information System Network (DISA term). 1 J+ c* k9 [' L$ _3 Y" DDISSP Defense-wide Information Systems Security Program.0 j1 D. n' e. ]# T/ @2 T, e DISUM Daily Intelligence Summary (JFACC term). : b0 k* H; t8 V8 P5 KDITDS Defense Intelligence Threat Data System.; a- s: P6 F0 D+ J DITP Discriminating Interceptor Technology Program. The objective of DITP is the ( x# y* D- D( L6 x+ qdevelopment of advanced interceptor seekers to counter advanced threats. 1 _# ]/ l3 y+ ?/ H% bDITP will integrate passive and active sensors into an interceptor seeker that+ d0 b; V6 F. b4 d: G integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP' |! p/ F; |; G, K/ k' K, M flight demonstrations will involve the tracking and interceptor on-board . [ ?8 G b2 X$ y' _discrimination of targets of opportunity while providing fusion processor data 2 s9 k1 P. n. [8 |8 D2 q' i3 ^9 Ptelemetry. (See also ASTP).9 ~+ D( a- j$ k+ V3 @ DIVARTY Division Artillery (US Army term). $ b) M0 t8 H8 e, EDIW Defensive Information Warfare. / [/ p- v8 X! n" g6 d' I/ DDLA Defense Logistics Agency, Alexandria, VA. 4 W9 q1 ~3 ?& T, @+ D- G3 [: {DLSC Defense Logistics Services Center (Battle Creek, MI).0 V j- v, \5 ~5 D' L DM Data Management : z. o3 F* A4 g" ]' t* K! F0 rDMA Defense Mapping Agency, Fairfax, VA. . ~- z( y( T [: \DME Distributed Management Environment. `0 P) v l, ?" ~4 y0 {* mDMI Dual-Mode Interceptor.! @! l+ e+ R5 H MDA GLOSSARY, VER. 4.0 D4 F. @2 I% t3 q6 @0 W/ W 82* ~2 }% x" I, `0 |4 W DMRD Defense Management Review Decision. ! s& J) ^) l: wDMS (1) Defense Message System. 2 N0 x4 P* w, M% d1 X(2) Dissimilar Mission Simulator. 0 i2 ]! K9 m; C& iDMSO Defense Modeling and Simulation Office (OSD). P$ X" ~' s; t, [9 u& mDMSP Defense Meteorological Satellite Program. ( S8 L; v7 K0 ~( c& A2 Q" y6 aDMU Disk Memory Unit.; j7 p6 E$ ~, _0 `4 ^- M DNA Defense Nuclear Agency, Alexandria, VA.. ]( n& A4 T/ j+ P/ r u: q DNMS Distributed Network Management System.9 c8 E& o. e% y7 Y: H K& ]4 [( D DNSIX DoDIIS Network Security Information Exchange" t* c# b+ _' L7 g5 N& e DNSO Defense Network Systems Organization.8 d+ ^2 P1 r1 ]- y' j9 L DO The lowest rating under the DPAS. All “DO” orders take preference over unrated" c }9 B ?6 A* v! b orders to meet a required delivery date. ' Z) L# @7 b! i+ ADoc Document5 S* }5 S3 R- Z3 W8 K DOCPREP Documentation Preparation.4 T& ]) `* l( |; g Doctrine Fundamental principles by which the military forces or elements thereof guide " {$ Z( ]7 o0 a- y9 c% ^their actions in support of national objectives. It is authoritative but requires 6 O0 _2 m e8 gjudgment in the application. See also Combined Doctrine.' @ l' N P' ]0 q DoD Department of Defense! H/ D9 D$ c! W8 p4 `$ L3 ~) D/ N DoD Component 7 D8 _9 L7 y( g8 v' h( NAcquisition0 B V! P. D; q" ~. ?( d" | Executive* J, z. K3 k9 ] o, p; S$ L A single official within a DoD Component who is responsible for all acquisition ( ~; G3 \8 w+ d1 yfunctions within that Component. This includes Service Acquisition Executives+ h% Z4 }6 @* p# H. p8 ?& S8 z for the Military Departments and Acquisition Executives in other DoD6 V+ U% Q! C% r# Z' s' p Components who have acquisition management responsibilities. ' t# q7 v: U# E5 _: M) _: @4 cDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, ) Z& q- V( i3 d9 W) }Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the 3 i, \- { y. e9 Z6 QDefense Agencies; and DoD Field Activities. % h( d; l, u& I+ K( m3 XDoDD DoD Directive.2 x4 G$ f6 z' l+ x1 Q5 x, n DoD Directive ) I! d6 v/ l% p- y8 H8 p5000.1 7 }& S" M* R5 ]; r/ D" ~' {“Defense Acquisition.” The principal DoD directive on acquisition. It establishes/ O1 U% P1 A! w) M1 c2 B policies, practices and procedures of governing the acquisition of defense ' p& T4 a9 O) k" |; o$ g# vacquisition programs. ) J1 @( f8 ~' ?, I. ~5 nDoDI DoD Instruction.' _: u" O3 Y- |8 n3 I DoD Instruction$ E+ y3 l, o' s. t 5000.2# e$ m# B5 R+ g. ~ “Defense Acquisition Management Policies and Procedures.” Implements DODD% Y; Z1 G: J: m; z* j; Z, [3 O. ~8 P 5000.1. & M: P/ J% ^. D$ r+ ?1 p, fDoDIIS DoD Intelligence Information System. L6 {: _8 a a! ]) ?/ }# |DoDISS DoD Index of Specifications and Standards. 8 m! f$ ^7 t1 O% I6 |. U8 v uDoD-M DoD Manual. : }8 h" g$ o0 k- a; _# }) \MDA GLOSSARY, VER. 4.0 D5 F7 S" _2 ~, l' D/ S' f 83 7 I) F# V5 \ Q) {# ODoDR Department of Defense Regulation. 1 b& g: l+ S$ r, }- S9 qDOD-STD Department of Defense Standard. * q# S8 q; K' tDoE Department of Energy. * b. v4 m! _0 e3 Y2 F- DDOF Degrees of Freedom. ( j/ v( e1 _/ `Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system. X3 e4 b# z! c3 L; z having a detection range of approximately 3000 km. It is believed to provide2 m* V" i8 i4 e$ J \$ o Q3 ? battle management for the totality of Moscow defenses. 6 l& R: h0 j' D: o8 yDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). * [4 C0 J. s* `) M% G0 u) _ UDOPAA Description of Proposed Actions and Alternative (environmental term).' y& G, @! z4 B. e. | Doppler Effect The phenomenon evidenced by the change in the observed frequency of a ( A$ w$ X5 ^) u; y" vsound or radio wave caused by a time rate of change in the effective length of 5 t/ U! d& D3 @# b; I) r$ nthe path of travel between the source and the point of observation.) X7 I' a( O5 v9 J6 d DoS Department of State (US).9 y2 E, O* g% I- w. d- R DOS Disk Operating System (TelComm/Computer term). 6 E) l# u% B6 c4 T" `) V" }/ ^3 n& W* yDoT Department of Transportation [US]. 9 }* t6 G# L( M$ cDOT Designated Optical Tracker. ) \; {0 X! c. TDOT&E Director, Operational Test & Evaluation. 3 ]0 O: K) V$ ~DOTH Defense of the Homeland. 6 o* W" ?$ p/ c1 U3 Q2 }0 s6 ^/ |Down Select To reduce the number of contractors working on a program by eliminating one or 8 t; ~- D& g& ]. N. e% dmore for the next phase.0 y! L$ I8 A$ K* N T1 \ DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning., \4 w ^0 a7 n1 C7 x- k DPA Defense Production Act.0 i$ z. E4 t3 c. f. m' L DPA&E Director, Program Analysis and Evaluation. 6 k- ?) h- g( V, K; \5 dDPAS Defense Priority and Allocation System. 0 G, j+ E6 {2 bDPAT Dynamic Program Analysis Tool. , w" o3 J1 w9 K! tDPB Defense Policy Board. " [! J t6 a6 i9 e% \$ E* HDPG Defense Planning Guidance. " I* j, m5 N: s. ^6 oDPM Deputy Program Manager. # _) l/ E6 \" F) _DPML Deputy Program Manager for Logistics9 B! S6 M4 L. ]; Y/ k DPP Distributed and Parallel Processing (Computer term).) W* Y- x# }/ \ |- [ DPR Defense Performance Review. - e, n7 r2 d# u( WMDA GLOSSARY, VER. 4.0 D6 Z6 _" ?( }5 K. U 84$ E) v+ g2 ~7 V5 e: _( n. ~ DPRB See Defense Planning and Resources Board. 7 n+ R4 Y7 Z+ \8 v( L$ W/ ?DPRK Democratic People’s Republic of Korea (North Korea). ) u, `* Y9 W2 K3 M+ l0 ]DPRO Defense Plant Representatives Office. + @* i, d p( nDPSSL Diode-Pumped Solid State Laser. 4 B2 P* @6 n$ TDR Deployment Review. k: K& N# j+ v8 }$ g# |DRAM Dynamic Random Access Memory.+ b$ }* ~4 ]' Y Draw-down Curve A method used to encapsulate the overall performance of a BMD system that : X! @! z! q k/ l0 h- Aplots the probability of survival on the vertical axis versus the number of attacking+ h# H4 I+ Q7 o( h RVs on the horizontal axis. Used in conjunction with attack price, they are the- p+ U h1 p+ ?& ?. C0 f( O most important expressions of a BMD capability. + C# c0 Y( [- d. K7 ~DRB Defense Resources Board. 0 }) F$ p- n2 h8 DDREN Defense Research and Engineering Network.! f. {1 A4 W/ y) F, ?) |9 s DRFP Draft Request for Proposal. ) D. j+ E1 \1 U' A& C3 uDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from ! S) S8 x0 |+ E9 {gravitational and atmospherically induced torques on the spinning projectile. ! K |3 i" X* _ ~/ a* M: ?DRM DAB Readiness Meeting (DD 5000.2 term). 5 U5 @+ b4 {! N. {# c( P6 @: r ZDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also 2 E, O R" I/ y5 O: q6 F; hRemotely Piloted Vehicle., ^ O- E- N8 C9 w7 W" \ DRP (1) Deployment Readiness Plan (US Army term). ; a6 v! B# u/ m1 I: p(2) Deployment Readiness Program.4 n3 Q7 ^5 f( r6 S. g DRR Digital Receiver Replacement (USN term).* ~( \$ u* u8 O0 q5 H( M- g; O7 F DS Deep Space. , }1 e1 D0 o8 U9 P; M0 GDS-1 Category of telecommunications circuit capability.4 J" H- g" ~5 |" d7 A DS-3 LAN Category of telecommunications circuit for a Local Area Network. # ]/ Z" A+ A# y& D0 bDSAA Defense Security Assistance Agency (OSD).* [4 c. q. M/ X! ^- d8 { DSAT Defense Satellite Weapon. : c6 h, s6 N, j. C2 o) |) w+ KDSB Defense Science Board.: k0 E- Z5 K* c) S8 ^; t DSCS Defense Satellite Communications Systems. ' w7 Y% u/ R$ l% m0 YDSCS-3 Defense Satellite Communications System Three. 2 u% C: Q% T* p4 |) `$ eDSCSOC Defense Satellite Communications System Ops Center.8 ?$ G* |% R) g/ J4 ^7 j DSI Defense Simulation Internet , t D5 m; M4 Q$ e1 LMDA GLOSSARY, VER. 4.0 D , {7 `0 v' `. B, H3 z0 p4 e$ {7 K) y0 Z& G" g85. M$ C6 |7 D+ I) R! s DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet3 G3 C2 K& F/ Y System. s7 W- w8 A8 K( n0 d' X& a" X DSM Decision Support Matrix+ _' X" j9 {( c `" h DSMAC Digital Scene-Matching Area Correlation. 6 m& c0 o- _2 }2 z0 ~7 p( XDSMC Defense Systems Management College.9 v1 C& b( t! T$ A; d B( R7 ]* \ DSN (1) Defense Switched Network (formerly AUTOVON).1 _% i% A: K* a( a; H0 i/ T (2) Deep Space Network (NASA term).6 V& N) t" M& Z# o! e DSP (1) Defense Support Program. (2) Defense Standardization Program. ( U _/ a+ S$ _4 B( }DSPRTM Defense Support Program Real-Time Model. 8 X9 c) Y/ j+ j. z8 m2 DDSR Data Set Ready (TelComm/Computer term). ; r4 c! ]$ N& h1 [DSRCE Down Scooped Radio Control Equipment (TelComms term). # T& r/ c6 S4 D2 ]' v$ fDSS (1) Defense Supply Service. (2) Digital Signature Standard.; w$ M5 q( P! d& { DST Defense Suppression Threat. 4 {+ \( l1 a' _1 G8 A. hDSTAR Defense Strategic and Tactical Array Reproducibility. 7 f% O/ n/ _6 Y! W: P$ T) vDSTO Defence Science Technology Organization (Australia).6 S/ E6 l- d( v6 _6 S2 e9 r DSU Digital Service Unit (Telecomm/Computer term).' r' I3 J' {. `& l1 c7 O, ~* b$ P DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to 2 H1 c3 I! q; X$ w6 _ \1 Mthe DNA.- i- I2 D% o9 R* ?1 a: s8 U- I% m DT (1) Discrimination Technique.; J$ m, Q# P" ? q: H% a0 V9 \ (2) Development Testing.. `0 d$ a( s+ l% A! k8 Y5 @ (3) See Development Test I, II, III. 8 H9 u: c8 t) j7 k! g(4) Down Time (ILS term).7 X/ Q4 ]3 n) A6 {9 j (5) Depressed Trajectory.; L6 M, V2 X7 i- y" i (6) Dedicated Target. 6 I, N! u. ]$ f* ?% w, B% g' w# LDT&E Development Test and Evaluation.5 M4 L6 J% X$ L' F8 g1 k8 ]! S DT/OA Development Test/Operational Assessment. # X! J6 y& p3 _( M5 M: @DT/OT Developmental Test/Operational Test. 5 b! ^6 K: R- h4 J9 h5 RDTAP Defense Technology Area Plan. " ~' b4 ^$ l% y: K E+ XDTC Design-to-Cost. : z3 G4 x% J B. e# n2 ^3 ?7 UDTD Digital Transfer Device (TelComm/Computer term).: y( y/ x* C% R# N) Y DTE Data Terminal Equipment (TelComm/Computer term).0 o2 `" J- p3 M( t' Y; t DTED Digital Terrain Elevation Data.$ |' ^1 m% N5 d DTIC Defense Technical Information Center, Alexandria, VA. 5 x# }" o3 A( ]3 X j; P ~. ZMDA GLOSSARY, VER. 4.0 D" A: w Q. o; \2 i 86 1 z7 z& c! d# l8 {7 e8 HDTIS Defense Technical Information Services (now DEIS).* E2 y0 {. t6 }( U DTLCC Design to Life-Cycle Cost. , h5 W; o+ J2 N- vDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL; X% @+ ?- D4 w4 R term).! }5 l# v/ @. N: R+ v DTLS Descriptive Top-Level Specification. - O# R" j4 A; ^DTMF Data Tone Multiple Frequency (TelComm/Computer term). 3 ?- l4 j5 `7 p7 `1 }2 j( ?& nDTO Defense Technology Objectives.! f( a' |, M$ ]' p3 @2 j% D DTOC Division Tactical Operations Center.+ @) u+ f+ Y2 F- c! z3 u6 l DTR (1) Demonstration Test Round. (2) Development Test Round. ' {$ H% ^8 f) {) H% W+ mDTRM Dual Thrust Rocket Motor.: d! {2 ^5 D6 c DTSA Defense Technology Security Administration.4 R) l5 `- V9 U, O/ C DTSE&E Director, Test Systems Engineering and Evaluation. & m, R" ^2 F4 y$ V9 l4 s& k, KDTST Defensive Technologies Study Team., x8 N. Q) n6 b# D DTT Design-To Threat ) Y$ B! J5 `, d6 A& o* m# NDTWT Dual Traveling Wave Tube (Electronics Engineering term). # F+ A q7 s) E: K! d( lDU Depleted Uranium.5 c4 r, D2 g, r5 I) m t DUA Design Upgrade Assessment., Y. `% A/ N8 | R5 B, K0 r Dual Source Two contractors producing the same components or end items for the same ! B6 I m0 u* E4 U* K& }% Sprogram. , w0 D& n, A1 E) `9 g, C, kDUNDEE Down Under Early Warning Experiment (MDA/DSTO term). " ]3 J3 l( `( D. j: w. nDURIP Defense University Research Instrumentation Program. 5 i9 B5 `2 O" p! Y. E, b* I! j' }DUSD Deputy Under Secretary of Defense.) V8 w+ i8 Q% r: L9 T# m m DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). % a w$ e1 \: d9 K: L5 V" X2 t! oDVAL Demonstration Validation." V* G: ^/ C, g DX The highest rating under the DPAS. It takes preference over all other rated and ) a5 _/ F* s7 u( ]+ j1 m5 M- Rnot rated orders on a contractor’s production line. The BMD program carries a 7 m) O1 V/ @; v+ M, P8 Q6 h& v“DX” rating. 2 y0 Y) m# Q- F6 L% v1 B1 OMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 : l e6 _& V, J) A$ i) j" [E East 5 m0 V2 ?6 B: K! `: _/ CE2 I See Endo-Exoatmospheric Interceptor. % `: Q0 \, T$ q& t: tE2SRD Effectively Two-System Requirement Document.0 n' P, G2 \% |# B E3 (1) Electromagnetic Environmental Effects.$ _! Y X, S7 J9 n (2) Electrical, Electronic, and Electromechanical. ) O3 h2 ]' H1 z9 T' gE Spec Materiel Specification.) P- B: Q5 o! M' ^3 g$ T7 S EA (1) Environmental Assessment. % S: s2 k$ r! @: E+ J(2) Engagement Authorization.7 D: { W. \. ^. T$ w (3) Executing Agent. 1 L& ~2 g% ~& s- `(4) Evolutionary Acquisition.3 O! _% S: c) {" L" w9 ~ (5) Environmental Analysis (environmental term). \4 C2 i) k7 h. ~0 z (6) Executive Agent. 9 g' {1 P! b, Z6 ^6 mEAC Estimated Cost at Completion. 6 H6 T( V6 W( s0 z6 L7 iEAD (1) Engineering Analysis and Design. (2) Extended air defense.0 g: M. a v; B) a EAD/D Engineering, Analysis, Design and Development. * M0 w: [' `0 ?$ XEADSIM Extended Air Defense Simulation.; `1 C" z n9 d0 U EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing * j3 h8 ?$ e$ X% Kusers to model military response to airborne and ballistic missile threats. ( N& O. F5 `' E9 tEADTBP Extended Air Defense Test Bed Program.- E N' `7 G# f& _/ b j. b& [ EAGLE Extended Airborne Global Launch Evaluator.. B7 y f" P3 g EAM Emergency Action Message. d0 d2 [& G7 V7 d8 b; e: ?+ EEAR Export Administration Regulations.$ {5 `: }: z% B6 M8 z! _ Early Operational , D4 z* \. d+ X: _, v# JAssessment ! Z9 r* h# }. U/ o" }7 E% ]An operational assessment conducted prior to, or in support of, Milestone II. 7 h" I! z/ b8 g i- {" g% H; H. D) jEarly User Test 7 c# I6 F" z& f+ G, [(EUT) ; Y8 S$ e* {: u9 @9 d4 {, EA test employing representative users to examine materiel concepts, training or ( T h: t% L: blogistics planning, or inter-operability issues. EUT can be accomplished during/ X+ A6 H0 k4 |/ ]3 Z% W DEM/VAL on brassboard configurations, experimental prototypes, or surrogates6 {, C8 n5 D6 Z0 L, c+ H: V s% n to provide data leading to the decision to enter full-scale development.1 Y- _3 ?1 y' n& _" m$ l Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of- K9 D! P/ ^# Z0 i+ J$ M0 k surveillance satellites and long range radar.2 {" ^+ k* q1 {6 E$ ~ (2) Early notification of the launch or approach of unknown weapons or1 Y0 U# i3 j( |3 V1 t$ e2 M weapon carriers.) n% y& \) n8 J y8 E! F( Q Earth Limb The apparent outer edge of the earth as viewed from space. * N& o* g/ e6 U, k( K7 C' F- p$ U' NEastern Test5 _( V" ]6 @( l2 @& r Range (ETR) 4 A! z- T5 m. MBeginning at Patrick AFB, FL, this range stretches halfway around the globe/ m* @# K) k5 _8 D where it meets the Western Test Range. An array of launch complexes, sensors,$ I" j$ y, v: d C' \5 { and tracking sites make up the Eastern Test Range. The ETR is now operated" A C( b; \$ k, h. m9 r by AFSPACECOM as shown in WTR definition. * R# B$ v8 `: v$ l4 uMDA GLOSSARY, VER. 4.0 E # g, s w' ]: a) O8 j: U7 ]& V4 e88+ ^* a! {) R2 B+ e EB (1) Electron Beam. (2) Enhanced Blast. l5 }- M% u, E, c$ b EBB Electronic Bulletin Board.) s0 K4 I h5 b6 K+ ] EBCDIC Extended Binary Code Decimal Interchange Code. ) g3 H# [6 h0 [: e# S' YEBW Electron Beam Welding. * l6 e# H O4 [3 z bEC (1) Electronic Combat.' |1 [' n4 X% x7 x/ m (2) Error Control.3 U6 ?* c0 Z6 N3 {, O" W& ^ (3) OBSOLETE. European Community. Now known as the European Union3 x% q% j/ D8 i (EU).( `+ q% ^9 n2 i) D( M3 Z$ t EC/EDI Electronic Commerce/Electronic Data Interchange 8 P1 e( F! w$ s6 FECAC Electromagnetic Compatibility Analysis Center.; V1 u j' B$ V% n8 \ p; Y0 C ECB Engineering Change Board. ; A4 w, q! \' Y9 ~5 Y) y8 ]ECC (1) Equipment Control Center. (2) Element Control Center (USAF term).1 s/ W/ f2 I8 F h; | ECCM Electronic Counter-Countermeasures.6 y' Z: Q* W/ R9 r3 G$ l6 i ECDs Element Control Directives. % I4 H6 X" k; Y3 T; y3 yECLS ERINT Command and Launch System. 9 } C0 q+ t# D& J+ SECM Electronic Countermeasures. ) D1 y# G, R$ l, p: MECN Engineering Change Notice.; ^2 Q1 F K1 _5 P: U ECO Engagement Control Orders. # C$ n* ?2 Z* @% ]& a4 Z; P6 gECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.; _) Q% E$ g; Z) ]" v" h ECPMO Electronic Commerce Program Management Office. 8 l; M! c* G% _9 L- B! g7 iECS Engagement Control Station (PATRIOT)., |5 Q1 u( [2 l ECU Environmental Control Unit. 7 O& L3 L) M! e' p: U; QEDAC Error Detection and Correction# n% Y& K7 m$ ]3 u EDGES Electronic Data/Guidelines for Element Survivability. , ^0 w E8 y3 ~, VEDL Electrical Discharge Laser , ] P/ W O4 Q8 _" o8 t hEDM Engineering Development Model. : S% D7 m9 b1 VEDP Engineering Development Process+ R+ T* g3 ? x/ k4 U EDR Embedded Data Recorder (PATRIOT).) T* _- y* B! i* I) _: T EDS Electronic Data Systems Corporation" m/ w7 W$ d: `: b EDWA Engagement Determination and Weapons Assignment (PATRIOT)." K8 n/ v$ r) i: @! F MDA GLOSSARY, VER. 4.0 E ~; o ?! u9 E+ J896 Y4 t* o( G3 [, J9 W EDX Exoatmospheric Discrimination Experiment0 O7 k5 G9 C; O" o4 Z! [ EE (1) Electrical Engineering. (2) Engineering Estimate. ; ?3 e7 b l) B" j L) J) rEED Electro-Explosive Device." Z7 x+ `& F c6 P3 x EEEV End-to-End Experimental Version. 4 J* |% h$ f) L4 h$ qEEFI Essential Elements of Friendly Information.5 C$ [& I: ~6 x+ v: |" y EEI Essential Elements of Information.- X. E# G' z% G9 s4 _) ?2 I7 }7 L EEIC Element of Expense Investment Code. 8 g9 o7 s& E7 o& t- jEELV Evolved Expendable Launch Vehicle (USAF term) ( _4 ?+ u8 H t, j0 _4 z, I5 b* KEEU Electronic Equipment Unit. 8 P9 E8 Y, f) Z6 NEFEX Endo-Aeromechanics Flight Experiment.$ ^% B- ^( i7 i6 }/ t' G EFF Electronic Frontier Foundation.0 ^8 Q# n$ n1 A9 j$ b/ T2 K Effectivity A designation given to the BMDS configuration and demonstrated capability at$ r* B6 [2 C4 p5 C* _; Z a point in time, becoming effective at each increment when an element or9 t/ @. s+ a6 [5 U* m0 H/ Q component is inserted into a particular Block.0 N4 g) x0 Z+ l- G8 q# O Effective Damage That damage necessary to render a target element inoperative, unserviceable, . ]3 _* e5 b9 Q. D% I# ~8 rnonproductive, or uninhabitable. - O" D0 O+ Y. Z# h: |5 JEffluent Plume The pathway of movement of effluents through surface water or air.* c" j/ D" \ h. E0 d: _ EFP Explosively Formed Projectile.; \" Q' L" b' w; D EGP End Game Processor. " C' A K4 }+ `) u6 GEGTR Eglin [AFB] Gulf Test Range., [. @' y6 n" d2 g9 ^# J! o EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). - X/ Y# x0 f- C6 p' p3 w% D. U5 `+ IEHF Extremely High Frequency." [, |: r; e- C& @" Y ehp Equivalent Horsepower.8 p8 h# j' c0 g$ \ EIA (1) Environmental Impact Assessment. # \" S H% L5 s. n(2) Electronic Industries Association.3 c n* {' \% h8 A( f EIAP Environmental Impact Analysis Process.; w, c; [: q, v. V* m EIP Exoatmospheric Interceptor Propulsion. % Y# d; ~3 d. MEIPC Electronic Information Privacy Center.5 |% D" Z$ L# B( W c& P EIPT (1) Element IPT. (2) Engineering IPT.2 j- |( j m# O5 Q6 v3 }2 Q: } EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.! ~( @7 O" E9 j! {8 g) r+ I L# R EISA Extended Industry Standard Architecture (Telecomm/Computer term). ; A+ }$ [1 O4 g9 C$ h' yMDA GLOSSARY, VER. 4.0 E2 k6 g j8 x+ E+ N0 _' e 90 J1 P; Z# p& D R6 E& e, ]EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. $ a: b! ?9 B/ ?! X7 u- IElastic Range The stress range in which a material will recover its original form when the force : t7 g3 d6 H* H; n& V+ ~( a" d(or loading) is removed. Elastic deformation refers to dimensional changes+ K! G7 H2 z" F# ] v occurring within the elastic range. 8 g5 B0 O2 i( l* k; s1 xElectro-Optics: K; \3 v; Z! T& l M, R6 ^ Infrared (EO/IR) , J- b# J' g) x' C l9 ?$ RTechnologies/techniques employed by optical sensors in the wavelength & t3 {8 {- p/ h- O1 W8 kspectrum slightly longer than visible but shorter than radio.3 u4 |/ Y. o# M; I5 G( e0 H Electromagnetic% L0 a/ R+ O4 U: o" u6 ^7 c, `# T Compatibility% d. f0 S/ q, n1 M (EMC) $ L( n% R1 y1 B5 q+ L# G8 q# Q. T4 [A condition when all electromagnetic emissions from electronic, electro-magnetic, 5 i9 K# e# O4 Y# @2 Aand electro-optical components of a system interact without interfering with one: J% }' d* I$ E3 h8 d: ]5 A$ f another.# ]8 R6 u* I$ Y% O W0 z" @ Electromagnetic7 H2 s7 J3 f2 k$ u Emanations) a: l' j& u+ |) |1 ]% S& } Signals transmitted as radiation through the air, through a vacuum, or through 4 j- ?" p0 {$ lconductors.+ ]+ w6 ~5 T/ a! } Electromagnetic : T& E3 m/ R: i9 z. F! y/ U! i; MField (EMF)3 d: U7 f) @; Q2 j, J' f& ]9 y4 L An electric or magnetic field or combination of the two, as in an electromagnetic 3 v' @3 e/ p7 u1 Ewave. Created by electric charges in motion, having both electric and magnetic _+ z6 Z9 Q# L components oriented at right angles to one another and containing a definite; [$ B+ M& j+ m% J* S amount of energy. 9 V# U) L6 p/ K1 N5 |9 } E8 HElectromagnetic 5 f- L1 }5 M! W; r0 LGun (EMG) % b8 w5 w: p5 V: d/ A1 a' PA gun in which the projectile is accelerated by electromagnetic forces rather than0 o3 N5 V& b5 w by an explosion, as in a conventional gun.% p' K- @/ G' L: _ y1 ?9 o Electromagnetic& W z0 u9 W- F+ C8 x3 E3 F Interference (EMI)7 h7 }) d/ R; v5 g! `' @ Any electromagnetic disturbance that interrupts, obstructs, or otherwise+ `0 v. a4 N8 Q3 U1 U9 Z1 ` degrades or limits the effective performance of electronics/electrical equipment.) b% d# T9 q s% b) i6 c# q! w It can be induced intentionally, as in some forms of electronic warfare, or' f, k4 {+ j! E unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.% b5 Q/ R% X* I% k Electromagnetic4 `# p; M( ~) {0 F( K' w& t+ e6 Q Pulse (EMP) 2 t% o" G0 s; W9 t: C/ A$ MThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of . k. y5 D& \4 B+ u3 r7 athe nuclear device or in a surrounding medium. The resulting electric and1 q$ s; _& P8 n+ k" t magnetic fields may couple with electrical/electronic systems to produce% n' K$ H1 ?" W0 M0 v% T, f( M damaging current and voltage surges. May also be caused by non-nuclear 1 \( b N6 p' z0 ]5 F, Umeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic 1 R1 X7 f9 I& Z+ wRadiation (EMR)% x& _8 w( ~+ U$ ]6 O4 J5 N/ `2 ~ (1) A form of propagated energy, arising from electric charges in motion that. d! ]& S1 S$ M- C h9 G produces a simultaneous wavelike variation of electric and magnetic% J! d3 [/ b, O- y& ]3 V8 h* P fields in space. The highest frequencies (or shortest wavelengths) of; I4 q2 I/ A* a, j0 P: b- [+ x such radiation are possessed by gamma rays, which originate from 1 i9 b0 k/ U6 {& X" J) V% q% d. Aprocesses within atomic nuclei. As one goes to lower frequencies, the $ S% o! a+ J& U& j4 delectromagnetic spectrum includes x-rays, ultraviolet light, visible light, & a- ]) A N4 b1 {6 zinfrared light, microwaves, and radio waves.) i" v: ]# u1 Y1 |* m (2) Radiation made up of oscillating electric and magnetic fields and0 R8 s& h0 T6 O2 A! w0 h+ l2 ?& z+ X propagated with the speed of light. Includes gamma radiation, X-rays, ( Y0 o; @" p' k& x: ?: Oultraviolet, visible, and infrared radiation, and radar and radio waves. 7 c9 u; Q0 c- E$ e: X- v0 vElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices# A4 H) p+ v8 _8 D' J used in system/subsystem design, excluding employment in the RF spectrum. 7 D) O$ R! m# ]% eElectromagnetic2 o) R' o) _# ?( w( `* c$ A# \ Spectrum! p/ z9 S/ E7 ]) O1 `# u4 x1 D The range of frequencies of electromagnetic radiation from zero to infinity. It is6 _. F$ d4 Z0 j) n& n9 A divided into 26 alphabetically designated bands. " C* j( \3 K8 F1 S, a* Y0 QMDA GLOSSARY, VER. 4.0 E ( O- M+ a+ ~+ H/ E- u% q1 k913 ]/ H a' J) M6 Q* F8 _ Electronic # K n7 O* y. v( ]! t0 YCounter- 6 a+ x+ K: r3 k# t- d9 @Countermeasure; j7 \+ D: @, x0 H4 N. ^- f s (ECCM)2 q* B8 a* U: @+ r; k2 K That division of electronic warfare involving actions taken to insure friendly: }9 }5 s. V' f2 J% T& h. A( f effective use of the electromagnetic, optical, and acoustic spectra despite the/ U' Y2 b2 ^3 }+ ?+ | enemy’s use of electronic warfare to include high power microwave techniques.2 E: \; n; k0 ]2 ? Electronic " |. b! u) d: s$ {. X0 |6 hCountermeasure% k, P. X; x6 a& ~) [ (ECM) ! J& k% s- h- r3 Y' v0 t9 R FThat division of electronic warfare involving actions taken to prevent or reduce an3 f! D+ l4 |. f3 Y1 f- } enemy’s effective use of the electromagnetic spectrum.) s: |/ n) n a/ o Electronic : E" A9 `: h- L* d4 zIndustries$ {- }/ F( Q" m* M. z) v" }/ t# @ Association (EIA) ! \- l' _ ~8 m. i7 n: X! YA standards organization specializing in the electrical and functional7 J/ c& G- m" x' Z, M+ w characteristics of interface equipment.. n% o+ n" l/ L8 B3 ^/ ^ Electronic ; Q6 }( p1 z* s4 \6 d/ i/ R# H2 zWarfare (EW)) L* j; Q# i6 B- _, R1 ~8 E Any military activity involving the use of electromagnetic and directed energy to9 c: o1 o* l/ A7 `+ C control the electromagnetic spectrum or to attack the enemy. The three major ; X" [) C) d/ l( ?2 msubdivisions are: 7 ^+ E0 z# n: Z) r5 A5 l" \•Electronic attack – Involves the use of electromagnetic or directed energy to8 C0 j _$ w( i: j" b attack personnel, facilities, or equipment with the intent of degrading,5 {+ M7 D: g B neutralizing, or destroying enemy combat capability. Also known as EA.1 w/ W; D( q: H" R+ M$ {! x. p" ~ Includes: 1) actions taken to prevent or reduce an enemy’s effective use of# R3 K2 d9 Y* }2 H. Y the electromagnetic spectrum, such as jamming and electromagnetic ! D8 `, v6 \* Adeception, and 2) employment of weapons that use either electromagnetic or ' [9 F' d! Y0 Z" t E+ |, H& X1 ^9 Pdirected energy as their primary destructive mechanism (lasers, radio ; l$ p+ f) r% Zfrequency weapons, particle beams). ) p6 Z& @: l5 z8 [•Electronic protection -- Involves actions taken to protect personnel, facilities, b' _: Z; M1 F: Yand equipment from any effects of friendly or enemy employment of" n, i6 V& S6 x+ R8 H electronic warfare that degrade, neutralize, or destroy friendly combat a& M2 E2 D. r1 m, [+ r capability. Also called EP. + j$ g- H3 a6 V& `) t. k# N•Electronic warfare support – Involves actions tasked by, or under direct- o5 F* I: W+ j3 S control of, an operational commander to search for, intercept, identify, and 9 G- o, p3 [5 ]locate sources of intentional and unintentional radiated electromagnetic . c$ b# |; k' venergy for the purpose of immediate threat recognition. Thus, electronic % w. |$ L* C! ]1 \warfare support provides information required for immediate decisions - K" S8 ~- g- b5 y6 vinvolving electronic warfare operations and other tactical actions such as 0 x& h4 S1 }% A; G; i2 T: }5 qthreat avoidance, targeting, and homing. Also called ES. , B4 J% K9 s; @7 e4 uElectronic 8 {7 A( ?$ L$ `) SWarfare (EW)- o% c% h) L0 C3 j" t" f, l Environments , {; V; }; o# c* C( g# i: w! EElectronic warfare environments result from radar and communications jamming 2 d( x) ]. R/ Y! P* s, ?and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD + v+ Z5 T5 K. ksystem. - e& z7 }6 f, ]7 oElectronics ! G+ S$ Y$ c0 H2 jIntelligence % s7 d. A, _2 w* y* F(ELINT) 1 M; f- s0 z" ?5 jTechnical and geo-location intelligence derived from foreign non-communications " H/ n2 b* I4 c: @, b% J N! melectromagnetic radiations emanating from other than nuclear detonations or + K% |) y3 R- {! Q* N' eradioactive sources. 2 }& G& [8 a! g( h2 h! b9 Q p4 v' aElectronics + b3 @* O4 w/ o! _6 [Security (ELSEC) 2 w6 j" o5 ^! M% x" @0 oThe protection resulting from all measures designed to deny unauthorized. ^, A! R" n& r persons information of value that might be derived from their interception and 2 g% w. k% `' ]$ {study of non-communications electromagnetic radiations, e.g. radar.( B! G& f: ?5 f2 \3 D Electro-Optics 7 c, S; q3 U6 x4 u! d+ uInfrared (EO/IR) # T/ k. ~) Y0 n5 I; v+ }* QTechnologies/techniques employed by optical sensors in the wavelength 9 F. z( \/ \2 r5 }; K$ E# g+ f8 Zspectrum slightly longer than visible but shorter than radio.; ?6 t: O3 O7 Z; E% _ G. S MDA GLOSSARY, VER. 4.0 E 9 d# C9 p7 N9 r5 z: b/ v$ ~9 ?& c. P92$ m9 B! @: [ N Element A complete, integrated set of components capable of autonomously providing 3 g& W" C! w) z& M9 J$ T6 G( FBMDS capability. ^2 @: |3 N7 Y6 w Element: W }! i7 u, }$ O Capability1 R! s2 S* f( b% E Specification 2 [ J. o; v7 j9 P T- R3 D(ECS) $ J) G; {6 x* }$ M/ ]7 t* LA document that identifies the element-level BMDS capabilities and# P( T* t0 B: L6 I specifications necessary to achieve the system capabilities identified in the SCS.$ N3 W/ ^' F1 G; f1 m The ECS further defines the SCS-apportioned mission/technical performance $ L ~, r7 j: t9 E/ a" a; @1 `capabilities and allocates these capabilities to the element’s components. . L( a$ }1 p# x) f+ FElement Control 0 _2 r) o; p1 ^- |Directives (ECDs) ! W2 u# S8 o/ }8 T! lThe command and control data instructions to control the conduct of the3 Q7 C9 ^/ M2 O4 v" X: G engagement. ECDs are developed by command and control software based . t5 i& }/ O) Y4 z2 K" M5 O7 {2 @) aupon variable parameter input by the operators (both pre-planned and real time),7 o# W0 [$ M& S9 P7 r% Y and operator defined rule sets embedded in the software. The individual battle 5 }- O& E4 z5 Dmanagement processors use these instructions to accomplish the assigned tasks 9 X2 B6 C: s! b* v) kfrom the operations order. ECDs are contained within a Task and represent the: B0 t' `2 l. `" E2 S! ?" n form of parameter values that influence the resource management processes of 1 L2 x3 ?/ Y' e0 c9 `( j( uWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and/ O7 P5 ]1 S+ Q2 Y1 D& w Communications Management (CM). There will be numerous ECDs per Task. 9 O, J, K0 K, y+ c' EElement, @9 S9 o) W @0 _; a. t, o Operations : M' z( Q8 ^. ^Center (EOC) / K7 w4 R. {* W' m0 E g" V/ yAn Air Force operations center, which operates and maintains a BMD weapon or. `7 O: f5 h3 R0 p) U9 c sensor suite. (USSPACECOM)2 z9 M+ p% {* X- v. Q# h7 u ELF Extremely Low Frequency.* t: K* s7 D5 J2 H" b: ?- V2 [2 R ELIAS Earth Limb Infrared Atomic Structure., y" x+ Z. T6 o$ R ELINFOSEC Electronic Information Security.7 P& V3 ?/ ]6 ~- K8 N+ f9 L5 C ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-10-12 06:05 , Processed in 0.051003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部