航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ( ~2 @3 y, F6 N2 X" ~5 M3 QCOMSEC Communications Security. 3 r F5 O d2 s7 @% K7 NConcept & q" ?: }* n9 W% `& U) v5 LExploration &. y7 y, E1 f! G. Z4 {: I4 W: d Definition& ~; \6 U. \. V# T, a- [" o The initial phase (Phase 0) of the system acquisition process, beginning at1 P: S. P' q: ^9 ? Mission Need Determination. During this phase, the acquisition strategy is ! Y( U% N( Z& R% [4 L1 Y, `developed, system alternatives are proposed and examined, and the system+ K. i4 N/ [4 _ ` program requirements document is expanded to support subsequent phases.) K1 H. P8 m1 c# A6 k# F Concept of- T! b0 |1 D9 p/ S2 {$ O# G/ H Operations V; x8 j4 J+ E/ M( k+ V7 w5 {2 G (CONOPS)! T$ k; E; \9 h& j6 m9 A, b (1) A statement, in broad outline, of a commander’s outline or intent in regard to( B, ]* e/ g/ N3 H! H# N" @ an operation or series of operations. The concept is designed to give an overall # P2 M% c. D( o9 r) ]- i! @4 ypicture of the operation. (MDA Lexicon) ; |) W: \, c, ~7 [/ ~6 z! d* m- x(2) A verbal or graphic statement, in broad outline, of a commander’s 3 w9 @/ W5 e- D6 d9 Passumptions or intent in regard to an operation or series of operations. The! ~- W A6 y; z' k( h5 j6 R3 [ concept of operations frequently is embodied in campaign plans and operation* q0 T6 x7 e/ C/ U plans; in the later case, particularly when the plans cover a series of connected 0 t0 p; N: B0 aoperations to be carried out simultaneously or in succession. The concept is: E6 F. k. X7 ~, b3 l4 u2 v designed to give an overall picture of the operation. It is included primarily for * c2 p' G3 |0 x' A/ y" T- ^ I Oadditional clarity of purpose.9 R# Q! l H0 P, @8 Y" u Concept Plan An operation plan in concept format. Also called CONPLAN. % f) a3 Q6 J9 V" E# E3 B' h) P& DConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of . E" ]2 N4 k2 P, C5 t: Dthe acquisition process, or combines development T&E with operational T&E., j! a$ n: n6 d4 Q Concurrent ) S, w" ^% @& h+ Y( |: y# wEngineering1 Z' I, H; o+ \. v& y2 Q: n A systematic approach to the integrated, simultaneous design of products and8 Z. R3 p" o0 I4 S their related processes, including manufacture and support. This approach is ! Z( k& ^! E- i4 K* a' xintended to cause developers, from the beginning, to consider all elements of& [4 a* D% s( E0 T/ L5 G9 ?. g the system life cycle from requirements development through dispersal, including 2 E6 I9 g% `3 {3 U& s! i! q' t2 Pcost, schedule, and performance.- K* X2 j0 s- r1 _- T1 ? CONEX CONOPS Exerciser. ' G- g/ S# G, t* O$ |Configuration A collection of an item’s descriptive and governing characteristics, which can be7 D" b( A' m# A U" | expressed in functional terms (i.e., what performance the item is expected to * y7 {% V6 Z+ ?2 K8 I; Nachieve); and in physical terms (i.e., what the item should look like and consist of # w1 e9 f$ m5 J) }+ g# B' Cwhen it is built).% n# V* A9 M1 k" A6 Z MDA GLOSSARY, VER. 4.0 C 7 A9 u# e/ _, j* u* {' B& m6 u& A59 6 R$ r+ H G& g5 f! |Configuration 3 _3 [& H4 @9 ]! t- W wAudit / K5 n' L1 Y: D/ P" ]0 a5 w9 h- jOne of the Configuration Management tasks which includes a functional" f0 L. N- w: {" d1 K! C' M configuration audit (FCA) to validate that the development of a configuration item , D. v. Z8 t* \has been completed satisfactorily and that the configuration item has achieved1 b# U s* k( q" G6 |$ H; f to specified performance and functional characteristics, and also includes a( E& D1 L& a( L9 h) Z physical configuration audit (PCA) to verify that the configuration item “As Built” ( T y$ m4 Q6 k* L) Z! Gconforms to the technical documentation which defines the configuration item. $ `5 c, G6 [. k* r# o4 k t4 qConfiguration* v9 }% X t2 J( I Baseline ! }1 w/ j4 u3 C% M4 E IThe configuration documentation formally designated by the Government at a 7 h1 D2 ]# L/ w b$ V' qspecific time during a system’s or configuration item’s life cycle. Configuration O }; `: ~( a1 a& j _- vbaselines, plus approved changes from those baselines, constitute the current G6 b0 Z; C' O3 w a8 [8 Q9 z configuration baselines, namely the functional, allocated, and product baselines.( |$ j- F9 g+ W2 B: d8 } Configuration! i! `( V- r5 f9 w1 \9 I" C Control+ k. ^# |6 ~" m& z One of the Configuration Management tasks that involves the systematic" z# |2 S/ X1 }$ a g0 o evaluation, coordination, approval, or disapproval of proposed changes to the% }3 T4 S3 W2 H% a+ j; y2 S design and construction of a configuration item whose configuration has been8 u* G9 C; T; k6 Z8 H* q) d% o# r5 g5 W formally approved.5 g/ @% |( \* G" ~ Configuration# a# s/ P5 i: i) T' h' Z8 u Identification- a9 x3 w2 i h" k One of the Configuration Management tasks, which require that for every ( h* M# s2 j' A/ ~change that is made to an Automated Data processing (ADP) system, the design) W4 E$ w- U7 P and requirements of the changed version of the system should be identified.' F+ X0 M2 u: { Configuration* Q/ u B6 ~( _' v' j! D Item (CI) $ X# N, o; G0 U% ]1 D8 R: GAn aggregation of system elements that satisfies an end use function and is / }! M: h9 h$ N9 `( b: `designated by the Government for separate configuration management.; J# E& \, S, a& r Configuration items vary widely in complexity, size, and type. Any item required ) n( a* c+ [. K. g# \6 ~for logistic support and designated for separate procurement is a configuration' m) X7 `0 J& g) ~ item. Configuration items are traceable to the work breakdown structure (WBS). 8 k4 A5 f& Z d& Z6 _) FConfiguration ) [# f' \9 S) p: P8 q( {0 ^Management( m$ [( f+ `. c3 y; M6 G (CM): s8 T( L4 s5 }) r- Y In computer modeling and simulation, a discipline applying technical and # V) N* p" {9 Q- C, {administrative oversight and control to identify and document the functional R' E& B; `' I5 {requirements and capabilities of a model or simulation and its supporting 5 b+ F5 S6 S' c( ]databases, control changes to those capabilities, and document and report the 8 S g% c: Q9 I9 \+ P; @changes. See also Accreditation. " y, v: X- }4 r' ?" J0 B* d9 T$ oCONOPS Concept of Operations. $ v! h7 w: {$ iCONPLAN Concept Plan " c5 g" s m3 ^2 @, d; ICONS Contracting Squadron. " g0 K) `6 I& S/ yConsolidated . d. J! y4 [+ w7 A' w# e# X! V& YCommand Center) I' ~4 H: X5 D2 \) v& o% A; X$ {- e (CCC)4 d$ m& e! i$ L" M" k( d A single command center from which USCINCSPACE/CINCNORAD can direct all , b+ W- C- e- `. E" ~# j+ Fhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado 4 ?4 T7 \2 c, s4 ySprings, CO.6 G X; j( t7 e Consolidated 0 f1 g& B' j; x# m5 pIntelligence $ H2 V- s: V- t" ?; d: D" sWatch (CIW) 3 a( q6 v4 o. H$ yA consolidation of intelligence watch functions within the Intelligence Operations6 r2 y0 W+ z0 i' {% ` Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD: X O0 V ] @& V Aerospace Defense Intelligence Center (ADIC), and the Air Force Space1 i4 \3 g+ W$ D+ Q Command Space Intelligence Element (SIE).1 v3 M# U7 g$ l$ s, A Consolidated - v. N; P0 s8 O) L8 T6 E1 WSpace 8 z+ H: U; p4 e e& a1 \Operations / Y! Y. w E% c' G6 p' DCenter (CSOC)% ]6 Z$ v) y8 k$ } Series of centers at Falcon AFB, CO, which operationally control and maintain 6 _0 [" w p7 R8 ]. uassigned DoD satellites.! \/ j' c4 y0 G" O Consolidated ; W. m) s9 k+ h" r1 ^% h* @2 nSpace Test 7 \/ Z% p* K: V S9 v, p/ uCenter (CSTC) , k; `3 B3 y7 C, e$ w, _, N mSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and 4 E$ T3 }" d% r0 d l% @3 H* ]" Vinitial on-orbit checkout of operational satellites, operate R&D satellites, and+ b, G2 e7 Y7 ` serves as a backup to CSOC for operational DoD satellites. 9 f4 @7 H4 z/ f! r$ v0 |MDA GLOSSARY, VER. 4.0 C d. F( n. F$ ^$ t0 o) v60 3 X2 d0 ]2 f1 X$ l0 L1 ] r' y" fConstellation$ ^* _% C1 H* l4 `2 a# v Size (CSIZE)4 I6 G1 D% A' w L9 _& [ The number of satellites of a particular system placed in orbit about the earth.7 I r& k" S; _0 m; Q7 b# R. U3 M Contact Fuse Device used to detonate warhead on physical contact with another object.; A* m; T" j9 ] Contingency - i5 S& X! K$ _2 FDeployment Plan 0 n# e# E: y) M2 W7 e9 I(CDP) 4 Q& {0 [$ e! `1 l2 X8 G( bAn executable plan designed to deploy an early missile defense capability and2 p- I- b9 C" f% b9 [0 D# U reduce deployment time. The plan provides specific executable deployment# k9 g! m. q9 H, q; W' } options and describes activities required before and after a deployment decision. ' ~8 ~5 x1 F; J* d0 j, g6 V4 v- p- IThe plan also allows decision makers to have oversight on technical progress, 7 l% Q9 H3 c0 R6 I% q$ ?, o) Q9 `cost, schedule, and risks associated with a deployment system.- |- @0 Y, {2 O; d' \# m5 q) ~; D Continuity of5 T$ k, o3 F7 e* G6 x Command 1 P" O2 W" W( J1 r2 {: uThe degree or state of being continuous in the exercise of the authority vested, m+ x5 ^# p3 `+ _ q) Y in an individual of the armed forces for the direction, coordination, and control of ! e( ]) C( x; C9 ]military forces.2 D. O# t+ s E/ I& I, R Continuity of ! w+ v: ^3 i1 H2 ~6 C- Y/ lOperations' \$ Q/ z6 p* G) d0 T3 O. R) G& R7 Y/ f The degree or state of being continuous in the conduct of functions, tasks, or3 K$ u4 N" y) P duties necessary to accomplish a military action or mission in carrying out the3 Q% q# b1 f/ q* J national military strategy. It includes the functions and duties of the commander, 2 @3 }+ b2 U7 G \ r$ eas well as the supporting functions and duties performed by the staff and others 2 x+ w. [6 P# N/ Z4 Zacting under the authority and direction of the commander., d: J6 [1 u8 m8 U) T Contract k& U q1 k, A5 }6 N Administration. y8 i8 _4 P, ]3 @# U5 L Office (CAO)1 i0 p; _. D4 v( J J# A) P0 @" z The activity identified in the DoD Directory of Contract Administration Services . M( y# C, e7 ^/ o/ {1 h1 W9 P$ FComponents assigned to perform contract administration responsibilities. It is a 6 |6 W# p& u: _/ Jgeneral term and includes Defense Contract Management Regions (DCMRs),( n: g: S9 k7 C2 x Defense Contract Management Area Operations (DCMAOs), and Defense Plant# T/ L+ Y% L9 S A Representative Offices (DPROs). (Defense Systems Management College ' V; U* ^- w7 w1 j- BGlossary)2 d2 `4 |# B- {9 F& P' N- {: ^) B Contract Data " Y d$ e+ {: F) B, @1 B$ XRequirements ( O- X$ ~6 Q. w! i/ D* ^& j4 yList (CDRL)* s2 U0 w" ^8 A Document used to order (“buy”) and require delivery of data. Tells contractor) p4 s, K$ \ o# Y& o what data to deliver, when and how it will be accepted, where to look for& R% i; ]* S) p" f& `; O( f# v% ^ instructions, etc. 9 |* i9 j2 z- D0 oContract 5 w) t% ^; a9 v: U& B4 q: |Definition6 n/ w; k% ~( \, W7 k6 @ A funded effort, normally by two or more competing contractors, to establish 6 X6 I# V/ h7 k. S0 I1 Z' [6 Hspecifications, to select technical approaches, to identify high-risk areas, and to $ c/ U. e9 c, V) e" Amake cost and production time estimates for developing large weapons systems. # z! y, i5 E, CContract Work1 g0 ^8 N9 j, B Breakdown; n# @, e( x) Z; N! s. m Structure 4 @% k8 x$ v! f+ W5 {: FThe complete WBS for a contract developed and used by a contractor within the , R( a b, s# Uguidelines of MIL-STD 881A, and in accordance with the contract statement of + Z/ p3 ]' `! c: Z4 }2 @2 |! N2 dwork. & ^' D8 o; {3 p0 D7 }Contracting* j" R1 b4 j) V M( i+ \ Officer (CO) 6 S! J Q4 _, E+ B* g5 {A person with the authority to enter into, administer, or terminate contracts and' j% N7 Y6 k* r* Y5 q; u8 {4 u# @" j make related determinations and findings. The term includes any authorized6 K5 H2 B7 |5 u2 f representatives of the CO acting within the limits of their authority. A CO whose8 a. F% J: J9 E/ W; x r primary responsibility is to administer contracts is an Administrative Contracting # B( `4 m6 m1 @; f7 \Officer. One whose primary responsibility is to terminate contracts and/or settle & `" C* p" t+ q8 E) C! F* n( Kterminated contracts is a Termination Contracting Officer. A single contracting, j8 V) {' G& M' V1 g* N/ ` officer may be responsible for duties in any or all of these areas. 9 a5 R0 p: i; S' N! t9 @* ^Control Authority that may be less than full command exercised by a commander over ' n( ?8 U( F9 Y: y8 Npart of the activities of subordinate or other organizations.5 \# S. L: B7 ^6 y# Z Control% t/ Z' _* D* L+ i, l Abstraction + N- z& M% S# F. B(Software) The process of extracting the essential characteristics of control by ( \: b$ b& B& _3 W7 ~defining abstract mechanisms and their associated characteristics while0 @/ x8 m3 |2 B8 W- G. e1 j disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C 6 H7 V' P, w8 @61 3 H& f% P, t6 W$ PControl and 4 H. ~2 I# K W8 p( ^6 eReporting Center # L: a2 H0 E6 B2 S* ^( B+ C. JAn element of the US Air Force tactical air control system, subordinate to the ) y* }* B4 r% u4 K5 |5 P8 Atactical air control center, from which radar control and warning operations are7 {4 s( N& |+ | conducted within its area of responsibility.9 E% q8 L/ L$ m; r2 m# X, G6 l Control and- N5 b5 f0 i6 U) c* j! F, V Reporting Post Y4 d0 r9 `- a& L7 G An element of the US Air Force tactical air control system, subordinate to the: V' ?0 ~/ l+ h' R/ @+ M control and reporting center, that provides radar control and surveillance within # I- Z5 }) x9 @its area of responsibility.* ~7 |% q2 D7 e: e# [% r Control Area A controlled airspace extending upwards from a specified limit above the Earth.% z5 s4 |5 \ C1 R' v2 V! E Controlled 3 R* g. v! E) X& KEnvironment* Y: T% d/ \( ]# g% b Area where entry into the radiation hazard area is controlled.$ z; c9 X+ b6 b+ C Control 2 n* N% i6 w6 p! V; s: n) cProcedure3 V; D, l: K5 @# Q5 g1 b2 M h The means used to control the orderly communication of information between, v* l" h* h! V$ b% D- M0 G E stations on a data link. Also called line discipline./ j7 b/ @ l, y1 _7 K" G2 v z. |9 V Control Station The station on a network, which supervises the network control procedures such v& c/ ~% ^6 S M. J2 v* }' jas polling, selecting, and recovery. It also is responsible for establishing order% G$ X8 |8 ?7 W' `/ O# E on the line in the event of contention, or any other abnormal situation, arising7 U% `5 o* U1 o1 |* ? between any stations on the network. 7 v( K* y& x7 a5 \. y) FControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to 6 v, |6 A5 W$ ~. S) Dprocess sensitive defense information and that is under sufficient physical and# e7 i; p6 _, e# j/ @* I; t' r technical control to preclude an unauthorized entry or compromise. $ D( S+ c7 N1 l, d+ B7 VCONUS Continental United States.( `. G; [, N% ?& J Conventional Co-9 X* ~. z' l) j Production" b; y# a& S( r+ { An effort between governments to produce the same end item, or components 9 G8 P$ V; X! z$ E3 n1 H& O& k# e @of the same end item, in concert. # u ^3 `" d# DConventional4 x+ J; c) Z' | Weapon ( g1 |4 L2 q. j0 H& y6 }0 _ xA weapon that is neither nuclear, biological, nor chemical. , g& x) H) d# N, w" n( GCoop Cooperative 1 q' X, k' U7 nCoordinated . ?) l) I! `6 D# `Engagement + Y7 ~3 L2 ^; xPlanning/Actions 4 y/ b% W6 x/ rNecessary coordination among engagement components to ensure maximum! j' M+ e5 r( I# ^6 J- F$ k effectiveness of the SDS and resources are not wasted on targets already- w+ b. T4 i/ ?* v5 F0 q# n targeted.+ e8 X1 Y+ f; k8 ]# u' b# d Coordinating 6 I4 b; f7 B% y5 f- ]7 I- TAuthority. q/ j, D+ U9 R) q% ]4 X A commander or individual assigned responsibility for coordinating specific 8 C j' n9 @* ]- `( p; xfunctions of activities involving forces of two or more Services or two or more: G( s. ^8 Q- A: g% u forces of the same Service. The commander or individual has the authority to) `& {4 `0 q" e9 [, F6 e require consultation between the agencies involved, but does not have the 4 h4 q& p1 B: L/ s }authority to compel agreement. In the event that essential agreement cannot be# I( _* e, D) {) G1 _! y reached, the matter shall be referred to the appointing authority.( D" }, Z3 ?# W* M2 T1 }4 H0 V( ? COP Committee of Principals, l8 Y/ ~5 @1 T8 `1 Z0 w" N& f' j COR Contracting Officer’s Representative. Contracting Officer. / y6 N! u$ U" O d! fCORBA Common Object Request Broker Architecture.4 |( ~8 Z3 }1 M& |3 ^. U CORM Commission on Roles and Missions. 0 Z2 u" l$ Z* w" O3 l0 z0 A7 `MDA GLOSSARY, VER. 4.0 C 3 O; i; p. ]$ U+ J! O- X62% L# d% i, w8 E) Q' q Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens' u8 Z" m3 j) I perpendicular to one another, designed to act as a radar target or k1 c4 e, D; H% z& ]4 A marker. # u) Y( J( q% v# j(2) In radar interpretation, an object that, by means of multiple reflections # w0 K( ^5 o$ Z! @from smooth surfaces, produces a radar return of greater magnitude than + t1 ^4 l; o& F& N( smight be expected from the physical size of the object. $ d% ~# m9 ^# f! K; B0 F1 p4 s! I, _Corps SAM OBSOLETE. See Medium Extended Air Defense System. 5 ?4 ?* m% D7 Q& w0 m; DCorrelation (1) The process of relating observations or tracks from one set of data to + `3 m% V q1 ^; T8 Aobservations or tracks from another set of data, i.e., collecting data from# C9 ]( M' ?9 a different frames or sensors that presumably relate to the same target. (2)/ D* l& E. D0 B! f In air defense, the determination that an aircraft appearing on a 9 x* z( d( N3 l( \- w7 bradarscope, on a plotting board, or visual is the same as that on which1 U, S) T% N3 e; i7 R information is being received form another source. (3) In intelligence 1 J8 ?, E" B( N f* T# G; _' T( uusage, the process which associates and combines data on a single4 k- J; s) s# M. D, e$ Q0 \% n entity or subject from independent observations, in order to improve the2 T+ N6 ^9 o% f3 ]. s reliability or credibility or the information.8 [. m9 F" x( T4 ~7 b m COSEMS Evolving architecture operations support tool. ; m. b X. I7 V, ?COSM Computer System Operator’s Manual ! E/ G% X% J* Y0 O2 b' j l4 YCOSMIC NATO security category.1 ^6 ?# f9 D/ o9 L# c* _ Cost Analysis& ?- c) M8 |; U! F9 p' \5 ^2 V S Improvement # F0 c: s1 }+ K) y! j, R4 F2 @Group (CAIG) 2 b9 C2 J7 i4 @( E7 [An organization within the office of OSD Director, PA&E which advises the DAB% u2 V2 E) Z; j% z+ K: O$ f& \ on all matters concerning the estimation, review, and presentation of cost( F- S- o# j0 u. ^# P analysis of future weapon systems. The CAIG also develops common cost G" I% y- E$ Q9 M/ ~estimating procedures for DoD. 2 I* I1 w6 p5 F; ~; kCost Analysis" {3 l( u( U5 D Requirements v* i1 Q2 L4 W/ \' |5 o5 @, Z$ @ Document' r0 i! w4 |. Z+ b2 R G) B; ^3 ?- S (CARD) ) v# U) l0 J2 Z- W! V! V5 q7 DThe document describing the technical baseline, which is a subset of current 2 I; _1 }( w7 |* Wsystem technical data and is used to generate the baseline cost estimate for an9 r6 M* _6 U, \4 P. [ SDS element. It includes, but is not limited to, the element description, ) e2 ?" L, H# d4 \. a# Ginterfaces, operational concept quantity requirements, manpower requirements, I" P8 o( K1 A N9 {activity rates, schedules, research and development-phasing plan, and facilities $ V% Y9 o Y5 H4 m5 K, s( [$ Orequirements.2 e+ a4 W F" w# J I/ \0 n! I- x Cost and / ?: G- [6 t J3 ~5 p# j4 Y& ?* ^Operational4 f7 s8 m* V$ D/ x3 i Effectiveness v( q5 g9 J. p- d6 |/ r1 RAnalysis (COEA)' U, m9 M0 q3 o2 {# y( k& S An analysis of the estimated costs and operational effectiveness of alternative " b$ K" C& K9 ?' }, omateriel systems to meet a mission need, and the associated program for8 B- O* s$ r( H' @) O L0 f acquiring each alternative.8 W2 T* b% _% e% x! O+ ^6 j9 \: ~ Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk" Z+ A6 X5 X) X- i- Q due to cost estimating errors and the statistical uncertainty in the estimate. 4 l1 C# O3 `8 [. |& E( SSchedule/technical risk is risk due to inability to conquer the problems posed by ( {: S- l* }+ k+ L% othe intended design + p$ _( D" ~5 P- V& _' hCOTR Contracting Officer’s Technical Representative. See Contracting Officer.; r4 `3 S% V3 t; d; b COTS Commercial Off-The-Shelf.4 n6 `1 T( U ] Counterair A US Air Force term for air operations conducted to attain and maintain a desired 1 X0 g. j+ a$ t. Qdegree of air superiority by the destruction or neutralization or enemy forces.0 Q: n! g4 @& ?4 A Both air offensive and air defensive actions are involved. The former range $ d9 ^5 q- Y8 z9 Q4 G: Z; Fthroughout enemy territory and are generally conducted at the initiative of ) n( @9 O4 H! o1 T7 vfriendly forces. The latter are conducted near or over friendly territory and are $ _. y7 s) T! a+ Z& D, mgenerally reactive to the initiative of the enemy air forces. # w$ r- _& ^/ s& d, X4 w fMDA GLOSSARY, VER. 4.0 C5 T" _3 d% u4 H/ |% `2 O% b9 \ 63 : V/ Q4 R8 X4 H+ N, k& lCountercountermeasures! A4 }; A' ^! S- F; Z (CCM)( X. c' V( A3 ^1 `; l Measures taken by the defense to defeat offensive countermeasures., S9 H7 }/ J- Y! |' r: ^) T$ I Counterforce The employment of strategic air and missile forces in an effort to destroy, or: t* J% Q* D2 }! J& B/ y" J render impotent, selected military capabilities of an enemy force under any of the) [ o" _* k2 w) a circumstances by which hostilities may be initiated.7 j% m' U( E2 W' L) H9 B& f# K- \ Countermeasure A design or procedural measure taken against covert or overt attacks. 7 |/ j& x( H) a5 R& x& X# H7 \6 P/ MCountermeasure ) q+ {, {: C' }" ?* L* Ms (CM)2 p. L% m' n8 e3 F0 q! [ That form of military science that by the employment of devices and/or , Y: }$ a, L1 f2 p5 C; W4 Atechniques has as its objective the impairment of the operational effectiveness of . u8 [. F% R! {enemy activity.& a. G7 g/ |6 R& K0 H4 B, A9 u Countermeasure 0 u, a5 {7 @) m6 A7 ls Rejection & n" i+ P: X& Y8 y' C/ F(Surveillance)3 E7 V k. P) B1 J Improvement or rejection of an object signal in the presence of& ^/ \5 ~5 H% p countermeasures. - k, r+ l1 R2 S- c: G, SCourse of Action ! J e4 Y' a" u( A# p" }(COA)) k1 b0 m! K0 {: q- T2 I (1) Any sequence of acts that an individual or unit may follow. (2) A possible 6 x& B- {* F4 O" @0 x& w u1 z4 Zplan open to an individual or command that would accomplish or is8 [5 n0 }( D( `4 | related to the accomplishment of his mission. (3) The scheme adopted 8 F+ W5 l% ]7 p% Nto accomplish a job or mission. (4) A line of conduct in an engagement.5 L9 C" Q8 H& s" s: g (5) A plan to accomplish a mission. It describes the execution concept4 `# c I! `% P4 z5 u% c' Z for BMD of North America. It will specify the engagement priorities,0 |4 ~+ M$ o! Q2 f resource allocation and desired results by Area of Operation (AO).6 B) H: a0 D0 M# [ (USSPACECOM) (6) The scheme adopted to accomplish a task or7 o; ]: v; w" ]! l3 r mission. It is a product of the Joint Operation Planning and Execution3 d9 i2 q( w# D8 f' O" R System concept development phase. The supported commander will 6 d8 @ @' u0 S6 Q5 Y7 j9 cinclude a recommended course of action in the commander’s estimate. 3 A& I8 q# r; @: R* _The recommended course of action will include the concept of 1 |2 w# t1 ]+ u" n$ Joperations, evaluation of supportability estimates of supporting 5 O7 L8 S: Y) F$ Q! |organizations, and an integrated time-phased data base of combat, 2 V! s1 L; T' A- u- a0 }/ E+ pcombat support, and combat service support forces and sustainment.' d0 Y9 ? q5 O Refinement of this database will be contingent on the time available for L; y2 @% _7 }$ q z9 F- y0 B course of action development. When approved, the course of action8 ?; |6 I/ P! D, a' T2 Q% N becomes the basis for the development of an operation plan or: {! m; }) N4 h1 { operation order.& U6 w( M/ S+ ^ Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, 9 D1 `2 I0 K! b1 f3 ], |4 X5 t% Qand other geographical presentation systems. (2) Cover or protection, as : A. r1 r3 l9 fthe coverage of troops by supporting fire. (3) The extent to which 0 w4 [% @9 M, _intelligence information is available in respect to any specified area of 6 z% C y5 a6 y% Yinterest. (4) The summation of the geographical areas and volumes of % @% m$ }. h m" y0 |aerospace under surveillance. 1 Y n* h3 Y; F" l: A7 f3 [Covert Timing j* ?: R, R- L! o Channel 3 a$ x2 l, |7 UA covert channel in which one process signals information to another by + z$ y+ F. H0 f6 u y7 [( T2 {modulating its own use of system resources in such a way that this manipulation 1 D6 t8 a; X; w3 ?; S/ f5 Q4 D( Haffects the real response time observed by the second process.# {0 Q. S! _! S3 c3 P CP Command Post. 8 r C& T1 T' p d5 |CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.5 H6 ?% w1 c: F8 i# X CPAF Cost Plus Award Fee." t }- \! d& B: l: M+ w; ]' ? CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) ! a0 n4 m8 G) U* DMDA GLOSSARY, VER. 4.0 C* Z; @$ b7 i0 p* o1 g 64% ]/ W6 C6 D: Y7 { CPAR Cost Performance Assessment Report. q( ^, L4 b( R9 T9 DCPAT Critical Process Assessment Tool + \6 G/ C% q/ O8 Z. f: ?CPB Charged Particle Beam.$ b2 N8 o5 H; e0 E. M CPEV Communications/Processor [Network] Experimental Version.6 a$ J& ^4 [# ^5 i4 }% p CPFF Cost Plus Fixed Fee. " Q' \: F. B5 O5 t- ^! XCPIF Cost Plus Incentive Fee.' X# U0 F# ?. e& N8 A4 G3 V9 q CPIPT Cost-Performance Integrated Product (Process) Team.* S$ n5 Y0 c u CPM (1) Critical Path Method. (2) Contractor Performance Measurement. % g3 M3 y9 Z" H6 g: VCPP Critical Performance Parameter.+ n! J# {. ?/ ~& z1 j. B CPR Cost Performance Report. : e0 x# R$ W+ k& pCPR/NC Cost Performance Report/No Criteria (Contract management term). # H2 A8 T9 {% X) s0 @1 hCPS (1) Consolidated Program Summary./ x' |4 p2 q3 z+ S (2) Competitive Prototyping Strategy. 9 m1 \$ i0 T3 I+ e! A5 M(3) Current Program Status.6 I3 v7 o& b9 {0 } CPU Central Processing Unit (TelComm/Computer term).3 [1 q, ?# Q) ~+ u" D) ~ CPX See Command Post Exercise.' C6 v, l- S; P! ?( s CQAE Chief/Contract Quality Assurance Evaluator. 6 h3 {) S0 W9 ~: uCR (1) Computer Resources. (2) Continuing Resolution (US Congress term).) \! E L9 c- g* o CR-UAV Close Range Unmanned Aerial Vehicle. 0 D: z; `. q+ e% kCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement* ~4 ^( D4 u: m- b1 b' E- O) h- k CRADA Cooperative Research and Development Agreement.1 Y |9 P8 f7 C: m CRAM (1) Control Random Access Memory. 5 a7 G N+ F t# ?(2) Cross-tie Random Access Memory (Computer term). # \* k# `7 {& y6 ~CRB Configuration Review Board. ; U$ `5 D) I) A# D. d# WCRC Control and Reporting Center. ! s- ^% d' g& R" XCRD (1) Capstone Requirements Document. % ^8 ^. m% h' o" O9 v5 O4 f(2) Component Requirements Document. 1 Y/ e* \5 A* p1 z- SCRDA Cooperative Research and Development Agreement.. W6 a9 {8 E X+ d p0 R- b1 G' e/ R N CRG Communications Relay Groups (PATRIOT). ( U0 K V, Q$ f ]CRI Classification, Recognition and Identification. 3 K: ]0 b1 U. B% H$ n! wCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C/ N! `+ p: h8 h. o) t: ^# ?- Z 65+ c" f2 O' d/ b0 g4 `( g Critical Design: l: V6 s6 h+ l/ V" F$ D Review (CDR)( ^% V+ e+ f0 @9 Z9 v4 R A review conducted to determine that the detailed design satisfies the% n- C1 v( I6 n6 X& Z9 Y- `1 ]/ _ performance and engineering requirements of the development specification; to 7 f" r d8 A1 n1 r: S" Z Z1 oestablish the detailed design compatibility between the item and other items of" W( Y5 u3 `& H4 a9 y equipment, facilities, computer programs, and personnel; to assess producibility2 H) L$ i6 B( `$ N3 v- |$ L and risk areas; and to review the preliminary product specifications. Conducted h5 }$ d: {% G: r/ M& B" Dduring Phase I, Demonstration and Validation (for prototypes) and Phase II, 6 C9 F+ N. a8 _% ~* i! YEngineering and Manufacturing Development.% E- V7 q$ q% u0 ^4 t0 v Critical : |, O d& k) ^ h5 ?# QInformation ! \; {8 x$ i" D. ~' L- D2 ^, USpecific facts about friendly intentions, capabilities, and activities vitally needed5 H$ K& k" e/ z; Y9 N; j by adversaries for them to plan and act effectively so as to guarantee failure or5 O" b( }) h; O) X$ S3 J/ x! O$ z unacceptable consequences for friendly mission accomplishment.3 ~+ A; k4 {. R7 Z3 ~( ~ Critical* k# v! F& g% t: ]$ t Intelligence6 [; F1 L0 L5 L2 n# U2 Z b$ u Parameter & E0 c6 M' B/ @. p: a4 ]A threat capability or threshold established by the program, changes to which # t& _! V5 A, N( Wcould critically impact on the effectiveness and survivability of the proposed4 d! e) j' @( y4 ]5 f system. + a, t' h9 ^' c1 {8 [& `Critical Issues Those aspects of a system’s capability, either operational, technical, or other,' ~, P9 U" k6 E8 @9 J that must be questioned before a system’s overall suitability can be known, and 7 }' n$ T l0 nwhich are of primary importance to the decision authority in reaching a decision : |! X+ ?/ A8 Yto allow the system to advance into the next phase of design, development, " n/ q8 p2 |, f; L+ n2 X: Bproduction, or post-production. # g6 l, {1 J- D$ E" T9 W8 {1 ZCritical $ U* I7 j6 i. R* n5 K% ^Operational% R4 u! c9 G. s" [. ^8 C6 n Issue% Q& j7 c% W) T A key operational effectiveness or operational suitability issue that must be$ ?, I3 H2 i) s+ @# ~% `. x/ i1 y examined in operational test and evaluation to determine the system’s capability, u. s* [. ?; K9 i# }6 d4 e to perform its mission. A critical operational issue is normally phrased as a " E4 D3 i# k7 f0 j& b7 l. C. s3 W5 Squestion to be answered in evaluating a system’s operational effectiveness ( K, k; w4 |7 q* ?3 `7 pand/or operational suitability. W$ e4 y: N3 q" z2 l T Critical Path $ Z' k9 Z$ u+ z( f& y/ ZMethod " S5 _8 u' I% I% K" K4 h1 E" z6 RA technique that aids dependency of other activities and the time required to+ P2 g8 c* ~# h6 b- z complete. Activities, which when delayed have an impact on the total project 3 i) C+ w5 Q3 C. q xschedule, are critical and are said to be on the critical path., z. t' T5 B' Q& c+ l- p. T, z Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to ) m+ c# C) [9 X1 x, _" l- [9 S" N# tthe viability or the operational effectiveness of the SDS." E, g5 L$ j9 ?& a' f6 \/ w" j$ Y Critical Security 4 J9 z# V3 Q( x% dRisk/ b$ u2 T0 y+ @+ U I The existence of a security vulnerability that, if exploited by an adversary, could. {5 x: K9 V2 W J$ C2 K, t cause exceptionally grave damage to the viability of the BMD or the operational5 s5 b. n! [! D5 h8 ?! a effectiveness of the SDS. Critical risks assume an adversary’s capability to , w( `) c, k; l* Zcause major system disruption or degradation (e.g., single point failure),% t7 {( p9 P4 ` destruction of mission-critical components, or usurpation of system functions. : v4 r1 r, E# FCritical * S" v. r4 }! k: R! ~+ d; TSupporting " {9 U* e. t1 ~0 M* z( {Technology $ G. j, ~$ _& k' C# q7 j: HA technology that program management personnel consider a critical part of the2 l6 q0 v+ c$ o& s4 S program being described. ( u- l" U7 M6 x7 Q' V% P5 iCRLCMP Computer Resources Life-Cycle Management Plan. : _* O9 `. k" O9 D6 wCRM Computer Resources Management. ! m: `5 l. D" {) O7 C2 bCRMP Computer Resources Management Plan.5 i3 }) j3 S7 N ?# G) @ CRO Chemical Release Observation.1 t8 l" A$ J) O v- } CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC . S; o# t& j/ @& g- g! {4 iterm.) + l$ v! Y9 R+ j9 c& T7 e) ^! WMDA GLOSSARY, VER. 4.0 C # G- m# ]9 f a. ?6 x1 ~66 2 U* y2 ~ I3 c; pCRS (1) Computer Resources Support. (2) Congressional Research Service. (3)5 H+ D0 Z3 }: i& a6 L9 O% j z' `9 c Contractor Reporting System.5 Z% d/ U1 ~* A: E9 Q, f CRT Cathode Ray Tube. $ @/ a$ }0 L! s2 Q+ ]CRWG Computer Resource Working Group.2 ^, x" _4 x; `2 a. c Cryocoolers Cryogenic Coolers. 3 X- x- r! i/ m/ b$ @Cryogenic Of or related to cryogens (substances which are used to obtain low " [) [; `) p1 [0 c& \2 p( K0 btemperatures).! o- ?+ c- C: s3 o& J( W* I Crypto A designation or marking which identifies classified operational keying material, 6 H; T7 q' _% t8 F. m, F0 `- \and which indicates that this material requires special consideration with respect0 ~" Q- W' _; \3 G/ u to access, storage and handling.- C4 O5 m2 K/ a8 f7 F( @& D2 T1 s Cryptographic. A9 \2 j4 b" [3 d( u System 8 Z; A9 c* K, k% i; b' wThe documents, devices, equipment, and associated techniques that are used) j6 l0 e5 F8 B( A+ c7 v as a unit to provide a single means of encryption (enciphering or encoding).4 J/ h+ ~2 i+ g( x% X) S Cryptology The science that deals with hidden, disguised, or encrypted communications. It / u G7 [; g) b) H0 Kincludes communications security and communications intelligence. / N+ r& |8 O8 s$ D& I- {2 sCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. 2 L# o# H( s, c- e% Q5 l, jCS/CSS Combat Support and Combat Service Support (USAF budget term).. D- R$ j, N. G+ J- w CSA Chief of Staff of the Army. - I& f1 W- o6 _6 j3 j; r/ ^$ VCSAF Chief of Staff of the Air Force., \! L% O2 W4 P- C4 P2 B/ O CSC Computer Software Component. ; F& C0 ~- z' i- ^& Y4 c1 tCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) , k- K! t7 S) P5 Z( B6 \- nCSCSC Cost/Schedule Control System Criteria., M# m' x. b' `9 e, ]+ a2 p CSD (1) Constant Speed Drive. (2) Critical System Demonstration.% \1 N. R: ~! W. |* e, L/ Z3 q( H. e CSE Center for Security Evaluations (DCI).# z0 e! @* X' _; I CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon 7 ?8 Y& @5 }! W" V' l9 M7 C; D3 pSystem, located in Cherry Hill, NJ. # d( \9 A# W3 OCSF Consolidated Support Facility, Arlington, VA. 0 O1 k2 e/ [9 {9 w9 oCSI (1) Critical Safety Item. (2) Critical Sustainability Item.+ v5 ?% W' D+ D$ W5 q5 T) ] CSIP Current Systems Improvement Program. 1 V8 A9 n# \& |& {CSIZE Constellation Size.: y* R% } O7 Y! X8 H* J; F CSL Computer Systems Laboratory. ' b2 ]3 G+ Z2 MCSM (1) Core Support Module (*C2E term). (2) Communications Support Model. * W3 G6 }* l- K6 Y/ s8 s7 CCSNI Communications Shared Network Interface (NATO term). , d8 i( Y7 N5 N* GMDA GLOSSARY, VER. 4.0 C2 J9 F, v" B8 h& J. ^ y 67 ! g2 P$ |5 E) V# oCSO Closely Spaced Objects. , M: _; k: K7 ]CSOC See Consolidated Space Operations Center. 3 H7 w# M. B+ x# FCSOM Computer System Operator’s Manual ) n8 r: a# e+ }) q1 zCSOSS Combat System Operational System Sequencing: I0 Q7 O( S3 X- G/ ]& I CSP Communications Support Processor (numerous locations, including USAF Air / U8 n- M$ M7 f* y! o0 ]' nDevelopment Center, Rome, NY term).: E' l6 t2 U& ~. s/ s+ Q% k1 V2 Q CSRD Computer System Requirements Document./ K i4 F0 j) k1 y CSS (1) Cooperating Space System. (2) Communications System Segment. (3) : V7 r* t; @5 a' G4 `3 b$ i& kContractor Support Services. (4) Common Sharing System. (5) Communications . K9 p0 K7 P, ]4 gSupport System (Navy term). (6) Common Support System. (7) Combat Service ! F o& ~$ ^* c7 e/ w' O0 K; C7 rSupport.$ B: F+ @- ^$ ^ T CSSCS Combat Service Support Control System (USA term)., B* h( o0 ~3 z6 ]5 n4 f CSSPAB Computer System Security and Privacy Advisory Board.- v# t4 \3 s8 F. f CSSO Computer Systems Security Officer.0 ~% o/ e* H: K- q. L1 a( ?, R CSSTSS Combat Service Support Training Simulation System (US Army term). 6 h- s7 L, B9 bCSTC Consolidated Space Test Center. L4 l2 p* l: ^1 u4 W8 Y/ ? CSTI Civil Space Technology Initiative. , ]1 Z, [% _7 Y$ s5 g. I( p6 DCSU (1) Computer Software Unit. (2) Communications System Utilization.' Z& @- O2 S+ c7 |5 a) ^ CSUR Communications System Utilization Report. ( d; w2 V/ z% u aCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.2 l" Y# `7 O& Z6 `) G (4) Cryptologic Technician (Navy occupation specialty).! g; A4 a6 O6 i. M CTACS Contingency Theater Air Control System (JFACC term)." z& l4 p1 V5 j1 ?1 F! L9 E CTAPS Contingency Theater Automated Planning System (USAF). ( u* L4 i( l! BCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term].* c. g; v# d( E, K/ i CTBM Conventionally-0armed TBM. 3 ]/ f; y1 H/ n( m' }CTC Combat Training Center, Ft. Leavenworth, KS.1 \8 \4 M) r: i" z4 a CTCC Critical Technology Coordinating Committee. 3 t. A: i& `7 G. bCTD Communications Test Driver., h, ~8 A* _$ s) o0 V( y$ T CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. V4 S3 W% G$ T4 E- i- {4 lCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally4 [: X. u1 ]4 u/ N! y4 J4 O funding selected test investments proposed by the Services and Defense 9 S5 j3 D I# L! s2 zAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C7 h( d% ^6 s) `0 c 68, p" w) r; S- y% B7 ` CTF Controlled Test Flights. 6 }% ~1 ?& K4 F9 TCTI Concept Technology Insertion. " |9 m6 }2 V6 ?8 |7 L0 o$ qCTN CALS Test Network. 7 ?: D9 o6 I% h+ V$ @6 w' u2 aCTOC Corps Tactical Operations Center.# h# z. M3 m9 t: r$ Z CTOL Conventional Takeoff/Landing aircraft. / A2 K! Y& D8 S8 S& f2 zCTP (1) Critical Technical Parameters. " b& W6 w% R# z5 l& l/ ^(2) Communication Tasking Plan. 4 Y* p' A3 @' l$ V6 c& V(3) Consolidated Targets Program. 0 r) P' a4 `- F+ tCTPE Central Tactical Processing Element.% U1 M- I y. Q+ P6 M0 | CTPP Consolidated Targets Program Plan.! K# J8 d$ f* Y CTR Cooperative Threat Reduction (Treaty negotiation term). ( B: r7 Q$ D1 M) j( ]3 CCTRS Centers 1 B# T5 g- H D; k. ]8 kCTS (1) Clear To Send (TelComm/Computer term). 5 z2 d. L" u( w \0 m$ z(2) Contact Test Set (USA IFTE term).4 h( {2 X" a: ^5 [) Q1 N; }7 e7 ^. } CTSS Computer and Telecommunications Staff.0 n4 r$ K( k2 Q5 k2 l) M) _. O5 W: ` CTT Commander’s Tactical Terminal (US Army).% b$ f. ^% p0 |* s p/ E' D CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). ' A3 B9 ?+ Y9 l1 @CTV Control Test Vehicle(s).( d+ ^4 q6 D9 P' d8 \ CUDIXS Common User Digital Information Exchange System. ' Z7 r! K/ k; i/ @3 o [ ]; z( k5 M. zCued Operation The directing of one sensor based upon the data received from another sensor. C% {' ?- |5 d. {Cueing Command The command within a tactic, which specifies the sensor element’s coverage9 @ v" L3 q4 ` volume.4 [) ]) S" F, A Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage , w& E. F* x! L& w- Bvolume.% x% x1 b3 \$ Q9 o) @9 R CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. - ?8 L, O r2 I0 bCV/BM Carrier Vehicle/Battle Management. " _9 f( ~! {' E, t8 }CVBG USN aircraft carrier battle group.8 B8 _ p6 M6 t9 |7 G CVHG Carrier, Aircraft (V/STOL), Guided missile. / f! s" r4 L: |1 m; M' s9 pCVISC Combat Visual Information Support Center. 9 k: K# ]2 j# T! uCVL Copper Vapor Lasers.& J! q" @8 d4 R3 v! R CVN USN nuclear powered aircraft carrier./ ]; F |1 x. o* L MDA GLOSSARY, VER. 4.0 C' f. t7 g1 }- N8 L0 s7 D 69 & M5 A2 s5 }1 y# N& R4 ?- j% e+ E, TCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.- b: p* f: o8 P2 \- z CWAR Continuous Wave Acquisition Cycle (Hawk).: m+ P5 |+ C- d8 @! W CWBS Contract Work Breakdown Structure. ) P1 i7 t% ~7 A! ^0 C) ^. ECWDD Continuous Wave Deuterium Demonstrator.. w0 P5 d. b$ d7 R! f0 H+ @ CWIPT Cost Working group integrated Product Team.2 ?+ t1 [" o! q. a: l5 K CY Calendar Year. . x" `. `5 m6 x+ r9 z/ yMDA GLOSSARY, VER. 4.0 D* t) l! K5 u5 V* y 71: I1 J, D$ S8 |" B D Deuterium % n( I- i6 ?. r; \( @' Q- dD Spec Process specification. * W; v4 U! U( y* v7 E; k6 I& E' s4 hD Star Measure of infrared sensor sensitivity. 2 [, [( l: O8 F- } S1 GD&D Design and Development . p1 d+ U, T7 j) y- y1 V) o }D&T Detection and Tracking.4 n: X, D2 y k! l D-IFOG Depolarized-Interferometric Fiber Optic Gyro. 3 b t1 o1 w/ O/ `6 q% g9 [/ ?D-Level Depot Level (ILS term). 5 d) T* m" ]$ Q( I* g9 J8 B+ mD/A Digital-to-Analog : L3 h# L+ |1 u4 b; TD/V Demonstration and Validation. 3 b/ @* y! S4 t }* ?. `D2 Projective (interceptor) in the Hyper-Velocity Gun program. 4 i; n. F$ X, p8 q. o3 N& Y# q9 ^DA (1) Department of the Army. . e3 U2 }7 C1 [/ Z: Q8 j8 J' E(2) Department of Administration.- i2 k1 m- G1 s (3) Decision Analysis.3 W! I5 i% y/ o; J3 ]6 F$ w6 j (4) Developing Agency/Activity. ! x$ C9 r7 X) w: |: ](5) Data Administrator. , R4 C) B8 }. E3 K$ N8 C4 Z(6) Direct Action. / K$ S6 b' J @% U/ ~2 |+ h* X(7) Data Adapter.- ?; M* e) g) ?9 M& N" @ DAA Designated Approval Authority (DD 5000 term). ! t" N4 e8 E r6 p+ v/ z: b! ODAASAT Direct Ascent Anti-Satellite.( M' g# A8 J1 }& C$ P" A5 { DAB See Defense Acquisition Board. $ }& v$ M0 Q& A3 E9 C' |DAC (1) Days After Contract [Award].5 \- ], f6 H1 ^) @8 i$ @ (2) Department of the Army Civilian. ( K( f9 f/ R2 U' ?7 V' c(3) Directed Attack Characterization. 2 o' X3 ~- l! P/ ^6 p. I1 O( @7 S(4) Deploy ACCS Component. ' f! L6 z3 L' H" Y(5) Digital-to-Analog Converter.* m, A! I8 ?4 e! ?0 e$ e DACS Divert and Attitude Control System. W9 E' Q, H5 h1 l! PDAD Defense Acquisition Deskbook. 8 B) r# I% f1 b; Z5 [% G+ nDADS Distributed Air Defense Study (1993). ' \6 A% E" b3 b: y! u5 eDAE Defense Acquisition Executive. ( {; R# Y( o0 ^% Q" p, wDAES Defense Acquisition Executive Summary. - k2 \, k2 ~. KDAGGR Depressed Altitude Guided Gun Round.# P1 d. l8 s, T8 t% @( J, y DAHQ Department of the Army Headquarters. r) R4 r3 w# ]/ D$ Y- j DAI Damage Assessment Indicator (targets). - e U, l( o8 ZDAL Defended Asset List.- N8 }* {$ i+ f* O MDA GLOSSARY, VER. 4.0 D 8 \: E, E+ F3 }) N3 L7 l! D72$ ~0 ^9 j9 c9 g. ]; B( [1 r# N. N DAMA Demand Assigned Multiple Access./ }3 w5 o! W6 b, _ DANASAT Direct Ascent Nuclear Anti-Satellite.) w5 R; o* T7 A. t5 q% ^ DAPR Director’s Annual Program Review (SDIO term)# \. C3 R6 T# y. O9 t! | DARO Defense Aeronautical Reconnaissance Office (OSD). 0 V% i0 V/ ^! i3 GDARP Defense Aeronautical Reconnaissance Program. 1 @3 x9 F; a2 xDARPA Defense Advanced Research Projects Agency. See ARPA. 8 a+ Q- R) ^' f, H' o+ S' T/ ?& sDART OBSOLETE. Defense Acquisition Review Team. : a. D! Q+ V. C2 B4 SDASA German Aerospace. Member of the MEADS Program Team.8 m# m* q9 f# }% Y1 C$ w0 T' _ DASC Deep Air Support Center (JFACC term).9 x+ M8 U$ u2 p3 l9 J8 P1 u DASD OBSOLETE. Deputy Assistant Secretary of Defense.* N7 h: |& t: A' V DASD (C3) Deputy/Assistant Secretary of Defense (C3): ?5 `7 j1 C( p" C8 E DASO Demonstration and Shakedown Operation., q2 [3 A) ` l. v% Q# `0 w Data Integrity The state that exists when computerized data is the same as that in the source ; ^. s* k: G$ o+ O9 ^1 ]documents and has not been exposed to accidental or malicious alteration or3 j% e }7 G9 \+ l+ t Q* }8 } destruction. " O3 z$ O! l9 v9 ^% WDatalink (1) The means of connecting one location to another for the purpose of . T- k9 m* Q: m* U1 |transmitting and receiving data.& x: i, D/ c8 v" Q9 U (2) A particular path between two nodes over which data is transmitted. It , i/ k- I6 h2 sincludes not only the transmission medium, but also digital to analog' y- X) f" [, H1 l' C4 ] converters, modems, transmission equipment, antennas, etc., associated : ?- r8 k5 Q- c7 Dwith this path. In the SDS backbone network, it was a path between two ' x5 \. f0 q0 {$ `3 mSDS elements. In space these datalinks were microwave or laser. On a- \$ `5 L# N Z0 M the ground, they could have been wire line, microwave, or optical fiber.) m( |: _0 o0 v4 C+ _+ u DAU Defense Acquisition University, Ft. Belvoir, VA. # ], O B5 U6 Q0 pDAVID Development of Advanced Very long wavelength Infrared Detector (USAF 3 G9 w' j' R( hPhillips Lab term). B& ^& k' Z3 n3 }4 zDAWS Defense Automated Warning System.- y, Q* z* g* `4 H2 y7 j# t9 o Dazzling The temporary blinding of a sensor by overloading it with an intense signal of @8 h- R5 k' [1 f electromagnetic radiation (e.g., from a laser or a nuclear explosion). ! J2 J- j* M$ `* E3 g# _DB Bata Base' y! M% j& E4 B: t0 l DBME Database Management Environment (Computer term).& S/ Z$ j6 N( r3 K7 t/ r# m$ g DBMS Database Management System.7 I% N) t9 K- ^" n1 @: j DBOF Defense Business Operations Fund.- L8 R* f/ R; B! W$ N- O8 z) m- E DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D $ [9 x; L9 I# ?73 1 v( V/ ~- y, B2 ~Dbsm Decibels per square meter.# A, Z# j$ Q8 H( j, I' F DBSM Database System Management.+ k5 r% x, q0 B8 l/ T DC (1) Disarmament Commission. (2) Direct Current.+ r+ X7 j+ [( L' E DC-X Delta Clipper Experiment.. f' J; c8 i2 c x6 k DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications ( c& o9 _* F0 n: X8 tAgency. (Now known as Defense Information Systems Agency (DISA)). 2 c5 V( d3 K( h3 K6 ]8 w1 F, CDCAA Defense Contract Audit Agency. $ K0 B% T3 R( g$ A' D3 fDCAS Defense Contract Administrative Services. 5 r) ?2 d. n+ O. yDCCO Defense Commercial Communications Office (of DISA).; g9 p; L9 z" N; ~$ ` DCDS Distributed Computer Design/Development System. ) Z/ ^7 w0 V! A3 x/ ]DCE (1) Data Communications Equipment (TelComm/Computer term). $ h3 @+ W' c. Z* } ~(2) Distributed Computer Environment.+ s: S2 F/ q6 Q2 O8 m- q5 z6 U DCEC Defense Communications Electronics Command. $ D m- t* {6 fDCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.# C- B( W7 p- M. z8 B DCINC Deputy Commander-in-Chief. 3 K4 a' b+ s m2 T4 }7 X: R- lDCM Defensive Counter Measures.# J7 g9 X2 X& l% c0 M1 H DCMC Defense Contract Management Command $ B* J# M1 K- t2 @4 ^7 Z# RDCN Document Change Notice. ! y/ n/ c, }# _1 WDCO Director of Combat Operations (JFACC term).7 H( ^( x5 J3 L. A$ ?8 r/ E DCP (1) Decision Coordination Paper (see ADM). 8 V/ }$ B, P* s$ z, Q( y; R4 m(2) Director of Combat Plans (JFACC term)./ P5 H, A ?! v' G/ ^5 d+ N DCPG Digital Clock Pulse Generator.% U/ u4 ^& u. K N DCS Deputy Chief of Staff. : Q2 V4 E/ U O# k+ H6 z7 g" BDCSOPS Deputy Chief of Staff for Operations and Plans (Army). 2 ^; ~8 X$ W& A& @3 ?( JDCT Digital Communications Terminal 7 i0 j* G) m4 R7 C' E/ IDCTN Defense Commercial Telecommunications Network.9 `( r1 c+ y" o4 c7 S% `0 K& F DD Variation of DoD. / p$ o @5 L5 @9 Q+ zDDCI Deputy Director of Central Intelligence. ; i$ z/ ~1 g" {; H2 Z0 t6 d* mDDEL Dwight David Eisenhower Library, Abilene, KN (army term). 4 s) l- i8 {; j- V5 p" EDDG USN guided missile destroyer. ) {: X) }' y3 ~% ?% qMDA GLOSSARY, VER. 4.0 D ) C0 p {7 q2 v. t' E3 F9 A. k$ y) |74 . b" \- `. q9 F' V$ J3 x7 R i/ ?DDL Disclosure authority letter. ' E8 y7 U* @$ K: `7 \$ ^% nDDN Defense Data Network.$ u( j* c1 |0 t" w: C$ a) f# \ DDR&E Director, Defense Research and Engineering. ; f/ y% R" Y. T+ N$ Z! ^9 M2 v( @2 ODDDR&E Deputy Director, Defense Research and Engineering.! q0 v/ g3 W: Z0 [7 I DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). : R5 z4 q9 K' `5 B; sDE (1) See Directed Energy. (2) Delay Equalizer. ; N* A. Q, A! T7 L. d1 t- wDEBRA Debris, Radiance Model. - D* I( ?8 B0 i EDecentralized, e' }% ^( Z- M: j, E Control 9 _' H0 P) }2 `, ZIn air defense, the normal mode whereby a higher echelon monitors unit actions,# q1 T4 n' q7 G& E0 _1 p& g* s6 c making direct target assignments to units only when necessary to ensure proper - g5 Q7 `' L8 cfire distribution or to prevent engagement of friendly aircraft.. d( g) t2 }8 T9 n Decentralized, }3 e# m7 s3 E9 e% X% t5 W Execution ! k! G* I; |. d0 B" a9 [: TThe distributed and integrated implementation of USCINCSPACE direction by - V/ d# q( H8 d% Y! N5 {# sthe BMD forces. (AFSPACECOM)) @% i) r6 p h* ] Decommissionin, F% k2 e( V8 _% m Q g 2 o1 ]8 r2 y( s. {The removal or the rendering useless of obsolete or no longer needed . v' w/ J& g9 i2 r/ Ccomponents of the BMD system from service." Y- o7 i1 s) u6 ~% j Decrement A directed funding level reduction for an acquisition program. / T7 p) e0 F( ODED Data Element Definition (Computer term). ) K n! P F4 m; k. W" U/ @$ sDedicated Mode. L9 H7 p4 i: F6 R of Operation: N; t0 u9 R; \# j v% q (ADP Security)3 y& A- B' ]7 B A mode of operation where all users of the AIS possess the required personnel ; X+ x: a9 a# C8 Msecurity clearance or authorization, formal access approval (if required), and a' Y' E+ Z6 M& B% O) E3 } ? Need-to-Know for all data included in the AIS.3 z6 D3 J1 I5 f$ K2 ^2 | Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about* I. [' {& `' E x- W- E9 h 5,600 kilometers) above the earth’s surface. : N/ ]! X' T% QDef Definition. 6 M$ x3 n* K9 J6 H+ Z3 w( g( xDEF (1) Defense. (2) Demilitarization Enterprise Fund.9 J8 N) ^7 h% L$ j DEFCON Defense Readiness Conditions.& Q7 |- l! [- a, ?) P/ g Defended area; p/ E+ m+ H% ^: b% M coverage - c# A/ q0 I4 N0 M, LDefended Asset 9 N6 O9 ~; k0 I' D6 ^List (DAL)& f$ K( l! g6 K3 f The geographical region that the BMDS can protect from ballistic missile attacks & M. Q \9 x7 Rwith a specified level of probability of negation. May be specified for a particular : w! h$ w7 ?' C% H4 xthreat type, launch point(s), launch regions, raid size, etc. * o& r& J2 _8 B% I( B) N: BA ranked listing of facilities, forces, and national political items that require 5 U: {7 _7 I( K* ~+ tprotection from attack or hostile surveillance. The list is compiled from Federal N3 H2 e+ f/ `" _7 q+ H! P- T) g departments and agencies, Unified and Specified Commands, and the Armed, n1 m3 e6 o; \. Y C: g# D% h8 S& E Services to ensure National Security Emergency Preparedness functions.9 z6 d" L0 X! G) t5 ?) \: f# ?4 F MDA GLOSSARY, VER. 4.0 D : j/ O0 |, D$ X2 C( O* p75 ) A4 n! p$ ^9 h4 D' ]* ]; jDefense , k8 u( @+ }: WAcquisition ) x# C$ A: G; k/ [. n( W* ZBoard (DAB) ! r6 o" e. [' }0 X3 gThe senior DoD acquisition review board chaired by the Under Secretary of& L- T& N3 _8 {3 G3 T& j Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the 7 |- g, a8 b: \. D5 jVice-Chair. Other members of the Board are the Deputy Under Secretary of( _3 ?; {1 Z: d9 H Defense for Acquisition and Technology, Service Acquisition Executives of the 0 N; P( \ E3 t8 k4 i% dArmy, Navy, and Air Force; the Director of Defense Research and Engineering;1 \" `1 r j7 C4 R- t L the Assistant Secretary of Defense for Program Analysis and Evaluation; the2 r3 L0 G% ]1 x# }; X Comptroller of the Department of Defense; the Director of Operational Test and$ ~4 Y% h& X' X) D9 p# v Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the9 l: }3 Q) ^' g Defense Acquisition Board Executive Secretary. Other persons may attend at) ~2 |! @/ f5 q the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition 9 Y+ F1 g8 u N$ c; BBoard.”)( P y7 g* t# [2 Y5 w1 J Defense $ j! [/ }% n! E' _# H: qAcquisition% J, B9 [+ M- ^1 z9 G Board Committee ( e: h2 @. w* eAdvisory review groups subordinate to the Defense Acquisition Board. The$ t7 [8 _) Q2 h# n3 F" F Under Secretary of Defense for Acquisition determines the number of 9 d) O2 J5 M0 C& Z* {/ V0 S3 B" ^Committees. The purpose of the Committee is to review DoD Component) ^; f3 l6 R" B& ` programs prior to a Defense Acquisition Board review in order to make an, n( R5 @( ~2 n$ i# o$ r, ^0 s5 K independent assessment and recommendation to the Board regarding the/ _" ~; Y3 ]: J3 _ m8 v program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense . U+ m* u5 e; a4 M0 t( pAcquisition7 T+ V" m0 M% n- U8 G4 M Executive (DAE)) F- U; L2 B, Q) e0 U1 q The principal advisor to the Secretary of Defense on all matters pertaining to the ; i0 T( E$ \5 u- G- p% _ UDepartment of Defense Acquisition System. The USD (A) is the DAE and the& E/ X$ _" h( w9 z% _ Defense Procurement Executive (DoD Directive 5134.1). ) [- w2 W+ Z$ b: A$ }: q" vDefense) `) ~2 {% Q8 A2 H$ O/ G Acquisition6 \% `# X' \( _' n& Y$ _+ C Executive) f4 i- C5 T; l5 [ ]$ r: `5 ~: U* n/ v Summary (DAES) 6 S. f8 I8 W4 v }0 d* F6 E6 uThe DAE’s principal mechanism for tracking programs between milestone/ P0 S; H$ ]1 s5 i9 r reviews. Includes programs subject to the Selected Acquisition Report (SAR),6 _% \1 a# F" F, w- a and any non-SAR programs subject to review by the Defense Acquisition Board. & {- l: z- v0 k! EDefense , y) H8 d- g( A* l, EEmployment $ y4 G: i4 c( h5 B) k+ r- SOption (DEO)( N1 S! y7 z# _7 K6 O; n5 W' o Engagement strategy provided to USSPACECOM component forces to achieve+ ?- d; [2 ~4 ?' o; v5 S specific military objectives against a ballistic missile attack. It defines hostile' s+ J, T: V0 X: M! H z! L target priorities, provides assets to defend, and allocates SDS resources to be- g# o+ k* U) t( o employed. A number of DEOs may reside in a particular Preplanned Response , L! Q- Y' z( S, H, U$ jOption (PRO). However, default DEOs (those believed to be best suited to ( L8 q6 r" h; U% ^* T+ u. N1 ]counter the threat initially) will be automatically processed and executed when ! u" U2 B$ E9 b4 h0 q$ oDefense Activation Authority (DAA) is given by USCINCSPACE. 1 U7 D; |( R2 O! x# d8 y+ ?Defense& e8 m' c# I' f! d& N6 Q d Enterprise! W7 U. C" X1 W' W0 Y6 i0 H Program (DEP)8 j ~- a$ z/ Y' k8 S An Acquisition program designed to streamline the acquisition process by waiver' r. _) o: G0 x* w4 f) k of selected regulatory requirements.7 \, Z' n& [( T Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb J) f) D8 H' N9 t& Hand progressively weaken an attack, prevent initial observations of the entire# U7 }8 C) B/ O z* n3 l position by the enemy, and allow the commander to maneuver his reserve. 0 r6 x+ a$ g$ `3 _+ ^3 c4 R; gDefense 5 h k$ E4 n- d* l) l5 u8 C$ G- }Meteorological# J4 F# I+ m( ?# g Satellite Program% i8 h8 }) T6 {7 \: G T (DMSP)# s+ J7 t j3 g/ t4 ~5 y5 _ Satellites designed to meet unique military requirements for weather information.0 Z6 b( z! b1 O1 W8 Q' v Used to detect and observe developing cloud patterns and follow existing7 C+ W1 @& B5 F1 Z$ x weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. . [5 W) |+ G. A/ b3 W% X8 FDefense Planning 2 X8 ?% E% P: I# ]3 Mand Resources 5 G( G2 I3 R& b4 HBoard (DPRB)8 O% A1 ?& o0 [) g* i A board, chaired by the Deputy Secretary of Defense, established to facilitate0 H& F1 F5 |" q! \, s% A" C decision making during all phases of the planning, programming, and budgeting * F! W- C0 e5 Z/ lsystem process. Board members include the Secretaries of the Military 6 X/ P( @- N V2 Q7 MDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of % ^% D/ B) r+ F" d! KDefense for Acquisition and Technology, and Policy, the Assistant Secretary of . h4 z9 x4 W* \1 y' d) {9 fDefense for Program Analysis and Evaluation, and the Comptroller of the- M w2 ^* E3 V i Department of Defense.: O, @5 ?+ M) J$ i MDA GLOSSARY, VER. 4.0 D / |9 B `3 a w; L, E) l' H76 9 q B& o, F E# b9 v, S; D, ~Defense Planning6 D: c7 K! @) W! P6 |- B Guidance (DPG) ( }" D6 R, I+ d6 r2 g- ?! fDocument issued by SECDEF to DoD components providing strategic framework* T5 q. ]- i# ~3 W0 v. {" R for developing the Service POMs. Result of planning effort by Joint Staff, OSD, 4 P9 {1 `5 w, Sand Services. In connection with two-year budget process, DPG is issued every! R9 Y8 V, L; M) M- e" X other (even) year.) H) u3 Q$ j; b9 f Defense Priority ' g0 M' b0 X; |) t+ Yand Allocation : p/ h) J9 _8 z8 a; h. C) OSystem (DPAS); C( j% D c3 b0 z- L$ }' L& }7 n The implementation of a statutory requirement where contracts in support of+ ]" d5 J( N& m- A national defense must be accepted and performed on a priority basis over all 8 U5 @' B; l+ U( l4 K4 |/ n Q% _other contracts, and which requires the allocation of materials and facilities in6 y0 W0 g Z6 o' f1 [* G such a manner as to promote the national defense. See “DO” and “DX.” " C/ k( x5 c+ E) G8 |) MDefense 4 Z6 D: H* y& ?+ T* QReadiness 3 q4 N$ Z" |$ XConditions7 r( h2 u6 @1 F% S; C (DEFCON)) H; u4 D# D9 c% \" o3 Q A uniform system of progressive alert postures for use between the Chairman of # |: N$ {2 T/ N: J: H3 C- y% mthe Joint Chiefs of Staff and the commanders of unified and specified commands. s: B; U. C {" Q and for use by the Services. Defense readiness conditions are graduated to - D: g* s! O# ^& \, l; }$ p/ cmatch situations of varying military severity (status of alert). Defense Readiness , {& y) k% }+ P/ T) Z5 |Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as( q4 m" T" [: W* l; s appropriate.& K6 C0 ?5 e. D4 U7 w; U2 j9 ^9 C Defense Satellite9 v7 ?, b3 a* Z* S6 V Communications 3 D9 n: v' o. Q% FSystems (DSCS) * n0 f! Q) V( ZAdvanced communications satellites in synchronous orbit around the earth. 9 f i8 P% o6 i Y) qProvides high-capacity, super high-frequency (SHF) secure voice and data links4 S/ v8 Z3 X% j. [, n" X9 ? for the Worldwide Military Command and Control System (WWMCCS). They 3 A$ X/ c1 c3 }" B" K8 Gsupport terminal deployments for contingencies; restoration of disrupted service # _4 K6 b. [6 j! Xoverseas; presidential travel; global connectivity for the Diplomatic# @1 b! ]7 [0 n Q" ?' ` Telecommunications Services; and transmission to the continental United States F7 F& U6 F" a4 a' H6 ? of some surveillance, intelligence, and early warning data.. z" |1 [& ^+ @ Defense Satellite / `# B# @( o" m" B+ }+ h# v( S(DSAT) Weapon: J3 x) h8 I. [ A device that is intended to defend satellites by destroying attacking ASAT$ M- R6 X% H4 x# U weapons. y# g$ J* B# G+ |* NDefense Support7 S7 {2 \0 i5 m; X Program (DSP)( ~# [* z( ~. v6 J A system of satellites in geo-stationary orbits, fixed and mobile ground 4 \7 j. B. s5 I Oprocessing stations, one multi-purpose facility, and a ground communications 1 z5 E; G9 w0 E2 ]network (GCN). DSP’s primary mission is to provide tactical warning and limited * O+ Q+ }$ D4 J$ G6 n/ oattack assessment of a ballistic missile attack. # r6 k. y7 v" z; MDefense , H4 m/ C* g) _$ `6 M, `Suppression2 {# h+ Y) |7 n, u$ P) J \ Temporary or transient degradation of the performance of a defensive system 5 q3 D7 o4 I5 h) Q# W. y. abelow the level needed to fulfill its mission objectives, by an opposing force. 5 \3 u0 {' S( F(USSPACECOM) ' F+ f) N0 o/ C: JDefense Tier The arranging of a defensive system to correlate with the phases of a ballistic" W9 t7 @& y& m+ d+ h/ h missile trajectory; i.e., boost, post-boost, midcourse, and terminal. , G. J' Q( M0 g% K$ p' Y: X$ d( xDefensive 4 c- x( z, C0 W# [Counter* F: R' }$ U3 v& H: t6 [ Measures (DCM) ( X, G) y' V2 X) IActions taken to eliminate an ASAT attack. / ^0 a. L0 V( F% GDefensive3 m( e0 f5 e H' D' Q Technologies4 l! S, E y4 m& d" p8 D/ [ Study Team 0 v5 [! S! I% L4 y$ f6 k! C; o7 P(DTST) 4 z8 B$ N! D- Z7 [# J& v" w7 U( ?" CA committee, generally known as the “Fletcher Panel” after its Chairman,- T4 N v1 B& N appointed by (former) President Reagan to investigate the technologies of& u& n: e4 U9 j( O! ]1 ? potential BMD systems. 3 S# s( K: x3 U3 J% o& sDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.- q+ s K5 Z# j% l% h2 }9 t5 { DEIS Defense Enterprise Integration Services (ex-DTIS)., A% N* @4 C7 ^) J# N& v DEL Delivery.9 \# g/ A7 K4 v9 ^/ h Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion3 R- e) S' u0 D( |; D2 S% Q" N of shots about the aiming point. See also Circular Error Probable. ) n5 k+ e; D) \9 B: q& p3 VMDA GLOSSARY, VER. 4.0 D! W/ _" ~% N) X2 g$ \. j/ a 77, P! q- V' U v3 b Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the+ F3 c3 W0 k/ z) z maximum change in velocity, which a spacecraft could achieve in the absence of 1 C% c# |% n n8 ~a gravitational field. & G" x% r5 m8 J/ s" oDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). + ?8 r4 ]6 c* N- s; \- G( d, r. GDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its " |% F2 D1 ?% qdesired function (matching RV characteristics, screening RV, etc.) * ]$ p O' r% SDEMO Demonstration.: I# m8 X# f+ Y8 J7 ? Demonstration- C. E- ?& Q6 B. m! x# b- l and Validation. H9 X5 T6 A$ x, b* G7 E (Dem/Val); E/ ^6 a# u1 b5 {- U The acquisition phase when major program characteristics and product designs 6 V4 b: |: A2 e: |2 ]& ?* nare refined through extensive study and analysis, hardware development, test,* S8 ^' E9 g, D and evaluations. The objective is to validate the choice of alternatives and to ( w: b5 Q3 y2 F$ z" Tprovide the basis for determining whether or not to proceed into Engineering and & D( ?$ y% b' ~% e: H2 d- N7 N" U AManufacturing Development (EMD).' j& }- P- v# `; V. m7 ?' X Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. 8 v# m6 i/ N- J. P% U/ xIt may include destruction, removal, contamination, or erection of obstructions./ [$ Q/ K1 ~( ]8 z DEO Defense Employment Option. # r. `) c; P: X7 S4 ~, O: lDepartment of ! ~3 R2 {7 ?9 e4 w7 e4 `Defense 6 E2 M( Q: K; ]+ _7 L A8 x4 Q6 m, ]4 pAcquisition 2 A* D9 w& g8 c8 Y( r% i( t* MSystem * }$ c2 C9 D8 v# I, XA single uniform system whereby all equipment, facilities, and services are 8 j" r* s" T2 h1 Bplanned, designed, developed, acquired, maintained, and disposed of within the 1 g, R. X {, P. xDepartment of Defense. The system encompasses establishing and enforcing/ e% T% O3 A4 T( h( \5 _+ V1 f" Q policies and practices that govern acquisitions, to include documenting mission : ? t' Y5 q/ ?0 `% mneeds and establishing performance goals and baselines; determining and 6 w9 r ~: H: A5 Pprioritizing resource requirements for acquisition programs; planning and # P, Z9 I1 m$ u/ Y) `+ eexecuting acquisition programs; directing and controlling the acquisition review" W: R( F' V, c process; developing and assessing logistics implications; contracting; monitoring 3 {/ ?, S0 ]7 c: Rthe execution status of approved programs; and reporting to Congress. (See ! S: Q; W; D/ u5 G C: QDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)& e' Z6 K2 o/ _- a) i6 N# s Deployment (1) The placement of force elements in battle positions to obtain a higher" |8 G+ N' j" }3 c state of readiness.# v7 {* f8 [3 p. |7 b (2) The movement required to place force elements in battle positions. ' }# L, J2 @. ~3 H) J2 ^5 `5 D(3) Fielding the weapons system by placing it into operational use with units / p a* c: M0 w8 cin the field/fleet.1 P4 H5 y" Q% n (4) To arrange, place, or move strategically., f/ U" Y' o! n3 N: Y Deployment; D" ~+ z1 p" Q7 ]0 Q, r3 V Planning' p5 F- i n+ Q3 P, I% ~: p" m (1) The development and maintenance of plans required to initially deploy, $ {3 y2 d V4 @( h3 dmaintain, and evolve the operational system in accordance with 1 Z4 G1 _+ B0 g3 Rschedules and priorities. It includes factors such as launch facility3 C \/ i `1 O6 V availability and planning for the availability of other required elements# H$ i) l7 ]- k! F such as trained personnel or units. In addition, it identifies the impact of 4 d8 E6 K9 k/ i& f5 `deployment on operational readiness and any testing constraints! n& Q E5 j; g. J5 u associated with deployment. * O2 j2 h% f, n. x' C(2) Encompasses all activities from origin or home station through2 Z5 L: n! i4 z3 }+ @6 q destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding # U+ R2 M) L& l0 p! J+ I1 F. Iareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment- \, m+ a) S2 T a, Z6 V% r Testing' K2 T% T6 r( z; Z The testing and/or simulation of system assets in the physical and operational $ ?. D3 l" S, F5 d4 W5 p" g0 L) jenvironment in which they are expected to perform. + f0 @- R6 X- u7 H' c4 O* |" YDepOpsDep Service Deputy Operations Deputies. 5 b. X; _- m4 [$ r7 d/ `1 eMDA GLOSSARY, VER. 4.0 D 0 Z2 Y( ?( g: _( |; C) q. K: F78 3 Q5 W. ?8 L; ?$ S9 H: ~4 KDepressed3 ]$ b5 v- M L- B Trajectory - E& T" L8 v) ]3 V' k$ {$ hTrajectory with an apogee below that of the minimum-energy trajectory. s' k% i. O. X2 g3 M" KDEPSCoR Defense Experimental Program to Stimulate Competitive Research. : }) m# F1 y9 O6 uDEPSECDEF Deputy Secretary of Defense.) Z7 O0 M' j* ]: v! ?3 j DeSecState Deputy Secretary of State. - m+ C: _6 R3 r5 L. x, gDERA Defense Evaluation and Research Agency. Consolidated research and8 k/ R" \$ j8 g4 ~( S5 B development resources of the U.K. Ministry Defence. Headquartered in& D( }( S1 [ ~/ o% T2 m Farnborough, England.- R8 I/ K" R' ]2 h" C" S7 @ Derivative/ X0 Z, }& m* J Classification " Y" Q. ^2 o: r( R& IA determination that information is in substance the same as information8 f( i2 L( g) X currently classified and the application of the same classification marking.& t' b% K+ m# p( z0 C% ^" D DES Data Encryption Standard.* L5 F- y8 J4 b+ \6 Z5 c DESC Defense Electronics Supply Center (DLA term). & d1 k, a W6 M, ~8 J4 |$ yDesign " ?' K& j6 p4 b0 \1 CConstraints, D! \7 E1 d, y' J Boundary conditions within which the developer must remain while allocating" A- u. |# g$ u3 f& [- l; h performance requirements and/or synthesizing system elements. & b1 { g5 L6 E S7 vDesign( T7 k- n* C6 W! g0 u# D Parameters" m: g3 q! w/ h' X Qualitative, quantitative, physical, and functional value characteristics that are& T# Q' W0 B" Z, `& b) Z; G& ` inputs to the design process, for use in design tradeoffs, risk analyses, and4 H& x. s x; _5 ^ development of a system that is responsive to system requirements. ! J% O) }" [( d* ZDesign Phase A period of time in the software life cycle during which the designs for ' y& B" f. \8 P) R) d4 c* |$ Larchitecture, software components, interfaces, and data are created, ; h% C) g6 a5 _9 T5 z1 o' Edocumented, and verified to satisfy requirements.* B0 J' K4 T" Y x4 z8 l3 b+ f Design-to-Cost4 o, P) B: s* Z. N; ]2 A" H3 q# V (DTC) Goal / x) y% k. ~# OManagement concept wherein rigorous cost goals are established during+ o. _* L; C) K development, and the control of systems costs (acquisition, operating, and, ^/ x: l y3 n* [* _ support) to these goals is achieved by practical tradeoffs between operational1 x8 B: N5 Z8 v$ Q, c capability, performance, costs, and schedule. Cost, as a key design parameter,9 w1 Z4 B* h8 w! S+ | is addressed on a continuing basis and as an inherent part of the development$ K/ d- V8 d. H4 Z- {) x and production process. A DTC goal should be in the form of average unit # @! r. n1 Y, b- L' L& \7 Uflyaway cost. Also, DTC parameters for operation and support will be 7 M; F! D; I1 j0 x1 i& e* hselected—parameters that are design-controllable, significantly affect O&S costs, % u5 }# J) `2 h! P6 O3 Z3 r& Wand can be measured during test and evaluation. Parameters may be2 N7 w# E1 B g) k9 j, Y E expressed in dollars or by other measurable factors, e.g., manpower, reliability, or. [0 L8 |7 F: m- U5 e5 S: d9 V maintainability. Firm goals and thresholds will be established no later than entry - B8 k, k6 ~( L/ _8 Einto EMD (Milestone II). This is an in-house goal, almost contractual in nature, ) c6 z6 j3 x+ A7 H% abetween the PM (Service) and the SECDEF. Allocations from this goal will & W' U X' b) v& j4 [become the contractual DTC goals for contractors supporting the program. ) y- |' t3 d0 d; o: ]5 ?2 \Det Detachment. 0 _3 }% ^0 X. _% ?( ?" `6 mDETEC Defense Technology Evaluation Code. 2 L3 @1 J* n" a. Q- i' C5 TDetector A passive IR, visible, UV detector turns photons into an electrical signal. The8 b/ ~9 M$ ~0 N# h% Z IFOV of the detector is its solid angular sub-tense. There is sometimes$ C% g: ~5 z* L8 P! _! z: {3 n confusion between the detector sub-tense (size) and the pixel (picture element7 M- }1 f: `8 ]% J" C* d3 V6 U size). They are the same for a staring sensor, but in a scanner it depends on% {% W2 w8 v3 t4 q* t& c the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. 3 M7 _) Z5 h5 K- [4 Y2 GMDA GLOSSARY, VER. 4.0 D: A+ c9 ~% A* ?+ ?/ X9 n4 h 79 & m [: `+ ~8 p, I8 ~DEV ENV Development Environment. 3 t+ N% P$ t& N' K: {0 jDevelopment ) z. u, z0 K8 X$ T% ^Test (DT) ) y0 B( z* o4 _! {2 HTest conducted by the development test organization to achieve specified test $ G) o; V/ j* N# @- B6 bobjectives. It may be a complete test, a subtest, or a phase of a test.1 k3 c2 {# e) H$ T1 K0 v; S; M/ P Development. c* d" l6 |; z% P& ^2 n, }& h Test I (DT I) ) B, e$ f. P$ Q% [+ \3 vA series of tests conducted during the demonstration and validation phase.& @! M2 ?2 p" F. }' t3 T Components, subsystems, or the total (or full) system are examined to determine / }2 j) [5 b3 A9 B5 [& uwhether the system is ready for EMD. State-of-the-art technology is addressed 0 f# a; `% F% O. X- { O! g4 T. t9 nin DT I.5 ^0 `/ v9 U# ^$ @2 I6 n! X/ ? Development! A. d$ \" P/ `* G7 A" z% P* [# T Test II (DT II)" ^2 V3 a/ Y2 U3 F) [ A series of tests, normally during EMD, which provide the technical data( K$ a w1 T: C% }* z necessary to assess whether the system is ready for low-rate initial or full5 f! B. {$ e4 V" E production. It measures the technical performance and safety characteristics of6 f" z# ~4 f' q the item and evaluates its associated tools, test equipment, training package, . r! {6 V* X6 F/ dand maintenance test package as described in the development plan. DT II : e, z% z' {9 _' m" i( u* t$ ]4 Raddresses accomplishment of engineering design goals and the fulfillment of 7 a! O1 m6 m. n6 t$ l" kcontract specifications. ) u4 J' E# c" r( j% \Development& t5 H- [+ W8 p; B | Test III (DT III) k9 Y3 t G' Z; N+ RTests conducted during production. ! w) h2 r, [8 J9 C; ]Development5 ^* y4 G" p0 u1 t Test and6 ^- M; P1 N3 d8 e( W& } Evaluation 4 P" D0 W; ^" b1 S(DT&E): |: _% j( @; P7 j Test and evaluation conducted to measure progress, usually of 6 e) u: j2 `" F6 k0 i* Mcomponent/subsystems, and the proofing of manufacturing processes and4 n% Y$ G/ h: c& k) P. ^ controls and to assist the engineering design and development process and ( |" ?/ X% ^& U7 b# } Lverify attainment of technical performance specifications and objectives. Usually% N! z0 {! V- ^8 h, q7 c( X2 t conducted under controlled or laboratory conditions. Can be conducted before0 L- `2 h3 a" a8 K0 H( S7 A- ~" W; N8 P or after production begins.( J3 l2 U8 F- a' J6 ` Development # b$ R* k6 j' P* X1 }Test (DT)% A1 K/ I* @& ^; O" ^ Test conducted by the development test organization to achieve specified test) R, R7 @" @. [0 l( A) E objectives. It may be a complete test, a subtest, or a phase of a test.& r1 z) ~% o) W) ^5 _ Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,; } L; l4 \9 A5 G# g schedule, or performance without authorization from the milestone decision ' h1 t$ V! \' m0 Y mauthority. Acquisition Program Baseline (APB) thresholds represent these ' t9 Y$ w. x' ?, Z& _; pparameters. , i/ a- n# X( }3 A- C( I: KDevolution of * _* z/ Q2 y3 R5 R. k& Y- y8 \Command. e& M' _$ a! M$ c/ B2 c) ~1 j" B Minimal essential operational capability to perform C2 provided in an orderly and 8 H1 K8 v( j2 ~8 etimely fashion to a duly authorized successor. 0 t' ~0 Y* l5 K- }' h/ hDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. ' }/ g& w: x3 N9 O, p1 N, A4 N2 \DEW/D Directed Energy Weapon/Discrimination. ' m7 q1 U4 Y# h# H% h, Y yDEWG, O Directed Energy Weapon Ground, Orbital 7 E; L0 m) B, Q3 Z$ u9 A5 bDEWL Directed Energy Weapon, Laser (thermal or impulse).( k/ R3 x1 ]. }1 X DEWP Directed Energy Weapon, Particle Beam (neutral or charged). 8 N" z' ^. d- T* z* Z4 p5 JDF-KBS Data Fusion Knowledge Based System. / g ^2 \# s& H3 y% GDF2 Deuterium Fluoride./ y9 u W* h7 F1 t' ] r$ w DFAR Defense Federal Acquisition Regulation0 |. w* L) \! s( j' A DFARS Defense Federal Acquisition Regulation Supplement. 4 |' N3 x0 ], x# ]2 u- yMDA GLOSSARY, VER. 4.0 D4 C! a/ v9 F; i' A3 x4 m/ z( z 80 % ?/ k. F' X! ]& Z$ [& ]. ?DFAS Defense Financing and Accounting Service. ( U2 r! b* j. W l( ZDG OBSOLETE. Defense Guidance. See Defense Planning Guidance.8 U9 f* F9 y- R" M6 |2 Q T DGA Director General of Armaments (France).) |' d' ? R5 b- B: ] DGP Defense Group on Proliferation./ s/ @8 n: D* f) t DI (1) Data Item. (2) Developmental Item.5 ]- C9 `" C# L) F; r, U DIA Defense Intelligence Agency., k+ z- @/ P- }8 C6 ~) R" ` DIAC Defense Intelligence Analysis Center. 8 D5 j0 z3 Q6 o. r- zDIAM Defense Intelligence Agency Manual, p4 z. I6 m; ~/ F Diameter (Optics) The unit of measure of the light gathering power of a lens. " T; @& ^/ N- O+ K5 F" PDICE Digital Integrated Combat Evaluator./ P! B2 d2 x( u( g" F DID Data Item Description. 8 V# P+ W# h1 c) |# }- K9 U! DDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The & k3 N6 v# Y4 R# y4 Qangle of spread, which cannot be eliminated by focusing, is proportional to the / S. I) Z0 i, v7 d- rratio of the wavelength of radiation to the diameter of the aperture. l1 {, k( i0 C# Z2 ^( y9 B Digital 4 ~1 d+ F6 B8 q( G: W7 K! a! UProcessing3 I3 w' [- \5 W, t, r( a' R- d The most familiar type of computing, in which problems are solved through the 4 e' v' U* e% ]% Z' |, s. [mathematical manipulation of streams of bits.# c8 ?0 ]: h# {% ?7 `- C# R6 [ DII Defense Information Infrastructure ( E w9 B/ g1 d! |' g6 kDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to# S' s9 ^" V* o% O% a% S 12 km) between wake termination and de-sheathing. 1 G2 P+ P* j/ k2 B' M0 vDIPS Dynamic Isotope Power System (which provides up to 10 kW of power). 1 m6 u9 D# C4 W$ a" I. F3 jDIR Director. $ T' e) ^4 r2 S) y- U, M3 {Direct Air ; n( r- o1 y* o. u4 l2 S2 LSupport Center " Z6 g5 ^4 `9 `1 MA subordinate operational component of a tactical air control system designed $ w% n4 P4 Q. E+ Lfor control and direction of close air support and other tactical air support / x* `0 l5 w- V3 V. k; qoperations, and normally collocated with fire support coordination elements. # p0 i8 c& y# H8 sDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not7 ?9 K9 | F9 F3 ^, O& l- D necessarily limited to items that are incorporated into the end product as labor or n$ ?! @' d2 V8 C7 J! y# tmaterial.& g9 f2 j- Z! T Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing% L" u' a, m5 Y, o1 i* W direct labor includes fabrication, assembly, inspection and test for constructing 4 W& }; f. f0 O2 hthe end product. Engineering direct labor consists of engineering labor such as7 o" T7 b3 m, w1 H+ Z$ l; Q reliability, quality assurance, test, design, etc., that is readily identified with the3 O/ |2 p4 ]$ }) z$ F( K- y/ o5 M end product.9 j C" e# @7 a* } Directed Energy 4 z8 z6 F" n" P(DE) ; K1 B( R" v, b0 f1. Energy in the form of atomic particles, pellets, or focused electromagnetic4 {, j. w* N! X- E. }- F beams that can be sent long distances at, or nearly at, the speed of # I( d3 @) o9 P6 i; S9 alight.: ~& D, R: C) g 2. An umbrella term covering technologies that relate to the production of a: O+ s! K- x2 ?$ x$ e `3 [7 Z beam of concentrated electromagnetic energy or atomic or subatomic particles. + C8 Q }6 }3 H* AMDA GLOSSARY, VER. 4.0 D ; `; [' q$ i: ~- p+ S81" N x; ]( [6 u" L1 s8 ?. G1 I Directed Energy4 d3 w6 l" g) J* N4 v6 Z0 [ Device * }- I5 [! w' B0 B5 HA system using directed energy primarily for a purpose other than as a weapon. 1 r( d) E$ r2 H( ~' c2 ^$ CDirected energy devices may produce effects that could allow the device to be A: g# s7 E0 A7 a: k/ Zused as a weapon against certain threats, for example, laser rangefinders.2 `3 S6 k; g! R5 P4 I1 }4 g Directed Energy j5 J* l: Q6 F0 e3 VWeapon (DEW)5 C3 f( }# \ J( h A system using directed energy primarily as a direct means to damage or destroy 3 u4 b& `$ @$ Y% x' E/ uenemy equipment, facilities, and personnel.: v+ x& w' X# t L$ Y1 R9 y4 l DIRLAUTH Direct Liaison Authorized.) G- F3 q4 d. | DIRNSA Director, National Security Agency./ b d5 f' \: b DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. ' S4 c B, S. I" `5 m' ^( kDISA Defense Information Systems Agency, Washington, DC. (Formerly known as6 S2 J4 n9 X/ Q5 G# h Defense Communications Agency).7 o- t6 ?, q* \* [ DISCO Defense Industrial Security Clearance Office ) s$ s& f. c, L& Z6 LDISCOM Division Support Command (US Army term).& ~& o7 F( H. h! s Discretionary ! ]1 e" E' V+ `7 D8 DJudgment $ b0 c, U; _$ Z* XThe authority given USCINCSPACE or his duly authorized representative to6 l/ F8 W r) \0 x+ k perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination% j8 i s$ _8 ^+ J DISN Defense Information System Network (DISA term).8 g1 m5 L' Y; A- W7 y' f7 J DISSP Defense-wide Information Systems Security Program.1 R4 ? G9 {7 ^! f5 h! \6 J DISUM Daily Intelligence Summary (JFACC term).% f* f) X. _/ ]8 A/ \ DITDS Defense Intelligence Threat Data System. 3 P' N2 s, q) X5 ], uDITP Discriminating Interceptor Technology Program. The objective of DITP is the 9 _9 J6 Y+ {6 |9 k+ Qdevelopment of advanced interceptor seekers to counter advanced threats. ' p3 N0 p% K7 |! n1 ~& u/ TDITP will integrate passive and active sensors into an interceptor seeker that! D+ P$ |/ t( \+ Z* Q0 C6 U5 K0 t integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP . j9 w4 C7 M/ D# i' R" L, |flight demonstrations will involve the tracking and interceptor on-board 6 Z2 D4 K1 W. Mdiscrimination of targets of opportunity while providing fusion processor data+ w* E+ k" Q, Z5 Q, x" X0 ] telemetry. (See also ASTP). 7 P2 Y$ e+ S0 }( G' B% ADIVARTY Division Artillery (US Army term).* @& G9 V- b. ]/ K DIW Defensive Information Warfare.' Q1 k3 [: W8 W: C: p: O. M DLA Defense Logistics Agency, Alexandria, VA. - A) t( |9 }: \# b7 V, o% f. KDLSC Defense Logistics Services Center (Battle Creek, MI).1 t& D, n0 Q% s DM Data Management 6 r( r8 |4 X: ^DMA Defense Mapping Agency, Fairfax, VA." k7 C6 J$ B. Y) ] DME Distributed Management Environment. & E) M2 I9 ?5 o$ @6 y# `3 v- ADMI Dual-Mode Interceptor. + |6 C: b% r' _) i1 V( AMDA GLOSSARY, VER. 4.0 D. ~% n+ y# C1 M' K/ y 823 A- `5 ^2 ^7 O. J- C6 U6 j4 H DMRD Defense Management Review Decision." W% Q& l e8 I6 G/ O2 e/ ^ DMS (1) Defense Message System. * U: _* X" ]$ C4 `& Y(2) Dissimilar Mission Simulator.& p: e) h" {0 j/ u DMSO Defense Modeling and Simulation Office (OSD)., o1 J+ p- K8 k' P1 p1 K+ s9 W DMSP Defense Meteorological Satellite Program. 5 {( C) R5 n* C6 t, S& I6 T) mDMU Disk Memory Unit. 4 k7 i [, n, w( H0 F& L, p: dDNA Defense Nuclear Agency, Alexandria, VA.: g$ l0 J4 E" k1 o* r# H6 v DNMS Distributed Network Management System.. v7 c* _% u* E. { DNSIX DoDIIS Network Security Information Exchange . p1 I Z8 b+ a5 k5 x, BDNSO Defense Network Systems Organization. % I7 `" `* k1 x5 [/ K, K& X4 b0 N& Y7 fDO The lowest rating under the DPAS. All “DO” orders take preference over unrated # H/ i. U( _) J& forders to meet a required delivery date.! ]2 X, D) d8 u) K6 B3 c; s Doc Document! D, m8 c9 V: Q: s6 a$ Y# q DOCPREP Documentation Preparation.6 |, u1 E3 p) p s; O- w6 i Doctrine Fundamental principles by which the military forces or elements thereof guide, J, X- L. f, M D their actions in support of national objectives. It is authoritative but requires( @9 J" q! [7 W9 u) a judgment in the application. See also Combined Doctrine. ' Z; y, j# w8 _- _; U9 ZDoD Department of Defense ; K2 R1 [5 U9 m( p6 y2 eDoD Component, A6 \+ x: N; J6 R% e" c( T Acquisition 0 V$ H5 o1 }' QExecutive0 T, M! ^) l) h, P3 j A single official within a DoD Component who is responsible for all acquisition" V% s, ?; [. F+ a3 P functions within that Component. This includes Service Acquisition Executives& q' C. Q/ y8 n, }) K1 M" P Q for the Military Departments and Acquisition Executives in other DoD/ n$ D/ N/ K3 I5 O9 E/ f Components who have acquisition management responsibilities. ( D8 r) p% ?; u" X+ Y; j1 GDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, ) |7 r- ^( \% ?Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the $ O& ~* G. w6 m, ] n! V% i3 S( FDefense Agencies; and DoD Field Activities. 7 b" v& ~/ H% Q `: [DoDD DoD Directive. 6 c2 j8 [, `. b) jDoD Directive. _ N; Q' A# N e 5000.1* B+ ` H# {5 z( `! v+ I “Defense Acquisition.” The principal DoD directive on acquisition. It establishes _( {# o# z7 s5 A policies, practices and procedures of governing the acquisition of defense ! a0 V' X( ?0 \* P ?4 t4 zacquisition programs. - H$ A7 S; n$ j8 wDoDI DoD Instruction. ' Z) M3 F5 O- x: m/ u0 NDoD Instruction + G: J! j" W7 b9 F5000.2 + u @3 F8 ~3 B6 k F# o5 h& I6 V“Defense Acquisition Management Policies and Procedures.” Implements DODD 7 o' v3 `% ~4 x g$ g; u. i5000.1. " \2 V' {# K4 \: ~DoDIIS DoD Intelligence Information System.9 k+ X6 q+ s- ^7 y/ ? DoDISS DoD Index of Specifications and Standards.5 r# @2 r& I+ e4 L+ K DoD-M DoD Manual.; |9 D9 K a; w! R9 U3 k7 R MDA GLOSSARY, VER. 4.0 D4 X: Z1 b [* u 83( M' O( q: u& R DoDR Department of Defense Regulation.0 m; T7 m3 {" V) x3 L DOD-STD Department of Defense Standard. 9 \/ q# q5 Z% a/ p7 c; w/ ADoE Department of Energy.5 z1 u# ]7 @: b# l! b9 [( [ DOF Degrees of Freedom. 8 Q+ w% y& u2 Z6 F- _9 \/ CDog House Large Soviet A-frame radar used as a component of the Moscow ABM system1 G* Y3 d* X0 f having a detection range of approximately 3000 km. It is believed to provide 5 e3 p* g. a+ X x( u; abattle management for the totality of Moscow defenses. 4 M% |% X% U( W$ Z4 w% LDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). z6 g. C+ A0 w, j* Q8 q# H8 X D: u DOPAA Description of Proposed Actions and Alternative (environmental term).0 w( ^. H, h, ^+ `% e0 |9 w9 A Doppler Effect The phenomenon evidenced by the change in the observed frequency of a8 |2 ~2 h1 ]! H. ?7 ^5 ]2 O sound or radio wave caused by a time rate of change in the effective length of + _8 u( o) v, C8 G7 x( @9 X6 n, {; q* Qthe path of travel between the source and the point of observation.* L3 R7 B! c. V6 p DoS Department of State (US).4 R6 P9 S( b$ O& e* e: X1 O DOS Disk Operating System (TelComm/Computer term).1 G7 K8 d5 w3 V2 q DoT Department of Transportation [US].4 D' G! e% ?* n ~8 o7 r DOT Designated Optical Tracker. " n4 r9 R4 i6 J" ^* iDOT&E Director, Operational Test & Evaluation. l. q; F3 C" _. O" C9 } DOTH Defense of the Homeland.9 X, W J' S+ M! |' D+ m Down Select To reduce the number of contractors working on a program by eliminating one or& s& p3 V# N9 x more for the next phase. 7 {% W# i0 L0 R$ y$ IDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.0 z, A0 Z! x! h# v3 O: t( n# n v. Q DPA Defense Production Act. 6 Q' O4 U- ]5 Q4 D* P' f7 xDPA&E Director, Program Analysis and Evaluation.0 a" ~0 g$ n* y0 [: \ DPAS Defense Priority and Allocation System. 9 ]! E8 t- z3 N8 Z- o# m+ {# Q* NDPAT Dynamic Program Analysis Tool. 2 ]7 n: d4 [+ X; u2 zDPB Defense Policy Board.# c* y& k# u1 G: ^1 F DPG Defense Planning Guidance.! a. U; G! h5 }: g DPM Deputy Program Manager." p; [5 w% D: {$ E/ g% q' l1 E. c' E DPML Deputy Program Manager for Logistics 4 _ H, M! P& [DPP Distributed and Parallel Processing (Computer term). 4 \: A! i& z. {3 A/ s& ZDPR Defense Performance Review.% ?6 t! M! @& X1 x6 C8 Y MDA GLOSSARY, VER. 4.0 D , Y( D9 M. Y: v4 U; |84. ^/ Y) w3 f: g2 S, ]* z7 M DPRB See Defense Planning and Resources Board. . c& l( \6 d7 C9 X9 X/ l/ ~DPRK Democratic People’s Republic of Korea (North Korea). ! i4 Q# `3 C. J% \DPRO Defense Plant Representatives Office.% d2 _- c! S) B3 W DPSSL Diode-Pumped Solid State Laser.! N7 J! f3 \% U' R5 c# P DR Deployment Review.& ^1 L% r( r9 j( Q; @ DRAM Dynamic Random Access Memory. 5 V% ]9 T+ E4 h1 h; s$ u5 vDraw-down Curve A method used to encapsulate the overall performance of a BMD system that M$ F( n6 o- y6 M C( V plots the probability of survival on the vertical axis versus the number of attacking3 \( b9 \4 m! D% F# b1 h RVs on the horizontal axis. Used in conjunction with attack price, they are the) @- [; j7 C, ] most important expressions of a BMD capability.) v& [. T3 g* ~+ C DRB Defense Resources Board.8 ~8 E a& v0 n5 \3 r DREN Defense Research and Engineering Network.2 ~. C3 Q% n7 w DRFP Draft Request for Proposal. / |# k' A9 K" C, I. E. GDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from; g/ P4 |* O7 U" x gravitational and atmospherically induced torques on the spinning projectile. - {% T) U) L8 b" W' JDRM DAB Readiness Meeting (DD 5000.2 term).2 ~8 u4 O) C0 P+ y Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also : g* `0 K r( m. R d" }4 Q' gRemotely Piloted Vehicle. ( Q2 v( ?3 i0 z' Q, [- GDRP (1) Deployment Readiness Plan (US Army term).) b$ p) O& s6 E; G; E7 o' Q5 h8 O (2) Deployment Readiness Program.( G: L/ D4 U _8 r# {% V, }: C DRR Digital Receiver Replacement (USN term). 1 L8 l, Q9 a' W3 Q, O) } @9 F9 |DS Deep Space." {, U- v2 h6 f DS-1 Category of telecommunications circuit capability. ; }0 ^3 |/ E: `. B* n/ H+ G, UDS-3 LAN Category of telecommunications circuit for a Local Area Network. 2 z4 p" e" P! R. z! M" a5 bDSAA Defense Security Assistance Agency (OSD).2 E- L6 `* ?$ f) X% m* r. s# E4 J DSAT Defense Satellite Weapon. 0 m, n/ }! d' ^DSB Defense Science Board.! s6 F4 E- z3 L( E% g6 o DSCS Defense Satellite Communications Systems. 1 U8 e9 @8 ^ [) r* S2 n; UDSCS-3 Defense Satellite Communications System Three.: h! ]- ]% F; f9 ?% J3 u" ? DSCSOC Defense Satellite Communications System Ops Center. 0 ]# E7 \* W$ T4 b- p7 hDSI Defense Simulation Internet7 |: p' H, l! k MDA GLOSSARY, VER. 4.0 D 3 U `+ f5 v' L& Q85 " K6 i& f5 O' B( \8 xDSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet ! s$ u/ V: E8 H' {: \" [8 z2 f. }System.3 R9 P0 w: ^: X$ U( c DSM Decision Support Matrix ' B6 e* g& O4 x4 l* [) UDSMAC Digital Scene-Matching Area Correlation." S5 u# ]" d" R9 V. S& `& \0 a6 i9 ` DSMC Defense Systems Management College.4 m- m# N$ I. V4 D" K' ^ DSN (1) Defense Switched Network (formerly AUTOVON).1 n; D& e4 E# Z7 d- `+ ~5 m3 r (2) Deep Space Network (NASA term).& V: P x2 F2 Z8 q. u9 t DSP (1) Defense Support Program. (2) Defense Standardization Program. / Q) j- `/ h2 x1 Y3 K4 K' @6 C GDSPRTM Defense Support Program Real-Time Model. ! ~1 h3 |8 x6 A) ?. a4 pDSR Data Set Ready (TelComm/Computer term).% k6 R/ Q( L& G; B DSRCE Down Scooped Radio Control Equipment (TelComms term).0 l5 ^7 G+ B4 b0 g- ~. a) B DSS (1) Defense Supply Service. (2) Digital Signature Standard. I+ Z* E1 o f# ^! J DST Defense Suppression Threat.) h5 F8 k: R! R DSTAR Defense Strategic and Tactical Array Reproducibility. . o7 t4 P o/ d- z6 k/ HDSTO Defence Science Technology Organization (Australia). 0 i3 M1 p. e6 L6 n' h2 WDSU Digital Service Unit (Telecomm/Computer term). 1 Y) m9 B) A; CDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to3 x% J/ y) _1 K1 ^3 S; w5 ` the DNA. % l, W6 h/ V- B! j& P1 kDT (1) Discrimination Technique.: j& q( F8 U' _6 l (2) Development Testing., V6 v/ [& g8 O: k' E (3) See Development Test I, II, III. 5 G. S, Y; j( |! ?; @2 q(4) Down Time (ILS term).4 ]: g1 q; A+ b( M- Q. q& W (5) Depressed Trajectory. - c9 z2 i4 V$ n0 Z* d1 a( e(6) Dedicated Target.4 b: V4 L) Q% ]8 h DT&E Development Test and Evaluation.- N) T9 d4 J/ Y DT/OA Development Test/Operational Assessment. ; _ {6 Q: H S7 M, k" l2 eDT/OT Developmental Test/Operational Test. 2 p2 |4 y( ] TDTAP Defense Technology Area Plan. ! T5 D% l4 U1 I( K( WDTC Design-to-Cost. # G0 B( D. y `3 f# YDTD Digital Transfer Device (TelComm/Computer term). # M/ F) X8 d' i2 @DTE Data Terminal Equipment (TelComm/Computer term).! o* @+ R( t) n5 X$ I5 Q0 \2 P DTED Digital Terrain Elevation Data. + b% v H" G# i& x0 K& P" gDTIC Defense Technical Information Center, Alexandria, VA. 2 w# J. \& Q4 q: m4 U" Y* [MDA GLOSSARY, VER. 4.0 D- G, _. X/ }) J6 x- N- P0 z 862 ]$ n, V$ g7 {/ r; y$ k DTIS Defense Technical Information Services (now DEIS). ! {0 Q8 `+ @+ x2 h% U8 o yDTLCC Design to Life-Cycle Cost.* r7 n4 e) W# ^, g6 O1 a( R DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL0 \+ C5 X+ W' G- l term). ) F6 h$ E/ M) aDTLS Descriptive Top-Level Specification. $ A- n8 t* [7 l5 w9 k6 M6 ]DTMF Data Tone Multiple Frequency (TelComm/Computer term).8 x8 x7 f: Y* B: v- j7 f8 q8 I: ~ DTO Defense Technology Objectives. " {5 Y" h& D$ Z6 g; zDTOC Division Tactical Operations Center. & B0 ?- D; o3 X0 U7 L5 ^' o" H7 ^DTR (1) Demonstration Test Round. (2) Development Test Round. . N% r$ q Y# Z8 A7 Z `DTRM Dual Thrust Rocket Motor./ @: J9 l v$ p7 ]0 Y. d: @- v L DTSA Defense Technology Security Administration.3 S0 T( J: O9 V2 W; f1 y. C3 e4 \, E DTSE&E Director, Test Systems Engineering and Evaluation.( x6 Y& w7 J9 v# U6 B1 w" w DTST Defensive Technologies Study Team.5 {7 h( u: u3 v9 M, X2 n DTT Design-To Threat8 {! i, Y3 t0 _ DTWT Dual Traveling Wave Tube (Electronics Engineering term). $ S- T4 Z1 @0 x% TDU Depleted Uranium. 5 E* s0 v, ^- `" Y0 N$ ADUA Design Upgrade Assessment. 5 y0 }7 l6 ^# _! k t: SDual Source Two contractors producing the same components or end items for the same5 ^# R' c8 G$ |# q# t, y program.4 y3 I& K5 r. l6 f+ c) [. ] DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). 0 S- y9 ?: I' U, wDURIP Defense University Research Instrumentation Program.1 P+ q% ~( v8 w! s2 i9 v DUSD Deputy Under Secretary of Defense.! d$ P3 |3 G, ^$ a* \ d DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). % S" @" M5 _) p [) ?) }# h* I$ IDVAL Demonstration Validation.1 s: j) ~* L4 e DX The highest rating under the DPAS. It takes preference over all other rated and ! `; _4 N6 G" ?) vnot rated orders on a contractor’s production line. The BMD program carries a ! D, b( E3 X, v0 H9 ]# _“DX” rating.: l5 Y% e/ L8 R# a% D/ J MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87) f9 X, B, _2 {( U; n1 r) A E East % \7 K& F3 ^) ]: ?9 _E2 I See Endo-Exoatmospheric Interceptor.& q0 R$ J: r% P5 P E2SRD Effectively Two-System Requirement Document. I4 L! B: e0 c: S% oE3 (1) Electromagnetic Environmental Effects. 3 `1 K8 Z3 y$ Z9 Q6 f% i(2) Electrical, Electronic, and Electromechanical.& v8 G; W3 c# j1 U E Spec Materiel Specification.7 ^8 c% s4 I$ Q% ~7 B5 ]1 a EA (1) Environmental Assessment.# Y9 \& j; O, e( S8 a7 q6 d (2) Engagement Authorization.; y" N. K7 @) o: P9 x# H (3) Executing Agent. . n+ b( t- T. D( P5 \! X9 W3 p(4) Evolutionary Acquisition./ q- R# a1 f8 y5 i3 v5 q" q (5) Environmental Analysis (environmental term). 9 k7 y3 I6 U4 G, ~" u# `+ ](6) Executive Agent. $ ~' L5 D! X" B5 IEAC Estimated Cost at Completion. " e2 n# ?- E: P3 d1 T. E" c9 i1 F' p. |EAD (1) Engineering Analysis and Design. (2) Extended air defense.5 V. p$ t) {" p+ X; J EAD/D Engineering, Analysis, Design and Development. & [3 p' M, a% }9 rEADSIM Extended Air Defense Simulation. _9 ?' p9 f) T/ B0 p& j5 `/ E4 n) KEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing , w0 y6 _, O3 @5 c$ o6 R( wusers to model military response to airborne and ballistic missile threats.* M; V% t5 X( X5 M EADTBP Extended Air Defense Test Bed Program.; U0 c% ^- J+ Z EAGLE Extended Airborne Global Launch Evaluator. - [( K- J5 [3 b! X! a+ k/ zEAM Emergency Action Message. & g% k0 N0 F' [$ c( EEAR Export Administration Regulations.3 ~9 P8 R \+ \+ x# ? j Early Operational 9 v- V" K4 _8 x, YAssessment 0 _9 z; a& E* J# k, U' X! f( G& mAn operational assessment conducted prior to, or in support of, Milestone II.1 B' ?3 Q2 ~/ _ e+ T' x: y Early User Test- |# R" L' a/ c (EUT) - J* n8 w6 I5 [% R# ^A test employing representative users to examine materiel concepts, training or6 p. n$ R8 u: A5 u logistics planning, or inter-operability issues. EUT can be accomplished during / d: g' u* Q/ b3 @DEM/VAL on brassboard configurations, experimental prototypes, or surrogates0 x0 N3 ?3 \. D) i- n( j5 K to provide data leading to the decision to enter full-scale development. 4 m( W; c, g5 H" NEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of$ w# n7 f! Z( k4 z surveillance satellites and long range radar. _2 O+ @+ N: l6 @* k- F; | m _9 u(2) Early notification of the launch or approach of unknown weapons or / K: i; V: W+ R, a g; ?weapon carriers.% @) Y- [9 b- w3 c- e$ p Earth Limb The apparent outer edge of the earth as viewed from space.6 h. [8 k' u o% O Eastern Test : O' e6 R3 C& }; nRange (ETR)) p7 d5 G1 g2 Q; f) Z Beginning at Patrick AFB, FL, this range stretches halfway around the globe 2 r; v6 M: Z, s; G$ Vwhere it meets the Western Test Range. An array of launch complexes, sensors,; f( n5 R- \. [; a$ b8 O& r# i' g% k and tracking sites make up the Eastern Test Range. The ETR is now operated. U2 y# |- C- q/ V* D by AFSPACECOM as shown in WTR definition. ' F0 I6 x$ }$ k' b7 pMDA GLOSSARY, VER. 4.0 E 1 r, `) a1 U, u* V7 W884 ?3 J, e" b G3 N' C EB (1) Electron Beam. (2) Enhanced Blast. s# z l8 U2 F: x3 F0 ]) FEBB Electronic Bulletin Board.% k5 U/ Q- d6 U" W1 s3 y EBCDIC Extended Binary Code Decimal Interchange Code. ' r, W7 }; ~: f% }* V- ?9 f" OEBW Electron Beam Welding. ) l7 B0 o# E. l5 P3 J0 a5 yEC (1) Electronic Combat." k0 [1 Y* I8 f! o) J. X (2) Error Control.8 E. R5 G6 [# m( e8 s5 A (3) OBSOLETE. European Community. Now known as the European Union ) v* Q& n. e, G# [0 [! @, U" ^(EU).3 h) U: V$ U ]# e0 R8 M- L5 P" K EC/EDI Electronic Commerce/Electronic Data Interchange9 [4 |5 M0 }, Q4 w' {, l9 {4 x ECAC Electromagnetic Compatibility Analysis Center. / F& g6 t+ Z3 f/ O, WECB Engineering Change Board. 8 `4 S( ~) `( s. ^" |ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). : |: z4 x+ c; j( mECCM Electronic Counter-Countermeasures. ; G! G- E6 x+ t$ m5 v( CECDs Element Control Directives. % \: c1 h. q g SECLS ERINT Command and Launch System. t& M6 q) x. ?8 \) c) J# J' x/ yECM Electronic Countermeasures. $ f* Y: R2 f& z* t2 oECN Engineering Change Notice.1 \' F8 L" e- u ECO Engagement Control Orders.. D& P _' G. b# q c ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. , J2 O+ Z* X7 [' T1 [; c9 G; LECPMO Electronic Commerce Program Management Office. * u/ [% N( l+ u, p1 [* ^ECS Engagement Control Station (PATRIOT). / s( h! T2 ^: s* pECU Environmental Control Unit.: k; R+ o5 a) o! Y EDAC Error Detection and Correction, N3 }2 g2 m; `: f- C2 N EDGES Electronic Data/Guidelines for Element Survivability. * j: ~. H M, q) rEDL Electrical Discharge Laser% A8 P" A6 z% b! B0 g3 g& ~" z EDM Engineering Development Model. " c6 o9 q0 {6 y4 [/ hEDP Engineering Development Process+ L0 L( n8 H$ p# S* g8 } EDR Embedded Data Recorder (PATRIOT).8 z8 v& _# x2 q) q/ G EDS Electronic Data Systems Corporation + I: h/ H( y5 U" Z; wEDWA Engagement Determination and Weapons Assignment (PATRIOT). " |8 [ Y8 |0 |9 pMDA GLOSSARY, VER. 4.0 E % I- o) H q. ?- S5 n( H9 I. J9 J89# s8 R" H. c) o- S EDX Exoatmospheric Discrimination Experiment0 T6 X; w4 H4 B5 C: G8 K5 J EE (1) Electrical Engineering. (2) Engineering Estimate.- u. H/ s8 @0 M6 \ EED Electro-Explosive Device.2 f% q6 P2 M) C4 |( ~ EEEV End-to-End Experimental Version. _ Y, p. }: A% _% ` EEFI Essential Elements of Friendly Information. " x9 F1 j; B( ?( e! PEEI Essential Elements of Information. 6 X. g) T0 h- @: W$ zEEIC Element of Expense Investment Code. 4 j# t5 q5 o0 eEELV Evolved Expendable Launch Vehicle (USAF term); i/ [* |0 x1 J2 x EEU Electronic Equipment Unit.* y7 m. q! I/ u7 O: e5 z EFEX Endo-Aeromechanics Flight Experiment./ e4 Q" u0 L; K" W+ g' v' W! @$ h EFF Electronic Frontier Foundation.0 I0 L8 }. `% E& A$ U/ o Effectivity A designation given to the BMDS configuration and demonstrated capability at 0 ~& l4 A/ j$ g! Ia point in time, becoming effective at each increment when an element or( O% N# Z" ]5 ]7 D4 S/ g% } component is inserted into a particular Block.6 X# |% U: u, Y3 c8 ^. r7 }1 } Effective Damage That damage necessary to render a target element inoperative, unserviceable,: y7 L+ V/ t$ W' i nonproductive, or uninhabitable." J( ]9 D/ P" E) y; s Effluent Plume The pathway of movement of effluents through surface water or air. " v; e6 Y$ d( a0 H" e0 dEFP Explosively Formed Projectile. 2 a/ z9 d1 F7 w$ mEGP End Game Processor.1 e# N9 g6 g% t I0 ] EGTR Eglin [AFB] Gulf Test Range. , _0 O: \' Q s* m7 XEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). 4 o- }/ |8 O0 I6 m2 l2 `EHF Extremely High Frequency. 8 ?$ V0 k$ w5 ?' t) dehp Equivalent Horsepower.3 w, O7 c# e8 r3 U* j EIA (1) Environmental Impact Assessment./ X' q0 X5 [ Q. p/ l# W: c) S (2) Electronic Industries Association. ' z9 l6 x# F& ]2 VEIAP Environmental Impact Analysis Process.5 i) @+ L, P; S EIP Exoatmospheric Interceptor Propulsion. 8 C9 z. L9 v- P" v' t( rEIPC Electronic Information Privacy Center.$ Y; O1 \1 @1 o8 g8 }" A/ ` EIPT (1) Element IPT. (2) Engineering IPT. ! o! P+ v5 }5 d6 NEIS (1) Environmental Impact Statement. (2) Explosive Initiation System.0 z, P, h8 N% L) c: N3 A EISA Extended Industry Standard Architecture (Telecomm/Computer term). / f/ F& y" ~& O; K6 n& VMDA GLOSSARY, VER. 4.0 E : o$ N: e |, {; [4 L' ]0 F, g5 S- d909 t" J, N* c% U5 s EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. / ~: x+ N8 Z, ~2 t9 ~1 v* ZElastic Range The stress range in which a material will recover its original form when the force ( }8 G5 x8 b* j5 W+ c& H) }(or loading) is removed. Elastic deformation refers to dimensional changes , I5 v* b; P& L. z, v" ?occurring within the elastic range.& z. z/ ^% H7 A' a" p8 f0 t+ h Electro-Optics & z2 k& B3 H( X6 |Infrared (EO/IR)9 c' [0 B( L% g* u v2 ^1 J Technologies/techniques employed by optical sensors in the wavelength1 T- A# s! P: S& \ spectrum slightly longer than visible but shorter than radio.7 ^7 u+ e8 n: c7 n9 H, i5 r Electromagnetic " @ @: A) w+ e8 T5 B: M3 WCompatibility g8 Y; x( h- [9 Q; P7 U: F (EMC) ( l4 g! H' [" w7 a" NA condition when all electromagnetic emissions from electronic, electro-magnetic, 5 m9 n: ?3 |5 B: I# Nand electro-optical components of a system interact without interfering with one# X2 W |, M( `; p another.) E1 y; z5 t [3 s Electromagnetic- ]! G" D. y/ S/ h Emanations A7 u; ^1 L/ f# ^3 E9 V Signals transmitted as radiation through the air, through a vacuum, or through ( l! k7 E' F4 K) k0 @conductors.' S- I, f7 d& T9 k N6 B Electromagnetic& {# Q5 u" g! `8 R3 X2 J Field (EMF) " N1 n" b+ K% N2 Y" U& D& mAn electric or magnetic field or combination of the two, as in an electromagnetic5 v4 ?# q$ ^" l9 s3 @& m( R! |# V# y wave. Created by electric charges in motion, having both electric and magnetic# x. H* p& K$ r: [ components oriented at right angles to one another and containing a definite % X* f* Z$ U2 T8 Samount of energy. , H5 p6 t8 y3 e- w$ Z; j4 yElectromagnetic4 U* Q( y v" _/ q$ N Gun (EMG) + L. h; j: k1 m, l( l" S6 rA gun in which the projectile is accelerated by electromagnetic forces rather than 5 p+ f# o. D6 {2 K2 Z0 ^by an explosion, as in a conventional gun. # p8 G; y8 i/ o0 t& CElectromagnetic 8 `; s! {3 j6 t; H0 b! ?Interference (EMI) 4 Q) h R$ a; Z' V; T$ r; ?3 s3 E3 [Any electromagnetic disturbance that interrupts, obstructs, or otherwise & Q9 M6 K8 j% I( idegrades or limits the effective performance of electronics/electrical equipment. w/ b8 w; L5 T' t0 r It can be induced intentionally, as in some forms of electronic warfare, or . y" t! a0 F! j( Gunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. . ^: i* d& T* C3 m: Q) L& VElectromagnetic / b$ h) l1 v" }( ^Pulse (EMP) H8 z& a- F. R. N( Z/ ~+ v6 jThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of& z$ R0 E2 [1 w the nuclear device or in a surrounding medium. The resulting electric and 6 }. f4 V, d: E: D5 d' U1 c4 _magnetic fields may couple with electrical/electronic systems to produce. Z# h" v& b0 s damaging current and voltage surges. May also be caused by non-nuclear ; m# ]% c9 p" `4 \4 ^# l6 M- Jmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic" P9 a/ M1 e% l+ I h# e X Radiation (EMR) : f3 b9 e0 x& c( r: j(1) A form of propagated energy, arising from electric charges in motion that) Z9 B+ L3 h, q; @1 q) x" r, c produces a simultaneous wavelike variation of electric and magnetic/ D# ?# x. d3 Q0 d: O fields in space. The highest frequencies (or shortest wavelengths) of 9 L" K7 Q8 U& x, H) F8 c, wsuch radiation are possessed by gamma rays, which originate from / K* d: o9 c2 j7 {# }processes within atomic nuclei. As one goes to lower frequencies, the7 T1 t) T% C6 @ electromagnetic spectrum includes x-rays, ultraviolet light, visible light, + \+ _' {; k2 l3 T. }infrared light, microwaves, and radio waves.# e" V/ n+ v+ M8 w9 I% y (2) Radiation made up of oscillating electric and magnetic fields and $ k$ p0 q0 r0 m% Q$ J! Y" |+ apropagated with the speed of light. Includes gamma radiation, X-rays, 6 I) ?" P2 }, |9 Q \# rultraviolet, visible, and infrared radiation, and radar and radio waves. / S8 @6 ~2 ^ D& Z: [+ P7 I2 WElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices0 T# W6 O: A N8 ^1 n used in system/subsystem design, excluding employment in the RF spectrum. 0 F( s2 m q" ~7 QElectromagnetic . i* ?- P8 @ t; v+ v7 pSpectrum & n( h3 @# h) G4 j. u9 RThe range of frequencies of electromagnetic radiation from zero to infinity. It is, g1 s0 v& h |* J divided into 26 alphabetically designated bands. 8 i' G _/ X! M9 ~ NMDA GLOSSARY, VER. 4.0 E S% h( \8 \1 l% B) Q) j! k912 ^5 m7 B' n) t Electronic 0 d4 Z6 Q! c) |, k( ?5 ~3 \1 CCounter- ! O! G% d9 d3 ?5 uCountermeasure' `0 F( o* n) _* a" }1 e s (ECCM) 0 T+ F' N! p3 ?, N+ |- EThat division of electronic warfare involving actions taken to insure friendly6 _) H! U$ @4 ~9 t effective use of the electromagnetic, optical, and acoustic spectra despite the% H& ~2 l8 @' T# w: i$ K enemy’s use of electronic warfare to include high power microwave techniques. q3 p' @3 J- W( }0 Q1 {Electronic ! F' Y* S# R& x, H$ j/ VCountermeasure / r+ e, Y9 i7 D(ECM) * d* o0 p! @9 K) M3 g0 @That division of electronic warfare involving actions taken to prevent or reduce an + L8 Y; G6 i+ j! X P% Senemy’s effective use of the electromagnetic spectrum. 3 H# J+ P- r. ]' oElectronic . G: |5 ~ n# D: ^Industries$ j, W A" c- q. q( s5 S Association (EIA) $ h1 O+ K+ F! ^A standards organization specializing in the electrical and functional ! _2 r- J7 E2 V: w9 `characteristics of interface equipment. 8 z- G. o% ?1 D1 e' @! sElectronic $ `# U' @( a% g9 y& DWarfare (EW) ( b: p1 @% |0 FAny military activity involving the use of electromagnetic and directed energy to 1 V. x$ @: r) W0 ~' Kcontrol the electromagnetic spectrum or to attack the enemy. The three major' D. V4 }; e8 X- z9 H7 S subdivisions are:6 c5 V+ [( m: T, r4 E •Electronic attack – Involves the use of electromagnetic or directed energy to/ K' D7 A8 A7 _. f: ] attack personnel, facilities, or equipment with the intent of degrading,3 S: w* c7 y: Y: L: @2 ~! E0 Z neutralizing, or destroying enemy combat capability. Also known as EA. # E1 {6 f: I {7 r% W G8 I2 \Includes: 1) actions taken to prevent or reduce an enemy’s effective use of ; f* M6 V1 J4 p3 G$ N, Sthe electromagnetic spectrum, such as jamming and electromagnetic 3 [# H: x. d5 Q( i1 G4 Mdeception, and 2) employment of weapons that use either electromagnetic or # R# X: }" W7 Cdirected energy as their primary destructive mechanism (lasers, radio2 W- k& Y9 y" X frequency weapons, particle beams). R, s7 U, b$ x•Electronic protection -- Involves actions taken to protect personnel, facilities,1 z! C. }) w7 G and equipment from any effects of friendly or enemy employment of# W `2 S+ s V electronic warfare that degrade, neutralize, or destroy friendly combat / T _! j. H9 d% C/ Hcapability. Also called EP.6 X; I. \8 n2 e4 l6 A& g •Electronic warfare support – Involves actions tasked by, or under direct % T* X( F. f- y0 \. }control of, an operational commander to search for, intercept, identify, and, Q& ^2 [5 o" \( {* A$ E; k& z locate sources of intentional and unintentional radiated electromagnetic) m2 d/ K4 Y3 `- M4 i energy for the purpose of immediate threat recognition. Thus, electronic5 ?/ _( A/ h9 Y6 q# S warfare support provides information required for immediate decisions $ L- n% z: j" t' M; y* H) k tinvolving electronic warfare operations and other tactical actions such as 8 M1 ]" n* A% K8 E4 T9 \" @6 Rthreat avoidance, targeting, and homing. Also called ES.: G; Q" A# L( b V8 ~; D) T Electronic' ^: |& y% a# s3 d7 a Warfare (EW) 9 Q0 D) e, D# n7 y y2 h% f0 B7 fEnvironments7 D, S+ I& ~. A3 s6 H Electronic warfare environments result from radar and communications jamming2 n5 L! _, A1 d% r7 D9 [* V and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD % J4 p4 r$ t9 m/ v' @5 Lsystem.) F) V! b! o% \. c Electronics 9 n2 d& {* N+ G* F& E ]3 ]) b+ _' t" dIntelligence$ B3 S( \5 u$ W# |1 |3 z (ELINT)2 Q* ^- Y- z4 L# @% d' H; N Technical and geo-location intelligence derived from foreign non-communications : j0 J2 s# \- w: ` a" n, `: J/ Yelectromagnetic radiations emanating from other than nuclear detonations or: R! ]" j( t4 T, v1 O- x. Z& h radioactive sources.( l. b$ C2 D: Y8 L+ W4 C1 R( ] Electronics % D4 Q7 u8 G: x+ ~2 o2 QSecurity (ELSEC)( @( i6 ], v) _9 j; u The protection resulting from all measures designed to deny unauthorized/ a* m5 J) e6 a/ c$ @% j persons information of value that might be derived from their interception and 0 @/ J7 d- @! n; k# b* w( Rstudy of non-communications electromagnetic radiations, e.g. radar.2 h- q" M, S, ` r$ E$ | Electro-Optics' T' y9 Z2 j+ d9 w: W& v' ^$ s& U# h Infrared (EO/IR)! g; c i9 o( s7 b3 G) d; s0 T Technologies/techniques employed by optical sensors in the wavelength* w: L7 J% K+ f4 o) S7 { spectrum slightly longer than visible but shorter than radio. 2 r& c7 ^. t4 L' s0 [" ?3 j* h8 @MDA GLOSSARY, VER. 4.0 E ' \ Q7 B6 [! l% x$ P2 {& J929 W x& T7 G! b! q7 f' \3 T Element A complete, integrated set of components capable of autonomously providing ) c1 Q0 ~- c2 {! `. l* NBMDS capability. % O7 y, x& }' F" X l4 M9 eElement. C, Y6 h( C. H6 X Capability : h2 ^) Y1 r$ o# U7 o7 [4 [Specification& @6 n8 A3 @7 E% a (ECS): |/ h* r. X9 y* J6 r! P9 c2 C A document that identifies the element-level BMDS capabilities and / e2 K% b7 Y2 U# z! H- o( _specifications necessary to achieve the system capabilities identified in the SCS. * W& E0 E1 \3 e, t" o- Y' LThe ECS further defines the SCS-apportioned mission/technical performance 0 L, f- h5 w. r0 C$ m% icapabilities and allocates these capabilities to the element’s components. 7 M4 A) I1 V! B( G7 r/ J/ DElement Control A" @9 R! b) F/ I Directives (ECDs) $ i- b3 C$ h) _The command and control data instructions to control the conduct of the# z5 H+ @0 j) ` engagement. ECDs are developed by command and control software based2 s7 }" F: i! `) T7 W+ h upon variable parameter input by the operators (both pre-planned and real time), , i" G, r& f3 V1 k3 Oand operator defined rule sets embedded in the software. The individual battle 6 @7 w/ J8 Z4 D7 `8 Q H" ?management processors use these instructions to accomplish the assigned tasks6 }, c; H" z7 P from the operations order. ECDs are contained within a Task and represent the/ _: i( l$ r) e) R! ~6 S form of parameter values that influence the resource management processes of 6 m1 o& d3 T$ h# b7 F! M9 e$ kWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and6 {% R b) l- L. U" j. s/ v1 Y Communications Management (CM). There will be numerous ECDs per Task. 2 h. J" U# k+ u% j) t7 g8 p/ fElement i1 A* e6 E) J5 i. R( W0 _Operations7 f( x( g% G5 c# p Center (EOC)% v8 j% Y" T9 w { y. a6 g% s+ E An Air Force operations center, which operates and maintains a BMD weapon or 8 l/ u' b+ O1 ~$ r( Ysensor suite. (USSPACECOM)# k' X7 x, l' x8 H) p ELF Extremely Low Frequency. C8 f) ]0 p$ f' K# A8 Y+ O- u ELIAS Earth Limb Infrared Atomic Structure. , ?# ]0 r1 o' `- V8 bELINFOSEC Electronic Information Security. 5 P; v) d! b! p% [8 @ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-4-2 16:09 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部