航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation7 q$ o3 T6 o! T: ^" N COMSEC Communications Security.8 O+ [! R7 ~6 t+ r Concept+ g$ u# T: E% m2 g g% V. x1 v Exploration &9 H2 h+ j, A+ J* ~/ ?( z% N Definition - o6 J' t- j6 ^7 R& C6 U xThe initial phase (Phase 0) of the system acquisition process, beginning at. ]# o* g3 u; v. k& I" }# D Mission Need Determination. During this phase, the acquisition strategy is' d( o9 t, v, _; r, r; W7 y. G developed, system alternatives are proposed and examined, and the system 3 E0 X6 X) h$ r, ^program requirements document is expanded to support subsequent phases. 4 o" j- V1 j. @7 C- l. fConcept of% k& R6 ^* Q# z1 S; v# |8 ^8 ` Operations ( P& A5 h3 h& a! k7 K' T; e(CONOPS) % B$ `$ N% b4 q1 V6 ?9 b7 {/ j) e' ^(1) A statement, in broad outline, of a commander’s outline or intent in regard to9 M+ N) V* h) w5 m. x an operation or series of operations. The concept is designed to give an overall : L7 N5 C% \3 j: h2 ]- l# o! Opicture of the operation. (MDA Lexicon)6 w/ p% F8 o+ O3 j2 N (2) A verbal or graphic statement, in broad outline, of a commander’s ' R2 J6 c- j9 H6 N" tassumptions or intent in regard to an operation or series of operations. The 0 f d0 o# i3 \6 N3 Gconcept of operations frequently is embodied in campaign plans and operation / z! K8 g2 }* r+ {! mplans; in the later case, particularly when the plans cover a series of connected $ y; ?: D+ c/ L, doperations to be carried out simultaneously or in succession. The concept is 9 z7 W6 |9 c" H5 y. R' Z3 Qdesigned to give an overall picture of the operation. It is included primarily for; z+ v7 g) y, f7 k% h7 Q) a* |# p2 e/ ~ additional clarity of purpose.0 l# L9 \! D: t5 t+ i( w b! s Concept Plan An operation plan in concept format. Also called CONPLAN. , u2 O6 g# P2 ~ F9 ?( _+ S! cConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of! }4 Z! j" s0 |, A3 r the acquisition process, or combines development T&E with operational T&E.) X4 S, J/ L# J9 \ Concurrent1 F, l/ B7 R: t1 V Engineering- s6 U( _# F' _4 y% N: v: f3 o A systematic approach to the integrated, simultaneous design of products and. g' i) s1 }$ C2 ?; A6 s their related processes, including manufacture and support. This approach is, D3 W9 t+ P8 _" ~+ ?* M intended to cause developers, from the beginning, to consider all elements of: ^0 _% L. [. G9 X: L2 v5 L3 O1 ~ the system life cycle from requirements development through dispersal, including2 d9 ?) C& k7 g& j* I6 @5 |& a cost, schedule, and performance.4 k( b, n6 i1 p* x CONEX CONOPS Exerciser. + I5 M, d6 j" ZConfiguration A collection of an item’s descriptive and governing characteristics, which can be+ Z. J) Y8 O; e/ o expressed in functional terms (i.e., what performance the item is expected to 0 `4 ?4 w( R/ J: tachieve); and in physical terms (i.e., what the item should look like and consist of : G3 k& S8 o# J$ L/ A' Pwhen it is built).1 s( ]& L! l& g' f& J( D MDA GLOSSARY, VER. 4.0 C1 C5 U$ k2 d& j+ e1 B' P, H 59" ^$ S9 E3 G' }9 U" k g/ E Configuration" c0 Z, O& u+ f Audit 0 [% @1 U' x/ s: N9 G) \! POne of the Configuration Management tasks which includes a functional ' s5 m- h/ {" J; \configuration audit (FCA) to validate that the development of a configuration item5 b& J( G. D* J# e2 Q0 g has been completed satisfactorily and that the configuration item has achieved 3 ^2 E/ v8 t$ m1 o! Ato specified performance and functional characteristics, and also includes a 2 x# u9 Z( \' H% {1 P) [physical configuration audit (PCA) to verify that the configuration item “As Built” 7 Z# A0 v$ S% T- J9 kconforms to the technical documentation which defines the configuration item. . f6 X8 k+ f0 I% J: e+ ^" u, PConfiguration0 ~/ s7 D$ _7 s, S1 ?4 | Baseline1 e4 @/ }+ r9 t The configuration documentation formally designated by the Government at a : b9 s; F; V ]7 J6 Z3 especific time during a system’s or configuration item’s life cycle. Configuration * m- x& L. }7 K" v8 H$ xbaselines, plus approved changes from those baselines, constitute the current B& l- s2 Q2 U6 zconfiguration baselines, namely the functional, allocated, and product baselines.1 b& L+ a& }( I Configuration 5 u# [! D( X4 f1 J2 u2 T1 `7 ?, ?Control+ J8 a+ ~: v) U: G# e' K7 X5 K One of the Configuration Management tasks that involves the systematic/ i3 T& Z7 ~) r6 O; R! @3 M, ^3 R evaluation, coordination, approval, or disapproval of proposed changes to the ' o! C! x' I# o" U4 G0 odesign and construction of a configuration item whose configuration has been . l5 f1 C& }& g+ u, \9 w; pformally approved. . [) J4 D7 }( z0 o. m- u( t. ~Configuration 2 A( g. D) r: R F9 o; qIdentification 1 U, y. X- |+ c$ l7 Z$ @One of the Configuration Management tasks, which require that for every) q3 r9 x, N& n7 w7 ` change that is made to an Automated Data processing (ADP) system, the design ! A$ F2 I2 }$ h* `" Qand requirements of the changed version of the system should be identified.5 w i8 Q& n$ ^4 f+ _ Z Configuration( ]. r3 F0 m5 _" K7 A5 `# ^8 C0 e Item (CI) / B+ h* N1 R$ d! n% b, j! c7 tAn aggregation of system elements that satisfies an end use function and is; t6 m o. t, e& v5 ^* f designated by the Government for separate configuration management. + o' O* V G7 o* h q K: mConfiguration items vary widely in complexity, size, and type. Any item required- s' j& j3 y m3 `+ H+ S3 F; L for logistic support and designated for separate procurement is a configuration , C6 B; g! o* Z0 r& m. B. Xitem. Configuration items are traceable to the work breakdown structure (WBS).1 t2 \, D$ w$ s) ]9 r& J& C( z- @$ s Configuration 9 d7 C/ { y# @8 d2 y* QManagement 8 X& J8 p9 t$ O; P(CM) ; N) N# e; Y& @) ^$ f4 qIn computer modeling and simulation, a discipline applying technical and3 e% }1 B& [0 T! R administrative oversight and control to identify and document the functional 3 e) d, p8 q9 G9 ^/ P' z9 B) srequirements and capabilities of a model or simulation and its supporting2 |/ a% U7 g8 z+ a databases, control changes to those capabilities, and document and report the* Z) N% }9 [4 K) I' z2 V changes. See also Accreditation.; H2 x. B6 e, P& ]- w' G CONOPS Concept of Operations.7 ^/ {+ g% J$ c& [# a0 g CONPLAN Concept Plan ; e7 M' @1 D7 [0 T: `9 n' |5 }- c$ ^CONS Contracting Squadron.8 ^( m; [# U8 ~9 Y$ ] Consolidated 1 p# O! O' |( V& {' XCommand Center) x4 b/ x* M% N/ U }) c7 G( W% f (CCC)- @! ^# A# s$ m5 p6 b2 c* B6 a" h. z A single command center from which USCINCSPACE/CINCNORAD can direct all % M' W$ b8 b( O' O2 x4 g) vhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado 0 N4 n7 M7 l3 U9 c8 ^Springs, CO. # w: e. Y' ]; [: t& I$ i+ V: {Consolidated# S- W# W+ p$ d% h Intelligence " a+ O5 V3 l$ |' i) r7 q. m4 m. c* P" oWatch (CIW)( J$ Z% [7 v$ Y- U/ P% Q A consolidation of intelligence watch functions within the Intelligence Operations0 ^+ e1 \) ^3 Q% Y% C) C Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD & |7 Q# E7 i+ C, |Aerospace Defense Intelligence Center (ADIC), and the Air Force Space& }. k/ `8 X" U s Command Space Intelligence Element (SIE). " k7 f4 c9 B) l$ j( RConsolidated9 d j& v0 C% i! C V+ n+ M Space ( O, V8 m l* w' O, }& G4 H `Operations$ r/ C0 Q1 }* u2 z8 k Center (CSOC)0 h' B/ L$ b7 Y1 I# B! g: z Series of centers at Falcon AFB, CO, which operationally control and maintain 5 o3 Z' j; d8 `# ~) Tassigned DoD satellites. $ i* u! F' ~( {, d3 P/ s JConsolidated ; D; R* p3 ]7 U4 ^6 F* M6 Q. P% hSpace Test # F/ d9 B; C. L$ I& I- ~+ ACenter (CSTC) " E) C0 E. d3 r7 h3 J# qSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and ' J: z0 X B0 winitial on-orbit checkout of operational satellites, operate R&D satellites, and6 F$ [/ [2 m0 X/ p( Q) r7 G serves as a backup to CSOC for operational DoD satellites.2 D( f3 h4 c' B0 G5 g7 K; I1 h+ F6 d MDA GLOSSARY, VER. 4.0 C 4 P) i0 X( g5 j60 + x2 x; Z) Y" l) N- r* WConstellation9 B. ?% A3 q8 ^* W1 q& E Size (CSIZE) 1 T8 H4 U: F# I7 x! x) Z" X0 e1 L+ ZThe number of satellites of a particular system placed in orbit about the earth.( [1 F+ \0 R- s6 Q; a8 [ Contact Fuse Device used to detonate warhead on physical contact with another object.- X& W0 t& ~! V' n) Y Contingency * f3 g# p, p; K# A8 F; h* Y# wDeployment Plan % n) W& M ~- D, s0 g! C(CDP)/ {6 R# \! F; |! O An executable plan designed to deploy an early missile defense capability and 2 V, W" }" n& @) f7 b1 [$ q) l6 p/ lreduce deployment time. The plan provides specific executable deployment : R V; q. `; S, ~! r" i. Hoptions and describes activities required before and after a deployment decision. ! Z& v8 P# Y. z0 YThe plan also allows decision makers to have oversight on technical progress,, t1 X) }9 c8 y) z, S5 \+ S1 w5 t5 b cost, schedule, and risks associated with a deployment system.9 l ?, R- M ?& n# V3 l# h Continuity of2 L/ T ?( Q" B2 i1 i, e Command1 Y1 u1 N( q* {4 ^1 t The degree or state of being continuous in the exercise of the authority vested; S2 A- j( E8 @ in an individual of the armed forces for the direction, coordination, and control of0 H$ l: P: i# U military forces. ]" _* d5 i2 [6 C% V$ ?6 Z5 r# D9 l Continuity of % ^8 P! H+ Y& d# k' _+ T' _8 X5 E( XOperations/ @- F2 [ k: O5 b+ X$ e The degree or state of being continuous in the conduct of functions, tasks, or & R3 u. G( Y+ y* oduties necessary to accomplish a military action or mission in carrying out the6 P/ }, J" b! C G6 V national military strategy. It includes the functions and duties of the commander,* t5 b4 u7 V' @: S1 e as well as the supporting functions and duties performed by the staff and others; ]5 P9 K: B5 o, o+ Y3 v2 b" M8 ` acting under the authority and direction of the commander.( X# m2 S$ u# m( x Contract m/ _$ u! d+ ]6 j( m, X& ~ Administration / l; V( F. R& t$ ?9 sOffice (CAO)& k$ G- `) L) c7 [2 X+ a The activity identified in the DoD Directory of Contract Administration Services5 p- F5 b" h0 j/ B/ y Components assigned to perform contract administration responsibilities. It is a) C( l& B$ G, n" s4 |$ F general term and includes Defense Contract Management Regions (DCMRs),# n, g& x B& |/ O$ _ Defense Contract Management Area Operations (DCMAOs), and Defense Plant' Z3 w" a. G2 h Representative Offices (DPROs). (Defense Systems Management College& s+ ` I* H2 `7 W% k4 B [ Glossary) 1 b l4 H8 ]- c" L2 cContract Data8 ^' ?7 H6 b" r) o+ K% x* l7 N' M Requirements% m: p4 p. z ~; o. @ List (CDRL)& v ^! V: B( R- P: g Document used to order (“buy”) and require delivery of data. Tells contractor. G% L2 P% N Y, V1 [( @ what data to deliver, when and how it will be accepted, where to look for/ g4 l7 [9 e! ~% F. o7 K$ y instructions, etc. 2 v0 J! @$ ` C7 K- E, _7 O jContract2 ^. e0 ?' v2 b5 x) D; ] Definition 0 Y1 R7 r5 h% c5 C1 W" BA funded effort, normally by two or more competing contractors, to establish3 h+ e0 x' \, C9 j8 P J specifications, to select technical approaches, to identify high-risk areas, and to- A( }+ k- ^. F y make cost and production time estimates for developing large weapons systems. 7 I8 @. j" G/ W. j! HContract Work 9 [1 Y. l. ~- L p9 N2 |Breakdown2 A5 \/ `' m" C Structure 6 W# V# {/ K+ N2 OThe complete WBS for a contract developed and used by a contractor within the+ S% ^7 O N8 m; n% O; _6 U guidelines of MIL-STD 881A, and in accordance with the contract statement of ( q" A, \6 R( C' ^, [+ ?work.7 t$ J a/ [& L1 @) i( E Contracting 7 `% Y6 W6 a4 f4 DOfficer (CO) 0 B5 D: l0 i" u9 _$ V/ f6 H5 I IA person with the authority to enter into, administer, or terminate contracts and , Y! A5 @2 n1 M+ t: B) fmake related determinations and findings. The term includes any authorized; I- s$ w* r, ]& C# U+ r. S+ y representatives of the CO acting within the limits of their authority. A CO whose T w9 i* T' V; Lprimary responsibility is to administer contracts is an Administrative Contracting ; G2 O# P$ ^) h! f2 G, _! K. O5 O* cOfficer. One whose primary responsibility is to terminate contracts and/or settle 0 n1 w/ a, H- f" cterminated contracts is a Termination Contracting Officer. A single contracting m9 [8 a( K' d8 V1 ` b+ S officer may be responsible for duties in any or all of these areas. - A7 a- P! H+ ]Control Authority that may be less than full command exercised by a commander over % f- K3 n4 r2 \1 hpart of the activities of subordinate or other organizations.# y+ |2 f1 {# |2 H! @ Control6 w8 q9 q. \3 G. V+ T) L Abstraction5 x0 x! V; B* Y4 k (Software) The process of extracting the essential characteristics of control by " ?* ^: h7 Q p* r3 K& X; Gdefining abstract mechanisms and their associated characteristics while9 t; a" }$ ~, Z7 s7 s$ r disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C0 I" h; G1 s/ k2 n2 Z0 z$ B1 l 61 0 R" U7 z: b% B- L6 D6 rControl and 5 E* j1 }2 i0 \6 p. K5 c* |; vReporting Center9 w% B5 ~1 `6 `1 G9 | An element of the US Air Force tactical air control system, subordinate to the" l. w* A J- g- S( Q* k tactical air control center, from which radar control and warning operations are: ^* ^# G% ^& i; u. J1 e" T' |0 ~ conducted within its area of responsibility.$ i. F, k: ? y0 N M Control and ; W' O8 G3 Z) {( N- m i# a% JReporting Post2 n. s1 U/ }' m) R2 c N6 D6 w An element of the US Air Force tactical air control system, subordinate to the % j& q6 [2 W+ U7 U6 j! icontrol and reporting center, that provides radar control and surveillance within2 U' X" `! l) @2 r8 R- O% H its area of responsibility.* t8 _1 |5 t# k0 p; ]; t2 e Control Area A controlled airspace extending upwards from a specified limit above the Earth.6 l6 L! W& i# I4 {( @ Controlled - G' z1 b- s( l1 H8 J2 @4 gEnvironment + _6 o: w9 X* v% [/ b% x! p$ ~5 HArea where entry into the radiation hazard area is controlled./ T! I9 D- n5 T. g' ~( R9 n Control' W* i0 M# s# c7 @- q ?. T2 g Procedure# e. f! Q* Z; W% | The means used to control the orderly communication of information between8 K( e: X2 M x' _ stations on a data link. Also called line discipline.' I# W1 T7 e9 [4 ?. L! r" o Control Station The station on a network, which supervises the network control procedures such + V2 g2 v8 f/ q8 C4 eas polling, selecting, and recovery. It also is responsible for establishing order " U/ ]- N, T% _4 w# ?# H: eon the line in the event of contention, or any other abnormal situation, arising) `. {5 }+ H% z; s, m5 b6 H. ^ between any stations on the network.+ c/ L6 V1 P9 o1 u: u4 C Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to , |% i: T! ~" Y8 Fprocess sensitive defense information and that is under sufficient physical and) T, ]6 q2 z2 Q technical control to preclude an unauthorized entry or compromise. " B' E! j K& A) Z% T" J# y# YCONUS Continental United States.0 [6 e1 }0 o1 Q Conventional Co- ; w7 l$ Y7 j* A# Z E0 qProduction# i, q6 }5 f* K2 @) c An effort between governments to produce the same end item, or components 2 `( c. j& _# G9 C! k& Uof the same end item, in concert., K! ^* F# P: H1 g! R Conventional ( B, U' Y5 y2 m+ eWeapon9 S A: t* x6 ^6 } A weapon that is neither nuclear, biological, nor chemical.8 ~6 K! y8 h8 ?0 @3 L. ^ Coop Cooperative- x* {% {( S, x& Y, k: }7 o Coordinated- g$ P: h W% C: }8 u Engagement% j [7 X# K% K! T' U+ m9 ?/ a Planning/Actions' @. [6 m2 J, r X5 m5 f$ E Necessary coordination among engagement components to ensure maximum/ \, y# A2 w- A3 M effectiveness of the SDS and resources are not wasted on targets already ?! V- c7 v! [5 j* a% e% b targeted.0 i( r$ w1 X$ U7 L# O$ R9 o Coordinating2 d9 d1 z2 _$ D Authority- r7 b' D# Q) ^& l A commander or individual assigned responsibility for coordinating specific( C- z% K w( h0 B1 i3 n functions of activities involving forces of two or more Services or two or more " ?, H$ D5 u# V6 T7 y: a9 ?forces of the same Service. The commander or individual has the authority to/ M& A9 Q+ p3 M5 N$ f8 u require consultation between the agencies involved, but does not have the L0 o5 `# H0 f2 R2 J. @ authority to compel agreement. In the event that essential agreement cannot be 9 A6 h+ l4 j- n- D' jreached, the matter shall be referred to the appointing authority. , N/ h0 F2 m0 k& i2 [, DCOP Committee of Principals( g2 Q9 a4 q+ @ COR Contracting Officer’s Representative. Contracting Officer.9 l. ?. k9 U: s3 H CORBA Common Object Request Broker Architecture. p; |0 T* z6 _8 x1 H, K CORM Commission on Roles and Missions.) t: L1 _$ K' }" }& a MDA GLOSSARY, VER. 4.0 C ' g0 R: c. ]: }' P# T4 h$ n62# |; l% u/ W7 z# b+ W- e2 j- v Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens5 y7 P7 k/ z. r, T' |7 w perpendicular to one another, designed to act as a radar target or " t$ C: i6 C1 [8 n& A; U! Lmarker. 4 _) e/ k. B, I, Q+ j& b u. N(2) In radar interpretation, an object that, by means of multiple reflections " Y8 C t$ q# s% I" Wfrom smooth surfaces, produces a radar return of greater magnitude than% W/ r7 u/ s4 P0 A) F might be expected from the physical size of the object. . @5 z! F7 I- Z' u( tCorps SAM OBSOLETE. See Medium Extended Air Defense System.0 f" f! _% b9 Z7 } Correlation (1) The process of relating observations or tracks from one set of data to / S/ J0 T/ f4 m6 I0 `" Wobservations or tracks from another set of data, i.e., collecting data from 2 ~! j& P+ D. M# V& _ vdifferent frames or sensors that presumably relate to the same target. (2) & N; o' ~6 ], D8 ~3 iIn air defense, the determination that an aircraft appearing on a # X1 @. f+ R, _( ~radarscope, on a plotting board, or visual is the same as that on which/ k$ k- ^) b& d0 H5 O& s9 `6 j9 j+ J) Q information is being received form another source. (3) In intelligence 1 R( B# z% A3 I* t2 t' G! yusage, the process which associates and combines data on a single( h% [* h" S% K$ k entity or subject from independent observations, in order to improve the4 O6 ?" s7 v( U, s& U reliability or credibility or the information.4 c- \/ C& N$ O+ `; E& n# c. _ COSEMS Evolving architecture operations support tool./ n% Y5 Z- A; [7 x8 h COSM Computer System Operator’s Manual : ?5 c: y) [ B4 N! A5 jCOSMIC NATO security category.6 U& O8 v% v. `) E) ?: o& B& ~ Cost Analysis5 ^, x. u1 _$ G! d" f6 y Improvement 3 y; w& b1 p! M/ |Group (CAIG). ~) L; T8 p0 l/ T' L7 [! T; t An organization within the office of OSD Director, PA&E which advises the DAB ' p( y' ~5 V/ n- p1 @on all matters concerning the estimation, review, and presentation of cost - B8 w6 }7 m5 e, E$ L& E7 fanalysis of future weapon systems. The CAIG also develops common cost 2 p8 u7 T/ a, ]& x. n: mestimating procedures for DoD. , W0 O* g& `+ ]& [* G, F \Cost Analysis , P& I# ]; `5 JRequirements & j1 y) t% I4 a: _Document 1 [. O; I# {" J# G9 }3 ?5 O* V(CARD)$ h& ]/ m0 S( k3 T, U- l6 v The document describing the technical baseline, which is a subset of current1 { G( l$ q0 K system technical data and is used to generate the baseline cost estimate for an + S4 ?2 z: q& pSDS element. It includes, but is not limited to, the element description,* _5 ?, \3 S) S: s0 @+ U interfaces, operational concept quantity requirements, manpower requirements, & ^# P4 _9 L( r9 q$ ?0 C1 Cactivity rates, schedules, research and development-phasing plan, and facilities, A. ^+ [/ w2 M) Q requirements. 9 g X. B: F0 l& CCost and n1 O% {3 {) v8 d# m; qOperational" u' o- ^: j8 d4 M Effectiveness - k. b/ p `. f. KAnalysis (COEA). ^. x+ H: [7 U- p An analysis of the estimated costs and operational effectiveness of alternative7 B' M/ \3 |1 W) c$ M' d: f materiel systems to meet a mission need, and the associated program for * \6 X1 B7 G" y* p5 xacquiring each alternative.+ h% A: v! J: H# I! q Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk7 H9 p! \: t( \/ G" ^, w due to cost estimating errors and the statistical uncertainty in the estimate. 5 S$ K9 B( I, B# J+ ~Schedule/technical risk is risk due to inability to conquer the problems posed by ; }: |; y% }- F$ H0 Jthe intended design. O& ^$ a8 v, Q% ]" A0 ^3 Q COTR Contracting Officer’s Technical Representative. See Contracting Officer.# \. m/ S( K) Y4 a( Y1 i( Y7 l COTS Commercial Off-The-Shelf. + z# i6 Y! f0 N0 }: a/ d' WCounterair A US Air Force term for air operations conducted to attain and maintain a desired0 C' b, ?* B5 {0 Z+ ^; Y+ g7 ` degree of air superiority by the destruction or neutralization or enemy forces. ) n' I0 f% j" y5 f' wBoth air offensive and air defensive actions are involved. The former range # f& z& ^6 B$ j: V$ J* {) N6 Bthroughout enemy territory and are generally conducted at the initiative of 0 i* |) Q' i5 C- o9 V% ffriendly forces. The latter are conducted near or over friendly territory and are 2 H8 L) c& E0 A3 J5 N+ s' \' @1 \generally reactive to the initiative of the enemy air forces. 4 { _4 y, ~( G. c: [: kMDA GLOSSARY, VER. 4.0 C " |; g$ S' M4 j4 z637 a$ |( t: e ?' E Countercountermeasures & Y7 ^& H: w& G* I) V8 E" x(CCM) 4 D9 l6 j; ?0 I1 j5 RMeasures taken by the defense to defeat offensive countermeasures. 4 r. n: |" {7 c4 o- ?# jCounterforce The employment of strategic air and missile forces in an effort to destroy, or# m: `. i }6 S render impotent, selected military capabilities of an enemy force under any of the; B0 i ]* u5 Q circumstances by which hostilities may be initiated. 2 I+ {$ I9 u$ f' ?) B6 n2 D! Y+ WCountermeasure A design or procedural measure taken against covert or overt attacks.* j4 D8 m$ w& d+ F Countermeasure! ^4 A. t- W) f s (CM)0 X5 H6 M- O* T6 T That form of military science that by the employment of devices and/or* h! Z7 I% ^5 h x) c, e techniques has as its objective the impairment of the operational effectiveness of - u" ?, `' U; `enemy activity. % R3 i! t( q" U- x, C9 o( cCountermeasure / ~5 w3 j9 d# v: T9 d; ps Rejection( R7 l0 `+ g' ~1 N& a& b (Surveillance)( {. L, `4 s+ O; S' h% x Improvement or rejection of an object signal in the presence of1 o. N z0 w; \ countermeasures. / {1 L0 c- S }2 yCourse of Action # _ }* I! F" z2 M2 T! l(COA)4 l, E, X' a) @- `. z- C (1) Any sequence of acts that an individual or unit may follow. (2) A possible ) e0 U& ^; d- l1 i1 fplan open to an individual or command that would accomplish or is + }' V6 l3 A6 R* Q5 wrelated to the accomplishment of his mission. (3) The scheme adopted + @+ }5 X! J; Q" I6 t# w- rto accomplish a job or mission. (4) A line of conduct in an engagement. - I) ?( F4 O% v(5) A plan to accomplish a mission. It describes the execution concept& P* A4 E7 ^! y2 V for BMD of North America. It will specify the engagement priorities,1 V" \# U+ E# p' j! b0 s resource allocation and desired results by Area of Operation (AO). % }$ c% I y- D, r(USSPACECOM) (6) The scheme adopted to accomplish a task or 2 E( f( ?: x$ A6 R1 q) A6 Amission. It is a product of the Joint Operation Planning and Execution' p$ ]8 _: T7 j1 H* Y System concept development phase. The supported commander will* o+ w4 e# O( M. ? include a recommended course of action in the commander’s estimate.' X1 ~$ v( C" N2 g2 p The recommended course of action will include the concept of ; i) k2 O/ z9 ^4 S! E- ^' {8 Z4 Hoperations, evaluation of supportability estimates of supporting ! d L0 B: G9 Iorganizations, and an integrated time-phased data base of combat,: @0 \% q4 Z( |* k# \* b combat support, and combat service support forces and sustainment. + D( J! [! l3 \7 y$ F2 A" x/ BRefinement of this database will be contingent on the time available for 5 ?. @, }) F' A# _" O" ecourse of action development. When approved, the course of action , q6 a' o! x$ t+ @( \becomes the basis for the development of an operation plan or * u6 Z! [( |# v* {# Z) xoperation order. ]+ z! [3 i7 t- _2 o( \) B3 eCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps,3 t% p) j8 S. l: r7 N( Y and other geographical presentation systems. (2) Cover or protection, as # L W/ P2 m5 Ethe coverage of troops by supporting fire. (3) The extent to which3 }% I& Y2 S6 a! S8 w( L intelligence information is available in respect to any specified area of: _7 t6 T0 V; r( u5 D8 X: @# x H interest. (4) The summation of the geographical areas and volumes of 2 i4 ^ L/ n7 w a' R baerospace under surveillance. , V) ^1 D) H4 [6 rCovert Timing % |8 T6 d! `; n: i! A( k& d% e- RChannel) _" X) e; k( \" v6 G3 y4 d A covert channel in which one process signals information to another by " c% g Z1 j2 n0 Q: V& L: P: U/ qmodulating its own use of system resources in such a way that this manipulation . X" a" V( w! S& ?affects the real response time observed by the second process. " d& n+ v0 q2 q0 p$ }" nCP Command Post. # ?6 q( v& C3 _5 j$ G9 j. @CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. ' k, e) I- |. c( Y/ OCPAF Cost Plus Award Fee. 3 P0 o% [0 s3 ^9 CCPAM Chief of Naval Operations Program Assessment Memorandum (Navy)) {: K, r( a8 Y: ^1 g/ M, H# e# ]1 e MDA GLOSSARY, VER. 4.0 C- K3 v4 d* W( A7 w7 G# c& p 64 7 ?3 v1 S# \1 L! ~! F. hCPAR Cost Performance Assessment Report. 5 P0 a1 P# h) J/ {6 DCPAT Critical Process Assessment Tool 8 c4 V* ]' p! }4 T7 t t9 LCPB Charged Particle Beam. ) P- Y- j' N' K NCPEV Communications/Processor [Network] Experimental Version. 4 h$ O5 o$ `/ {" ]1 E, gCPFF Cost Plus Fixed Fee.# u, G0 f1 O6 \; L# y CPIF Cost Plus Incentive Fee.& ^% X- G& u B) F( p CPIPT Cost-Performance Integrated Product (Process) Team. 7 N( a1 M/ n/ D* h( NCPM (1) Critical Path Method. (2) Contractor Performance Measurement.$ g( t& [# k# n# } CPP Critical Performance Parameter.$ h: J% f( t- o ]9 t/ `" }% O CPR Cost Performance Report. 2 U) X; p1 ?% ^$ yCPR/NC Cost Performance Report/No Criteria (Contract management term).3 ?8 l+ {9 ~% V$ v$ H3 p CPS (1) Consolidated Program Summary. + L) A# s$ V# H- _6 `: f; a1 o) M(2) Competitive Prototyping Strategy. + S+ D( @- E" g( ]1 \4 l7 H(3) Current Program Status.* h3 E5 v+ V) |' `8 p; ] CPU Central Processing Unit (TelComm/Computer term). 9 K. I R- E. x% F/ O/ aCPX See Command Post Exercise. - a- Q: S( ^1 j/ M- [' X; O* hCQAE Chief/Contract Quality Assurance Evaluator. 5 A3 z# u. G) vCR (1) Computer Resources. (2) Continuing Resolution (US Congress term)." [* Y* T% E9 Z) k6 M- M) O9 V CR-UAV Close Range Unmanned Aerial Vehicle. & j" b) M# Z0 `- {% ^5 {: T" {CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement 9 w& e% _3 Z$ j& n( wCRADA Cooperative Research and Development Agreement.$ c% L& r% c/ M$ \ CRAM (1) Control Random Access Memory. 1 n- l% Z8 B+ v, A; E) _/ `8 @; q6 H(2) Cross-tie Random Access Memory (Computer term).4 ^( v) n5 t) q) Q, t+ |. M CRB Configuration Review Board.8 u# Y4 [! T. b* |% q* ]- a) G8 _ CRC Control and Reporting Center. ! W. Q$ E6 O9 _1 v0 Q/ J, \ eCRD (1) Capstone Requirements Document. * d* k$ w, \: D5 s! }(2) Component Requirements Document. * g+ U; J/ t/ N7 }CRDA Cooperative Research and Development Agreement.' L, i! w7 H- d# I6 L4 P8 N CRG Communications Relay Groups (PATRIOT).2 ~) |+ s2 f- W CRI Classification, Recognition and Identification. 1 q+ D, Y* t' C" G X- ]0 T$ S" _CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C" x3 _* X& W4 y; W- w) B9 D 65" o3 _; q0 U. S+ l) a1 c' v Critical Design8 K! Q, L7 w% B! x Review (CDR) # w) j g( h0 K h# ?: {1 ^' bA review conducted to determine that the detailed design satisfies the 6 e# K7 ~) H2 \ e0 k: aperformance and engineering requirements of the development specification; to 1 F: h) t5 G& qestablish the detailed design compatibility between the item and other items of 9 s* k1 i/ M- q. g! yequipment, facilities, computer programs, and personnel; to assess producibility( ~6 N* n$ y0 b1 A" Y and risk areas; and to review the preliminary product specifications. Conducted- U1 @" \, v$ H, |( i$ p4 q) z during Phase I, Demonstration and Validation (for prototypes) and Phase II, % l0 U7 _' s+ E, V& JEngineering and Manufacturing Development. # o4 d6 i7 X6 t! XCritical 0 H7 j3 d/ N# J2 H! S2 rInformation 1 H0 O& P/ [! H, c `Specific facts about friendly intentions, capabilities, and activities vitally needed( ^; `$ ]! @5 b+ e- p5 |! O by adversaries for them to plan and act effectively so as to guarantee failure or$ ^# v" @! p+ L6 ^, k unacceptable consequences for friendly mission accomplishment.! w0 s: ^9 p) |2 x* e Critical7 J1 J8 W4 X: Z( a' K! X9 O: [ Intelligence . P9 m* G. S) P( IParameter+ ]' K/ ^, M$ n* v( {5 O f A threat capability or threshold established by the program, changes to which : N) {" V0 a M, h. W4 p7 l6 K0 Ncould critically impact on the effectiveness and survivability of the proposed 4 T# o9 S" c! t! D% [; rsystem. 8 {/ T' C3 m& `; s6 q5 ECritical Issues Those aspects of a system’s capability, either operational, technical, or other,1 M. e* F8 S$ V7 [4 R4 M# Z that must be questioned before a system’s overall suitability can be known, and % y) n# E1 F1 g0 Uwhich are of primary importance to the decision authority in reaching a decision ; w+ C( a3 r% i% l9 ~' l9 Jto allow the system to advance into the next phase of design, development,0 b s7 @. o3 _' P" z% T2 J3 o production, or post-production. $ h# X3 n$ \8 Y+ m5 l1 y; ECritical$ s% i* w/ B' g2 |5 Z* T9 I( I* ` Operational 5 v9 l3 C/ O: p( Z/ j) M2 T+ JIssue% r# s0 X: n. F. X" r A key operational effectiveness or operational suitability issue that must be + o* o3 _" r, Texamined in operational test and evaluation to determine the system’s capability Q& ~" a9 i( |# xto perform its mission. A critical operational issue is normally phrased as a8 b3 o; H# F8 X' x' i& I question to be answered in evaluating a system’s operational effectiveness 6 P' f0 W$ a- q' g* f/ `4 I3 pand/or operational suitability. 7 z! E4 _, _* `- v% S r% iCritical Path _# A4 `! e4 P. U; S9 pMethod 5 x g- L0 O& p$ L4 B: D6 _" OA technique that aids dependency of other activities and the time required to - [& [1 ]. a+ L0 e* C8 p5 s* [complete. Activities, which when delayed have an impact on the total project # f' |- A; l3 X' i7 zschedule, are critical and are said to be on the critical path. 7 p7 [& P1 n' l, qCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to5 a1 F( Y3 N! r b8 z0 d* J/ X the viability or the operational effectiveness of the SDS. 9 g0 z5 r6 i5 \Critical Security) A0 A5 U" |+ a2 K4 h9 l Risk 8 c2 y) Z- H% f: A) NThe existence of a security vulnerability that, if exploited by an adversary, could % ~) ^# F/ j+ E9 [, ]+ ?cause exceptionally grave damage to the viability of the BMD or the operational # H' p/ Z* U( ]3 e! Heffectiveness of the SDS. Critical risks assume an adversary’s capability to$ F/ i7 a8 e% _, m: @3 \ cause major system disruption or degradation (e.g., single point failure), 2 M* q1 v# I, |; y: g) Xdestruction of mission-critical components, or usurpation of system functions. 4 \, i6 {9 i% j) _; uCritical# l) [9 T" O$ d% B Supporting2 }9 U% A# U0 X Technology& o# D8 {' _' {- o' E A technology that program management personnel consider a critical part of the 3 ?. h& ~1 C8 J+ Z$ L: }+ o- ^program being described. 5 H) j- [, ]9 s4 wCRLCMP Computer Resources Life-Cycle Management Plan. $ K. @1 H% U t ^. q$ I8 cCRM Computer Resources Management. % E9 @* k1 m' r7 Y4 E' X( uCRMP Computer Resources Management Plan.* u4 }1 ?: h; p. N3 w2 { CRO Chemical Release Observation. * n& n7 F6 P1 b v$ DCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC+ _, B9 W8 g$ y& S9 K term.)/ N a9 Y# _% j1 n! ~, B+ B MDA GLOSSARY, VER. 4.0 C 3 t# O/ b4 B" x6 O66 / x6 G. U4 M* k2 c v9 E2 BCRS (1) Computer Resources Support. (2) Congressional Research Service. (3)! }2 y, J6 q" ~1 ] W5 t Contractor Reporting System. 4 Q+ R% ~% ^, ^CRT Cathode Ray Tube. 6 [, x1 B* n3 Y7 D7 `! ^) C1 K6 dCRWG Computer Resource Working Group. " h' s, o1 B0 P( l! b' h/ O% z/ v( OCryocoolers Cryogenic Coolers.' Q: R! E3 ?* d9 k7 M, y. E Cryogenic Of or related to cryogens (substances which are used to obtain low, b# h: c) d6 P4 q$ i temperatures).: e, y U% @+ y# o2 g+ [* h" T Crypto A designation or marking which identifies classified operational keying material,$ k, f9 Y& Q- z. i/ D$ {! W5 p* [ and which indicates that this material requires special consideration with respect % l y6 W# J' ^to access, storage and handling.9 N8 B: R+ T) z; s- q$ Z8 Y, N Cryptographic 7 q( f* d( V: f1 I8 p7 [System + ?! L' I0 y, ?% Y2 `- t( oThe documents, devices, equipment, and associated techniques that are used h( b8 V7 O0 {% I, o; G( T7 ^. nas a unit to provide a single means of encryption (enciphering or encoding).; t$ I9 }; T- O8 T. s# W }& L1 @3 |; [ Cryptology The science that deals with hidden, disguised, or encrypted communications. It 8 X/ k4 j( x( n7 j3 lincludes communications security and communications intelligence. / O; b0 ?. A+ K% ^ X# W6 hCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.$ G* k2 L5 s* F' w. [ CS/CSS Combat Support and Combat Service Support (USAF budget term). & l9 t2 I, ?1 y$ F) Z2 d" q4 O8 ICSA Chief of Staff of the Army. ! n; z8 n, r' Z8 ^8 t; z" _CSAF Chief of Staff of the Air Force. , e; Q* O+ r6 BCSC Computer Software Component. ( f: e, h8 m2 i" @' F0 XCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)# S O! v- H. E9 |2 V# Q CSCSC Cost/Schedule Control System Criteria.! m# q+ \/ V" \8 r! l+ p CSD (1) Constant Speed Drive. (2) Critical System Demonstration.: c9 D9 F7 N% }9 C f7 ]. D CSE Center for Security Evaluations (DCI).9 P9 l0 Y1 x3 @3 o7 v, k3 m CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon % c% W. S F& r2 E8 e3 k- eSystem, located in Cherry Hill, NJ.6 ?& _5 a+ I+ j5 ~7 A9 W S CSF Consolidated Support Facility, Arlington, VA.9 [* j7 u; [* p CSI (1) Critical Safety Item. (2) Critical Sustainability Item.4 i6 G7 d& b* z0 T3 r% l7 q CSIP Current Systems Improvement Program.: Q/ ^& u _% S1 S4 W0 N5 P CSIZE Constellation Size. \3 r% T( s- W$ @- j( u4 @ CSL Computer Systems Laboratory.* R0 o s' O) Y CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. 3 o0 M7 ~7 ?4 C2 q% SCSNI Communications Shared Network Interface (NATO term). 5 |/ \" u6 W+ F9 r4 O+ F; FMDA GLOSSARY, VER. 4.0 C 5 K3 m* ^6 s; `0 S x67 ' H! Y2 w3 ], Y, Y @+ w0 `CSO Closely Spaced Objects./ f9 Q; K) n* N$ I% D! k1 V5 F CSOC See Consolidated Space Operations Center.! _7 C' E6 I! j( q$ F/ W CSOM Computer System Operator’s Manual / T5 A3 V6 w/ {. CCSOSS Combat System Operational System Sequencing ) _% U' E6 A n% y$ JCSP Communications Support Processor (numerous locations, including USAF Air( k. E: G* L* ?; M8 d- ?% G0 Y f Development Center, Rome, NY term).2 U h1 s2 d/ n# I( O b: b x: K% L" z0 U CSRD Computer System Requirements Document. 7 F r3 l! n; e# T/ HCSS (1) Cooperating Space System. (2) Communications System Segment. (3)' W" S: u0 E0 h+ P0 |% V( \% @$ J Contractor Support Services. (4) Common Sharing System. (5) Communications 1 i% x% [5 x2 Y8 _, K" {Support System (Navy term). (6) Common Support System. (7) Combat Service1 \. Z W- o+ P( T5 Z5 D+ N. p Support. 6 }0 s5 G. s; W) [& v& _CSSCS Combat Service Support Control System (USA term).; B3 S( m! o5 j. \ CSSPAB Computer System Security and Privacy Advisory Board.5 k% \. g8 U% y( @* H CSSO Computer Systems Security Officer. : H, v$ F& ^) ]/ ]' j# _, |9 @CSSTSS Combat Service Support Training Simulation System (US Army term). 2 o' {- G* l: K4 k0 K: W; m) TCSTC Consolidated Space Test Center. * Q: Q" L4 @6 n0 {CSTI Civil Space Technology Initiative.9 q- d- P( L( M) J CSU (1) Computer Software Unit. (2) Communications System Utilization. O8 t, e# y8 Z {- u5 k CSUR Communications System Utilization Report. - Q$ X! J0 S: U, ~( o) B( C: ^CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. 3 ]! w0 F& c0 C6 k8 a4 Y; p(4) Cryptologic Technician (Navy occupation specialty). " _% g1 s7 K g# x' b8 e MCTACS Contingency Theater Air Control System (JFACC term).4 _7 P( @' L8 Z# p3 S CTAPS Contingency Theater Automated Planning System (USAF).1 {) D+ V8 Y9 N; @6 |) I9 N CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. " k/ R# _, \& ?9 gCTBM Conventionally-0armed TBM. " j5 U" q% K, z' m. |. N1 R! W% pCTC Combat Training Center, Ft. Leavenworth, KS. / q7 s$ h- w4 O( pCTCC Critical Technology Coordinating Committee. ; E4 Q( J/ v0 kCTD Communications Test Driver. . I( O1 s! E0 U; ^1 ` t. }8 B& lCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment., Y9 ?; v$ ^5 z, n6 ~ CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally - m% x6 x! j- a* @1 `4 n: @; i$ Nfunding selected test investments proposed by the Services and Defense% _- Y# { I/ K Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C 6 N( o; p# X: H5 ?. Y68' j# }+ n" D n% w$ \+ {/ u CTF Controlled Test Flights.8 r9 V0 p5 u0 H/ T. q CTI Concept Technology Insertion. / }" a# n" A: jCTN CALS Test Network. 0 _$ ~7 o+ z4 U' P' m& n3 m+ PCTOC Corps Tactical Operations Center. ! v: Q: i" Z# |5 S; ECTOL Conventional Takeoff/Landing aircraft. 8 @6 C/ T' d! F) h! C- jCTP (1) Critical Technical Parameters., N3 h* H4 f5 b( u: p+ t$ _2 u2 P (2) Communication Tasking Plan.( F- ?+ T! [3 j (3) Consolidated Targets Program. # ]+ |3 X P: t' l- ACTPE Central Tactical Processing Element.) [3 U; q0 Z6 d3 R! K. L" |# K) x CTPP Consolidated Targets Program Plan. * X: k% @% p0 K! J+ k% ~6 {CTR Cooperative Threat Reduction (Treaty negotiation term). 7 y X) B# ~* n6 FCTRS Centers : a7 [( B _9 R: ]8 i! PCTS (1) Clear To Send (TelComm/Computer term)., P# ^! b+ `! o) p \( r (2) Contact Test Set (USA IFTE term).$ a# w e1 `8 ` CTSS Computer and Telecommunications Staff. 1 A# v1 \+ {7 y* PCTT Commander’s Tactical Terminal (US Army). * P4 |; A% ?9 v0 kCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).5 F" q! y& C& o. o3 \- `; z CTV Control Test Vehicle(s). {' q4 [4 y: o7 Q8 H CUDIXS Common User Digital Information Exchange System.$ E9 I. N7 w8 n Cued Operation The directing of one sensor based upon the data received from another sensor., a9 [% F& P; ]2 P5 w! E! h Cueing Command The command within a tactic, which specifies the sensor element’s coverage ) N& q) O! X) Z8 z# H4 mvolume. 0 g) ?6 D9 `1 `' jCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage: N& M+ M) A8 U' s0 c3 F' j volume.8 S8 e+ J. @% E/ q7 N, X CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.) P3 o8 ]9 i3 F w/ f CV/BM Carrier Vehicle/Battle Management.9 c4 w& j, @5 A CVBG USN aircraft carrier battle group. ; _! E1 z% h8 g6 {CVHG Carrier, Aircraft (V/STOL), Guided missile.* d# l" |$ I5 }. n4 b+ m- y CVISC Combat Visual Information Support Center.* z5 c, r1 S. A: i CVL Copper Vapor Lasers. + e1 x/ O/ ^0 @CVN USN nuclear powered aircraft carrier. * X2 n% j. t9 P7 R# r hMDA GLOSSARY, VER. 4.0 C$ [/ l0 A! \! `* H 693 g4 U; E: V5 ]# `4 ^8 F% l! c CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.9 P+ B( r/ [0 d+ Y, c CWAR Continuous Wave Acquisition Cycle (Hawk).' E g- t' O* S- i) q/ { CWBS Contract Work Breakdown Structure. ; t! ]7 Z( u! m9 g6 e' O QCWDD Continuous Wave Deuterium Demonstrator.9 d/ j0 V/ P# `5 l$ w# { CWIPT Cost Working group integrated Product Team.5 K: G( ~, C) X4 O+ Q( z- \ CY Calendar Year.# U5 {! ]4 d3 [: M+ L MDA GLOSSARY, VER. 4.0 D( x% N2 N3 u3 K 71 ' q/ x1 m7 p4 q0 }4 }! mD Deuterium # c, k. b2 |( D( ^! F7 g* _D Spec Process specification. 7 C8 x* @) G, GD Star Measure of infrared sensor sensitivity. ( J& q. O/ t3 l$ C. m0 [D&D Design and Development: M/ s% {, z) r$ q& U% p- Y3 J D&T Detection and Tracking. 7 T# W: f5 v8 B, Q, N; J% `% a2 nD-IFOG Depolarized-Interferometric Fiber Optic Gyro. $ n9 a0 z) D4 l; S+ [D-Level Depot Level (ILS term). % q; y$ x, {! V9 k% YD/A Digital-to-Analog- P1 ^3 Q2 J, Y) g: m h& m D/V Demonstration and Validation., `- ^4 D: l3 d3 p# x! Y) s D2 Projective (interceptor) in the Hyper-Velocity Gun program." H( J5 J: D: Q y DA (1) Department of the Army.7 X7 ~; _2 I7 t (2) Department of Administration. 5 `7 k; q4 Z8 n' g(3) Decision Analysis. 9 B$ e/ }* X: t% n' Y8 n(4) Developing Agency/Activity. 0 h) U0 M1 ~8 e5 F(5) Data Administrator.1 A4 y6 _! ~- t1 t" E (6) Direct Action." O$ C8 g& k% e (7) Data Adapter.! ?2 A+ P$ \& r! \4 p DAA Designated Approval Authority (DD 5000 term).: [6 I" R7 Z0 q DAASAT Direct Ascent Anti-Satellite.0 n& \. q8 e/ u! d9 E DAB See Defense Acquisition Board. 3 U$ O8 o/ M p K1 d+ ]DAC (1) Days After Contract [Award]. 8 z5 T2 m- ~6 C7 \/ W(2) Department of the Army Civilian. 0 Q0 {1 i3 e( }! `- ^(3) Directed Attack Characterization.6 I" e# o3 Z6 H7 b0 A! | (4) Deploy ACCS Component.# L3 r4 c9 R6 Q (5) Digital-to-Analog Converter.' x) K& W" d, y% @* K; E5 T2 p0 c DACS Divert and Attitude Control System. ' {' _3 M- h0 c6 X" w2 d6 K" L9 D7 G6 wDAD Defense Acquisition Deskbook. + I* t! Q, c6 E0 R# r* pDADS Distributed Air Defense Study (1993).2 p+ x) n4 N1 m! W DAE Defense Acquisition Executive.% ] W6 G6 ~) E DAES Defense Acquisition Executive Summary. 2 m: Z" ?: o# RDAGGR Depressed Altitude Guided Gun Round.9 V& {, Q) B0 B. c) W5 y9 e DAHQ Department of the Army Headquarters.# h8 \3 H9 V' M# \* D3 n DAI Damage Assessment Indicator (targets). , J$ ], F$ v4 E# UDAL Defended Asset List. % T: K3 r! X# F/ oMDA GLOSSARY, VER. 4.0 D & n$ \ e6 z: F! @72 ' h& `6 O5 X% y z( Z0 A# m% hDAMA Demand Assigned Multiple Access.( c: }. r9 c& A# c5 ~! d, Z DANASAT Direct Ascent Nuclear Anti-Satellite. Z3 p- i# j7 IDAPR Director’s Annual Program Review (SDIO term): ]5 ^( J0 _7 e% n DARO Defense Aeronautical Reconnaissance Office (OSD). " ?! }' F s1 [$ GDARP Defense Aeronautical Reconnaissance Program. 5 @- F/ i; y" s6 f9 ZDARPA Defense Advanced Research Projects Agency. See ARPA. & F; y6 z& `3 |- S3 b1 f4 `/ gDART OBSOLETE. Defense Acquisition Review Team.+ A" R1 y" a1 j* n7 q DASA German Aerospace. Member of the MEADS Program Team.2 G% `: k# N& f& s Y1 i4 Z: ]8 T DASC Deep Air Support Center (JFACC term). ' B+ F4 l8 A) n- `9 d% KDASD OBSOLETE. Deputy Assistant Secretary of Defense.+ Z! P+ F5 T9 M: O- H DASD (C3) Deputy/Assistant Secretary of Defense (C3)2 J6 `+ O! c, l; C1 b' b DASO Demonstration and Shakedown Operation. * `' b( k$ o0 x& R- l G7 c/ gData Integrity The state that exists when computerized data is the same as that in the source4 j5 M' Y$ G) Z! A2 X0 t% I. B documents and has not been exposed to accidental or malicious alteration or - t' Y" c7 U* K# I: E9 V5 xdestruction.% x5 r2 }$ D C6 G% z5 F Datalink (1) The means of connecting one location to another for the purpose of 8 {5 Q) e6 S+ w4 C, {; ]/ Btransmitting and receiving data.8 b, ^( o- ~0 C7 U M q; s (2) A particular path between two nodes over which data is transmitted. It + Q" |% |( R1 X* o5 \, Rincludes not only the transmission medium, but also digital to analog7 i% J9 |0 b* r converters, modems, transmission equipment, antennas, etc., associated' z( G" Z' L q1 M0 P3 J with this path. In the SDS backbone network, it was a path between two4 |8 C9 M# [6 j' X8 f3 a SDS elements. In space these datalinks were microwave or laser. On# Y8 c0 e/ w$ W the ground, they could have been wire line, microwave, or optical fiber. & ] f# Q; N3 B% O- iDAU Defense Acquisition University, Ft. Belvoir, VA.5 {( P N& W* J- v' b9 F DAVID Development of Advanced Very long wavelength Infrared Detector (USAF 2 c! F- |- a+ P/ G6 Q+ i; \7 Q6 n) m2 NPhillips Lab term).4 n9 k# T K+ e1 u, V, v+ J) | DAWS Defense Automated Warning System.4 s+ a5 o7 _1 b! M Dazzling The temporary blinding of a sensor by overloading it with an intense signal of * k; m; D! i; P' R/ Y$ l" velectromagnetic radiation (e.g., from a laser or a nuclear explosion). 8 z8 J6 ]8 M5 q( Y7 j6 p# dDB Bata Base8 O: m- ?2 ]1 R6 S0 l8 _5 F0 C DBME Database Management Environment (Computer term).$ b: Z3 D$ {, g0 [# v DBMS Database Management System. 8 J: B! k9 ?0 u2 U; |8 mDBOF Defense Business Operations Fund.5 p/ s% F. v$ } DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D# }0 K4 b6 M; F; n$ }+ C 73 + e$ i2 i, e, P/ dDbsm Decibels per square meter. 4 {% U, M2 _9 k* T. QDBSM Database System Management.1 ~0 ~) T. P+ g0 E* i DC (1) Disarmament Commission. (2) Direct Current.6 O( ]) Y; g4 G" \. O; _) s1 U% } DC-X Delta Clipper Experiment. 1 u% {# _% g3 ]DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications" Z5 y& b2 j z% ]2 R6 q Agency. (Now known as Defense Information Systems Agency (DISA)). ( Y/ J7 {6 j6 X1 R+ c$ ?# |' \) HDCAA Defense Contract Audit Agency. # H9 M ~$ h8 w7 O" FDCAS Defense Contract Administrative Services. ' U2 C( @: R% O- A5 e) ^; ?DCCO Defense Commercial Communications Office (of DISA). ) J0 H6 z1 H7 ]5 T* E3 C# K# z: FDCDS Distributed Computer Design/Development System. % b9 h4 ?0 t1 ?( x eDCE (1) Data Communications Equipment (TelComm/Computer term). . M' o) X4 {( {& p(2) Distributed Computer Environment. 0 N/ d e9 \* a, [$ T. `$ SDCEC Defense Communications Electronics Command.- a& q9 ?+ {: ]2 C A DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. / j* W( B, J% U; A- Z5 W/ dDCINC Deputy Commander-in-Chief. , O: L0 }+ r; X* k' X% X4 ]3 O* xDCM Defensive Counter Measures. 3 p+ g3 a8 S# D5 qDCMC Defense Contract Management Command; z9 b5 D' B- f) k q# J+ n4 m0 y DCN Document Change Notice.% R2 a: m* r7 E DCO Director of Combat Operations (JFACC term)./ [6 O8 e7 o" t3 B2 N DCP (1) Decision Coordination Paper (see ADM).4 Q8 ^3 w; s' \ (2) Director of Combat Plans (JFACC term).) q" V' H K9 H) a# g DCPG Digital Clock Pulse Generator.- ]# P0 ^/ B( _6 ~) I* g& @7 w DCS Deputy Chief of Staff. - A; e2 Q: Q+ T, u8 p( w/ SDCSOPS Deputy Chief of Staff for Operations and Plans (Army). : E2 `7 p$ b7 Y1 J8 ]- p0 Q ADCT Digital Communications Terminal1 e& ~) b! g [0 ` DCTN Defense Commercial Telecommunications Network. ! B$ j( J+ Q' |) v# f# QDD Variation of DoD.$ u% [9 K0 j/ U: l$ T) e DDCI Deputy Director of Central Intelligence. $ c+ Z* Y% g1 E/ g* k8 D RDDEL Dwight David Eisenhower Library, Abilene, KN (army term).+ i i/ G% I7 s& C' |$ e DDG USN guided missile destroyer. % w8 f& {- l% { wMDA GLOSSARY, VER. 4.0 D 5 ~7 G, t2 o I& z3 o5 h( A7 }74# g, t/ S$ j' }$ p- ^7 u9 y DDL Disclosure authority letter.; W5 q9 F# @: X6 j DDN Defense Data Network. 8 H3 g% L! O U+ MDDR&E Director, Defense Research and Engineering./ _" q8 C- ]: L8 ~; `( q DDDR&E Deputy Director, Defense Research and Engineering. 1 J; ?3 P K% mDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). $ n) {/ C ^* f9 e0 u' u) A5 cDE (1) See Directed Energy. (2) Delay Equalizer./ d. h2 s% {) i0 `2 L DEBRA Debris, Radiance Model.3 C6 N; a( [& E u) e9 c I Decentralized 4 d7 j5 E# F2 s! l0 rControl" o) J# A0 U6 v. ^- M In air defense, the normal mode whereby a higher echelon monitors unit actions, % T0 r4 ^0 Y1 y$ Q- S8 D$ a- Ymaking direct target assignments to units only when necessary to ensure proper t; k3 e" ]5 L5 ?: H fire distribution or to prevent engagement of friendly aircraft. 2 i+ ~! u* O/ c/ bDecentralized9 A ?0 h' o! K Execution+ D# j& T3 G% f The distributed and integrated implementation of USCINCSPACE direction by 0 Y: s1 }$ t) [, h& xthe BMD forces. (AFSPACECOM) ( ^2 W$ U& E* x/ F( ~Decommissionin ' N+ d1 Q1 }( z6 m! jg5 T* f1 v1 R( Y$ }! H. m$ J, T0 | The removal or the rendering useless of obsolete or no longer needed0 x1 o, D7 c7 M# c3 ~+ V0 v& o# q components of the BMD system from service.1 N0 \. u; p5 G: `, F Decrement A directed funding level reduction for an acquisition program. / ?- j9 X) C3 V$ ?; ]+ yDED Data Element Definition (Computer term).9 ~- J" ?# T0 T# l' n Dedicated Mode" s- f* r2 E# M: O! _: W of Operation1 R: M, `' i N9 i, M (ADP Security) s" ^; A) _/ c$ _, P1 m8 ~3 f5 UA mode of operation where all users of the AIS possess the required personnel9 m: G4 [0 J" v+ z+ A" Z5 p$ k security clearance or authorization, formal access approval (if required), and a - }# M% @. P: A# W |* |6 f& FNeed-to-Know for all data included in the AIS., o) D) N- y6 o1 q9 o V( x6 T" K Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about, R% b) Z8 W0 v H 5,600 kilometers) above the earth’s surface. 8 @% U! J$ C' k; hDef Definition." Z( r; k5 p+ K1 o: y$ ^, l DEF (1) Defense. (2) Demilitarization Enterprise Fund.% V7 d5 V+ t& z" Y( {* ?, S DEFCON Defense Readiness Conditions. }8 X- [& k$ A# n8 zDefended area ?- I, g1 i- H% R+ r5 bcoverage) _7 d( {$ K" Y) n! o1 _) D3 n Defended Asset ) Z, m' _1 d. W% T2 r2 yList (DAL) : Q8 Z) d: b1 N* x( _& Q5 J2 I0 o3 LThe geographical region that the BMDS can protect from ballistic missile attacks 1 k, M Z0 Q* C; Swith a specified level of probability of negation. May be specified for a particular% z7 X5 ]8 ]( y7 L O6 m/ l threat type, launch point(s), launch regions, raid size, etc. 3 D+ d) v( n& ]7 p1 [+ g' lA ranked listing of facilities, forces, and national political items that require& G0 \) N/ m" K& \; z protection from attack or hostile surveillance. The list is compiled from Federal9 i; E- O% \: L departments and agencies, Unified and Specified Commands, and the Armed& C3 ?1 k8 F2 n Services to ensure National Security Emergency Preparedness functions. % v @, ] C) X% i" EMDA GLOSSARY, VER. 4.0 D : s. E& t9 V; ^3 I' e9 x& |75 5 F0 H/ I2 f9 p# jDefense ( H" l8 _: I9 o8 v2 y( ~( jAcquisition 8 q* x t5 U' b' s5 C+ mBoard (DAB) " \* F( d+ E" W; Q7 V r; p4 VThe senior DoD acquisition review board chaired by the Under Secretary of R. A# x6 u5 z+ G Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the : ~8 h, H) Y6 r# kVice-Chair. Other members of the Board are the Deputy Under Secretary of ) ~2 l' l6 x/ N. LDefense for Acquisition and Technology, Service Acquisition Executives of the3 ?/ L' U% w# l4 t3 }4 B4 t Army, Navy, and Air Force; the Director of Defense Research and Engineering;2 V1 u" p+ F- v5 Q the Assistant Secretary of Defense for Program Analysis and Evaluation; the) r7 N) h- C4 V/ N0 I$ P Comptroller of the Department of Defense; the Director of Operational Test and 8 g: e& R5 q' d& @9 v5 BEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the 3 ~+ O3 Y) y8 j$ o6 r' i* \Defense Acquisition Board Executive Secretary. Other persons may attend at3 ]; U8 i% _- C. w. z the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition: [" T" ]7 ]" F& S, R Board.”)" H2 G* y, u+ _; r Defense8 @, ]6 o6 S4 ], p4 a4 r8 ~0 G! i Acquisition6 V1 P6 {# A8 B2 g! }# g8 B Board Committee7 y* m: _& K" d Advisory review groups subordinate to the Defense Acquisition Board. The " m6 [4 S& ^' d0 `# c! ]) f: E# ^Under Secretary of Defense for Acquisition determines the number of 2 y7 m, a% X2 C: }Committees. The purpose of the Committee is to review DoD Component/ E2 o/ v. c3 g% t7 b" B; R/ r programs prior to a Defense Acquisition Board review in order to make an 8 U% } C* W$ ^0 v& u2 windependent assessment and recommendation to the Board regarding the 9 |( k. g" P+ Fprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense7 ]+ m0 G6 [' z1 H# m5 l3 { Acquisition 3 y) l9 K# H" ^! m. {, g0 rExecutive (DAE) 6 W6 t7 e& Z% J7 `: F r) aThe principal advisor to the Secretary of Defense on all matters pertaining to the ( o$ K; }0 k a/ D2 YDepartment of Defense Acquisition System. The USD (A) is the DAE and the, P! a" B) E8 p" w7 {3 q$ F Defense Procurement Executive (DoD Directive 5134.1). ( k) g' o0 c/ \Defense9 \4 t, m2 Y) Q' S! p Acquisition, `5 ^: L& j6 l% v- \$ y0 W" ` Executive 8 p( i. e0 q# U5 jSummary (DAES)/ M+ h, p% k, G6 w$ o. w" @3 S The DAE’s principal mechanism for tracking programs between milestone, I& Q0 ~* x% R. V) a% g reviews. Includes programs subject to the Selected Acquisition Report (SAR),! J$ s" A! S. L, O4 d* u and any non-SAR programs subject to review by the Defense Acquisition Board.. y" S0 [ w) r' x Defense, F$ m* y. @, ?1 Z7 ]8 q6 a0 B Employment ! o8 n# e F. }& oOption (DEO) 4 L7 t8 {4 u( x7 K( Z$ CEngagement strategy provided to USSPACECOM component forces to achieve8 X. z2 o3 q y3 t; T- k, f# ? specific military objectives against a ballistic missile attack. It defines hostile - T8 L% `6 n, Y2 y: r* ]3 Vtarget priorities, provides assets to defend, and allocates SDS resources to be ( F$ W4 t! [+ _0 `7 p( Temployed. A number of DEOs may reside in a particular Preplanned Response* `" m" b0 c# t/ M# g* f Option (PRO). However, default DEOs (those believed to be best suited to w; h( F' c6 zcounter the threat initially) will be automatically processed and executed when* y5 f2 Y5 u: l8 p) ^ L0 i9 c Defense Activation Authority (DAA) is given by USCINCSPACE." `. |* T7 n1 U' ?- j Defense 8 f+ i1 Y3 k9 F- dEnterprise 6 i2 a& N: {. i! J& ?9 A, BProgram (DEP) 9 I/ C+ S1 B: _3 ]% IAn Acquisition program designed to streamline the acquisition process by waiver * z5 q! C4 S; R) M, l4 I# @of selected regulatory requirements. " b' U+ }9 R0 ?7 T0 XDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb( s! G+ l" a0 |" a" J and progressively weaken an attack, prevent initial observations of the entire& h9 @2 |# N4 M' m& \2 \ position by the enemy, and allow the commander to maneuver his reserve." ]* Y) n: X# u# _2 R ~% e Defense ) v' R1 p2 ~. j6 H5 |Meteorological2 Q; a" W! s. i3 t" @ Satellite Program % S+ e; _4 X8 k# p5 f(DMSP) 9 g9 ]& ~0 `1 T- R$ L' DSatellites designed to meet unique military requirements for weather information.$ d/ h) _2 u ?! ?0 Y Used to detect and observe developing cloud patterns and follow existing1 D+ N* p7 @- ^5 v' x/ \1 U5 p weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.: y# D5 s7 O3 ~. @% B2 w Defense Planning: i; K" x0 p; s! r2 Z# q7 _ and Resources% z: J# s6 Q K, m5 b/ k! N' c5 z4 U, q. \ Board (DPRB) - o4 I$ J/ d! _2 i7 RA board, chaired by the Deputy Secretary of Defense, established to facilitate , f; A- {, y, o/ u wdecision making during all phases of the planning, programming, and budgeting4 J3 g4 U/ C6 W system process. Board members include the Secretaries of the Military7 t4 T) ?: S- J! t Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of! c0 L% I# M5 x7 E" \ Defense for Acquisition and Technology, and Policy, the Assistant Secretary of* R; c5 i+ Z! F, A# }9 Z- i Defense for Program Analysis and Evaluation, and the Comptroller of the' G! w+ e6 c) v; q$ N Department of Defense.- V$ R% J4 c+ ^ M8 E7 u# Q MDA GLOSSARY, VER. 4.0 D5 @4 e* {+ ]7 c$ }9 s* h 76 ( Z0 W6 l: Q% {6 ADefense Planning , J4 r5 f4 B4 l8 V4 aGuidance (DPG)2 B3 ?2 g; |9 l ~% Y Document issued by SECDEF to DoD components providing strategic framework 6 g1 d8 x+ d; [5 G) B& Cfor developing the Service POMs. Result of planning effort by Joint Staff, OSD,' v/ i/ C- H! \. @" x2 B and Services. In connection with two-year budget process, DPG is issued every u3 O0 h9 M$ q% J# \7 L; R+ u other (even) year. & H0 z( d; U% B( a1 h) G9 TDefense Priority # L2 R: E7 X( R. Xand Allocation u3 W0 N: R( {7 ?9 zSystem (DPAS) ; x' z# p6 ^ i, ^, A% K! V) hThe implementation of a statutory requirement where contracts in support of: p8 s0 f. Q' x+ E- S! F national defense must be accepted and performed on a priority basis over all# ?7 m* b1 G! H other contracts, and which requires the allocation of materials and facilities in 6 S) x; o* A! S$ i+ R/ f9 ?such a manner as to promote the national defense. See “DO” and “DX.”) n$ Q% }! B, A# X7 w, j; ` Defense ( f+ N- a8 L, }9 Y% c% o2 c5 X: dReadiness9 C3 M2 x1 ]! k, l% b) O Conditions # [! y: U9 f) g- f(DEFCON) 3 h2 N: @% S! c. ?* |A uniform system of progressive alert postures for use between the Chairman of( H- C1 n& h: k5 @3 [& [ the Joint Chiefs of Staff and the commanders of unified and specified commands 1 e9 n x* ?7 N0 R1 wand for use by the Services. Defense readiness conditions are graduated to ' T7 O! o. v7 `, k0 _2 W4 imatch situations of varying military severity (status of alert). Defense Readiness % ^' Z2 [8 `; Y G4 f0 F3 JConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as + f8 P p1 w) p! ?% p! [appropriate. : T# y6 {" n* L3 _$ cDefense Satellite# r4 J' ?* j$ Z d) g9 d4 M Communications5 y2 S( W5 W6 q Systems (DSCS) % `3 q. |; t/ ]Advanced communications satellites in synchronous orbit around the earth.9 C5 v# ?! T ` w& R! e. I Provides high-capacity, super high-frequency (SHF) secure voice and data links- [( L, l; ~: }. ] for the Worldwide Military Command and Control System (WWMCCS). They8 H$ Q4 J! b$ C' G support terminal deployments for contingencies; restoration of disrupted service ! _1 U% a9 `/ ^3 W) M+ Joverseas; presidential travel; global connectivity for the Diplomatic 6 e- z, b9 R! ~5 j/ p) qTelecommunications Services; and transmission to the continental United States- X; J/ a2 ]+ k7 ~3 w/ Y of some surveillance, intelligence, and early warning data. % C H+ ?$ V$ w, u- B9 I) N* _Defense Satellite ; m2 E* @3 ]& R1 p(DSAT) Weapon " J# u& `+ `% W& h- O) P5 z6 JA device that is intended to defend satellites by destroying attacking ASAT 7 l- k/ c( @) w2 hweapons. / }( e4 R" ]3 e. k6 ~, D3 M kDefense Support ! `6 }& q% [% N( nProgram (DSP): U: i: w& v6 b- y ~" V A system of satellites in geo-stationary orbits, fixed and mobile ground 8 w% i4 F* v4 [- m* Vprocessing stations, one multi-purpose facility, and a ground communications ) J# `6 x* s; Y- @9 ^3 ?; r' _network (GCN). DSP’s primary mission is to provide tactical warning and limited: `! o) A* |: z9 O% d# a. k. p attack assessment of a ballistic missile attack.: `$ _3 B1 U, l* `2 [4 Q Defense6 h- N" R. g& z; Y1 @1 | Suppression : P% M. ]! Z8 p8 m, jTemporary or transient degradation of the performance of a defensive system T3 b: q, ]2 X" T- q& o% ]1 y% c below the level needed to fulfill its mission objectives, by an opposing force. 9 j8 @ m# O, V ^: x; ](USSPACECOM)" U R+ b m1 h' e; r. R+ X, ? Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic( i" G4 D- e$ _3 p% V missile trajectory; i.e., boost, post-boost, midcourse, and terminal. & N6 t* u3 j' dDefensive: O% ?4 e1 q4 B9 S* a Counter # w* H& p9 F: J* Z2 rMeasures (DCM): t N2 R- U% r8 s" q+ g9 n0 [+ J! { Actions taken to eliminate an ASAT attack. 5 `" s4 U* ?1 W( [Defensive1 N& S4 _! s: F+ T6 q$ L Technologies 2 [7 ~' V4 C3 P" [4 tStudy Team8 \. b3 g/ a# J, {# Z (DTST)7 M/ Q) w; e* `/ r1 c A committee, generally known as the “Fletcher Panel” after its Chairman,7 M) Z3 F# N" D: ^, P" O: | appointed by (former) President Reagan to investigate the technologies of ' N+ f. \2 y0 _- W+ ypotential BMD systems.7 z' N9 y- q4 Z DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.8 `6 B2 C* w6 K' o DEIS Defense Enterprise Integration Services (ex-DTIS).7 e G- q2 [( _/ y( w' ~. t5 n# g t DEL Delivery. & `: y4 a7 s( \% c2 ?! u+ L0 }# ]: iDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion1 } Y, _0 R: J8 Q ?& @) r of shots about the aiming point. See also Circular Error Probable.+ Y2 z8 S& a$ e7 B( [ MDA GLOSSARY, VER. 4.0 D ( q$ @2 V, a( X2 ~3 b77/ Q/ n" n* |" x& Z Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the( h. V2 x2 {1 N+ C8 V: M5 m maximum change in velocity, which a spacecraft could achieve in the absence of/ C' t7 M7 c# b a gravitational field. " \& {6 Z" X7 E! p7 m6 Y, a) ]Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term)., q0 w [5 J8 X Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its 8 E/ Y; v1 y5 Z- X1 Y5 ddesired function (matching RV characteristics, screening RV, etc.)% }, y. W% E7 ]+ a, ? DEMO Demonstration. - j' V% V/ L# I1 }- Z3 N9 gDemonstration 8 @0 i8 P0 l2 b( M) \4 Pand Validation 0 }: ?2 Z' r6 W(Dem/Val)5 a$ t# Z' m) N2 `+ B The acquisition phase when major program characteristics and product designs # Z, z' H( V& u; i* W1 t# k, Uare refined through extensive study and analysis, hardware development, test,7 [, ?) ]0 }3 k$ e1 p C" R/ u& C and evaluations. The objective is to validate the choice of alternatives and to 2 K V2 f8 p3 gprovide the basis for determining whether or not to proceed into Engineering and ' y X4 w3 h jManufacturing Development (EMD).6 M$ l) T. D, D" v/ @. r Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.' X0 U! P. B! Q( R It may include destruction, removal, contamination, or erection of obstructions.$ s( y3 p) a% R5 F+ M$ \7 a; D* h DEO Defense Employment Option. . _( @5 ?+ t9 _Department of9 e' o6 {! P: z. V4 ?. K* v; Q Defense7 K8 T' \# k9 Q8 Q: `2 F Acquisition 8 x3 ~- z2 B- b8 o* x$ XSystem 9 W8 V" B; b- t2 s4 {! qA single uniform system whereby all equipment, facilities, and services are9 b6 d& K, }: |# M2 ]1 y planned, designed, developed, acquired, maintained, and disposed of within the( P" l f8 E+ z6 R% v Department of Defense. The system encompasses establishing and enforcing 6 ~3 H2 j. m w/ z8 s7 X- q- M, }/ Spolicies and practices that govern acquisitions, to include documenting mission t: @7 O# b# }; n9 ^ needs and establishing performance goals and baselines; determining and 5 p" @) @/ B+ E0 H: mprioritizing resource requirements for acquisition programs; planning and 3 f9 \, P( T6 h2 v6 k/ ^8 a/ w2 nexecuting acquisition programs; directing and controlling the acquisition review# o Q% a% q( u# M0 u$ U process; developing and assessing logistics implications; contracting; monitoring , w- C( F+ O. v+ P& g6 i' Mthe execution status of approved programs; and reporting to Congress. (See" l- a7 g" ^% D* M2 A' U DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) " q1 b7 x- P! j( j: P+ t2 @0 ^Deployment (1) The placement of force elements in battle positions to obtain a higher1 N9 ?: z/ [( t: L" R( Y* y! w state of readiness.2 A/ P) }% a& m* m7 O (2) The movement required to place force elements in battle positions." A1 t: u$ z3 s5 o (3) Fielding the weapons system by placing it into operational use with units; D" y% y& I5 _. D2 D. `0 a in the field/fleet.8 m/ [4 I/ p& e (4) To arrange, place, or move strategically.5 O; G/ Y$ ~: i- Q# H9 R: { Deployment3 d L+ A- a4 l; K# O* g/ x Planning6 o$ r) R1 O1 I (1) The development and maintenance of plans required to initially deploy,, b9 v6 {- o/ ~) A# @! m+ t maintain, and evolve the operational system in accordance with2 j) Z% g* F- }4 n8 C2 L: d schedules and priorities. It includes factors such as launch facility; S7 {9 V$ y- h* o- ^* _ availability and planning for the availability of other required elements 4 T% |0 n" G4 Q) q0 j# I+ n* e# Osuch as trained personnel or units. In addition, it identifies the impact of9 O. y, r5 y" e% q deployment on operational readiness and any testing constraints ( [! n+ |2 h8 r) A6 b: ` k) r/ xassociated with deployment. * |1 ~; `9 S6 ]. o(2) Encompasses all activities from origin or home station through 0 Y8 m1 O/ X7 ?0 i: R9 T( Tdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding0 A0 O- L/ D v& p areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment) W9 _! k8 O; @' H6 S Testing$ \8 k! p% F8 [ The testing and/or simulation of system assets in the physical and operational 4 ^% V( U! z& J/ Q4 _: uenvironment in which they are expected to perform. , W; C; H+ V* ~1 ~( dDepOpsDep Service Deputy Operations Deputies.3 L: h) {$ x- [/ h% X3 y& Q: J6 S MDA GLOSSARY, VER. 4.0 D" U! Z7 Y8 S) P; |+ A9 i 780 k/ R% c" O, l& C6 z! C! | Depressed& T* K& r D0 L% h T4 b Trajectory 7 B# J+ v& C9 t7 u [4 zTrajectory with an apogee below that of the minimum-energy trajectory.& {! P7 S* i% x6 P" i DEPSCoR Defense Experimental Program to Stimulate Competitive Research.9 {5 w+ H2 h1 C6 W, n$ V# q- M DEPSECDEF Deputy Secretary of Defense.: i% }# }6 @% w+ K$ ?, r+ @- @" ^ DeSecState Deputy Secretary of State.+ G7 W5 u2 g5 B6 I" a9 F DERA Defense Evaluation and Research Agency. Consolidated research and4 r2 @7 W2 ~! \0 M development resources of the U.K. Ministry Defence. Headquartered in ( e3 e" X; u2 s# s" ZFarnborough, England.! t( U5 s7 T9 v/ Q0 { Derivative ]$ F* o' ~4 X" f Classification$ {7 a: L, w) P3 V A determination that information is in substance the same as information 9 B( u; n9 E! y( ]; c- k, `) K! u3 Zcurrently classified and the application of the same classification marking.% H& a2 P/ |- G6 O! T6 I6 {" V+ o2 \ DES Data Encryption Standard.& V; ^) b6 i e ?+ G DESC Defense Electronics Supply Center (DLA term). : u: C" L; `/ m% M3 vDesign k7 p8 I* b8 [7 k Constraints # Q7 q5 R( G, P& Z0 K5 @Boundary conditions within which the developer must remain while allocating * F0 ` s/ K8 s Lperformance requirements and/or synthesizing system elements. % J; s: h7 ]! w& |8 aDesign3 h. y. D+ x* Q/ C5 } Parameters 3 l* ^2 e/ q( [( @0 r5 cQualitative, quantitative, physical, and functional value characteristics that are " ^3 S3 |6 G& n7 a# U! ginputs to the design process, for use in design tradeoffs, risk analyses, and 9 x' [6 _" ]/ J" [/ q2 K. ^: K% T2 Udevelopment of a system that is responsive to system requirements. / s. ~/ i) L/ @5 q1 a* U5 @# F6 uDesign Phase A period of time in the software life cycle during which the designs for3 b; N8 h9 n, i0 \ architecture, software components, interfaces, and data are created,: a8 x. i& w' I5 K documented, and verified to satisfy requirements.+ B2 ~: x8 ^* X Design-to-Cost1 W0 E7 d) r! ~0 N (DTC) Goal 4 q# H& z+ X) A0 q4 d( N* dManagement concept wherein rigorous cost goals are established during $ [6 i5 y, ?+ g7 l/ {& S6 G3 edevelopment, and the control of systems costs (acquisition, operating, and & B; a. ]6 W. \# o6 F8 [/ |support) to these goals is achieved by practical tradeoffs between operational% T! Y$ w: E, M* q* E capability, performance, costs, and schedule. Cost, as a key design parameter,3 u; O! N: {9 O* U' M% s! D is addressed on a continuing basis and as an inherent part of the development, y! Z, e9 K# E8 S+ n/ W/ r( I- Z and production process. A DTC goal should be in the form of average unit $ r7 J; x# I$ ]0 A! Y8 j9 S9 q+ Q* Iflyaway cost. Also, DTC parameters for operation and support will be ! E! @+ B v- p# p2 D1 t9 W" lselected—parameters that are design-controllable, significantly affect O&S costs, % f+ i6 P0 D) U3 Hand can be measured during test and evaluation. Parameters may be / r' ?1 @: e, V$ w* D9 texpressed in dollars or by other measurable factors, e.g., manpower, reliability, or) A0 c6 c0 ^* H2 a/ a maintainability. Firm goals and thresholds will be established no later than entry 4 n& M# R1 C% }% R: minto EMD (Milestone II). This is an in-house goal, almost contractual in nature,; ?. W8 A$ q) v. k/ b5 G Y4 T1 w" c between the PM (Service) and the SECDEF. Allocations from this goal will " p9 h. a* z/ O2 M$ w* hbecome the contractual DTC goals for contractors supporting the program." W0 X* ?% A# @* j Det Detachment.0 G. |: l8 l: y- l; G$ r DETEC Defense Technology Evaluation Code. - U+ y9 q" B4 k$ R" Q8 W& @# LDetector A passive IR, visible, UV detector turns photons into an electrical signal. The # K$ J/ L8 e9 sIFOV of the detector is its solid angular sub-tense. There is sometimes " E. B v! _ L$ s% n& D; i0 uconfusion between the detector sub-tense (size) and the pixel (picture element7 T4 n7 `( B+ n( I6 f size). They are the same for a staring sensor, but in a scanner it depends on* d! Z! B. }' f- z+ S! L$ p the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. " @ F2 `, o0 K" U) O4 U8 ZMDA GLOSSARY, VER. 4.0 D 2 e1 }1 u" U- H! D+ x* \1 \( F8 x79 1 c' v2 ^' w. P ^DEV ENV Development Environment., o! p3 L/ ^5 v" M3 @7 i- k Development9 \% w7 f- q# Y& V5 \5 D0 p% n Test (DT)3 k" y z: c' {5 B Test conducted by the development test organization to achieve specified test! L* R6 l* X' o, \' }( W objectives. It may be a complete test, a subtest, or a phase of a test.4 t9 l! g! y4 F0 x- H( D8 h' e Development. @) W2 B! i( j, f# M8 |3 y Test I (DT I) 7 M) t5 x; J' S$ Y C9 LA series of tests conducted during the demonstration and validation phase.1 c, f7 N2 e4 T/ u" F$ s4 a% C Components, subsystems, or the total (or full) system are examined to determine * a7 i8 u" p; @$ E- ]" Q+ mwhether the system is ready for EMD. State-of-the-art technology is addressed$ W( ^9 Y+ A/ U5 T3 ?3 `) V6 O in DT I.& E% O" x' L' Y. n& r7 t( p Development( Q9 K9 b2 A2 s. A1 E1 W Test II (DT II) ' z. B k' A8 ]- ]) `( m" wA series of tests, normally during EMD, which provide the technical data2 V3 a, u$ j3 y7 b$ W$ J* [ necessary to assess whether the system is ready for low-rate initial or full 6 ]+ t! ^5 { C& x& Xproduction. It measures the technical performance and safety characteristics of 9 s. t/ ~8 e3 ]: `6 v6 Wthe item and evaluates its associated tools, test equipment, training package,9 d4 {" A4 o. h) r( Q$ m and maintenance test package as described in the development plan. DT II ) x' K# U* h' C: i- m |addresses accomplishment of engineering design goals and the fulfillment of# }( L4 L! e t+ Z. j# a contract specifications.9 Z$ ^' l8 w, n& N$ l2 U" l8 N Development ; O+ v4 r: |7 }4 WTest III (DT III) + g0 n! N# U: ]. ~3 R/ J4 TTests conducted during production.0 x( }3 o) F. X$ N Development ; d/ `) \1 m9 |$ y0 S( L) kTest and4 X* w% Q! r, j- G5 S$ V Evaluation" W9 a+ F# O2 a3 S6 b (DT&E)9 q: @$ S6 y- B Test and evaluation conducted to measure progress, usually of J! L$ H5 W1 S Fcomponent/subsystems, and the proofing of manufacturing processes and0 P, E( z6 ^6 ]' u: A* d4 l controls and to assist the engineering design and development process and, d7 A, o7 l" Z* D verify attainment of technical performance specifications and objectives. Usually & z. S5 t& t0 @+ y; j+ Kconducted under controlled or laboratory conditions. Can be conducted before7 { ^1 r4 c: U1 b7 t u0 X& p or after production begins." \: h- ^6 N: z5 G Development k. G0 C5 u" `+ D" C8 Q$ s" Z Test (DT)( [7 ]5 I$ ^4 b% G' o% S9 g Test conducted by the development test organization to achieve specified test* m9 Q9 ^8 e. m6 h- D6 b9 \ objectives. It may be a complete test, a subtest, or a phase of a test.4 V# L: g5 O) N+ t6 d3 h, f; s( V Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,7 l) W1 B& M [% k6 m2 \' ^0 a schedule, or performance without authorization from the milestone decision$ Z% K+ J. C* z/ w# `* Z [ authority. Acquisition Program Baseline (APB) thresholds represent these% K" u0 N8 v+ Q. o3 a } parameters.& V- ^" a6 e/ D2 v5 `# a Devolution of " W- x' o1 s: ^/ c' c- CCommand - T8 E) u7 h2 q4 M3 DMinimal essential operational capability to perform C2 provided in an orderly and ! C% ?6 ?7 x7 @8 o$ N$ x1 ]' k3 U0 htimely fashion to a duly authorized successor. % E4 y& N; o6 a, jDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. 9 m. M8 S! _" H- y3 \" @DEW/D Directed Energy Weapon/Discrimination. 4 {' B7 x( G7 V! PDEWG, O Directed Energy Weapon Ground, Orbital4 I) t; W4 R( ]6 D2 ]; S# f; s- z DEWL Directed Energy Weapon, Laser (thermal or impulse).) w. B7 R {( K( l/ U$ G% p DEWP Directed Energy Weapon, Particle Beam (neutral or charged).- [2 {, b/ ] @1 l2 G! \- Y* K DF-KBS Data Fusion Knowledge Based System.1 l' h- ~5 T! E7 B0 _* Q' I DF2 Deuterium Fluoride.0 s+ H% q5 l; Z4 m0 I DFAR Defense Federal Acquisition Regulation9 D; c. t/ [! `/ Z# v DFARS Defense Federal Acquisition Regulation Supplement.1 x0 x) L) v3 x; p MDA GLOSSARY, VER. 4.0 D7 X; B6 }' x" d5 @* S% v! [# j 80 - ^$ N- J$ b/ [' T, p% U) k# UDFAS Defense Financing and Accounting Service. * Z9 Q' L" {1 @; O. C2 gDG OBSOLETE. Defense Guidance. See Defense Planning Guidance.& S' x% C- h9 Q4 V( F DGA Director General of Armaments (France).0 j" H* h$ @, v0 \' S/ o7 c& h/ Y DGP Defense Group on Proliferation. ( P8 D* {4 Y) T* g2 X; QDI (1) Data Item. (2) Developmental Item.3 @9 A# W: X Z* ^+ q0 x# [/ I) [ DIA Defense Intelligence Agency.) b5 p/ k' V4 R+ c: s DIAC Defense Intelligence Analysis Center.2 X9 i% J3 R4 v DIAM Defense Intelligence Agency Manual" N: o9 p* _8 M. c0 c Diameter (Optics) The unit of measure of the light gathering power of a lens.: p' A( T s9 @0 B4 H DICE Digital Integrated Combat Evaluator.% `) Z4 o1 h$ l- b I$ P9 D& A DID Data Item Description.- }8 l+ ?9 @& m8 _, d Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The 7 e7 E3 @& S8 Oangle of spread, which cannot be eliminated by focusing, is proportional to the W5 K7 a; i4 h# H6 t- e ratio of the wavelength of radiation to the diameter of the aperture. & S1 y7 Q6 H; x3 X t7 ZDigital* ?. J, u, ^# f8 ~2 ~4 g6 Y0 p Processing( R; f9 m2 X6 \2 v( l$ R2 T The most familiar type of computing, in which problems are solved through the9 t: ]5 E7 d3 ^; w/ ] mathematical manipulation of streams of bits. 8 B1 X/ P: L9 [& ^2 U. n% Z$ B! r" ODII Defense Information Infrastructure 2 }! v$ P' U4 w% H6 j8 p% @Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to ) {% l4 E8 o- d0 V, ^# B* T9 C12 km) between wake termination and de-sheathing. # ?0 b i4 L& Z4 W- w ]DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).% p: y$ ]7 t% f DIR Director. 4 F$ c( n9 M3 i$ e# H, p, IDirect Air6 j0 }- K" ^+ z" r3 Q( l( v Support Center % V, w4 R' z" G' R0 p* }9 GA subordinate operational component of a tactical air control system designed3 l# h% j* L8 w1 v7 h% t for control and direction of close air support and other tactical air support ' ?: {( e" O- O& H8 e7 @1 Poperations, and normally collocated with fire support coordination elements. 9 h" B3 }* _/ kDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not ; X; i, P0 ~$ P3 ~necessarily limited to items that are incorporated into the end product as labor or 0 l, a6 q& ~( u- @+ ?material. & C) K4 f5 q) [: KDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing . [" a# R4 p+ Edirect labor includes fabrication, assembly, inspection and test for constructing b/ Y. G, ^( M( I, Kthe end product. Engineering direct labor consists of engineering labor such as0 O1 \& E4 j# s# y" n4 D+ A/ ~' m reliability, quality assurance, test, design, etc., that is readily identified with the, r9 f; u9 |4 B1 _ end product.! @) e% ?, J; b* f0 n Directed Energy2 f Y6 l. Z! \) E x* ~6 T (DE)) B: F. ~" C% Q: ^3 r( K% E" w 1. Energy in the form of atomic particles, pellets, or focused electromagnetic 6 S$ a L. T( m/ C( p8 _' Lbeams that can be sent long distances at, or nearly at, the speed of # x: \+ G, H( G# olight. 9 ?' h) a! g9 ]- Z% U z2. An umbrella term covering technologies that relate to the production of a9 n( h6 E2 @& E5 a! r; k$ l+ q beam of concentrated electromagnetic energy or atomic or subatomic particles. + Z! R$ y. S* Y# RMDA GLOSSARY, VER. 4.0 D ( K6 S9 ^ P( V3 m81 5 W2 W& \' t1 UDirected Energy 7 h1 D0 n. @" h m' v. I5 yDevice; ?7 [1 u% m4 S1 O3 { }5 q9 d A system using directed energy primarily for a purpose other than as a weapon. 9 V8 n( l3 Z- vDirected energy devices may produce effects that could allow the device to be5 }% y# e* A+ I. z used as a weapon against certain threats, for example, laser rangefinders. C1 u* f; N' g% T+ @0 m& @Directed Energy; V+ ]$ p& C' \( Y' N1 x# v. D Weapon (DEW) 2 D. ?, P: I+ jA system using directed energy primarily as a direct means to damage or destroy * z2 J0 h3 F6 W7 venemy equipment, facilities, and personnel.' y+ f# Q" |! B2 d: E+ F DIRLAUTH Direct Liaison Authorized./ y Z: @, g: m5 b" Y$ z% v DIRNSA Director, National Security Agency.5 h1 E# ~5 c' u DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.: V1 V9 L" ^ x# E6 w3 V DISA Defense Information Systems Agency, Washington, DC. (Formerly known as8 S5 _' ?6 f9 m. i) @2 j2 D" d Defense Communications Agency).7 h+ C9 C2 E6 l3 o) o DISCO Defense Industrial Security Clearance Office' {) E* m T" h: F: W& _& E# ?8 h$ A DISCOM Division Support Command (US Army term). ; Z( K& G1 R6 H5 k5 _7 Z( kDiscretionary 1 Y1 `/ W7 [7 \Judgment' j$ Q: l+ R- s T& O2 M* W4 V The authority given USCINCSPACE or his duly authorized representative to; ]8 z0 I, C8 q) l* g; f perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination % t. S% b( P- g& R' ]DISN Defense Information System Network (DISA term). ) O& J: s* c5 P4 hDISSP Defense-wide Information Systems Security Program.$ S; B: K6 K1 _ DISUM Daily Intelligence Summary (JFACC term).4 U; L( k; }3 j9 L3 ~: \ DITDS Defense Intelligence Threat Data System.7 K+ U: ]$ q: E8 n+ m+ _2 B DITP Discriminating Interceptor Technology Program. The objective of DITP is the - ~0 G5 R( n4 {# {6 `. i8 ldevelopment of advanced interceptor seekers to counter advanced threats. ( M* i' U4 ^) z0 |4 b% `' n# xDITP will integrate passive and active sensors into an interceptor seeker that# ]2 I/ k- p) Y integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP 3 p. K; |+ E) i. jflight demonstrations will involve the tracking and interceptor on-board, k$ r) M! |0 G* b discrimination of targets of opportunity while providing fusion processor data ' p0 a% z8 ?; L) ?* L1 ~( F& Ctelemetry. (See also ASTP).4 s4 }+ B& E% M# @+ L: l7 x6 Q, ` DIVARTY Division Artillery (US Army term). & d3 M0 O# _, S- z" PDIW Defensive Information Warfare./ w5 }) o& F. X$ D' D3 H DLA Defense Logistics Agency, Alexandria, VA. ' |2 d4 {" @2 B1 HDLSC Defense Logistics Services Center (Battle Creek, MI).' c5 ^7 q1 V. o) Q: o DM Data Management2 G! ?3 \0 T6 `+ Y4 y4 f DMA Defense Mapping Agency, Fairfax, VA.- s4 {" f, V, I) R5 h- ]6 ?/ D4 j DME Distributed Management Environment.3 W/ N% m" S$ f DMI Dual-Mode Interceptor.3 r" l* D* l6 e( U1 O; y2 ^6 s& B MDA GLOSSARY, VER. 4.0 D) D4 f4 O3 J. x& g0 v- E2 f) X 82& p1 x5 t# M6 @2 X' F/ D DMRD Defense Management Review Decision.8 X( [0 G* E# @ DMS (1) Defense Message System.! H/ n4 o( ?9 g% z0 D (2) Dissimilar Mission Simulator. ( x' p' j9 g' yDMSO Defense Modeling and Simulation Office (OSD).3 B& z O |# o- p" N! n DMSP Defense Meteorological Satellite Program. 1 e- A* A* A0 q8 @6 [. DDMU Disk Memory Unit.6 |0 x! ]0 e! }# S( u) @" h* ^ DNA Defense Nuclear Agency, Alexandria, VA. 4 L4 `8 M; O3 I0 h- BDNMS Distributed Network Management System. / p& R3 M j" ~) fDNSIX DoDIIS Network Security Information Exchange. B3 ~3 V' A. ?0 h3 |0 d- C, ` DNSO Defense Network Systems Organization.3 ?. R# V, U" P DO The lowest rating under the DPAS. All “DO” orders take preference over unrated # H# ]8 l" z, t9 oorders to meet a required delivery date. 4 K) t7 V, f# C' O: [Doc Document 0 h$ N% V' X. C% w+ LDOCPREP Documentation Preparation. ( H* _1 A9 `, z( C' X2 t" _; s4 |Doctrine Fundamental principles by which the military forces or elements thereof guide9 f) k4 y2 K N, p( L their actions in support of national objectives. It is authoritative but requires + r0 {' N& a( A9 Bjudgment in the application. See also Combined Doctrine. # q1 W2 G/ E: W6 u$ f+ k/ X* FDoD Department of Defense9 ?7 M1 [, v8 m; D+ }$ ~8 `: l DoD Component) t3 b; Z5 P0 d Acquisition 5 a5 {) a2 L% N2 N" o# IExecutive / b" p8 z9 G# V4 _2 J! q' `A single official within a DoD Component who is responsible for all acquisition i; n+ i$ q! Y/ F4 W functions within that Component. This includes Service Acquisition Executives, t% q: ~! l& N; A for the Military Departments and Acquisition Executives in other DoD0 L1 u$ q1 ^; X4 v3 D Components who have acquisition management responsibilities.( c8 N4 n& J$ E& B" a0 M DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, # B& G/ s2 ?$ A; j0 @; xJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the 8 c7 _$ I ]" E: H) w* zDefense Agencies; and DoD Field Activities. 7 U( H5 b5 p+ B# R& Z) M+ r6 }DoDD DoD Directive.. u4 i( V! i. e DoD Directive 8 `1 Y; ?7 q, t( u6 [% h9 H- k5000.1 7 D- E8 I' [ k“Defense Acquisition.” The principal DoD directive on acquisition. It establishes6 t& _' Q0 I1 _6 a1 } policies, practices and procedures of governing the acquisition of defense ' O7 f; ^9 i. F/ Y8 @; vacquisition programs. # Y& t4 c3 E) B! F3 ?- u2 fDoDI DoD Instruction. " P9 w5 z6 k e3 SDoD Instruction" m3 r' O- Z2 J' y9 j 5000.29 i |2 w+ Q0 Z* P8 f' c1 Q4 X) G, J “Defense Acquisition Management Policies and Procedures.” Implements DODD 7 Y. X: t; \# K8 `7 W F5000.1. 3 {' p" h' c% k, v6 k8 F3 e2 lDoDIIS DoD Intelligence Information System. * U( I! q, f! K$ ODoDISS DoD Index of Specifications and Standards.- x4 m7 Z& e* E& g3 x5 c DoD-M DoD Manual. J8 \& `* q8 l6 D7 H4 vMDA GLOSSARY, VER. 4.0 D ) _+ M1 _0 e, T2 i5 w1 y9 n' I83& `2 Y; [) I3 g" d DoDR Department of Defense Regulation.0 R& R3 l# x6 w8 A- ^5 r DOD-STD Department of Defense Standard.& {/ o2 m4 k: W9 H( { DoE Department of Energy. % Z5 H6 E) _: V& M4 Z2 sDOF Degrees of Freedom. 2 ]0 D+ Z" {& D9 Y% ^3 pDog House Large Soviet A-frame radar used as a component of the Moscow ABM system ; W/ N6 v' Q! c' U# |7 R0 a* |3 Ehaving a detection range of approximately 3000 km. It is believed to provide! o' }8 R% D7 ^ battle management for the totality of Moscow defenses.; x; i0 `- [& k) k$ v DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). 9 d& D/ n# [; w* _& p! ~# Q# KDOPAA Description of Proposed Actions and Alternative (environmental term)., c# J/ A1 T% e" f# v Doppler Effect The phenomenon evidenced by the change in the observed frequency of a 8 v5 ]$ P: L9 o; _9 E. lsound or radio wave caused by a time rate of change in the effective length of 3 p; F* S8 t/ W7 H: othe path of travel between the source and the point of observation.' t' ~2 j$ d7 e- z1 X1 R; L DoS Department of State (US).7 W+ m$ B; L# `/ R! Q% L# f0 e% e DOS Disk Operating System (TelComm/Computer term)., B3 b# W2 P5 Z% ^( U0 o DoT Department of Transportation [US]. 2 {2 o6 U8 h4 { A" d6 j$ DDOT Designated Optical Tracker.; h0 S- k' s$ i$ I DOT&E Director, Operational Test & Evaluation. R9 v5 X7 _+ l: y3 ]9 r DOTH Defense of the Homeland.. v2 e, B- v% V' x, }2 i Down Select To reduce the number of contractors working on a program by eliminating one or# b' p" B2 ]! M, } more for the next phase.3 F! J3 n3 w4 ^. w* K DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.* h& Y' w4 m. c7 e DPA Defense Production Act. , G$ r4 F0 n! M# D0 _9 xDPA&E Director, Program Analysis and Evaluation. + D2 i! w! \5 S8 o) i. ~* rDPAS Defense Priority and Allocation System.5 Q9 G1 o7 K4 N9 ]8 V5 P, S4 M- W, } DPAT Dynamic Program Analysis Tool.1 j) t }, s8 |8 j DPB Defense Policy Board. F2 I: c& K5 J% FDPG Defense Planning Guidance. " Z9 k& B5 n4 O1 i+ V8 Y pDPM Deputy Program Manager.# W- O; M) C. t) Z DPML Deputy Program Manager for Logistics! A& h) a# l& o4 l DPP Distributed and Parallel Processing (Computer term). ) w. D& i3 o; H% r" Q7 EDPR Defense Performance Review.+ ?5 [) H! Y4 I, A MDA GLOSSARY, VER. 4.0 D5 b) `2 O5 }3 h/ T0 g+ c" L; g 84, Q# W0 P# {8 u( S) x! D5 j/ b5 r DPRB See Defense Planning and Resources Board. ) z4 q# y4 k1 L/ i& Y/ J& {) [DPRK Democratic People’s Republic of Korea (North Korea).; s3 L% l. A3 C+ S DPRO Defense Plant Representatives Office. 1 i2 d4 [: [2 r; T; JDPSSL Diode-Pumped Solid State Laser. 0 O: x4 m0 D) _0 T* r) A: x, lDR Deployment Review.+ a: U8 p% N* q: u4 |* G DRAM Dynamic Random Access Memory. : t- o% ~2 B0 c1 R( ^Draw-down Curve A method used to encapsulate the overall performance of a BMD system that5 L( n. c" i# {# Z9 A) j. p plots the probability of survival on the vertical axis versus the number of attacking ' \% J$ B/ f; q4 p, s! C* W, S% D9 ARVs on the horizontal axis. Used in conjunction with attack price, they are the H: O7 i/ G, E0 s! T: _most important expressions of a BMD capability. $ W( Z# s* x5 }6 RDRB Defense Resources Board.5 [9 R/ p9 `5 \: |" U3 }* H3 j DREN Defense Research and Engineering Network.6 m0 l1 o5 `9 P' J( u; y DRFP Draft Request for Proposal. - _0 m8 T) l6 `/ p9 R9 g+ I9 qDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from. O# b+ _8 T# L5 h+ f# J; x gravitational and atmospherically induced torques on the spinning projectile.$ u8 y3 @. r" Z6 a) I7 G+ ~. P DRM DAB Readiness Meeting (DD 5000.2 term). 3 H* D' \# C2 f4 {- h; c, i+ W; K! j% rDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also4 C) U( W/ m& I Remotely Piloted Vehicle. . r9 P2 A: U4 H0 p I& L) o9 _DRP (1) Deployment Readiness Plan (US Army term). H7 Q5 D! k, K$ i2 a(2) Deployment Readiness Program. & x. n/ v) N. @+ L4 fDRR Digital Receiver Replacement (USN term). " e" ]' |6 G1 T% { sDS Deep Space. : f3 F8 a+ C- Q) \; E! BDS-1 Category of telecommunications circuit capability.* b! s9 n: ^& Z9 T DS-3 LAN Category of telecommunications circuit for a Local Area Network. 0 w( \1 Z5 ?" E: pDSAA Defense Security Assistance Agency (OSD).) m" Y2 ~# s8 Z4 s$ l9 t2 R8 _3 N DSAT Defense Satellite Weapon. 5 F7 l- m+ t7 L( c1 s5 K, {* M& y k" fDSB Defense Science Board." h" X# `" z1 f+ r Y DSCS Defense Satellite Communications Systems.: f- q5 ^6 T* Q i7 g6 `; O& j DSCS-3 Defense Satellite Communications System Three.; i1 q. P- g( ]8 k0 Q3 j DSCSOC Defense Satellite Communications System Ops Center.9 |- O2 }7 w! B5 T DSI Defense Simulation Internet * V$ J' W+ l. ?4 l) T4 O0 XMDA GLOSSARY, VER. 4.0 D! @5 P# x9 A0 x, S6 Z 85 : e% u1 q: V7 ?$ ~DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet2 r$ e l" C. L( _1 E" g/ J( V& S System.# \ b1 K' _& R2 `( K% U DSM Decision Support Matrix; B" n3 Y" l A9 L8 k DSMAC Digital Scene-Matching Area Correlation.4 q4 U6 l+ x% u! u9 }1 G( S/ j DSMC Defense Systems Management College. 8 e/ ~$ Z0 }" E5 z$ t. D; ^DSN (1) Defense Switched Network (formerly AUTOVON).3 q& k; `/ W# N# t' y (2) Deep Space Network (NASA term).3 f8 n. J* E: F% @* C) O8 e+ V DSP (1) Defense Support Program. (2) Defense Standardization Program., }* q% ?; S8 H DSPRTM Defense Support Program Real-Time Model. - V" V4 a5 t2 F4 J+ @$ Z FDSR Data Set Ready (TelComm/Computer term). 7 H9 Z/ Q" m# Z) SDSRCE Down Scooped Radio Control Equipment (TelComms term).1 x( Q% I: o/ g( }2 t" f% a( y DSS (1) Defense Supply Service. (2) Digital Signature Standard.+ M1 ?" o P k. u DST Defense Suppression Threat. . {# U/ b& B' Y8 y5 tDSTAR Defense Strategic and Tactical Array Reproducibility.) `& O& ^0 h8 I DSTO Defence Science Technology Organization (Australia). 7 E7 G4 I1 m/ qDSU Digital Service Unit (Telecomm/Computer term).' a7 B: i+ y, {/ G, [3 D7 M DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to 2 W' }5 T4 b; h- Lthe DNA. 8 u- {# w& R; d7 J0 s0 z \DT (1) Discrimination Technique. , n' |! r( F: f! K(2) Development Testing.' w1 }* C C) Z ~5 g$ Q (3) See Development Test I, II, III. [! S$ c4 \: M$ z(4) Down Time (ILS term). # [+ e0 v+ T+ T2 ?& b# C6 m3 }- V(5) Depressed Trajectory. 1 s; m) k: f K: z0 x& v; z(6) Dedicated Target.; e4 ~ S# [5 I( z2 X$ N DT&E Development Test and Evaluation. + }: P* u. P$ UDT/OA Development Test/Operational Assessment. ) c- @3 j) ?0 z3 |% T4 jDT/OT Developmental Test/Operational Test. G2 V8 @4 J3 R3 s' p: PDTAP Defense Technology Area Plan. 6 z& S6 m' C8 J" U9 C. e g' }DTC Design-to-Cost. 4 Y5 \$ P0 P; u3 M G& e$ H6 xDTD Digital Transfer Device (TelComm/Computer term).; h' t% H4 w0 _1 ]' J+ E. b DTE Data Terminal Equipment (TelComm/Computer term).- E; r1 v Q) i; D DTED Digital Terrain Elevation Data. + _/ H: i: t* F; }9 f$ _DTIC Defense Technical Information Center, Alexandria, VA.8 P" R5 o& b! h9 I. z MDA GLOSSARY, VER. 4.0 D # m1 d) \9 l& l! B1 p/ Q( Y0 _86 - ^# {" S: n% i+ \) J) f1 CDTIS Defense Technical Information Services (now DEIS).- Q' t' ^% G" M- C! N3 k# J DTLCC Design to Life-Cycle Cost./ |/ x9 l4 X- f. W8 L DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL - ?& E; w) M; f3 P8 ]" o0 Qterm)./ R. ~% `+ q9 T, s DTLS Descriptive Top-Level Specification.$ p( V2 H& e" A \- Z8 l DTMF Data Tone Multiple Frequency (TelComm/Computer term). 2 W7 w7 v5 F Z. u) B' IDTO Defense Technology Objectives. * h8 }( s" e8 CDTOC Division Tactical Operations Center. }2 Y& [7 p% O o& R DTR (1) Demonstration Test Round. (2) Development Test Round." X; ~2 |1 w2 Y5 X$ U l( S5 ]5 g DTRM Dual Thrust Rocket Motor. ! l) n4 N" B# |& M* \9 A$ W0 }9 xDTSA Defense Technology Security Administration. 6 Z2 l6 v ?" q' u6 C$ z; ]DTSE&E Director, Test Systems Engineering and Evaluation. + V: d& M7 L+ {% z4 W7 CDTST Defensive Technologies Study Team. 3 X: [6 g! B- m# a& cDTT Design-To Threat* y8 V8 U1 W5 _% h DTWT Dual Traveling Wave Tube (Electronics Engineering term).. t t4 c7 K( I) S+ P7 G' M DU Depleted Uranium. ! v) @( S9 X5 x' _9 c) X+ j! bDUA Design Upgrade Assessment. $ n* M3 o; g4 D/ ~Dual Source Two contractors producing the same components or end items for the same ( Q& Q8 A5 R) |2 _+ qprogram.0 K/ z& s+ y8 q7 [0 ^ DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). ) b+ s2 n) p d. T% SDURIP Defense University Research Instrumentation Program.+ H0 y) ^) d; ?* h# Y' Q DUSD Deputy Under Secretary of Defense.0 A. Y/ d2 `! F; i8 C; m/ }; w k DUSD (ES) Deputy Under Secretary of Defense (Environmental Security)., C2 q% Z! m& [' l( E; `; w" f DVAL Demonstration Validation.$ s. E# m4 L: T1 s DX The highest rating under the DPAS. It takes preference over all other rated and, m$ a! Q7 k7 H5 O% s not rated orders on a contractor’s production line. The BMD program carries a0 y+ k# o+ d4 ]* l “DX” rating. + f' ^% I$ y7 X" I8 V' ^4 E s: s8 zMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87% ]) j* H, T F0 [3 f: ?0 s$ H H, n! I E East + P$ y1 `3 N$ JE2 I See Endo-Exoatmospheric Interceptor. 3 p5 w- s1 Y2 RE2SRD Effectively Two-System Requirement Document.0 N* P* A# y" n( s7 I( Y E3 (1) Electromagnetic Environmental Effects. 7 m+ m# V! e* o2 F5 e$ j- x(2) Electrical, Electronic, and Electromechanical. a+ i& |) q# s( s, H# r E Spec Materiel Specification. . w7 X% C" D2 MEA (1) Environmental Assessment." b! Z- \$ t z% i% D (2) Engagement Authorization. 9 C8 \- O3 `; {$ L- r(3) Executing Agent.6 J( G# }2 J7 b5 q (4) Evolutionary Acquisition.7 q# |& {! u" v) R (5) Environmental Analysis (environmental term). . G1 f5 ], \0 n( l/ w* r, j7 D3 h% G(6) Executive Agent. * @2 @( q% D4 j1 FEAC Estimated Cost at Completion. 0 k" R. z0 M* d/ X) CEAD (1) Engineering Analysis and Design. (2) Extended air defense.5 h2 t' G. K1 L, v5 ^ EAD/D Engineering, Analysis, Design and Development.! A! l+ w$ W$ ]" K4 t8 `1 g EADSIM Extended Air Defense Simulation. : m L; }5 v8 `- {* Q% @EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing ' _) D1 y# a5 m Zusers to model military response to airborne and ballistic missile threats./ B2 g0 |$ F& N0 @* F2 _ EADTBP Extended Air Defense Test Bed Program. ( @7 F: a; {, q( A3 }2 _& PEAGLE Extended Airborne Global Launch Evaluator.$ L4 `' n5 n8 S1 r% z/ x EAM Emergency Action Message. 6 C; O1 u; @) A: z1 I, C3 zEAR Export Administration Regulations. # R" ]9 L- g0 I5 bEarly Operational : b9 }7 `/ Q5 C6 Z9 c" kAssessment" Y; b3 }+ ~6 v7 A6 B An operational assessment conducted prior to, or in support of, Milestone II. $ |/ w9 i4 b6 M. [1 `Early User Test" c7 E1 l& }- b. T (EUT)2 a8 j& }5 J6 _1 s. `' Q A test employing representative users to examine materiel concepts, training or2 b8 _* v. V' N/ C' I+ \5 H logistics planning, or inter-operability issues. EUT can be accomplished during # H# [% o6 K6 O- lDEM/VAL on brassboard configurations, experimental prototypes, or surrogates: A9 B _# g8 _ to provide data leading to the decision to enter full-scale development. ; F8 @( G1 N# [* ~Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of& L8 _; t1 t9 R surveillance satellites and long range radar.9 {0 m0 M1 T D% E# \ (2) Early notification of the launch or approach of unknown weapons or 2 W+ m* Q) M3 gweapon carriers.7 ?8 R7 ^/ [0 j0 N# V0 H: ~% q Earth Limb The apparent outer edge of the earth as viewed from space.2 o( u8 D [' S2 d; `/ I9 Q Eastern Test 6 y9 H; Q2 m$ TRange (ETR)+ u7 X; G1 W! N0 u- U Beginning at Patrick AFB, FL, this range stretches halfway around the globe J9 J" l }$ _ where it meets the Western Test Range. An array of launch complexes, sensors,3 P# e' q" R/ h i9 Q2 i and tracking sites make up the Eastern Test Range. The ETR is now operated$ n$ L9 @0 z2 C" q by AFSPACECOM as shown in WTR definition. 6 y; g; \0 y! C) _! M( H+ x1 \2 _) sMDA GLOSSARY, VER. 4.0 E0 y6 a% @: N: v+ M 88% V1 W8 W. j f! i$ P, ~) r EB (1) Electron Beam. (2) Enhanced Blast. ! @7 H# N$ Q5 z7 C5 [2 g. Q FEBB Electronic Bulletin Board./ d5 ] f+ ?0 h9 s" y4 b% `- e EBCDIC Extended Binary Code Decimal Interchange Code. : U2 R" S: i& _* N1 _ CEBW Electron Beam Welding., r6 o6 p7 P# s+ P& c EC (1) Electronic Combat.. Y! S" D! k) j; n (2) Error Control.0 j# L8 f# @9 ~5 v$ ] (3) OBSOLETE. European Community. Now known as the European Union* E: ]3 t( @0 A8 Y, E (EU). 8 b) s7 ^" [! B; I& _EC/EDI Electronic Commerce/Electronic Data Interchange & u) o6 @/ o$ Z AECAC Electromagnetic Compatibility Analysis Center.7 T- n- U+ R l4 G5 T0 p* O ECB Engineering Change Board. 6 m9 i& Z: a9 j# RECC (1) Equipment Control Center. (2) Element Control Center (USAF term).& y @, l: K0 E$ K/ V4 k- @ ECCM Electronic Counter-Countermeasures." O7 u, k) j9 M* r! A& Y ECDs Element Control Directives.9 w' {& N T8 a: Q& ?8 | ECLS ERINT Command and Launch System.* g3 E {( a$ W; P2 F ECM Electronic Countermeasures.7 k% I) b2 _; C! q$ P- e& C; z- e% Q ECN Engineering Change Notice. ! W7 s* m4 v& c# T9 bECO Engagement Control Orders.0 }. k, D" L9 G9 w! O+ O/ F" k- ~0 d ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.( c8 d+ v" |. H. u ECPMO Electronic Commerce Program Management Office. 5 t# L, ]. r6 x1 H3 Q. qECS Engagement Control Station (PATRIOT)./ X2 J4 _& I) v2 O9 W0 U5 x* k- s ECU Environmental Control Unit. # B$ Z2 r" g! _, VEDAC Error Detection and Correction: ?% E8 M, A3 |, a+ G+ c EDGES Electronic Data/Guidelines for Element Survivability.- X, U! ?" J4 n. R- F8 {2 c8 Z EDL Electrical Discharge Laser ( M3 @/ ` f _% R/ V3 U, l! G' UEDM Engineering Development Model. ' M/ L" v j, B, cEDP Engineering Development Process4 E1 K. N7 ^0 q- I9 |3 H! [ EDR Embedded Data Recorder (PATRIOT). " `3 ~/ |3 h# T# J: x8 @+ rEDS Electronic Data Systems Corporation0 B! t" W' R1 y: l8 u EDWA Engagement Determination and Weapons Assignment (PATRIOT).& @6 |9 V; b+ q- N4 x! S0 C, o% I- _ MDA GLOSSARY, VER. 4.0 E/ Q5 L( Z. K2 y 89 5 \7 o* N" u3 \8 cEDX Exoatmospheric Discrimination Experiment# s6 W' A! f M# R/ S5 H* i EE (1) Electrical Engineering. (2) Engineering Estimate. : c3 S3 B# n% KEED Electro-Explosive Device.9 L: Z6 N; v: ~, X) }; B; t EEEV End-to-End Experimental Version. 6 v# n8 W/ r' G/ f+ J2 {8 `4 P7 iEEFI Essential Elements of Friendly Information.7 ]: X8 F4 s; j u+ } EEI Essential Elements of Information.! Z# O, ?! O; i% I$ D* [, U& r EEIC Element of Expense Investment Code.7 V& Z# J' C) E, ~" a! F3 O EELV Evolved Expendable Launch Vehicle (USAF term) 4 Z3 @; g. Z# hEEU Electronic Equipment Unit.$ I6 o8 U- o1 Z+ f0 u2 N6 | EFEX Endo-Aeromechanics Flight Experiment. g& v( [" r$ t. {; C0 ~% E EFF Electronic Frontier Foundation. 6 M" _) r0 h) R% C7 tEffectivity A designation given to the BMDS configuration and demonstrated capability at( a' w7 f/ H7 x: ` a point in time, becoming effective at each increment when an element or 0 }! Q$ n1 \6 H& C4 t0 G T( ycomponent is inserted into a particular Block. & W1 M) F/ O1 ]Effective Damage That damage necessary to render a target element inoperative, unserviceable,2 k: S- K; C/ i) O' Y nonproductive, or uninhabitable. % R g! p, z: M, |% E8 D6 w% kEffluent Plume The pathway of movement of effluents through surface water or air.9 Q" M# u3 q2 q/ e EFP Explosively Formed Projectile. & p4 [6 n9 H( i1 R0 T- wEGP End Game Processor. B- K9 p" l9 M/ ]( k" t EGTR Eglin [AFB] Gulf Test Range. ( f7 e! \4 Y2 ?) m( @EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). % E6 S \/ A- z: Y/ cEHF Extremely High Frequency. ! S2 ]/ {, g: D9 i- q5 t& H3 cehp Equivalent Horsepower. ' M. Q" d' S. [7 O2 O# ?EIA (1) Environmental Impact Assessment.; w& F; _' w* U (2) Electronic Industries Association. / Z, _; N5 Z) H9 lEIAP Environmental Impact Analysis Process.3 l. }. y4 }0 p- _3 z+ m$ b EIP Exoatmospheric Interceptor Propulsion. / y5 j( f; c8 }2 d0 CEIPC Electronic Information Privacy Center.9 L7 G+ V! O; \ EIPT (1) Element IPT. (2) Engineering IPT. 5 C. E& V/ H- T9 P+ aEIS (1) Environmental Impact Statement. (2) Explosive Initiation System. # ~" y! { R1 x5 c% V1 Y6 ZEISA Extended Industry Standard Architecture (Telecomm/Computer term).) h3 F2 ~7 _1 d! G4 a: g2 U MDA GLOSSARY, VER. 4.0 E! \ U' b8 l7 I2 P 90$ V& A" A5 |& U2 @' | EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.8 ]# M; }/ r# P Elastic Range The stress range in which a material will recover its original form when the force' e+ s3 U+ M& \" ^ H; @# h2 b (or loading) is removed. Elastic deformation refers to dimensional changes % H" G, R4 e7 K6 |: K7 coccurring within the elastic range.( s$ V- ^3 w. W- K( H Electro-Optics8 N9 N- U% L2 k8 C, U3 T9 C0 n Infrared (EO/IR) ; \& y1 Z G% [0 \$ z* x: L( s6 zTechnologies/techniques employed by optical sensors in the wavelength' q. A) i* ?! W& z spectrum slightly longer than visible but shorter than radio." }4 M+ F0 W$ e1 s; r Electromagnetic3 e+ \. @2 c8 N$ g& {7 b$ { Compatibility . f7 `& }" I+ m2 M; b) N! Q6 a7 R(EMC) - f# F) j0 y( R. T# ]A condition when all electromagnetic emissions from electronic, electro-magnetic, 6 {5 X& e8 R: F/ Y/ @- M8 S- Fand electro-optical components of a system interact without interfering with one % g6 L1 F0 h4 V# b- [another.* k. R8 Y9 O# B! @ Electromagnetic 2 ?( ~3 E+ b& A% P D2 }" ?/ iEmanations / H, ~# `& K) q% NSignals transmitted as radiation through the air, through a vacuum, or through ' H+ P. F6 T6 {% {conductors.! R9 A3 X! W& {/ S# x& _# m" q# F Electromagnetic % j9 r2 |6 y- eField (EMF) ' \+ A, f4 ]9 b: u( ZAn electric or magnetic field or combination of the two, as in an electromagnetic( C9 D6 s5 g. d* ~) l9 s wave. Created by electric charges in motion, having both electric and magnetic6 e) S9 a8 n6 Y$ l9 A# c: l components oriented at right angles to one another and containing a definite K' R, X! p) w6 K amount of energy. / {. E' ^+ P8 L3 ?3 \! a$ g+ cElectromagnetic, i, O( d7 O( R9 F3 _ r5 T Gun (EMG) ) g! W( |- G$ B6 c kA gun in which the projectile is accelerated by electromagnetic forces rather than* y9 C! a$ c0 v0 t by an explosion, as in a conventional gun. ( _7 w6 l9 {3 @$ m% _! i UElectromagnetic1 F" \- @: V9 |. b0 ` Interference (EMI); i4 C2 }$ H: v3 t8 @3 j) D* r9 } Any electromagnetic disturbance that interrupts, obstructs, or otherwise . S* p) F0 i: cdegrades or limits the effective performance of electronics/electrical equipment. * v3 i0 b' h: D5 [3 GIt can be induced intentionally, as in some forms of electronic warfare, or3 c/ h% b6 `9 c1 u unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.) I. h) H8 r2 p, N" u% D/ O Electromagnetic / ?% [. w2 ^' `Pulse (EMP)( W. @+ G$ ?' {9 S The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of w; W$ L/ m4 H) a9 Y; v& }. r the nuclear device or in a surrounding medium. The resulting electric and6 O9 O+ i t& `# X: Q2 d9 z( L9 P magnetic fields may couple with electrical/electronic systems to produce O" _$ T+ d E( c% ddamaging current and voltage surges. May also be caused by non-nuclear& P- l% u' Q9 R' ^4 E; u means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic! F: q7 {0 n5 X* c9 L; b Radiation (EMR)4 l2 Y3 U) }9 R7 H6 J (1) A form of propagated energy, arising from electric charges in motion that ) \. z+ J* ], P! B; f+ Cproduces a simultaneous wavelike variation of electric and magnetic+ ` o6 |3 ~/ J# b2 ?9 V fields in space. The highest frequencies (or shortest wavelengths) of 8 ]8 f Z% s& [0 F; E" j$ ysuch radiation are possessed by gamma rays, which originate from% `/ ]- o% F8 S: `3 D5 Y processes within atomic nuclei. As one goes to lower frequencies, the% }$ C# y( x8 L( b: } electromagnetic spectrum includes x-rays, ultraviolet light, visible light,# m, j# Z9 j, V8 i8 W# B infrared light, microwaves, and radio waves.- D9 ]( E* x2 e4 r (2) Radiation made up of oscillating electric and magnetic fields and$ u" U" Y. G- E propagated with the speed of light. Includes gamma radiation, X-rays,4 v* p! p1 T: } ultraviolet, visible, and infrared radiation, and radar and radio waves.' ?* e0 \7 {, ~ Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices8 Z4 G- ^/ o: g: Q3 F used in system/subsystem design, excluding employment in the RF spectrum. 7 S$ Z2 E( l3 ~Electromagnetic( ?+ f0 y7 n8 ~9 M5 H Spectrum* y: _- _# G. g8 p& [' X The range of frequencies of electromagnetic radiation from zero to infinity. It is # K" E0 [; G$ C5 `) g; gdivided into 26 alphabetically designated bands.: |. ~1 t/ @2 W8 N* j; C5 d MDA GLOSSARY, VER. 4.0 E- c# e0 W; \* b 91% U1 R2 f( |1 {) E# v/ _ Electronic) v0 ?1 `5 T7 I& m; [) J, K Counter-3 M7 X7 L6 P$ O3 j' h Countermeasure% C5 I& c8 i9 r5 P3 C \ s (ECCM) 2 j; t5 D; G1 b. S ~That division of electronic warfare involving actions taken to insure friendly 7 x5 D- G ?$ N" Jeffective use of the electromagnetic, optical, and acoustic spectra despite the # A1 ^/ X" J! a5 Z' X0 Wenemy’s use of electronic warfare to include high power microwave techniques.- F( w0 u& c+ |0 ] Electronic 6 ^6 i9 U% I: V. WCountermeasure' E" `( ?8 f- Y: |/ A (ECM) 2 p. Q x9 R3 T5 M' e6 }: FThat division of electronic warfare involving actions taken to prevent or reduce an% p# H! s$ B6 k% F0 H% g7 e enemy’s effective use of the electromagnetic spectrum. : x( f" I; [" d) f9 u6 F. `* XElectronic 4 K9 m5 P0 s7 @& ?: V8 K6 }& JIndustries( b) p1 \! q, a) C1 g- D( q Association (EIA) 3 S9 Z$ ]' K* N0 n0 DA standards organization specializing in the electrical and functional / u: y; y$ O) L, h! [: vcharacteristics of interface equipment.9 I" K# p. n0 {% |7 `8 X: N. E Electronic( j6 ?& ], W! r3 F( h Warfare (EW)7 e, R4 Z! U5 M, Z7 [ Any military activity involving the use of electromagnetic and directed energy to T4 ^9 n) w& o- E: h control the electromagnetic spectrum or to attack the enemy. The three major & \. i9 Y0 z" z( R- ~subdivisions are:5 W S. t+ N" C, {8 h •Electronic attack – Involves the use of electromagnetic or directed energy to ) D _) o. z5 {, r; r5 K1 x9 Rattack personnel, facilities, or equipment with the intent of degrading,( o" f9 l3 h- r7 @( q8 u neutralizing, or destroying enemy combat capability. Also known as EA.1 o4 |% _' s0 K B, u Includes: 1) actions taken to prevent or reduce an enemy’s effective use of 2 d% x z) H5 o! q9 c" \/ T* k/ jthe electromagnetic spectrum, such as jamming and electromagnetic & ?# y A2 `7 r/ m$ h, x: A0 R1 ?deception, and 2) employment of weapons that use either electromagnetic or4 O. {1 p/ a: A9 V3 i2 I directed energy as their primary destructive mechanism (lasers, radio) M/ F: C, I' M' i, s0 r frequency weapons, particle beams). " z" q7 @. L0 U9 [•Electronic protection -- Involves actions taken to protect personnel, facilities, f% O( S; j/ Q$ z# k and equipment from any effects of friendly or enemy employment of' m& z4 m7 y3 L$ z/ ]) t6 D: Q electronic warfare that degrade, neutralize, or destroy friendly combat+ n/ _; C$ G6 D9 V capability. Also called EP. 0 S& g6 Y5 g$ n•Electronic warfare support – Involves actions tasked by, or under direct; i" l+ Y/ t. r6 y6 H/ K: c control of, an operational commander to search for, intercept, identify, and+ t0 h# k) T8 I7 {: i( Z locate sources of intentional and unintentional radiated electromagnetic4 _+ ?5 L K5 t+ t4 b energy for the purpose of immediate threat recognition. Thus, electronic. L& O4 B: O0 @8 F3 d0 H warfare support provides information required for immediate decisions ! ]# W- N3 L0 v' q! kinvolving electronic warfare operations and other tactical actions such as ) H" t, C& {/ _2 vthreat avoidance, targeting, and homing. Also called ES. 0 x( S2 Y- ], a1 n% p0 n4 tElectronic 9 S( U- Z, I$ D% _9 sWarfare (EW) # I. T9 s2 G4 l) X* [Environments j- K, B0 K0 b1 Z# T" E Electronic warfare environments result from radar and communications jamming & n( Z, p5 w. |! y/ t+ yand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD4 _* _0 p2 h! G" e/ D7 K& Z, n/ s) _ system. " T' u: e1 ?+ W: s& W$ v1 G4 \Electronics : U8 r- p" a7 i3 `! xIntelligence * ~7 y1 S4 S+ C3 t6 s(ELINT). B" W' e2 A; Q R Technical and geo-location intelligence derived from foreign non-communications2 g' h3 k) T/ f0 f& d electromagnetic radiations emanating from other than nuclear detonations or9 F" s3 o' v/ h% |9 U# l9 z" `) w radioactive sources. : z8 a! G) z- OElectronics # ^9 T. {4 D0 O" P! OSecurity (ELSEC) + y! `; g( l) `2 y; Z1 E) E* sThe protection resulting from all measures designed to deny unauthorized - x' k9 H9 g) \/ `( r3 L4 S" ~persons information of value that might be derived from their interception and 9 J; E3 ]; j, D/ u J' [& P0 Cstudy of non-communications electromagnetic radiations, e.g. radar.2 S6 T, z, |1 ` Electro-Optics- l1 [3 \: }8 R5 G) b9 W! z Infrared (EO/IR) 2 ~1 C) s* [1 T8 @# A# LTechnologies/techniques employed by optical sensors in the wavelength ! E( b+ {0 s& ~. [# \( Ispectrum slightly longer than visible but shorter than radio. % ~% m8 G; r0 E# bMDA GLOSSARY, VER. 4.0 E * R7 A4 {# H6 C! V4 [+ k92 `* k2 N: z+ O% @0 O; XElement A complete, integrated set of components capable of autonomously providing9 k3 c' d0 Y K) b5 g) S BMDS capability./ ^! c/ d/ G* i* V Element 9 }- h1 r& y& t8 T& VCapability + U3 i9 j! _& q) ]) ]Specification " r* b5 i4 h. k6 b(ECS) 4 Z, K* Z/ R" ?! [; r. v ]: g. JA document that identifies the element-level BMDS capabilities and4 I. P3 W) X% j" I specifications necessary to achieve the system capabilities identified in the SCS.% q; E; A9 Q7 G( W/ ?$ u The ECS further defines the SCS-apportioned mission/technical performance- Y0 r/ U. M0 d1 G* x7 j capabilities and allocates these capabilities to the element’s components. # [0 a8 F* _3 z) d3 zElement Control 6 n8 b3 s5 l. T& H! B1 WDirectives (ECDs)/ u! \8 x y1 x! Y4 \- Q The command and control data instructions to control the conduct of the3 ]* V$ `( g7 q! {! p4 q7 P engagement. ECDs are developed by command and control software based / i3 F5 H7 \* W$ E- c& `+ ^$ k: rupon variable parameter input by the operators (both pre-planned and real time), 5 A( q( h# q; q; Oand operator defined rule sets embedded in the software. The individual battle 2 _, I9 `) x4 G0 R0 N9 fmanagement processors use these instructions to accomplish the assigned tasks ) n8 D. C- K0 _% yfrom the operations order. ECDs are contained within a Task and represent the. w' F. e2 N3 F- e% ~# A9 y form of parameter values that influence the resource management processes of " h1 Y* U7 n: y& _1 {4 L0 uWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and 9 Z, `$ J C' l- v- J7 VCommunications Management (CM). There will be numerous ECDs per Task.+ B0 c9 @ R( N X4 r6 m Element / v( X) Q) h zOperations 7 M0 m+ u! P6 E+ y7 ^0 ~0 R* f2 tCenter (EOC)* K. @+ \1 S' W6 K An Air Force operations center, which operates and maintains a BMD weapon or 8 A# {. @+ m! h3 P* I9 g- Asensor suite. (USSPACECOM) % b' O; M6 }: x) O7 s! l" nELF Extremely Low Frequency. * I) h9 Z; Y, a m" N0 ^# bELIAS Earth Limb Infrared Atomic Structure. + |1 ~. B4 U H* Z4 `' U9 |ELINFOSEC Electronic Information Security.$ O" f4 Q6 ]2 t8 u+ g ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-1-22 19:41 , Processed in 0.052003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部