航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation; I3 W" y2 |3 e- ~ COMSEC Communications Security. 9 z. W) ~2 _% Z! y, T' \Concept6 o% S& l+ V/ I: b7 E1 q Exploration & 3 U8 G" A! j1 o( D3 J* X' B' n: zDefinition. I/ n" h0 Z8 b2 Q The initial phase (Phase 0) of the system acquisition process, beginning at1 P; [$ }0 f5 Z3 ~ e% p Mission Need Determination. During this phase, the acquisition strategy is , V% a1 @; Y- Z& `developed, system alternatives are proposed and examined, and the system4 L% _/ z8 m- k \ program requirements document is expanded to support subsequent phases. - }6 a: v! K& pConcept of # `; ~5 |1 |7 p% L( J8 {Operations! i- K2 R) |( V; @% ]0 S P! o (CONOPS)/ n3 W2 ~7 S3 l+ `' m: E5 s (1) A statement, in broad outline, of a commander’s outline or intent in regard to6 b+ p" u& b1 X8 o6 E5 f an operation or series of operations. The concept is designed to give an overall ) [- a5 r( `8 d, ?& h2 I8 Lpicture of the operation. (MDA Lexicon)* ] p9 ?% T1 v( f! y! n (2) A verbal or graphic statement, in broad outline, of a commander’s y( {* N2 \7 F Z5 ~ |. _" s assumptions or intent in regard to an operation or series of operations. The / D4 ^) d" X+ I4 O2 [3 }concept of operations frequently is embodied in campaign plans and operation 1 x. Y% g* p* n; f) z3 S# R! Eplans; in the later case, particularly when the plans cover a series of connected9 i* i( @% I9 A6 K$ T8 r4 N operations to be carried out simultaneously or in succession. The concept is4 _0 c! }' v0 O8 w" | designed to give an overall picture of the operation. It is included primarily for . ]: D6 @( ^6 @% Madditional clarity of purpose. 6 v3 X2 N# _) ~- y; B; gConcept Plan An operation plan in concept format. Also called CONPLAN.! r! p/ F. D# K7 D Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of8 O+ {& h. j& N+ R the acquisition process, or combines development T&E with operational T&E.- o) A0 L8 D: X9 I! B, ^ Concurrent) }" H- c) T0 g/ p Engineering ( C) f* b; @3 ^7 ]: qA systematic approach to the integrated, simultaneous design of products and ; d& O4 X/ X$ ]6 }$ H5 O3 Wtheir related processes, including manufacture and support. This approach is ; W/ e. ~" {* e) Eintended to cause developers, from the beginning, to consider all elements of" p) T2 v$ p X: X the system life cycle from requirements development through dispersal, including8 o g0 U8 O& W$ | cost, schedule, and performance. 0 O a2 j+ `7 I. J/ G6 Z" ~CONEX CONOPS Exerciser.$ T- u# [, ^3 l Configuration A collection of an item’s descriptive and governing characteristics, which can be4 f- X& [8 F& _8 @ expressed in functional terms (i.e., what performance the item is expected to$ v' z& s# z, \ e" N" K0 \" z' n achieve); and in physical terms (i.e., what the item should look like and consist of; e, n' @4 g6 f) l* O when it is built).3 y: \* w) @4 O" Y9 E7 B MDA GLOSSARY, VER. 4.0 C! z! S1 m5 N1 r$ N: g8 u 59; X% l9 t7 e9 Q; U9 y7 W9 j Configuration ?4 ^+ T5 H9 f0 uAudit : U. }/ O* Y+ _* P5 G4 iOne of the Configuration Management tasks which includes a functional ' v, O* L: q0 e5 d" G" e) `2 uconfiguration audit (FCA) to validate that the development of a configuration item : P0 g, v9 q: q/ R7 {6 H% `# s |has been completed satisfactorily and that the configuration item has achieved 8 a# l1 l( f6 V9 qto specified performance and functional characteristics, and also includes a- f" Y& W* s+ k( n8 g physical configuration audit (PCA) to verify that the configuration item “As Built” * J# q" _2 Z7 m/ x. Zconforms to the technical documentation which defines the configuration item.3 m/ ^- d: N( k7 B2 `9 s Configuration 9 r$ d/ a; B8 p" `Baseline9 P9 q3 P$ X% ] The configuration documentation formally designated by the Government at a4 B' P! U9 H* a2 C. }, S5 B specific time during a system’s or configuration item’s life cycle. Configuration * h6 _" y1 H6 A. Sbaselines, plus approved changes from those baselines, constitute the current3 Y* k+ t, r' y, e6 N! Y9 L configuration baselines, namely the functional, allocated, and product baselines. 5 G8 l& R9 o0 M7 f2 t; O4 {Configuration * W* ? [1 V5 a! zControl# I% F0 Q2 k% v0 h4 | e One of the Configuration Management tasks that involves the systematic # d3 |1 f0 A$ t& l4 E, X6 M2 Z' p* w9 l" tevaluation, coordination, approval, or disapproval of proposed changes to the# m" \! u, [9 ^; F design and construction of a configuration item whose configuration has been : E0 T- x6 m+ J4 Gformally approved. ! q0 ~ c8 ?* H6 T) E7 t' c, CConfiguration # }8 Z& ?; a8 KIdentification6 b; J. {! r4 i One of the Configuration Management tasks, which require that for every) j1 I& A: k" Y* n9 D6 J! u2 @ change that is made to an Automated Data processing (ADP) system, the design 7 m9 {$ U0 p% ~+ _; Cand requirements of the changed version of the system should be identified." f- E* }9 `$ M Configuration d/ ~& m3 }4 w w, D& ?7 M) K Item (CI) " T8 T' r, {& ]: EAn aggregation of system elements that satisfies an end use function and is $ a7 a% Q6 g; ^: ]" Ydesignated by the Government for separate configuration management.6 ?: ?$ u' Z# @% k0 m/ q' t- B1 ] Configuration items vary widely in complexity, size, and type. Any item required ' d( j, ^$ F& X \1 Sfor logistic support and designated for separate procurement is a configuration/ d8 |* ~ R0 V item. Configuration items are traceable to the work breakdown structure (WBS). & Q3 `0 n: J5 l, D3 o6 zConfiguration ! B( q& l( F0 H. fManagement3 i$ c; X! h- p/ w7 f (CM)/ s4 |; f! x0 _$ ~/ f In computer modeling and simulation, a discipline applying technical and ! g. o4 R6 I- @, Q9 ]administrative oversight and control to identify and document the functional # D: P/ s O2 E& v4 a: Vrequirements and capabilities of a model or simulation and its supporting- {$ D% M4 \5 _) I databases, control changes to those capabilities, and document and report the1 k7 @, P" O! I; x; t changes. See also Accreditation. ' Z4 L6 O1 V: ~+ \CONOPS Concept of Operations. ! a) p: N3 }" g+ g3 cCONPLAN Concept Plan ; P: q5 N5 q" }+ T6 ?CONS Contracting Squadron. / [( g. V2 R' T2 QConsolidated7 c& Q& J. [ f2 g- k, M6 v Command Center3 j& g5 u& M$ ?! V K; h. l (CCC)" I# H% v7 P( `0 {; P" _8 G! Y A single command center from which USCINCSPACE/CINCNORAD can direct all. z) \0 I. u1 {7 a" Y. h; N" j his assigned missions, to include BMD. (USSPACECOM) Located in Colorado" @1 O! F$ A5 m: k4 F) F( t Springs, CO. 0 l% v3 I1 r' t) O6 x' \- u" NConsolidated _( Q$ ^/ V% Q Intelligence7 V9 I# F" R. R: n8 ? Watch (CIW) 0 f* V! p4 H) ~. {# t7 L' x( D5 wA consolidation of intelligence watch functions within the Intelligence Operations% H' z# T @' M' z$ Y: r Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD) g& A0 C, v! Y; Q# a- Y/ `0 E Aerospace Defense Intelligence Center (ADIC), and the Air Force Space 5 W( |+ K! M; U e5 TCommand Space Intelligence Element (SIE). 2 b+ p3 P1 g3 wConsolidated6 K% ^! w! Y8 B: T# g Space 8 t5 Z _6 S: ]) b* Q+ m, x% QOperations& i1 B' r' G5 W' J6 C5 T% l2 A Center (CSOC) ) D8 h9 Q& {$ E fSeries of centers at Falcon AFB, CO, which operationally control and maintain) V$ U% d# _* m& v4 f7 G assigned DoD satellites. , b$ p1 X* x ?) q8 ^' z [& RConsolidated( A1 ^: y" L& k9 g- ~ Space Test # o" X9 ?# ^" L4 g& s* \. @% A- mCenter (CSTC) + B1 c$ \" G; F' ~. @3 fSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and* U- S) w9 O- I# B initial on-orbit checkout of operational satellites, operate R&D satellites, and. q9 K- Y2 _0 B5 M serves as a backup to CSOC for operational DoD satellites. % N7 N" q0 o1 OMDA GLOSSARY, VER. 4.0 C ( i4 v+ W& t8 S! y9 Z# T) U60 9 B Y B# L. Z! pConstellation - `+ e3 q V; ~6 RSize (CSIZE) & f; W7 ]. A! I- DThe number of satellites of a particular system placed in orbit about the earth.8 G# Y. z& E7 K; Z9 J9 K9 e Contact Fuse Device used to detonate warhead on physical contact with another object. ( y+ N7 L6 o" p4 A% ^Contingency 3 ~6 V+ k* n% S2 M) ^- dDeployment Plan0 J7 a% m: L, J/ ?" H (CDP) ( A- `) c& b8 f& rAn executable plan designed to deploy an early missile defense capability and # u4 R% r* j. Y0 I5 y' E; breduce deployment time. The plan provides specific executable deployment5 Y& `& ?3 e1 r6 r9 }; n options and describes activities required before and after a deployment decision.! {* v* e( N$ S1 m5 D' Q. A9 F The plan also allows decision makers to have oversight on technical progress, + P# l7 b: [& Acost, schedule, and risks associated with a deployment system.9 \' d% F7 E. U Continuity of 0 Q5 ~( d, h9 r3 `0 PCommand/ z: f2 k" s; `; D. b The degree or state of being continuous in the exercise of the authority vested% P& C8 W3 \) p0 m& i! K in an individual of the armed forces for the direction, coordination, and control of6 \. E+ `5 J& \ military forces. u( Y' L) h9 p& |4 g4 F/ ]" l" e- v# U3 ~ Continuity of* T- b" [0 L- Y' B9 I Operations 5 r* \4 O5 H# V. q0 E% B, MThe degree or state of being continuous in the conduct of functions, tasks, or- D a5 [1 a+ I/ O7 S duties necessary to accomplish a military action or mission in carrying out the ( q# V2 M" ]. `. U0 c Lnational military strategy. It includes the functions and duties of the commander,& b. U, f& D& h6 n as well as the supporting functions and duties performed by the staff and others # y- r9 T/ q; A! ]acting under the authority and direction of the commander. ' {5 \# B! K; eContract 8 q1 [2 F5 c/ |8 {2 Q F5 Q& t7 UAdministration" x0 o; t6 E; g9 I: `1 T* Q* u Office (CAO)$ Q/ q- T3 y) O The activity identified in the DoD Directory of Contract Administration Services w% a: x% f( I8 b1 J2 p1 G7 ? Components assigned to perform contract administration responsibilities. It is a $ t# X" |1 k( _$ ageneral term and includes Defense Contract Management Regions (DCMRs),+ H- A/ @$ e+ w; N5 h7 K' ~ Defense Contract Management Area Operations (DCMAOs), and Defense Plant1 @: M+ T+ f1 e( n Representative Offices (DPROs). (Defense Systems Management College9 k1 j8 m! E% z& ?/ q Glossary)& I4 Z0 A) G2 A) P0 E2 C* M/ k5 H Contract Data * X0 e) U' ]6 ORequirements J1 ^1 l% P& L List (CDRL) 1 P Z Y0 z0 @) VDocument used to order (“buy”) and require delivery of data. Tells contractor* m' t N O5 Z) e3 O, t+ y w what data to deliver, when and how it will be accepted, where to look for 8 o5 I( ?$ ]3 @instructions, etc.7 c" B% z$ n1 ~$ c9 [9 e Contract6 ~& H \0 g: j% D( x$ ~; o Definition 2 a# X+ w" i# c& J2 p7 BA funded effort, normally by two or more competing contractors, to establish 0 N" f, L( p% k6 W7 G+ G# [3 A" tspecifications, to select technical approaches, to identify high-risk areas, and to # [% h. M/ y: T7 Bmake cost and production time estimates for developing large weapons systems.1 Q. A. ], ~! p Contract Work ) A2 Y; f0 M% RBreakdown) x) n1 W2 P, M1 E7 W Structure- v. m% f' v" ^) t5 `; M The complete WBS for a contract developed and used by a contractor within the 2 u# K( j4 c4 ]. P% u/ I( nguidelines of MIL-STD 881A, and in accordance with the contract statement of ; M5 j7 v. `/ u3 Uwork. + j, ~2 \2 ?5 E( d& p! SContracting % k" m2 C& x4 EOfficer (CO)8 i3 ]& M& C' s; J7 x* e# j A person with the authority to enter into, administer, or terminate contracts and) |6 n8 A3 M, f- P4 \ make related determinations and findings. The term includes any authorized }) h, Z. l) f7 r" _' D representatives of the CO acting within the limits of their authority. A CO whose3 o- o" `6 Q- K7 n! L e: i9 j primary responsibility is to administer contracts is an Administrative Contracting0 y: m8 t* {4 Q2 X, a Officer. One whose primary responsibility is to terminate contracts and/or settle 2 `% n5 Q0 O* S% @$ `terminated contracts is a Termination Contracting Officer. A single contracting ; t8 i6 k2 L' Q- C+ o& G6 [. Aofficer may be responsible for duties in any or all of these areas.8 Z6 i0 T* [5 x y! N+ g3 a! h6 u Control Authority that may be less than full command exercised by a commander over$ q6 C7 V, {+ P T& s4 @5 K% Q8 D part of the activities of subordinate or other organizations. ! {# H- H. m$ U8 f# D& V7 W8 }8 AControl9 E- T3 m. g/ p% R C, j1 _3 K+ Y: I) ` Abstraction% e T [1 U# C/ e (Software) The process of extracting the essential characteristics of control by: F) L; }3 _, ` defining abstract mechanisms and their associated characteristics while9 K' D1 ~# s6 q6 Q0 @ disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C+ T- Y) p8 @2 l! m6 w7 l+ X2 \$ w 61 8 @9 B6 t, g J. A' u/ x9 EControl and $ |: U+ n: _+ ^# A- BReporting Center8 L! s8 v1 x; N& i% ]$ {" o8 @ An element of the US Air Force tactical air control system, subordinate to the5 K" @+ r2 x& k) M tactical air control center, from which radar control and warning operations are 9 U x/ V# m' O$ A, p! {5 Yconducted within its area of responsibility.3 T9 L! G1 y0 Z( [ Control and * x, _3 x8 M) i+ Q( H. y) T' _ eReporting Post / s0 [; _- h8 IAn element of the US Air Force tactical air control system, subordinate to the8 m; O: N8 T l0 p& {& @6 {3 ^. E control and reporting center, that provides radar control and surveillance within, b/ `' w. k% f! F its area of responsibility. 1 O. U( R( I; z* |Control Area A controlled airspace extending upwards from a specified limit above the Earth.2 j- n n, A* \" z# n9 X/ f2 L9 V Controlled 5 k! l/ S2 _& d- a# r7 U+ t1 v! sEnvironment2 o; y1 Q5 I7 n: k8 ^ Area where entry into the radiation hazard area is controlled. ) z- w: f! |0 s$ O6 b, gControl* {! o4 j& H$ O P/ q Procedure4 N0 D( R* U/ f q" D: } The means used to control the orderly communication of information between - q6 l% _* }7 n0 `" {stations on a data link. Also called line discipline.) i7 x. U5 E% ]5 M( f, O& U Control Station The station on a network, which supervises the network control procedures such 7 ^; R! n2 t% N# s. P! c( u5 o/ l1 aas polling, selecting, and recovery. It also is responsible for establishing order 0 j# h5 |' o* O. }" jon the line in the event of contention, or any other abnormal situation, arising [! }# ~( p1 j" u3 n1 B4 ]between any stations on the network." j% k6 q7 R! ^& d5 a Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to 4 u+ Y( S1 D/ w- r4 T, Dprocess sensitive defense information and that is under sufficient physical and6 ]$ K' w5 s# U( i3 | technical control to preclude an unauthorized entry or compromise.1 ^, b# f$ [2 j" N; _ CONUS Continental United States. 4 A( R0 j4 c% {$ t2 _6 w" w; YConventional Co-6 E5 R8 Y" a% g) B, [- u# b1 v Production " G) ^: X2 M* J1 VAn effort between governments to produce the same end item, or components3 _9 r3 Y8 m% V i2 r& x0 j of the same end item, in concert.7 y' Q2 A- f* c2 @% ~ Conventional + |; _( g3 f) R# f, `5 T$ uWeapon- m# Y/ f3 ?0 C$ i A weapon that is neither nuclear, biological, nor chemical. # ^" R5 x! ~/ s2 d7 r1 v3 ^- `- OCoop Cooperative $ C: X9 i, x- UCoordinated$ C, g8 N0 I' t. M, W7 Y2 y Engagement 6 k$ ~ L; D j3 M- R) bPlanning/Actions& P8 b4 h/ m$ O: s- t2 h Necessary coordination among engagement components to ensure maximum" T' C8 |7 Q* r) u effectiveness of the SDS and resources are not wasted on targets already- S7 y$ C7 W0 E# H4 ~ targeted./ m% ]- l p: W6 _! w# ~ Coordinating $ b5 L8 c4 R' HAuthority 8 t, \0 T" u+ kA commander or individual assigned responsibility for coordinating specific% g1 u; A9 {% J3 a9 Z$ K functions of activities involving forces of two or more Services or two or more* m/ k5 s& [3 z forces of the same Service. The commander or individual has the authority to# I3 {6 I1 q% `1 }' s require consultation between the agencies involved, but does not have the$ t% N- N+ f* |% z8 G authority to compel agreement. In the event that essential agreement cannot be* l0 P+ A( o. G T$ W0 p reached, the matter shall be referred to the appointing authority. , ]2 j, ]$ [. s. pCOP Committee of Principals . ?2 B# U; Y1 J) }, yCOR Contracting Officer’s Representative. Contracting Officer.1 g! _% N6 z- z7 k( p! y CORBA Common Object Request Broker Architecture.: u" J" U) @! N CORM Commission on Roles and Missions.2 z$ J+ ~( l r$ n, ~ MDA GLOSSARY, VER. 4.0 C! U, y4 Z, ?2 a% B) w 62 : r. z' b$ B0 Q+ \' @- MCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens- F9 n7 [0 D4 g( w perpendicular to one another, designed to act as a radar target or" V3 B( \- i- b% J0 U$ k: w marker.8 `- ]& O: T4 Y6 p5 c8 l (2) In radar interpretation, an object that, by means of multiple reflections % s" Y. a' I& X" s- k1 [. [from smooth surfaces, produces a radar return of greater magnitude than; [# `' \3 w+ r3 k) a might be expected from the physical size of the object. + B) t ], E7 b8 k7 B( wCorps SAM OBSOLETE. See Medium Extended Air Defense System. & |5 l3 a' G4 f: G: [5 r# p3 UCorrelation (1) The process of relating observations or tracks from one set of data to$ m J* y' ^+ F7 ? observations or tracks from another set of data, i.e., collecting data from ) F3 k4 n1 O) H' [* ^" odifferent frames or sensors that presumably relate to the same target. (2) $ l4 m9 Q6 k9 t% w3 N2 @In air defense, the determination that an aircraft appearing on a6 P# v) w# N+ A/ m w radarscope, on a plotting board, or visual is the same as that on which 3 {. x, | p& Z! [ `% N$ H/ Finformation is being received form another source. (3) In intelligence ) ~& M9 M& R; W( b; A% Musage, the process which associates and combines data on a single; ^& f$ p- Y% O. h; X; S entity or subject from independent observations, in order to improve the ( E$ z* {, N: {9 s3 @1 |/ greliability or credibility or the information. $ }5 {7 Q4 _( i+ f5 yCOSEMS Evolving architecture operations support tool. " t: K, w5 N8 B- E" @. E) eCOSM Computer System Operator’s Manual 7 v% x9 J9 `2 \/ A8 M- ?+ |* ]. rCOSMIC NATO security category. : e5 x+ M7 k' c6 `6 r9 `Cost Analysis % e, g. v/ a. q9 R0 L* ~4 iImprovement; s! N6 [1 v, s' F* Z- i6 N Group (CAIG)5 x! Q0 Q0 Q3 z% G8 V. J An organization within the office of OSD Director, PA&E which advises the DAB , }+ ^9 w: M% _8 b D1 Xon all matters concerning the estimation, review, and presentation of cost 7 U$ ^+ z7 n H" B, `3 g* P3 v kanalysis of future weapon systems. The CAIG also develops common cost 1 \3 ^9 u2 o; W" k$ F a1 Gestimating procedures for DoD. 5 ~- U; q( u0 [Cost Analysis3 i$ u h0 X9 s Requirements 3 b, g3 s$ S, E* d/ L) \# oDocument1 B9 B9 P% ^2 Y5 T8 _ (CARD)# Z/ H) @; A: q3 f9 G v0 u The document describing the technical baseline, which is a subset of current . _3 u0 U# I1 H! |3 c7 H0 [+ ksystem technical data and is used to generate the baseline cost estimate for an 5 u1 w' [4 j$ }- N0 Y) \! WSDS element. It includes, but is not limited to, the element description,# f* \1 c6 F. y/ s* k) t6 R interfaces, operational concept quantity requirements, manpower requirements,3 v9 c& ? m6 M3 K( _8 b. k' T' _. t activity rates, schedules, research and development-phasing plan, and facilities! [+ P9 D( {6 I requirements. 3 ?( ~4 c% b ^) a# y; }6 dCost and E- n/ w7 \4 A7 E( r0 O Operational# {* O$ _, H) J2 b Effectiveness( ~% r4 P4 ], | Analysis (COEA)+ ?* T9 \' ^, c; ^1 m1 ^4 A' Z An analysis of the estimated costs and operational effectiveness of alternative ! O2 B6 T* }1 Tmateriel systems to meet a mission need, and the associated program for , x3 ?. X8 h5 N$ [acquiring each alternative. " Y: b: o( o5 G( G3 L- V( iCost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk 5 @- \3 }+ z# M6 s: ndue to cost estimating errors and the statistical uncertainty in the estimate.. _# h% O2 b1 [: {8 r m Schedule/technical risk is risk due to inability to conquer the problems posed by 5 K5 X- V6 v$ T V8 g* r x J4 B/ sthe intended design 2 m6 W! u8 u4 j1 K1 fCOTR Contracting Officer’s Technical Representative. See Contracting Officer.+ s: ` s2 H* m5 M" M COTS Commercial Off-The-Shelf.1 ?7 B9 g L* l9 j! [ Counterair A US Air Force term for air operations conducted to attain and maintain a desired - @) l3 k( B' E+ v( X3 gdegree of air superiority by the destruction or neutralization or enemy forces.) }6 S/ _4 K! K5 ]; l3 l* P+ b- t! G Both air offensive and air defensive actions are involved. The former range3 j0 A I1 a& a. j4 c& n throughout enemy territory and are generally conducted at the initiative of - q% u/ D3 d) W; N5 p* Dfriendly forces. The latter are conducted near or over friendly territory and are 0 @- G) t* v& G: y- hgenerally reactive to the initiative of the enemy air forces. - B3 `: Y& [4 @* [" oMDA GLOSSARY, VER. 4.0 C 3 k# t: V, K5 S; ^; l# s63; [6 G- v/ K$ t0 I1 U% j0 R( R6 a Countercountermeasures e9 x- D. _1 V% {, o8 h4 _7 w$ s(CCM)- ]; P0 |5 ?: m# A9 F Measures taken by the defense to defeat offensive countermeasures.: q# G3 K$ z3 g: p& \( h Counterforce The employment of strategic air and missile forces in an effort to destroy, or 7 m* f- [3 T; N* r3 C! {4 }render impotent, selected military capabilities of an enemy force under any of the 5 }' W! d, G. H5 p" U2 b: Bcircumstances by which hostilities may be initiated./ q7 i/ k5 I6 ?0 `5 u Countermeasure A design or procedural measure taken against covert or overt attacks.% O: j3 I& W6 `4 r6 h* H3 Y Countermeasure5 Z- n/ [5 B; |" A* d s (CM) * P& |) b2 Q0 l# |: G1 H% `& zThat form of military science that by the employment of devices and/or ( ^$ n/ Y5 ]. w6 {techniques has as its objective the impairment of the operational effectiveness of 4 h' k2 x! }9 w' Y( W4 j- Zenemy activity.1 f& o! S! ?% @+ { Countermeasure + H; d' a! f! N% M2 \4 k! os Rejection7 d; u/ c1 ]9 K& l6 }: j (Surveillance)/ U f5 K( [# G% Q Improvement or rejection of an object signal in the presence of7 T2 r @% k& Y/ C$ U; {* y/ @ countermeasures. 1 X) ?' x2 o& C4 @) a5 tCourse of Action! f# q0 u7 K# J1 A (COA) & f" w8 u! @3 v6 M(1) Any sequence of acts that an individual or unit may follow. (2) A possible8 q5 u0 A4 s9 p, s) f plan open to an individual or command that would accomplish or is$ u4 c0 @8 B+ t* H# e% d1 c related to the accomplishment of his mission. (3) The scheme adopted # M# H( v* {1 r% ?% gto accomplish a job or mission. (4) A line of conduct in an engagement. , R6 |. q6 r4 k! }/ m4 _(5) A plan to accomplish a mission. It describes the execution concept . s# M" z6 G2 E3 d% K4 t0 ~- c, wfor BMD of North America. It will specify the engagement priorities, 7 g! V6 a, j; S6 tresource allocation and desired results by Area of Operation (AO). 5 h6 r" z: z2 z(USSPACECOM) (6) The scheme adopted to accomplish a task or+ ?: b* c/ w. |" S7 R mission. It is a product of the Joint Operation Planning and Execution 3 |. s5 P: `9 a" OSystem concept development phase. The supported commander will / j0 b( w6 @! l' Cinclude a recommended course of action in the commander’s estimate. 7 {- s- l; s6 p- w0 t9 G- MThe recommended course of action will include the concept of 5 _% S5 n2 A/ k Yoperations, evaluation of supportability estimates of supporting * R6 M) I% C- L4 O. o0 oorganizations, and an integrated time-phased data base of combat,' H$ j0 d1 n0 A ~1 | combat support, and combat service support forces and sustainment. ( S% P, T" t& {0 D2 T% L uRefinement of this database will be contingent on the time available for + H6 Q4 z: W! b$ r9 Acourse of action development. When approved, the course of action$ v1 c' t' ^: k' C$ S; u0 L becomes the basis for the development of an operation plan or, ]- F* P) h5 ~* ]1 x3 m) |2 E* ` operation order. . q. `& D( Y7 F# C n, @! P! a/ a4 UCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps,. `1 m$ f( [" i3 S i and other geographical presentation systems. (2) Cover or protection, as ' G, p. H: h0 c _. i H6 ^the coverage of troops by supporting fire. (3) The extent to which: o, @- }) `- m) J0 L; G intelligence information is available in respect to any specified area of7 h) S* X0 ^0 E4 Z' H( B interest. (4) The summation of the geographical areas and volumes of. S% m( Q/ g6 o8 O8 t9 Q aerospace under surveillance. # D! W2 |% S2 x( HCovert Timing $ X( I/ p5 v! ^, n GChannel - ] Z4 w! R/ d$ N5 P6 cA covert channel in which one process signals information to another by7 [) C& y; T) ^ modulating its own use of system resources in such a way that this manipulation * M2 z7 m- q! l6 yaffects the real response time observed by the second process. 1 s) C) c+ H# I1 z# x, d: |' h2 fCP Command Post.; T+ T6 Z1 y; B CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. / H% d$ K/ T( Q: B. x! vCPAF Cost Plus Award Fee.+ y5 g& b- N! `& Z- u6 ` CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) 0 \% b6 Y2 E9 R" v+ b3 R9 k& uMDA GLOSSARY, VER. 4.0 C9 H! L u% i( G- o8 ]3 F 64 " w# i5 ]+ d4 z3 h( I1 MCPAR Cost Performance Assessment Report.3 h6 ~! N8 o4 f. z7 G CPAT Critical Process Assessment Tool! B- ?( b1 w( I CPB Charged Particle Beam.3 q" C! } H+ s* ?" A: |3 l CPEV Communications/Processor [Network] Experimental Version. ! C i/ t9 `# E& J7 D: z% }8 FCPFF Cost Plus Fixed Fee.- y& h6 p8 j$ d; B& ?' q' H B1 J CPIF Cost Plus Incentive Fee. . ~( \0 P! V/ OCPIPT Cost-Performance Integrated Product (Process) Team.2 P6 C( B5 {2 p* P CPM (1) Critical Path Method. (2) Contractor Performance Measurement.9 v+ G) F, P) j1 ~ CPP Critical Performance Parameter.; d' w. J# m7 U1 i" Q( D6 @ CPR Cost Performance Report. 9 x8 ?. A$ N1 J+ n3 ]0 o5 qCPR/NC Cost Performance Report/No Criteria (Contract management term).1 h* |+ U: Q& R* t: t1 e* z CPS (1) Consolidated Program Summary. $ q' A, `% g0 P+ i) D(2) Competitive Prototyping Strategy. }0 _8 |1 Q4 N (3) Current Program Status.( P0 Q# z" k* h+ N! d: B CPU Central Processing Unit (TelComm/Computer term).' u. N# s; o( h2 S+ W: U CPX See Command Post Exercise. # e$ V4 B8 G* r$ n9 h: NCQAE Chief/Contract Quality Assurance Evaluator. 4 ?$ ]$ F. d- m# fCR (1) Computer Resources. (2) Continuing Resolution (US Congress term). 5 e" K& k+ g2 V4 I3 a) L( oCR-UAV Close Range Unmanned Aerial Vehicle. - T* p; T7 \/ uCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement0 |4 r+ w! c. @1 J6 p8 p CRADA Cooperative Research and Development Agreement. , k' w# _8 G0 A; n. wCRAM (1) Control Random Access Memory.) S2 }* i8 q& ]0 _7 V) u (2) Cross-tie Random Access Memory (Computer term).3 H% \& `* {- Y, [& x% i CRB Configuration Review Board.9 A) y- q& M9 ?$ M% \6 N) u CRC Control and Reporting Center.& F# e9 C7 s( K- | CRD (1) Capstone Requirements Document.8 z5 n6 w q. t% k2 p( y& _* L (2) Component Requirements Document. . ~: x/ K. v. M E6 X- s! NCRDA Cooperative Research and Development Agreement.* K" E% U8 y3 ^1 n CRG Communications Relay Groups (PATRIOT). 8 h A1 Y# R' t3 ~- W; w: `CRI Classification, Recognition and Identification. & {) C3 b' ~9 P" w; k: zCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C5 J* A' J3 T2 F: g( S( c/ V$ Z 65) K8 C" q9 J. ^1 c6 N2 N+ I Critical Design / V: ^8 A4 p( g* F9 SReview (CDR)- f0 J$ W2 q8 M3 n0 M" F A review conducted to determine that the detailed design satisfies the * L( C; j2 o H, T$ u& ]: O7 hperformance and engineering requirements of the development specification; to" _1 _& c# b U# J' c establish the detailed design compatibility between the item and other items of/ \5 r( }+ M9 X! W. T+ A" t0 _ equipment, facilities, computer programs, and personnel; to assess producibility " P) K, L: l$ w" \. P+ ~' ~% Band risk areas; and to review the preliminary product specifications. Conducted' F) ~, M5 Q6 z+ F during Phase I, Demonstration and Validation (for prototypes) and Phase II,7 b" |# H$ h. a& r$ A- m1 {: D Engineering and Manufacturing Development. 8 U+ f+ j* ]) f$ S! v* LCritical 1 t3 T7 M/ X) e* S2 b* nInformation 0 A0 Q' z0 J9 g9 }/ t. J9 N+ ^Specific facts about friendly intentions, capabilities, and activities vitally needed 4 Q% f0 V) d5 n* [, tby adversaries for them to plan and act effectively so as to guarantee failure or) Q' V- H& K/ c& w7 c unacceptable consequences for friendly mission accomplishment. # M* u' y( C/ b, g$ Y8 k$ uCritical/ {, z" C. T" {% I# g Intelligence / G4 [4 l1 v2 E! T6 M/ R+ oParameter4 M& p7 h& S$ G. ?' c& `' u A threat capability or threshold established by the program, changes to which ; q# m$ f, u+ J4 S+ V; zcould critically impact on the effectiveness and survivability of the proposed3 N* a0 q! F+ }2 `- { system.3 Q0 R$ m$ Z5 w @( F5 ^% @$ g Critical Issues Those aspects of a system’s capability, either operational, technical, or other,3 I2 {2 p4 ?) A! P that must be questioned before a system’s overall suitability can be known, and 8 p& {+ d# r! n4 fwhich are of primary importance to the decision authority in reaching a decision - f! B$ U! }8 Q5 D0 jto allow the system to advance into the next phase of design, development, 8 z3 t4 N7 N* xproduction, or post-production. ; e' R) H+ z) j! u, Z+ K2 o( yCritical 0 @* n1 r/ ~/ F' B% HOperational ( C. {# p g. p( s. d" DIssue0 x& O$ r( w0 g+ f; i- F A key operational effectiveness or operational suitability issue that must be& w7 Z9 z3 {, _# I$ r examined in operational test and evaluation to determine the system’s capability' S4 [! ~* Q) {& E9 d( c to perform its mission. A critical operational issue is normally phrased as a $ @7 L) W/ ?/ u1 aquestion to be answered in evaluating a system’s operational effectiveness 8 C* Z c8 q- E) gand/or operational suitability. + V. \ W5 c8 [. P# cCritical Path ' M! z. m) T% I2 |Method8 [; e& O( `9 ^* ?- O3 P. k A technique that aids dependency of other activities and the time required to ! q1 K/ `4 N3 G! J& N2 ~complete. Activities, which when delayed have an impact on the total project ' c- g9 _4 w, I; N( J6 o% r- g5 Aschedule, are critical and are said to be on the critical path. 5 |' k) [$ F* }3 f+ S- lCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to7 _) F0 m) ^5 d the viability or the operational effectiveness of the SDS.6 R% v, z4 A8 I& C6 S4 B0 L Critical Security E2 `0 `) K( l/ Q) v, LRisk 5 s. p- u8 r" a4 W I- CThe existence of a security vulnerability that, if exploited by an adversary, could 0 F5 W8 m3 P7 `( E% m/ b' Hcause exceptionally grave damage to the viability of the BMD or the operational 3 h& f! [( Y, e# ]( seffectiveness of the SDS. Critical risks assume an adversary’s capability to8 I! @, r3 m5 e" b' V& G cause major system disruption or degradation (e.g., single point failure), " U. `, d5 r' e ^# k; |0 fdestruction of mission-critical components, or usurpation of system functions. 7 k- z- R* g- x' OCritical$ M3 N/ d& Q& l6 s2 ^ T7 F! Z- X2 e' x Supporting5 N1 N) b* P; M Technology# ^$ h! j7 T: } A technology that program management personnel consider a critical part of the 0 K* q+ ?$ u3 ~& X' {3 Aprogram being described./ [. q& b7 ?" v/ j# {/ H- F CRLCMP Computer Resources Life-Cycle Management Plan.+ A; G; g2 [% |! x CRM Computer Resources Management./ M! b; e1 }) m# o( c0 K* g9 ~, _" R CRMP Computer Resources Management Plan.3 K( e0 ~& c8 z CRO Chemical Release Observation. ) I* K8 A5 |, { B& QCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC9 I0 w" A' ]& ?2 G term.)8 k, q; @! Z3 M9 Z1 |. r" }, P' D MDA GLOSSARY, VER. 4.0 C [2 B# i9 x! n+ r$ V 66 ; j+ t. d1 @6 m$ }5 WCRS (1) Computer Resources Support. (2) Congressional Research Service. (3)) \' q* \5 J3 W6 { Contractor Reporting System.; {- H1 C- A' d, F ?" S CRT Cathode Ray Tube.0 m/ \9 W# q9 v5 ?: c! t7 g1 S! i CRWG Computer Resource Working Group. 4 ^: y3 Q0 X2 ^6 X( E$ w6 RCryocoolers Cryogenic Coolers. & W8 h* @1 t, t) R5 S% \; q# hCryogenic Of or related to cryogens (substances which are used to obtain low ^ |5 F0 d& R/ L, Ltemperatures). G: ~6 U' W! Y6 D2 h Crypto A designation or marking which identifies classified operational keying material, ( [7 z! O2 _. Eand which indicates that this material requires special consideration with respect8 Z' u9 P3 Y+ o( x0 t6 L; S4 h" X* G to access, storage and handling. ( Z" H% ~- B8 vCryptographic * b5 v/ p- a0 ]( LSystem' z& X9 x: I5 `& D! a1 k. ^ The documents, devices, equipment, and associated techniques that are used7 t( s9 a2 H$ F; ?! _" x( Z as a unit to provide a single means of encryption (enciphering or encoding). # F% R8 P% v) T- ?3 J0 FCryptology The science that deals with hidden, disguised, or encrypted communications. It8 W) d9 H1 y+ e3 M- @ includes communications security and communications intelligence.% ^1 q5 A1 D$ H$ Z0 |* x/ I2 N p# f CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.; R5 m6 a" f+ v j CS/CSS Combat Support and Combat Service Support (USAF budget term).! i5 ]0 l4 W+ @( s9 X; V8 A CSA Chief of Staff of the Army.$ l/ C; i9 ^' X" ]7 W5 h CSAF Chief of Staff of the Air Force. 8 O- E0 }0 }% C2 K$ N% _CSC Computer Software Component.5 j4 e8 L, q( Z& w/ C CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) , x6 _! A2 }% G+ a; M- Y, MCSCSC Cost/Schedule Control System Criteria. + M6 j! o: q, G* x9 G2 CCSD (1) Constant Speed Drive. (2) Critical System Demonstration. $ j, L1 j+ I+ C w7 i0 s: DCSE Center for Security Evaluations (DCI). * i+ c8 D" Z2 ^( h& J# KCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon* v; o' a, X# s5 h) A System, located in Cherry Hill, NJ.9 x0 F) a1 f3 Q# o+ i; n5 n! s* S. j CSF Consolidated Support Facility, Arlington, VA. ; |) p1 D% x z( y9 G6 ], _CSI (1) Critical Safety Item. (2) Critical Sustainability Item.1 s5 X% H0 i$ L) S8 L- Q3 ~ CSIP Current Systems Improvement Program.: J1 s5 H2 F8 K) l. j- r CSIZE Constellation Size.1 s& z7 F, R# R CSL Computer Systems Laboratory. # R0 K" t; P: [ c- L+ W/ UCSM (1) Core Support Module (*C2E term). (2) Communications Support Model. . D% q: R( A+ X8 KCSNI Communications Shared Network Interface (NATO term). * ^: A2 ~7 x( x7 m# f0 q4 {MDA GLOSSARY, VER. 4.0 C ( Z- l7 W( Y9 W+ d/ ~/ q. W1 ?67 6 U" w3 R7 c8 _$ ]( a, [CSO Closely Spaced Objects. ' G9 R; {# @. j8 a# PCSOC See Consolidated Space Operations Center.& {9 u2 N" f( P& V& R CSOM Computer System Operator’s Manual 0 O+ x2 n( {( ?/ r- ACSOSS Combat System Operational System Sequencing. Z4 R' S+ S( |, A+ J) g1 _) j; @ CSP Communications Support Processor (numerous locations, including USAF Air - J9 ~9 [) q& ?( E7 F7 E3 y, y& M8 R! oDevelopment Center, Rome, NY term). 3 s i# u8 D& F) aCSRD Computer System Requirements Document. $ h" u# B0 W; l0 m& T- q% K, tCSS (1) Cooperating Space System. (2) Communications System Segment. (3)3 r: F$ J8 ?: V Contractor Support Services. (4) Common Sharing System. (5) Communications 9 l3 i. y5 w7 E9 `" I- t! jSupport System (Navy term). (6) Common Support System. (7) Combat Service( c+ w9 b, U9 s0 F' u Support. J/ U/ C Y& _; y* gCSSCS Combat Service Support Control System (USA term). 1 p6 C1 V) m; R# {CSSPAB Computer System Security and Privacy Advisory Board. " W. G0 H* v+ g2 N. H0 XCSSO Computer Systems Security Officer. 1 B7 `2 F7 ^% Y) s3 I; A) CCSSTSS Combat Service Support Training Simulation System (US Army term). + M6 [' l8 Z! y* QCSTC Consolidated Space Test Center. ' {( X0 |; |4 M8 h4 VCSTI Civil Space Technology Initiative. 9 R9 O# S8 k1 z" z+ ~; t! ECSU (1) Computer Software Unit. (2) Communications System Utilization.6 ~9 T# ?3 e; D ?: Y CSUR Communications System Utilization Report.# B" h, }9 |5 I" M4 |4 R CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. % w9 L9 U3 y. o4 A, G: x# |# J(4) Cryptologic Technician (Navy occupation specialty). 8 B9 D7 }, ^8 ^/ YCTACS Contingency Theater Air Control System (JFACC term).- k' M7 Q5 j! b" ?: ~ CTAPS Contingency Theater Automated Planning System (USAF). * o$ _# r5 W V& m1 vCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. : n! x3 A* P* B$ `+ qCTBM Conventionally-0armed TBM. 3 ^) I# [' V; g) rCTC Combat Training Center, Ft. Leavenworth, KS. - ]! f& `. @) w# _CTCC Critical Technology Coordinating Committee.2 J1 B' o! h; X9 s S* T CTD Communications Test Driver.$ c( f" _, p( V CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment., B) Z# p' S9 N! W1 _( T% [ CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally # O: R9 s2 b' Y6 k2 r! Kfunding selected test investments proposed by the Services and Defense ' f$ a9 k" T5 g1 W. ]( c7 FAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C 7 b, A& u. I5 T* ^, q7 W0 F" @" X( |687 R" j# c n, Z% E0 X4 G; g2 ^ CTF Controlled Test Flights. 0 E( j, c k+ v( ZCTI Concept Technology Insertion. 8 o2 D/ p3 l- ]) g7 m7 oCTN CALS Test Network. % y; c. h$ r* a5 B8 z) r+ S& u* _5 KCTOC Corps Tactical Operations Center.1 s1 \( l) b2 j p! M: d CTOL Conventional Takeoff/Landing aircraft.5 P4 F% D5 @$ ?! \0 c$ W/ j CTP (1) Critical Technical Parameters. J! m* p: f3 J1 R7 H7 R9 p (2) Communication Tasking Plan.- V$ [- d& ^8 i (3) Consolidated Targets Program. " m, R. M# Q7 w( N# \CTPE Central Tactical Processing Element.. ^! U4 e; P; N. [* P6 z9 W CTPP Consolidated Targets Program Plan.5 n" [8 z/ d( h9 j9 F CTR Cooperative Threat Reduction (Treaty negotiation term).9 k4 G0 O X, l CTRS Centers . \) N9 L2 N9 I$ p' j0 s, MCTS (1) Clear To Send (TelComm/Computer term).% f" A6 O: \$ }& N (2) Contact Test Set (USA IFTE term). 7 t1 u5 J/ E- _! [9 G+ L' _CTSS Computer and Telecommunications Staff.1 q5 q! \4 P. H8 f/ \- ? CTT Commander’s Tactical Terminal (US Army). : {( w% q' C0 C& O2 qCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). / Z) o" D. ]# ^6 jCTV Control Test Vehicle(s).' V6 i3 o6 R/ n# A% @2 J! }3 O CUDIXS Common User Digital Information Exchange System. % j. a- D1 ^1 q iCued Operation The directing of one sensor based upon the data received from another sensor. 5 |- |; e" c/ H# R$ j1 _Cueing Command The command within a tactic, which specifies the sensor element’s coverage3 _1 v( H) l1 B( n+ a0 r% s volume. " j K. t2 @( i5 V7 D4 _Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage , Z. u% p* a( T: X! Svolume. / n/ P. y' i% ` G5 [CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.( Y T& ~: J8 G0 A/ B CV/BM Carrier Vehicle/Battle Management. x/ W+ s* s6 ^# V. i; {$ @1 g CVBG USN aircraft carrier battle group./ R3 ~, s0 p- R* Q1 E. s) \; v( ^ CVHG Carrier, Aircraft (V/STOL), Guided missile. " \, _/ v* `* ~4 |CVISC Combat Visual Information Support Center.3 w4 f8 E& F; k8 v7 H8 V CVL Copper Vapor Lasers.- I7 d7 l" U" C! _+ D# G% U4 T CVN USN nuclear powered aircraft carrier. : V# Y/ F' G6 \5 A8 s2 ]MDA GLOSSARY, VER. 4.0 C* w2 L( {4 k M8 B 697 n; j8 q J& w* s' c. N CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.5 a, H8 \$ s) X( o) S Q! q% Z# N CWAR Continuous Wave Acquisition Cycle (Hawk). 4 }) J, \. D4 }0 F3 x \CWBS Contract Work Breakdown Structure. % |! X6 B5 X" fCWDD Continuous Wave Deuterium Demonstrator. ' E; X( Z8 w4 G" mCWIPT Cost Working group integrated Product Team. , D- K1 |% r$ r2 @3 H mCY Calendar Year.& U1 q; I( X# |7 U& T$ b5 q" \ MDA GLOSSARY, VER. 4.0 D" e1 X' G: |. x! s# L! g 71 / h' ~1 [6 K" E- A; N- o) UD Deuterium % t2 E1 f7 |* Q* a! qD Spec Process specification. 9 K) ?" _; X6 @3 m- ZD Star Measure of infrared sensor sensitivity. i* v+ J% c% L! R8 d D&D Design and Development $ q; V2 \& { a+ V. QD&T Detection and Tracking.( k+ H \, X$ [% o4 M! I D-IFOG Depolarized-Interferometric Fiber Optic Gyro. 8 X4 H1 V& w4 f, q0 y& v# c. ~D-Level Depot Level (ILS term). ; X! @2 B2 _, D$ @( N& ~ N, g0 x: tD/A Digital-to-Analog4 f3 @* e4 b( A D/V Demonstration and Validation." ~1 V6 ^ U* D1 Y D2 Projective (interceptor) in the Hyper-Velocity Gun program.$ J4 m' `) J1 w9 d1 P8 K r9 h DA (1) Department of the Army. , ]8 q1 U5 b$ S. l(2) Department of Administration. ) R( w3 a- s( K2 T* p5 B' k(3) Decision Analysis.+ H! {+ p0 ` H$ c! f* S& I \ (4) Developing Agency/Activity. @4 o% Q8 P/ z3 l3 E (5) Data Administrator.3 N+ ]/ h% c1 x7 v5 ]) h+ ?, M (6) Direct Action." d& P2 o: ?7 g- u. W (7) Data Adapter.. e# v! B4 g! V2 M6 s* u DAA Designated Approval Authority (DD 5000 term).0 D3 d$ o- V3 X, M2 Z& r+ I DAASAT Direct Ascent Anti-Satellite. O: ^3 \8 x* @0 O1 Y* ^DAB See Defense Acquisition Board.7 n) w. U% v) T- | DAC (1) Days After Contract [Award].9 r7 o$ Y$ G! h. F, @; @7 M! a# f (2) Department of the Army Civilian.+ i2 ^" k( E, C$ b/ t% L (3) Directed Attack Characterization. 1 f9 J0 _) a, _$ |: j3 X% t(4) Deploy ACCS Component. & {( X2 Y# y& M" C" C, H(5) Digital-to-Analog Converter./ K; d( x9 W0 p, m: @. e% j1 V DACS Divert and Attitude Control System. % G! X% w/ r' ?7 A; z/ rDAD Defense Acquisition Deskbook.! Z& u, h) C. |; T$ U DADS Distributed Air Defense Study (1993). ( b8 A& b; \% U, u6 y+ DDAE Defense Acquisition Executive. 9 V3 }0 V6 k7 r. E( L6 jDAES Defense Acquisition Executive Summary. # }$ b1 k. g$ i# cDAGGR Depressed Altitude Guided Gun Round. 8 b& z0 p# c4 `" y7 l6 Z. DDAHQ Department of the Army Headquarters./ _ b- ^2 F: t! z8 P; M, {. B' \ DAI Damage Assessment Indicator (targets).; p1 F# g6 q- X) H DAL Defended Asset List. & ] p7 l+ ?6 X, n. vMDA GLOSSARY, VER. 4.0 D2 J5 _" s1 L2 D/ t! @) L 72 3 t( D# L1 y" f& ZDAMA Demand Assigned Multiple Access. + L, X/ p4 S: `, V HDANASAT Direct Ascent Nuclear Anti-Satellite. ( |0 S- h1 C2 ~$ L6 VDAPR Director’s Annual Program Review (SDIO term)( X& G$ y1 R, k, D4 c0 }: W DARO Defense Aeronautical Reconnaissance Office (OSD).4 _" p$ m3 u1 @2 [" s DARP Defense Aeronautical Reconnaissance Program. 9 E: s. \/ v) ] Y0 H$ iDARPA Defense Advanced Research Projects Agency. See ARPA.- R3 E2 c3 a x DART OBSOLETE. Defense Acquisition Review Team.* O. s. |9 ]) B/ c- | r H- ? DASA German Aerospace. Member of the MEADS Program Team. N& E6 n- ~3 H$ Z/ X8 DDASC Deep Air Support Center (JFACC term).. E2 m; t! w$ t( w& y1 c; Q2 `# R DASD OBSOLETE. Deputy Assistant Secretary of Defense. + L% I" R1 D+ M+ g& ^# wDASD (C3) Deputy/Assistant Secretary of Defense (C3) # o/ ?% o+ K* u, b! y/ MDASO Demonstration and Shakedown Operation. # \1 l" I* s. P3 x6 AData Integrity The state that exists when computerized data is the same as that in the source0 O) M* M3 V$ Z+ f( J documents and has not been exposed to accidental or malicious alteration or ; J2 U3 ]) Y; t3 \8 o- A. vdestruction. : B. v9 H' u$ O @" v( g4 MDatalink (1) The means of connecting one location to another for the purpose of ! O. Y/ F$ B8 i+ f) htransmitting and receiving data.+ Q1 w% m2 r ]& j+ w2 s5 c, [ (2) A particular path between two nodes over which data is transmitted. It 4 E1 ~, B b8 Tincludes not only the transmission medium, but also digital to analog; A: a. U; ?/ _% ?% f+ A5 d converters, modems, transmission equipment, antennas, etc., associated! b. z' A: o6 i+ K- _ U with this path. In the SDS backbone network, it was a path between two0 g4 _% [9 a$ V. P$ m SDS elements. In space these datalinks were microwave or laser. On ; }9 y* E1 T" f& gthe ground, they could have been wire line, microwave, or optical fiber. $ [& D- G3 b" q9 w3 A* HDAU Defense Acquisition University, Ft. Belvoir, VA.8 k; |, `3 e: K1 I& C DAVID Development of Advanced Very long wavelength Infrared Detector (USAF ; s( s5 H& x6 r) yPhillips Lab term). 9 |! J4 L" z1 P% ]DAWS Defense Automated Warning System.1 \0 l% T0 Z+ W& U. V N: p& Z6 c8 J Dazzling The temporary blinding of a sensor by overloading it with an intense signal of 9 b9 t: v# y( ?electromagnetic radiation (e.g., from a laser or a nuclear explosion). + q' f5 a5 j4 |& L# [4 aDB Bata Base4 A' L( H d c DBME Database Management Environment (Computer term). $ X4 Z, O2 C, ~DBMS Database Management System.% f( C. |. N, F, Z+ G/ o* U3 k DBOF Defense Business Operations Fund.) z0 a. s3 I1 Y3 p# v1 ] DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D 3 ~5 ~; k h% t+ O1 {3 k: t73' O& N+ L% w9 v% b. T" w Dbsm Decibels per square meter. 6 ^& t) j0 `& f& u1 E+ s) }. P# HDBSM Database System Management.; v3 b6 o' X& U9 G$ E7 \4 X DC (1) Disarmament Commission. (2) Direct Current.8 ^+ _* l1 ?6 k DC-X Delta Clipper Experiment. , h8 l1 O7 @: L% B6 Y }3 gDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications$ {; y P3 Z; s) z3 Y0 @ Agency. (Now known as Defense Information Systems Agency (DISA)). & T+ g2 M8 _& n: ^DCAA Defense Contract Audit Agency.) f3 z. T4 P% E, ?) b: Y( U4 E DCAS Defense Contract Administrative Services. / e6 P4 |2 u# C, j3 d, iDCCO Defense Commercial Communications Office (of DISA). 2 y; Y1 v. R8 C C2 x! e" SDCDS Distributed Computer Design/Development System. 8 _' i" N8 E; m& w# D VDCE (1) Data Communications Equipment (TelComm/Computer term).( p# _& G5 L! |) c2 ? (2) Distributed Computer Environment. " k" X% q0 A' C ?/ P! DDCEC Defense Communications Electronics Command. ) h0 [ q! v- f0 s9 ODCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. 1 p; O9 e. O: o% aDCINC Deputy Commander-in-Chief. & ?1 u( X3 v5 R, {( S! ] ~" IDCM Defensive Counter Measures.9 O5 ]% t, \) V2 _! i1 N: ? DCMC Defense Contract Management Command ( m8 B# b9 C) a# ?DCN Document Change Notice. " [2 h( ]% Z& XDCO Director of Combat Operations (JFACC term). - G. D: j2 L$ M1 D& oDCP (1) Decision Coordination Paper (see ADM).2 ^+ M. }' \; ~8 Z (2) Director of Combat Plans (JFACC term). . B" N! y% j& H, wDCPG Digital Clock Pulse Generator. % g. ]. K) }4 D7 h' h! ~; U7 M7 wDCS Deputy Chief of Staff." T e6 G0 m x9 U DCSOPS Deputy Chief of Staff for Operations and Plans (Army). 6 ^0 s& ?) z7 x% ` YDCT Digital Communications Terminal- }. C( G# P1 f$ s, X2 Z; F0 p% w4 d DCTN Defense Commercial Telecommunications Network. v. y0 r, x* S+ {* r& l* r5 O" Q- VDD Variation of DoD.. U7 l0 i8 z+ |+ Y* ~; U3 ^ DDCI Deputy Director of Central Intelligence.- N- l( a! `! Y. |) a& {4 Y9 T DDEL Dwight David Eisenhower Library, Abilene, KN (army term)." z% g* Y/ p6 r r+ p: G# I$ O5 z% ] DDG USN guided missile destroyer.' V- U, |8 i8 @5 ? MDA GLOSSARY, VER. 4.0 D5 d2 ^: H( x1 i5 ~$ ]0 l u% V 74 . L+ @+ N3 J% ?; q& XDDL Disclosure authority letter. # v2 S+ i' y0 e$ bDDN Defense Data Network." f8 S$ X) E0 T8 t& b$ Z DDR&E Director, Defense Research and Engineering.) Y. r8 p9 K. ~; z) n0 f DDDR&E Deputy Director, Defense Research and Engineering. / j8 y5 v% E$ h0 NDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).1 f; Z' Q* b; w7 G& F DE (1) See Directed Energy. (2) Delay Equalizer. ! Y* G; k( B1 KDEBRA Debris, Radiance Model.( G7 q2 x% g8 u. V0 u Decentralized 8 `6 _2 I: n! \+ F' OControl; `7 X2 ?( M7 V: d6 ]$ a In air defense, the normal mode whereby a higher echelon monitors unit actions, 2 i4 {+ |3 A+ {- w/ c* w; Q. X" u$ Emaking direct target assignments to units only when necessary to ensure proper O, N" V9 l! D' Z/ I( f fire distribution or to prevent engagement of friendly aircraft. $ l6 k- i0 |8 t# Y" e" dDecentralized: j; x5 G7 U$ @( o Execution$ D5 A; ~2 M) F# R, P2 v* E, ` The distributed and integrated implementation of USCINCSPACE direction by . A' a6 X u2 ]the BMD forces. (AFSPACECOM)4 j4 H2 Q/ [5 L. j( y3 X D Decommissionin / y% [" P- V5 w6 Kg% o- p/ \9 u9 Y, e. b! h The removal or the rendering useless of obsolete or no longer needed$ X, p* a% ]0 o+ B8 P, C components of the BMD system from service. $ H1 n1 G9 @% v& G% o: @6 SDecrement A directed funding level reduction for an acquisition program. / |# U; M4 F" O) TDED Data Element Definition (Computer term)." x3 Q3 ]; U; D+ e0 T4 w% i Dedicated Mode- u& @/ e6 ~2 c9 |& ^1 q of Operation & ]9 N' R' {5 v) m5 z: S(ADP Security)* F0 n" c) X! j% n. }) R) A7 R. y A mode of operation where all users of the AIS possess the required personnel H+ L" g' l9 f7 i1 o6 }) @security clearance or authorization, formal access approval (if required), and a/ h& e% d1 [# i. y: r2 @ Need-to-Know for all data included in the AIS., E: b! w% c0 f Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about: U& {% ~/ w0 {+ z$ l: e 5,600 kilometers) above the earth’s surface. 7 L6 a1 @" T( ]& uDef Definition.+ q) B( C4 Q8 e' o5 @+ J8 y; Z: N8 e0 Z$ V DEF (1) Defense. (2) Demilitarization Enterprise Fund. 5 X$ a" _ T6 J1 j; tDEFCON Defense Readiness Conditions. 3 t! r5 R8 C, X& \% u4 jDefended area / n- H9 ~* x" j* D, ~5 _1 Rcoverage : p; F% m7 [6 R# W6 UDefended Asset0 X' M7 ^8 j5 Y+ ]( ], J List (DAL)( e0 c5 i2 L" m The geographical region that the BMDS can protect from ballistic missile attacks4 Q$ x, q5 r8 E% l8 Y/ S with a specified level of probability of negation. May be specified for a particular! Q, j, Z/ E2 T& ~( n. j+ A threat type, launch point(s), launch regions, raid size, etc.3 N' M. K" U! }: \& C- t! h A ranked listing of facilities, forces, and national political items that require 9 B0 z( i2 R: C. G$ \protection from attack or hostile surveillance. The list is compiled from Federal8 y2 L2 u; k' P6 {/ a( J departments and agencies, Unified and Specified Commands, and the Armed+ @, t, G) }4 n- Y! u' _9 x- e Services to ensure National Security Emergency Preparedness functions.0 ~3 `1 ~2 z7 B: a MDA GLOSSARY, VER. 4.0 D 0 S+ A. {! _( P; ^75# ]% M) J( o4 f- X1 X Defense# |( N( U2 F' B+ z) M) x7 m Acquisition 2 @% x7 y& ?) h) h+ m5 mBoard (DAB)8 Q* T9 U3 a( u. x b The senior DoD acquisition review board chaired by the Under Secretary of ) l+ t3 T4 w9 |1 x; kDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the4 B! f+ Y+ k" i, m Vice-Chair. Other members of the Board are the Deputy Under Secretary of " _5 k R9 ]+ U# [1 q; F$ ?Defense for Acquisition and Technology, Service Acquisition Executives of the4 r7 H e, C- V" \7 d Army, Navy, and Air Force; the Director of Defense Research and Engineering; 3 `) Q& e% G2 l0 ]3 X$ v; h3 z. ythe Assistant Secretary of Defense for Program Analysis and Evaluation; the ! \* ]3 E3 b X- H+ d; g# aComptroller of the Department of Defense; the Director of Operational Test and' m) ~/ X- [" c; s Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the) w2 y$ m* S- X7 z3 w Defense Acquisition Board Executive Secretary. Other persons may attend at C; e; r/ r$ ?8 k' Z1 r. F the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition- h; Q+ B5 z- X3 t5 {/ u Board.”)# g; s- T; R# N: u5 A4 D5 i Defense9 o& l) }2 Y, n& @ Acquisition . H }* e0 r- g' m+ X# m6 KBoard Committee ! m& L0 Z4 b& CAdvisory review groups subordinate to the Defense Acquisition Board. The( T6 H% e3 j; Z) M( Z/ R Under Secretary of Defense for Acquisition determines the number of8 h# a6 S e& F2 E6 Q7 D! U Committees. The purpose of the Committee is to review DoD Component 9 a+ K+ L+ b1 o- hprograms prior to a Defense Acquisition Board review in order to make an $ U* c; f7 L2 ?9 c) @4 R3 Sindependent assessment and recommendation to the Board regarding the: j: P' T$ ?; _) D! _ program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense 3 [2 P9 C5 P, s: |Acquisition ' O: J8 J- W% k5 v& lExecutive (DAE), C" P; T: I; P. T" P0 w. N The principal advisor to the Secretary of Defense on all matters pertaining to the 2 h2 M6 Y1 i, X+ eDepartment of Defense Acquisition System. The USD (A) is the DAE and the * n8 t7 t8 _0 |2 [* I. jDefense Procurement Executive (DoD Directive 5134.1). ; S6 ]# \" r$ P" NDefense: R: L# Q; P, l; A% b" L Acquisition - }# W: O8 T; @% ]+ t0 @( \& MExecutive 9 M' U% |- a/ E* ESummary (DAES) " R& ]6 [' {; N+ qThe DAE’s principal mechanism for tracking programs between milestone) r! X/ d% Z7 ?4 d- L5 j reviews. Includes programs subject to the Selected Acquisition Report (SAR), $ A7 g9 k: S ~# yand any non-SAR programs subject to review by the Defense Acquisition Board. 6 L7 r8 m. i% ~Defense2 B, o( n; S% [; K Employment' }7 l5 w7 t! A( I( V! N Option (DEO) & z6 k& N- [5 i7 i/ ^7 C w) rEngagement strategy provided to USSPACECOM component forces to achieve: U! m, c/ }7 G/ c2 Q( J% W t! ] specific military objectives against a ballistic missile attack. It defines hostile, ]) W2 K7 u! }6 b5 | target priorities, provides assets to defend, and allocates SDS resources to be 7 ^! M% c& i/ Y, C% m5 G# Demployed. A number of DEOs may reside in a particular Preplanned Response" V" ~6 `" X* x- g) U8 i, a4 I Option (PRO). However, default DEOs (those believed to be best suited to ! {" p; ^+ m$ d( Y3 Y, @counter the threat initially) will be automatically processed and executed when ' E( H8 }& [. q! R) uDefense Activation Authority (DAA) is given by USCINCSPACE. 9 c6 D. M3 `- NDefense 3 W& I2 }9 n1 r* F E" _& {Enterprise ' ^9 [2 s0 ]0 UProgram (DEP)3 i! M: w. x2 k' \, L2 O An Acquisition program designed to streamline the acquisition process by waiver 7 G2 }% Q% ?# ]; h8 Q9 |of selected regulatory requirements. 5 y# W$ z. _# m6 l! l# xDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb1 n- d! C9 c `4 l and progressively weaken an attack, prevent initial observations of the entire ! @7 H9 G& p3 i3 j. y0 w7 Y5 G- nposition by the enemy, and allow the commander to maneuver his reserve. * k' d! }9 S( O, v( R7 L/ H& I. NDefense . H( o6 N9 q( j7 s# HMeteorological ' Y, o5 f& Z: ^& iSatellite Program 1 v* ^' ~5 I1 Q(DMSP) 3 } n6 A) T1 A1 A! X. wSatellites designed to meet unique military requirements for weather information. - l. }# P+ U8 D6 ^3 xUsed to detect and observe developing cloud patterns and follow existing6 x2 w# M+ y% ^ weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.) j5 J4 }0 s, K4 | Defense Planning . `- k7 [4 k) b: [$ uand Resources# i! k3 N U! l% P8 @ f Board (DPRB) / r0 T# Q+ O2 `A board, chaired by the Deputy Secretary of Defense, established to facilitate- l" U4 q/ c. q decision making during all phases of the planning, programming, and budgeting5 k# `" P7 @+ K system process. Board members include the Secretaries of the Military. G# R0 ~1 ^+ q7 l* C Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of: S0 S. }8 I4 ~+ t" l; r Defense for Acquisition and Technology, and Policy, the Assistant Secretary of ' H( Y% \. j- D8 B8 L5 ]8 JDefense for Program Analysis and Evaluation, and the Comptroller of the: Z! i" \- U# k Department of Defense. 0 {: G, t& s( K; |: v( a. m" jMDA GLOSSARY, VER. 4.0 D! q4 S; l& l: @9 E# e" b 769 J. ?4 a4 ?# N( n3 N: l Defense Planning 5 [. J2 u) Z. \ b1 G: T1 GGuidance (DPG)1 L. A. I3 e/ K, t5 U2 [ Document issued by SECDEF to DoD components providing strategic framework , i. { F0 S9 }& sfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, 4 w, O" F- a5 ^$ h+ Q* h: |and Services. In connection with two-year budget process, DPG is issued every + K0 E3 R; A8 D { yother (even) year.5 {/ R: b' _4 U. Q- k( w/ M0 z, j0 S% n Defense Priority 9 T+ s& z c6 j( _and Allocation. d% M |* t9 p! y* q9 U, Q System (DPAS) 7 ^) S* G+ h, M' vThe implementation of a statutory requirement where contracts in support of! D9 M7 N) N; J- d( z8 Q: Q5 L national defense must be accepted and performed on a priority basis over all4 r* p$ J* A. M, g other contracts, and which requires the allocation of materials and facilities in, ]* J# X- m, s# J) X/ F- y9 @ such a manner as to promote the national defense. See “DO” and “DX.” : Z1 M6 m N% J% Z- M' Y" oDefense: F2 E) Y' e2 d- {$ L4 q# }$ d* b Readiness2 K, \3 Z' N- ] x+ I3 H Conditions : @* I8 C: o1 p(DEFCON) j# ]) @0 e- K" K1 _A uniform system of progressive alert postures for use between the Chairman of+ `. ~/ }; `2 k the Joint Chiefs of Staff and the commanders of unified and specified commands " ?& m5 b5 E% C/ dand for use by the Services. Defense readiness conditions are graduated to 4 ~3 K! g8 X0 ?/ w! Nmatch situations of varying military severity (status of alert). Defense Readiness2 y! n) ^4 q+ B) n) h9 |) F Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as 9 i8 d+ m' S/ q( q* e' s6 Fappropriate.& z8 _& P3 X- T3 { Defense Satellite" {* @7 v2 Q' M4 G Communications # l. q/ ?/ Z/ V9 DSystems (DSCS)! q3 h9 V, h/ ]8 c Advanced communications satellites in synchronous orbit around the earth. : s9 Z$ H7 X9 ^& A4 b+ IProvides high-capacity, super high-frequency (SHF) secure voice and data links 6 B( A+ a; _) N6 {' z& t0 Afor the Worldwide Military Command and Control System (WWMCCS). They2 ^' ]# M9 @' M1 @. }. [ support terminal deployments for contingencies; restoration of disrupted service + L8 T2 a c- t3 D. Goverseas; presidential travel; global connectivity for the Diplomatic 7 z6 |) S$ l* u( _2 u4 L3 BTelecommunications Services; and transmission to the continental United States: x( @* \% k7 f1 ?: j Y, `. g of some surveillance, intelligence, and early warning data.. B3 Z# k2 ^; O @8 e Defense Satellite 0 s, B1 Z/ i0 O; C" C5 x6 O% Z(DSAT) Weapon( i. {6 I& b& B: k$ c3 t1 y, T A device that is intended to defend satellites by destroying attacking ASAT 9 I2 o8 P x9 x, k+ s6 f5 w4 Lweapons.4 G1 j. A5 m0 v( S- Z' {4 ? I Defense Support 3 L" L& l; K6 Y$ }Program (DSP)5 ~) R2 Q4 g4 c% v2 B$ R A system of satellites in geo-stationary orbits, fixed and mobile ground# h3 h9 ~ u) t8 {' W processing stations, one multi-purpose facility, and a ground communications b* q( C. t6 w9 s network (GCN). DSP’s primary mission is to provide tactical warning and limited* `0 w( J8 s ^ attack assessment of a ballistic missile attack. ) D* s+ J; S5 y& J% HDefense , k |! G, {$ x# J2 LSuppression: X; N8 I2 z, u( Q0 l Temporary or transient degradation of the performance of a defensive system- E3 a) ?- t& `0 L/ d; F, T' } below the level needed to fulfill its mission objectives, by an opposing force. 2 z t) D6 d9 L5 T(USSPACECOM)$ U1 i7 F" G, g# H; ] Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic " a! S+ [1 k6 S d0 e6 C" j! B( r& ]missile trajectory; i.e., boost, post-boost, midcourse, and terminal.- {4 K! o* T+ }* e& q Defensive; L, `. [& ^3 O i7 G% ` Counter 4 J, H2 H( G% T* E& I2 a" EMeasures (DCM)$ y. ^9 j* c# k+ U Actions taken to eliminate an ASAT attack. 8 W0 l" M/ G3 tDefensive+ X8 j+ j& t- q, Z Technologies & A+ Y: v0 Y% p/ j- @Study Team4 w( U) A) X. {0 B& y$ D% p8 J (DTST)* W" ^" L# v6 s& j4 o$ _ A committee, generally known as the “Fletcher Panel” after its Chairman," H$ a# T. J( t5 n appointed by (former) President Reagan to investigate the technologies of R. J" |- @8 Q0 P, K. lpotential BMD systems.8 V0 Y# ~+ D9 ^+ P) X9 F DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. ( k" |( {$ h* `4 r. v8 d' e+ \* R2 `DEIS Defense Enterprise Integration Services (ex-DTIS).1 H t/ B( F0 _5 |1 R" C DEL Delivery. " I4 V6 y- y+ Z7 N& YDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion ( ^, n% t' J6 P' Vof shots about the aiming point. See also Circular Error Probable. ) o! Y1 Q# s$ i! X1 y% iMDA GLOSSARY, VER. 4.0 D 9 |3 G, `# P2 T& z8 K6 a77. O% e! T6 o* \$ }- n+ q3 T, X: ? Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the% |' V! O( e3 ^6 d maximum change in velocity, which a spacecraft could achieve in the absence of' J5 t% J5 M3 s. X& |6 l* |- B a gravitational field.+ _5 w4 h6 ^+ Y" b5 S' y Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).# S* l: h6 H! ~1 o3 K( s: s; N" y Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its! O9 V' Q# ~& L' Z& U8 ? desired function (matching RV characteristics, screening RV, etc.) , {1 u! w# K+ D# LDEMO Demonstration. 6 u) l* o, D3 y( S- LDemonstration 3 f0 i" ~& l5 P2 ?* }6 X6 A8 Land Validation% t" I ]6 g( G+ h* u% s (Dem/Val) 7 A+ D q% d! g; KThe acquisition phase when major program characteristics and product designs$ L' C; d; p4 V6 F( G- r; K are refined through extensive study and analysis, hardware development, test,7 T q/ u! ~ T and evaluations. The objective is to validate the choice of alternatives and to/ C3 \) U/ s6 S b provide the basis for determining whether or not to proceed into Engineering and0 F* K3 N, [9 n, `! S0 d Manufacturing Development (EMD).5 i% K: b! A" T2 A6 j Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.6 P- A- F, P& h It may include destruction, removal, contamination, or erection of obstructions.& B6 h$ E0 O. S5 \( b8 F DEO Defense Employment Option.6 y3 U) w9 q9 j4 @) d$ R Department of ) V/ z# i% a+ s1 `: d4 HDefense 6 i, W& a& [! y; q4 F2 K3 pAcquisition5 V3 [ H. `. Y# Y2 q" p System1 V" k8 L& ?& c, { A single uniform system whereby all equipment, facilities, and services are , K/ J# ]5 ^( C+ e0 _9 m8 tplanned, designed, developed, acquired, maintained, and disposed of within the# s& a- `8 y% O" x Department of Defense. The system encompasses establishing and enforcing $ q/ o9 z; c( {policies and practices that govern acquisitions, to include documenting mission : ^+ h; K' }* K1 |needs and establishing performance goals and baselines; determining and7 A/ ~4 w) J' t& i prioritizing resource requirements for acquisition programs; planning and 8 {' @$ b/ U0 A) ]) f' p+ xexecuting acquisition programs; directing and controlling the acquisition review4 F. p F. w# d5 k process; developing and assessing logistics implications; contracting; monitoring 5 C/ M! J0 K0 Ithe execution status of approved programs; and reporting to Congress. (See6 B3 d" }+ H) c2 h9 ` DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)0 Z s6 O. w G# F. K$ O Deployment (1) The placement of force elements in battle positions to obtain a higher ! n8 r; |3 y( Cstate of readiness. , K2 A' t! f) `5 h0 h(2) The movement required to place force elements in battle positions. ! e. } A4 ?9 K) ^ m(3) Fielding the weapons system by placing it into operational use with units6 F9 c& m# T5 G: q" P2 }6 \: `8 y3 B+ W in the field/fleet. / |( e% x1 j. H(4) To arrange, place, or move strategically. 8 k. n5 [4 ~# ^7 c! h- ^% EDeployment 2 n' _$ j* x: yPlanning ! q( V2 @% M% h2 U7 S(1) The development and maintenance of plans required to initially deploy, & |4 ^/ X" H/ K; V$ V" G: Zmaintain, and evolve the operational system in accordance with9 N* Y! p r" _ schedules and priorities. It includes factors such as launch facility 9 C# ~" i4 g, L3 B" [availability and planning for the availability of other required elements" o# I9 u6 f4 v- L9 l such as trained personnel or units. In addition, it identifies the impact of % a2 V! p* e3 q5 L$ n* f8 C6 Mdeployment on operational readiness and any testing constraints / [4 R3 y6 Z' l, D+ m* h1 @3 u6 yassociated with deployment. U! v9 K% U/ h7 S1 Z(2) Encompasses all activities from origin or home station through , F, `( a0 U vdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding5 C3 d, {, W1 L/ @ areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment. D& c. G7 `8 s5 m! t* n Testing$ s9 O# z6 x) Z; g9 f+ X7 M B The testing and/or simulation of system assets in the physical and operational2 c8 H/ b3 D. N: l+ h environment in which they are expected to perform. * O2 a* E' Y% f4 p8 M9 VDepOpsDep Service Deputy Operations Deputies.6 s6 o1 |/ L; ^( `8 p2 f2 i1 [% k# E MDA GLOSSARY, VER. 4.0 D5 k+ }7 ?; H. A4 z& S 78- n7 N$ \' o9 U Depressed* I4 o( J! f& B* ] Trajectory ( U) C3 z* I/ B rTrajectory with an apogee below that of the minimum-energy trajectory. ; u8 p! f' k, X& A! r, q( cDEPSCoR Defense Experimental Program to Stimulate Competitive Research.. W% t) X4 e: @% d8 }, L DEPSECDEF Deputy Secretary of Defense. 3 j8 c7 R4 d( `6 P6 XDeSecState Deputy Secretary of State. t6 R2 }: {# a. H* NDERA Defense Evaluation and Research Agency. Consolidated research and ' ?* r# p; D2 S3 E* Qdevelopment resources of the U.K. Ministry Defence. Headquartered in & i5 U4 J7 H7 A! ^$ c- cFarnborough, England.+ M0 }; Z' \" W5 v. y7 ? Derivative* p$ `9 N E, B O5 }& P' e Classification ! u$ e6 B# D/ D) A3 q5 i. dA determination that information is in substance the same as information : T7 l1 w' d2 I! y! vcurrently classified and the application of the same classification marking.& p; g3 e! u; W3 y6 u( A DES Data Encryption Standard. ( C% Q- z- z& Q0 ]/ `DESC Defense Electronics Supply Center (DLA term).& J( g* h* @6 w& A$ O Design - {( S9 v# P# x' yConstraints! R; o8 c0 [" f( | Boundary conditions within which the developer must remain while allocating. d7 Z( s! c8 F0 F( ` performance requirements and/or synthesizing system elements. r( ~$ s! s* h) d6 X1 YDesign9 P, M d6 _! @9 i6 R: o7 G" G8 V Parameters2 ]6 A# E8 n" Q: \% j- Q( k) | Qualitative, quantitative, physical, and functional value characteristics that are $ f; B* {: h3 L7 f0 `1 @$ a% [inputs to the design process, for use in design tradeoffs, risk analyses, and , b( X. [) ?- `( C/ Pdevelopment of a system that is responsive to system requirements. . q6 }7 v/ }6 W+ ^4 h; C; BDesign Phase A period of time in the software life cycle during which the designs for% Z+ _4 T B* E( \. f architecture, software components, interfaces, and data are created,# {( l& X3 W* k6 W4 g+ D6 C documented, and verified to satisfy requirements. 1 }9 a0 U& ~" @) u: TDesign-to-Cost) t' Y' h' _8 M* `7 F p3 s7 P3 T (DTC) Goal ! A' n+ L$ L4 {1 f( `; RManagement concept wherein rigorous cost goals are established during ' V7 f* c: ^* z. k& \% Qdevelopment, and the control of systems costs (acquisition, operating, and g- d( P5 W# w/ M6 R! X% [support) to these goals is achieved by practical tradeoffs between operational$ s ^, ?* u9 o' P a/ v capability, performance, costs, and schedule. Cost, as a key design parameter, $ P3 Y7 x4 d2 @& M W2 iis addressed on a continuing basis and as an inherent part of the development 6 E! J6 N# Y: S" n) }8 Eand production process. A DTC goal should be in the form of average unit1 h7 U3 {7 ?! X0 V- Z flyaway cost. Also, DTC parameters for operation and support will be3 X) V, }7 u" W6 ^7 [ selected—parameters that are design-controllable, significantly affect O&S costs, / P' ~& c: s5 u; R7 {and can be measured during test and evaluation. Parameters may be / H% ]& m3 t- f( ]expressed in dollars or by other measurable factors, e.g., manpower, reliability, or3 r8 \' x* ~9 |# F( i, h1 S" G maintainability. Firm goals and thresholds will be established no later than entry 1 p& M/ T% P8 Y8 F$ |; finto EMD (Milestone II). This is an in-house goal, almost contractual in nature, * u2 `0 t- O4 \: X" z. k* ]6 Bbetween the PM (Service) and the SECDEF. Allocations from this goal will7 l) x) {3 W [ become the contractual DTC goals for contractors supporting the program. ; e. A8 h1 M$ U$ o% X! X" ODet Detachment. # R7 e' Z2 i; kDETEC Defense Technology Evaluation Code. 8 G: C5 B5 c6 Q7 fDetector A passive IR, visible, UV detector turns photons into an electrical signal. The 0 u) Z4 E4 Y8 I* W3 ]IFOV of the detector is its solid angular sub-tense. There is sometimes 2 l- ]6 W" j" Y7 S" f$ p0 rconfusion between the detector sub-tense (size) and the pixel (picture element3 q8 p2 n3 o9 L2 y size). They are the same for a staring sensor, but in a scanner it depends on 4 H% W4 x4 f: A; R- [the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.2 T5 r5 j/ s8 j MDA GLOSSARY, VER. 4.0 D 3 P6 L8 k( h: G( M1 @: W79 6 I6 f$ o3 a3 S) @' l1 ]DEV ENV Development Environment.; I% M; B" i! q: f l' R, f Development3 G1 ^$ g, y' o! d Test (DT)1 Q9 r* M3 _/ Z% J: k' q! c5 S Test conducted by the development test organization to achieve specified test % b0 i0 X) L z9 mobjectives. It may be a complete test, a subtest, or a phase of a test. % g$ D% g. z: |; v6 qDevelopment3 f0 l s$ B% i0 `% n( [; f Test I (DT I)/ x- L- k8 H8 J2 m A series of tests conducted during the demonstration and validation phase.0 o2 A3 g+ o# N8 I- H- a# q Components, subsystems, or the total (or full) system are examined to determine: Z; ^5 j' L0 \& L, L whether the system is ready for EMD. State-of-the-art technology is addressed- K. w. i2 H; s' {+ k* C5 `+ _ in DT I. ) y- L3 t0 I0 ?) T0 |7 i% M+ E5 V. EDevelopment $ p/ j$ m; D( p! VTest II (DT II)3 |. i7 K% C- y+ c A series of tests, normally during EMD, which provide the technical data) I$ V q; w, P# g necessary to assess whether the system is ready for low-rate initial or full & p& P) v4 ^$ r( q! H# L$ Nproduction. It measures the technical performance and safety characteristics of * D L5 h; F. o, nthe item and evaluates its associated tools, test equipment, training package,- o$ B& q" l; B1 F and maintenance test package as described in the development plan. DT II # ~! ?. }4 A: ?5 U' R% N: g8 ~addresses accomplishment of engineering design goals and the fulfillment of& v& t- l- I7 t! Y4 W$ h$ H- m5 W! J+ W contract specifications. $ C0 y4 Y# R2 _. lDevelopment 6 G# Y& U; X, i0 R" M0 A3 {Test III (DT III)$ m( s, x* ~9 Y0 k3 \ Tests conducted during production.& Q2 t7 V) L- \" ?, j; s8 A- x Development' ^# F2 @0 |8 c7 Y' A: ] Test and( r5 h# I* f! g5 w; E3 q Evaluation& x# j) Q* F9 |3 Y (DT&E) 5 N& j a0 D2 u4 LTest and evaluation conducted to measure progress, usually of8 O! t5 ~, l" S; v3 X n. G component/subsystems, and the proofing of manufacturing processes and# T7 Z0 D$ R9 D/ w" _. ~ controls and to assist the engineering design and development process and 4 Q/ Y9 g' T2 Z+ Z* c& Overify attainment of technical performance specifications and objectives. Usually ! L4 i; Q% v" Econducted under controlled or laboratory conditions. Can be conducted before 1 Z" d/ @2 ]) t3 Sor after production begins.% d- ?, A7 G3 v3 I8 e$ q% F8 m2 ? Development, I" T' U6 X+ N+ N Test (DT)( M! \. s/ V* i: \ Test conducted by the development test organization to achieve specified test! D" u. v* o0 q/ g objectives. It may be a complete test, a subtest, or a phase of a test.' K; z6 S6 [" \# P Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,' A; z1 g% |# R* k0 u$ ^ schedule, or performance without authorization from the milestone decision 7 H) s, {5 v( f2 K5 z' G- mauthority. Acquisition Program Baseline (APB) thresholds represent these D1 _& o. h3 r& | parameters.# O. |8 O: @3 e w Devolution of: Z8 _6 s, z6 F- ] Command5 L4 _ h! ^5 X/ G" W8 |: K' j5 e Minimal essential operational capability to perform C2 provided in an orderly and 7 y' Y! l9 e0 k7 B4 W* E! btimely fashion to a duly authorized successor. 3 K5 ^' z" K* [" ]- XDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. 2 w0 N% U6 c8 t: y0 kDEW/D Directed Energy Weapon/Discrimination.4 S) K M' @$ n9 R2 l" [ DEWG, O Directed Energy Weapon Ground, Orbital7 v& [' G; K0 n$ J+ X/ k* j5 l4 I DEWL Directed Energy Weapon, Laser (thermal or impulse).: H4 y2 z3 ]) f4 q DEWP Directed Energy Weapon, Particle Beam (neutral or charged). : i3 M' Y) G$ ODF-KBS Data Fusion Knowledge Based System. / ]5 J: c" s3 B5 k |DF2 Deuterium Fluoride.0 V" C" ^* z3 a& M! N; ~ DFAR Defense Federal Acquisition Regulation. {( c: S/ V4 v* s" l2 ? DFARS Defense Federal Acquisition Regulation Supplement." i3 C$ u/ c1 N# z# N2 I: x MDA GLOSSARY, VER. 4.0 D 2 L0 a$ `3 _: ], t: D8 ^* [4 J9 M808 L/ c9 Y' k! _- o& y DFAS Defense Financing and Accounting Service.9 K+ |+ }4 w j) I DG OBSOLETE. Defense Guidance. See Defense Planning Guidance.2 Z3 S7 Q3 W2 J" ]9 M# E0 D DGA Director General of Armaments (France).2 B, X& W8 [" |& d" |0 j* r DGP Defense Group on Proliferation. 1 ~6 ~, K- s$ eDI (1) Data Item. (2) Developmental Item. + u/ f/ l6 D0 jDIA Defense Intelligence Agency. R6 v9 E. p% o S+ E DIAC Defense Intelligence Analysis Center. 2 p4 s; Z: k: P& y) d- q7 {2 `DIAM Defense Intelligence Agency Manual& h1 A& Q5 R* u! _ N! d+ K Diameter (Optics) The unit of measure of the light gathering power of a lens." z8 o' z5 v) G4 v- S: I( v' [# A2 I DICE Digital Integrated Combat Evaluator.* J; V6 Q# m% b+ D: q9 Y2 r DID Data Item Description. + T5 Q3 k& g, H( V( vDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The / y' @5 w' Y" Jangle of spread, which cannot be eliminated by focusing, is proportional to the0 K9 u" P, {, E% [ ratio of the wavelength of radiation to the diameter of the aperture.; S# v# L. f9 o' P Digital5 `' u. I3 u: U# {! x! M* Z Processing1 u5 N) N6 g- b+ T The most familiar type of computing, in which problems are solved through the 8 P1 t% r# D: f9 s# ]) Z9 G' cmathematical manipulation of streams of bits.% S$ V3 P# A. z, S( z. C/ m+ C- t DII Defense Information Infrastructure0 ?2 k& c4 m# \5 Y Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to4 A' h' y0 P1 x W" s 12 km) between wake termination and de-sheathing.6 |4 q) m i2 `$ q DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).; n0 y# o6 H4 a; a3 M0 E DIR Director. . u" d% u- _; I' C* IDirect Air/ Y1 U9 F* v% _# l! ^ Support Center" r0 T8 m8 N2 ^3 {+ m6 S+ n) }5 Y' a A subordinate operational component of a tactical air control system designed + g9 X' K _/ k7 P* v; kfor control and direction of close air support and other tactical air support ( }, j- m+ c2 |% E. [operations, and normally collocated with fire support coordination elements.; x% Z6 L. ?! _* g; c Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not & r7 O6 x% X- R$ p$ t; i2 Unecessarily limited to items that are incorporated into the end product as labor or8 \- M* G8 b. k0 f/ M material.' k3 U9 ^9 Q' R* X Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing' f. T) ^ ?% g$ Q direct labor includes fabrication, assembly, inspection and test for constructing . T& N; N* o& i: P( lthe end product. Engineering direct labor consists of engineering labor such as E1 |: z) f1 ^. M" v reliability, quality assurance, test, design, etc., that is readily identified with the ( m+ A: i6 ]0 f6 @- [! e9 B0 Iend product. ' S" i3 k# |5 X( |5 Z# C% i) n+ dDirected Energy , c+ X$ D+ C8 ^(DE); H3 T9 J% u2 |9 C2 O+ `* m 1. Energy in the form of atomic particles, pellets, or focused electromagnetic0 X: J( N; b$ m1 g8 g) H2 U0 l% ] beams that can be sent long distances at, or nearly at, the speed of: h+ S2 ]# u t. O- \: `. d light. : I- @6 B' O2 m2. An umbrella term covering technologies that relate to the production of a + o8 D) ~' j; a! abeam of concentrated electromagnetic energy or atomic or subatomic particles. % b; B: s) N$ ~$ y& gMDA GLOSSARY, VER. 4.0 D2 N1 [" l1 G6 w! x, ] 810 \; m) K5 J# C* ~ Directed Energy . L) [( R- H4 _$ s& j( CDevice+ G+ `0 A( A$ ^ A system using directed energy primarily for a purpose other than as a weapon. 2 x8 ^* Q) l* u8 h; B) A6 }& G' `Directed energy devices may produce effects that could allow the device to be 2 p" i5 v/ `( ^ x# Zused as a weapon against certain threats, for example, laser rangefinders.5 X( R# U q; p5 k! i Directed Energy8 U `% d: j' _& `2 o2 M Weapon (DEW)* f% R5 R6 K! c1 Y A system using directed energy primarily as a direct means to damage or destroy6 a1 p7 v, u0 r enemy equipment, facilities, and personnel.! a8 s5 a# L1 ^6 n DIRLAUTH Direct Liaison Authorized. 6 P2 b5 }! X% D/ iDIRNSA Director, National Security Agency. o; p8 j, T7 nDIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.5 m, K0 G& K, n$ C) g: U DISA Defense Information Systems Agency, Washington, DC. (Formerly known as. K3 n% P1 F$ C& I9 |% q- x Defense Communications Agency).$ B# i! c' b4 E* ~ DISCO Defense Industrial Security Clearance Office& \9 }* ^7 D. ^, ]* \6 @# B DISCOM Division Support Command (US Army term). 6 K2 L8 U. U4 ~4 B5 DDiscretionary0 j) Q0 ^: j' [7 C Judgment 3 r0 ~$ v! v k5 u/ l2 e( fThe authority given USCINCSPACE or his duly authorized representative to3 ^/ }( b& {2 z, ~ perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination4 G# c- G) y2 y0 b- S DISN Defense Information System Network (DISA term). # |% t! ]3 v* L& O7 ^4 u" oDISSP Defense-wide Information Systems Security Program. ( @" N) B4 _9 o. H S" ODISUM Daily Intelligence Summary (JFACC term). 1 F2 J* t! w8 Y0 _) Y' O; J5 gDITDS Defense Intelligence Threat Data System.: |; t c& |3 t0 C, X9 P( P DITP Discriminating Interceptor Technology Program. The objective of DITP is the; Q1 I& X5 C/ a9 y5 y development of advanced interceptor seekers to counter advanced threats.: M0 `! P. U; D) L: d4 Q1 j DITP will integrate passive and active sensors into an interceptor seeker that % d5 o; s3 j: f) C- L4 eintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP # }- _; D4 F0 u& E5 Z* b) y( w) _flight demonstrations will involve the tracking and interceptor on-board 1 C; p, ^) N& M4 K7 Q: r5 U, i8 sdiscrimination of targets of opportunity while providing fusion processor data 8 B" Q8 t o, y/ G1 M8 s) Qtelemetry. (See also ASTP). - X9 e7 j0 X& M3 a `& B% fDIVARTY Division Artillery (US Army term).( v! a: [* o7 F0 Z7 Q9 G) K DIW Defensive Information Warfare. 4 {; A/ X2 |9 C) ~. Q% YDLA Defense Logistics Agency, Alexandria, VA.) |, o& ~' `2 H DLSC Defense Logistics Services Center (Battle Creek, MI).: j% {% s& I+ }) a* _# K DM Data Management ' B7 B9 ?2 l- r2 X- DDMA Defense Mapping Agency, Fairfax, VA. 1 t5 A; v: c5 k& O! RDME Distributed Management Environment.# J3 {6 _' q5 Q) d8 ? DMI Dual-Mode Interceptor. ! h: ~" S' t- ~5 T, r& w" @MDA GLOSSARY, VER. 4.0 D , G- k5 J8 J$ _, O, x" _8 g: \( c82 . e; E) B7 _+ I, ]% eDMRD Defense Management Review Decision.7 S- ?& k5 X" X7 |/ j8 |) u4 M+ d* a1 m DMS (1) Defense Message System. 9 O& D6 b$ N1 r1 Q- ](2) Dissimilar Mission Simulator. : L6 m/ }" D" F5 }# YDMSO Defense Modeling and Simulation Office (OSD).- A/ ?2 {" {" F) s# G& L DMSP Defense Meteorological Satellite Program. 7 m4 |) |6 i" j5 J* pDMU Disk Memory Unit., L6 T \/ G( w w DNA Defense Nuclear Agency, Alexandria, VA.6 M3 a8 g' P: x% H* A DNMS Distributed Network Management System. 9 t. a. I0 M0 P/ eDNSIX DoDIIS Network Security Information Exchange" V0 Z" w. ~) }; S; F( C DNSO Defense Network Systems Organization., u( y! b* J2 u* c5 t DO The lowest rating under the DPAS. All “DO” orders take preference over unrated/ A% ?/ g& U: ]" c orders to meet a required delivery date.; w- `3 ]9 E: x8 c Doc Document$ u N1 _$ ?3 L: u DOCPREP Documentation Preparation. b* b) @ x- p2 C' s$ R! d Doctrine Fundamental principles by which the military forces or elements thereof guide4 q7 w( Z; I. Q2 b their actions in support of national objectives. It is authoritative but requires ; t3 X/ j, M7 m$ M/ H3 U" Ujudgment in the application. See also Combined Doctrine./ M) c* m- _7 H8 D DoD Department of Defense - c/ \. I: o. Z. d" A0 o& G6 K- A2 ADoD Component% c" @# U$ g; [1 G& Z9 R5 T Acquisition, ?) t; M& d# t Executive 1 a; F5 O3 l- C9 ^% l5 rA single official within a DoD Component who is responsible for all acquisition8 i L' ^+ L9 ?% O3 [ functions within that Component. This includes Service Acquisition Executives & @% h: e; K# \for the Military Departments and Acquisition Executives in other DoD1 J4 X# Q) V; o) \ Components who have acquisition management responsibilities. + x& k7 N* e2 D! Y" PDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, / \ S/ c2 ?& b& M' vJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the 5 h2 o) i; W& u: e3 N/ l& k# D9 UDefense Agencies; and DoD Field Activities./ s4 Z7 S' y; s! q9 X: J DoDD DoD Directive.5 W$ H# V+ o$ ] DoD Directive / n; O7 c4 E6 f+ {5000.1 * j( T- D: m: g; ?4 E& b$ W# q“Defense Acquisition.” The principal DoD directive on acquisition. It establishes 8 {2 D( T2 F) L, s' Kpolicies, practices and procedures of governing the acquisition of defense, ~7 ?! n8 B4 f7 {% N acquisition programs.( ^% q# a1 c4 f% G- V DoDI DoD Instruction.4 z* _# Q- C" h; f: ^, f. _( i DoD Instruction % ] h* H2 B. U; H5 E5 N$ B5000.27 i% m; e6 q4 |( A “Defense Acquisition Management Policies and Procedures.” Implements DODD3 y! V$ d4 Y+ [. N8 ]$ q1 d4 V r 5000.1.$ X6 g+ n$ l. u! N DoDIIS DoD Intelligence Information System.1 H1 }$ v7 g# [! ~0 H* S DoDISS DoD Index of Specifications and Standards. 2 Y9 k$ V% N* m9 ~' Z0 b; U# eDoD-M DoD Manual.' i) |) x3 }, M5 P MDA GLOSSARY, VER. 4.0 D # e4 E X& v M% }83! O& Z0 R8 h/ ^" w+ S6 x9 D DoDR Department of Defense Regulation. 0 g+ x" O9 J4 Q& g) BDOD-STD Department of Defense Standard. & \4 Z+ {$ T! F: h5 B* fDoE Department of Energy.- e/ t! M5 q) i6 _3 }4 B, k DOF Degrees of Freedom. ( l* O: A% ?9 j* |) [2 sDog House Large Soviet A-frame radar used as a component of the Moscow ABM system4 {; }7 q2 V# g9 _# {& I having a detection range of approximately 3000 km. It is believed to provide, l- D% A9 f4 M2 B( I8 m battle management for the totality of Moscow defenses.) D) I0 V/ w/ A5 @ W* X DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).# i* W/ O- t! ]- y( n; D5 T DOPAA Description of Proposed Actions and Alternative (environmental term). 0 n+ G1 [! X- E2 R; X6 ]Doppler Effect The phenomenon evidenced by the change in the observed frequency of a 8 X" y8 ?( z9 C( C# isound or radio wave caused by a time rate of change in the effective length of * M5 L, e5 w, {. X: Y& _- Jthe path of travel between the source and the point of observation. 5 L. C: D0 m1 N2 M$ V/ o8 h- \6 O* \DoS Department of State (US).8 w( s2 V( \3 x' h DOS Disk Operating System (TelComm/Computer term).$ O- z0 m7 H& l$ W DoT Department of Transportation [US]. * O w& p& g/ ?+ R( v- vDOT Designated Optical Tracker. 7 J% ~' t2 l% x, a! K7 GDOT&E Director, Operational Test & Evaluation., _ i) e. B- ~5 b3 q DOTH Defense of the Homeland. 4 y% j P0 m* F( s# ?Down Select To reduce the number of contractors working on a program by eliminating one or5 C/ \, j! C- y more for the next phase." G7 u* g) U3 D$ `* c. i, ?; R DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. , S3 z4 }! p6 N3 G+ I5 x+ }; W1 gDPA Defense Production Act. * q" r$ L$ c; EDPA&E Director, Program Analysis and Evaluation. ! V* l, j1 t7 c% n/ fDPAS Defense Priority and Allocation System.# H2 Q7 X2 K$ S% a; u2 i$ R' w DPAT Dynamic Program Analysis Tool. # W6 P) F1 v$ R" W, x" @DPB Defense Policy Board.# t2 `2 u6 ^$ @) x DPG Defense Planning Guidance. 1 H% ]0 Z& S: Y) xDPM Deputy Program Manager.' N, G" Q% ^/ k' `; f DPML Deputy Program Manager for Logistics 0 V: w# h1 ^0 aDPP Distributed and Parallel Processing (Computer term).0 }' ]' l2 T, D$ G' i& ] DPR Defense Performance Review. O% B- K- }( c9 }4 gMDA GLOSSARY, VER. 4.0 D ( m8 n3 x/ c4 j: M6 ^4 J! P84% P+ d# b' Y' \( ^; | DPRB See Defense Planning and Resources Board. 1 c; t) Q, K' n, e: Y- L. h. ?DPRK Democratic People’s Republic of Korea (North Korea).2 t4 s) B1 K6 ]7 Q DPRO Defense Plant Representatives Office.! u: X$ s$ o2 i) g4 l& e- n DPSSL Diode-Pumped Solid State Laser.% b5 f2 U8 G8 ^9 i* \. d" h DR Deployment Review. , N1 Y2 ~& m; XDRAM Dynamic Random Access Memory. ) m9 a) N2 s d2 a9 X' \& qDraw-down Curve A method used to encapsulate the overall performance of a BMD system that8 r7 j% v j( D7 I: |" @9 U7 a: W plots the probability of survival on the vertical axis versus the number of attacking ; s, d9 X# @% x6 jRVs on the horizontal axis. Used in conjunction with attack price, they are the 5 B1 S; q' G: M9 \8 Mmost important expressions of a BMD capability.& k- {5 J: K6 v/ H7 j/ }9 i q DRB Defense Resources Board.- q& H! l; ~- ^" J( c9 o DREN Defense Research and Engineering Network. 6 F7 C. i4 P; q2 [$ _) X4 v+ MDRFP Draft Request for Proposal.+ q$ `7 N3 {- F# N5 g. P Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from 1 r5 y, h5 r- ]: {+ `) @4 Y1 f* Rgravitational and atmospherically induced torques on the spinning projectile.( ^' D: C, z5 h5 _! R, `1 y+ L DRM DAB Readiness Meeting (DD 5000.2 term).& J+ v! x( m1 ?) F e: a Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also % r; S/ k: I1 v% jRemotely Piloted Vehicle. ) W: x" C% Z/ i' k; p& FDRP (1) Deployment Readiness Plan (US Army term)., f) e6 {& C0 ~2 T* {( k. F6 K7 T (2) Deployment Readiness Program. 2 r6 c( Z8 M4 n% P: a- p7 UDRR Digital Receiver Replacement (USN term).% `( y. }& R* x( G: o5 O DS Deep Space. 8 v$ i$ J9 }' y5 Y' fDS-1 Category of telecommunications circuit capability.0 l6 t9 \6 v3 J4 G DS-3 LAN Category of telecommunications circuit for a Local Area Network. # z+ A; {# D& l. }# H3 g6 h8 [/ SDSAA Defense Security Assistance Agency (OSD). - i4 y! E8 y [" qDSAT Defense Satellite Weapon.+ _' ]1 c% Q, j4 n% w/ e DSB Defense Science Board.+ M& T: W5 ~1 E- m. i DSCS Defense Satellite Communications Systems. ! H) Z" E& D& }7 e$ bDSCS-3 Defense Satellite Communications System Three.( e4 o% U5 q% k DSCSOC Defense Satellite Communications System Ops Center.8 W& j3 u/ a3 n% N- d2 R* } DSI Defense Simulation Internet I* c) ~# n0 h" h/ S7 H3 \ MDA GLOSSARY, VER. 4.0 D 1 k5 v4 a8 e; w2 ?" D! O853 G- i4 x% H. C: v4 o" i DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 5 F+ [4 S% V% L0 F2 S+ j# OSystem.8 H3 o2 M6 f: b+ ?5 [3 K DSM Decision Support Matrix & b g' O2 V5 _; V! i2 Z* k+ hDSMAC Digital Scene-Matching Area Correlation. 4 H) R+ j. i9 j) L9 p' ADSMC Defense Systems Management College. 9 @ i3 C6 }7 e: ]0 l+ X q4 yDSN (1) Defense Switched Network (formerly AUTOVON). 4 O; m1 U+ N* H* C$ e3 c' S(2) Deep Space Network (NASA term). 0 ]% l5 p1 L2 T/ |* FDSP (1) Defense Support Program. (2) Defense Standardization Program.6 r( J0 [$ b" j7 S DSPRTM Defense Support Program Real-Time Model.6 U! k5 e% T* Y, T* A. j. T! N; U DSR Data Set Ready (TelComm/Computer term). , L' j3 j# _ Z0 _7 y; E& V( GDSRCE Down Scooped Radio Control Equipment (TelComms term). - I' J3 V) E$ m' I8 bDSS (1) Defense Supply Service. (2) Digital Signature Standard." ^9 L5 `' n R7 | DST Defense Suppression Threat. * ^/ v( u+ R! l6 b! QDSTAR Defense Strategic and Tactical Array Reproducibility.+ O( s" y: F+ K7 Q DSTO Defence Science Technology Organization (Australia). $ K2 R( Z. G" z" VDSU Digital Service Unit (Telecomm/Computer term).7 `/ u: N/ n" O4 [- _1 W0 j DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to " v# y$ P4 T# J# e/ z. hthe DNA. ; E$ b& h2 s, s) T" W/ w& |+ j% L# a7 kDT (1) Discrimination Technique. 0 l+ ]1 o/ Y% K" t: F(2) Development Testing.+ l5 W ~" m1 n1 Q* b. j' s (3) See Development Test I, II, III. - O. R4 r* |0 w0 S(4) Down Time (ILS term). # d/ z* C& ^2 M(5) Depressed Trajectory.& R6 G7 }2 g6 n, ^ (6) Dedicated Target. + d* Q( X% p1 I% A3 CDT&E Development Test and Evaluation.( U4 Y4 Q5 c/ d8 ?) w& N DT/OA Development Test/Operational Assessment. ! M, O, F3 _0 ]DT/OT Developmental Test/Operational Test.+ \4 X* i9 L- h7 n$ d DTAP Defense Technology Area Plan.$ y; b5 l* X" l" Q! Q DTC Design-to-Cost.7 D/ l% u4 W5 S DTD Digital Transfer Device (TelComm/Computer term).1 {( N+ `* x7 {" q3 g9 z DTE Data Terminal Equipment (TelComm/Computer term).) l* K, `. w5 p2 I+ e3 D( h8 [5 ? DTED Digital Terrain Elevation Data.7 y' ^7 R5 R) Q2 V DTIC Defense Technical Information Center, Alexandria, VA.' e7 u9 q/ k9 @& r MDA GLOSSARY, VER. 4.0 D ' h' p; h: G; Z2 Y86- G8 V& o# `( ^) C8 ~ DTIS Defense Technical Information Services (now DEIS). , o( }% Y1 t2 d8 wDTLCC Design to Life-Cycle Cost. 1 `: A2 \: G( s/ {( O1 f. UDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL $ B4 J" E$ n- Q( ^/ J+ n/ aterm). 1 ?" O I ^; X: NDTLS Descriptive Top-Level Specification.% X9 K6 {( B) d2 D DTMF Data Tone Multiple Frequency (TelComm/Computer term).# H% E8 z) D! B% s( y DTO Defense Technology Objectives. ! D8 N7 f: ~6 k" ^DTOC Division Tactical Operations Center. 5 w1 q e# A/ k& J0 P5 IDTR (1) Demonstration Test Round. (2) Development Test Round. ! E9 M. W8 ]% ^2 c; M) X* {DTRM Dual Thrust Rocket Motor. ; Q6 G# T8 K wDTSA Defense Technology Security Administration. ) s/ \% c; `. }: wDTSE&E Director, Test Systems Engineering and Evaluation. , ?7 P7 w) u5 pDTST Defensive Technologies Study Team.' E( E8 b+ x/ q. I3 c4 ~ DTT Design-To Threat9 f# K$ \+ ^) w9 G! C' o DTWT Dual Traveling Wave Tube (Electronics Engineering term). 6 Q& T0 P/ b- C& YDU Depleted Uranium. ' |' c) |9 n5 z G- M( q# jDUA Design Upgrade Assessment. $ s" z3 n q3 t3 ^9 d LDual Source Two contractors producing the same components or end items for the same $ i: E* ^5 K! r/ _2 Q* Zprogram.9 d, |7 U n) w" v# o; [0 l- E DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). 9 [6 U# k$ r& C" `/ H% JDURIP Defense University Research Instrumentation Program.* w+ E" `# N6 Y! b O DUSD Deputy Under Secretary of Defense. |2 Z8 g. e) x$ {4 Q" Y3 CDUSD (ES) Deputy Under Secretary of Defense (Environmental Security).6 ~1 a' i% b1 U$ `' p DVAL Demonstration Validation.! d1 p0 R X( Q5 S w* {% |6 U DX The highest rating under the DPAS. It takes preference over all other rated and/ ^3 d, D, F+ F9 J! p0 `! [ not rated orders on a contractor’s production line. The BMD program carries a * k- Y7 t* m4 ?! r" \“DX” rating. , m" a! Z' ?9 s+ H/ o/ T# OMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 ) C6 w6 X0 w! [: c% O( ]E East # q/ [9 I, z+ z1 Z! BE2 I See Endo-Exoatmospheric Interceptor. # o. _9 B6 o& I0 E- B3 ^E2SRD Effectively Two-System Requirement Document.2 w3 {$ b8 X! E( U0 j" }. e% _1 i E3 (1) Electromagnetic Environmental Effects. 2 Z7 t$ ?2 w, k* Q# j(2) Electrical, Electronic, and Electromechanical. ! s) r3 @- ` K% Y; a( qE Spec Materiel Specification. $ r. A% _/ v* R; ?* rEA (1) Environmental Assessment.: j1 m: b, m9 g$ K (2) Engagement Authorization. 1 w r5 F( F/ }: r r(3) Executing Agent.( T" M7 @& \, O& g (4) Evolutionary Acquisition." v; C6 x6 i4 H4 y1 L (5) Environmental Analysis (environmental term)." i' m: A0 P' H7 [2 T (6) Executive Agent." C# e; D. @0 w EAC Estimated Cost at Completion. : ~7 |4 K; V8 u NEAD (1) Engineering Analysis and Design. (2) Extended air defense. - W8 I( q0 f. \5 I0 ~EAD/D Engineering, Analysis, Design and Development. ! J/ N* ^3 D& j* z( VEADSIM Extended Air Defense Simulation.% u/ U2 B2 J5 P. k; v4 [4 ? EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing& w; U3 Q) A4 R( @/ r# E users to model military response to airborne and ballistic missile threats./ W r( ?# Z. ^+ E* a EADTBP Extended Air Defense Test Bed Program. 4 _0 K, S6 w' m& t& U( N2 W' R$ C3 bEAGLE Extended Airborne Global Launch Evaluator. # t8 D8 v) b" N% \& a0 K2 r8 hEAM Emergency Action Message." l! Z' r" {. |' \* [: V EAR Export Administration Regulations. 5 S c6 F9 i) G5 PEarly Operational# U0 y. i8 j+ H& w$ L! H4 K Assessment3 A& s& E. X- C2 o3 } An operational assessment conducted prior to, or in support of, Milestone II.& a r2 C4 C( Y1 } Early User Test ! x, h. N2 s/ [! r6 P. m& i4 ^(EUT) 2 Q0 U8 Y+ Y3 V \2 ^A test employing representative users to examine materiel concepts, training or $ K2 o0 }$ q4 P) f. P& m1 Plogistics planning, or inter-operability issues. EUT can be accomplished during % N9 t5 _9 `& |4 K# k( O3 U( |( zDEM/VAL on brassboard configurations, experimental prototypes, or surrogates " [5 s" ^. P* ]to provide data leading to the decision to enter full-scale development.8 c+ a% ]$ _7 X: E+ j. j Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of/ V. s! |1 h0 I surveillance satellites and long range radar.: A: ?, k' A5 q! Z7 D# P$ _% r (2) Early notification of the launch or approach of unknown weapons or 2 D9 y9 K2 X' C8 h' `, Z+ E$ xweapon carriers. ( M7 e- p3 P7 `1 gEarth Limb The apparent outer edge of the earth as viewed from space. , Z2 ]2 i0 A [! ~1 T0 xEastern Test 4 ~7 E# ?8 Z0 N3 [% `Range (ETR) 5 Y, L/ z( [0 K* q) `, I nBeginning at Patrick AFB, FL, this range stretches halfway around the globe * V9 L" W9 W. R* O8 a& rwhere it meets the Western Test Range. An array of launch complexes, sensors,5 ^; l1 z! m2 b$ n, c" { and tracking sites make up the Eastern Test Range. The ETR is now operated4 L& X5 x! t7 p2 Z2 [ by AFSPACECOM as shown in WTR definition., P o; Z% |4 f" Y. s0 W% x: n MDA GLOSSARY, VER. 4.0 E+ b. o8 `7 V, C; A 88 7 i; u9 n( E" H- rEB (1) Electron Beam. (2) Enhanced Blast. ( e4 Y" g5 `" |+ bEBB Electronic Bulletin Board.) t5 H6 m" f4 x# J: W EBCDIC Extended Binary Code Decimal Interchange Code. ) Q2 G! z( r2 Z% F" T" fEBW Electron Beam Welding.+ U5 D) U# D6 P4 G* I. g& S EC (1) Electronic Combat. # d( M) M! L) b! t(2) Error Control. ' X# h/ Q1 Q6 f: b3 [(3) OBSOLETE. European Community. Now known as the European Union + t( t$ b. Z4 t: G0 x; Q(EU).: S' L: x7 M( Z* {2 I7 Y EC/EDI Electronic Commerce/Electronic Data Interchange . {9 N r1 x$ t! V; u( a5 zECAC Electromagnetic Compatibility Analysis Center.6 I6 e. \8 O8 Z5 Z* Y ECB Engineering Change Board.3 N' X" o0 u9 J) n; ~4 Y, d! N ECC (1) Equipment Control Center. (2) Element Control Center (USAF term).1 e9 |- W+ R' O; }+ q5 A8 ~. [ ECCM Electronic Counter-Countermeasures.0 V/ u7 u* G, w1 o6 i0 x( A5 q/ X ECDs Element Control Directives.5 L7 q: n5 {) M U, m- v6 \ ECLS ERINT Command and Launch System. ; ^7 G6 r$ g, XECM Electronic Countermeasures./ z6 e3 i, c3 b' h& P7 v7 q0 a$ C% b ECN Engineering Change Notice., P( N* h, c+ g( o4 R; h ECO Engagement Control Orders. ! t* `) K8 |) g# A9 C* w) D( MECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. B; T0 j5 j! B( pECPMO Electronic Commerce Program Management Office. ' g7 R% `) K4 PECS Engagement Control Station (PATRIOT). 5 Q& T/ Q7 y2 |9 zECU Environmental Control Unit./ \) C2 |8 X! d EDAC Error Detection and Correction1 v5 R* ~9 D% g/ Y* K4 v2 z4 u EDGES Electronic Data/Guidelines for Element Survivability.. J% Z* Z6 ^0 _8 x% C* e9 I EDL Electrical Discharge Laser " m$ ?1 b- }7 a/ e3 O0 MEDM Engineering Development Model.% ?$ l. l ^, V- }( Y5 x2 E EDP Engineering Development Process. w! q3 I8 d: Q, l EDR Embedded Data Recorder (PATRIOT). G& T$ D! E- V q) E" f: _) ] EDS Electronic Data Systems Corporation: v+ {& B; W% z9 S" j EDWA Engagement Determination and Weapons Assignment (PATRIOT).2 X% M9 p3 ~9 Y: m9 N MDA GLOSSARY, VER. 4.0 E; @& j. h$ \6 b/ Y h( y 899 ?+ e* ~5 J0 R; X$ s EDX Exoatmospheric Discrimination Experiment + N/ E6 d: l$ T# [: J& k6 Y [EE (1) Electrical Engineering. (2) Engineering Estimate. 1 u$ G x$ N) P3 c9 rEED Electro-Explosive Device.9 a8 \/ r! i% m) n EEEV End-to-End Experimental Version.! [! H. L7 ]; P2 ?- L# i6 B, k EEFI Essential Elements of Friendly Information. 7 n: B/ G+ X: _EEI Essential Elements of Information.- [/ V. a9 t+ z. }0 r2 d EEIC Element of Expense Investment Code.7 i0 @9 x9 G, s4 H0 D/ x7 h EELV Evolved Expendable Launch Vehicle (USAF term) ; s r0 S5 N" ]: N/ B$ m! {9 J7 jEEU Electronic Equipment Unit. ^5 G+ A0 x, {& {( k1 P EFEX Endo-Aeromechanics Flight Experiment." A% @) k# a7 b EFF Electronic Frontier Foundation. 4 E o& Y3 @% M' j" NEffectivity A designation given to the BMDS configuration and demonstrated capability at 7 R6 j" v* V+ w! ~( za point in time, becoming effective at each increment when an element or* y1 ]$ _) m1 B; |( j. c component is inserted into a particular Block. $ F% d3 \9 t+ N, R; d+ \Effective Damage That damage necessary to render a target element inoperative, unserviceable, * C2 y+ N6 B- qnonproductive, or uninhabitable. / }' W3 {! Z& v) a. [- G. S L7 CEffluent Plume The pathway of movement of effluents through surface water or air. ; X( z! k' w. p5 F: x7 Y3 MEFP Explosively Formed Projectile.- ]( {- g) h/ I# T r EGP End Game Processor.8 h$ a# R1 J! c EGTR Eglin [AFB] Gulf Test Range.& z% W! d% [$ n% y2 k! X) T EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). ( S% r& y; [. j, Z+ T Y5 xEHF Extremely High Frequency. * l1 J& m5 _( J# mehp Equivalent Horsepower. 4 u# g1 h" d& c1 N4 KEIA (1) Environmental Impact Assessment.% X }6 K* V9 d; k- K% r& Q (2) Electronic Industries Association.* j% D* b* Q; G) b% [% H EIAP Environmental Impact Analysis Process. & ^; f* _3 @2 y; l0 SEIP Exoatmospheric Interceptor Propulsion.5 _7 H$ Q1 C' @ i/ i4 w EIPC Electronic Information Privacy Center. 6 Q* S( g2 j; mEIPT (1) Element IPT. (2) Engineering IPT. ; J1 U. @& S8 V' J GEIS (1) Environmental Impact Statement. (2) Explosive Initiation System. ! M# l/ }5 f4 @9 g6 ^3 BEISA Extended Industry Standard Architecture (Telecomm/Computer term).5 c2 \" \6 [3 b& H# P$ a MDA GLOSSARY, VER. 4.0 E* g4 o7 d z$ f- p+ P# C T 904 u+ A) v+ _+ [, E% l) Z EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.' z$ c# A& J: v9 k: \: a Elastic Range The stress range in which a material will recover its original form when the force - y4 _9 S p% X" H2 b7 T(or loading) is removed. Elastic deformation refers to dimensional changes s9 ]9 S6 B- I- u occurring within the elastic range. " {. D+ h& E% `) j2 d# WElectro-Optics/ I; _- F3 h% X; X# h2 J; q Infrared (EO/IR)! K8 G1 B" Y/ a" H1 C7 L Technologies/techniques employed by optical sensors in the wavelength! P( G0 a4 U5 Z7 ^3 J spectrum slightly longer than visible but shorter than radio.0 c8 i3 G/ p n& G3 i! ]7 v Electromagnetic 1 E/ d1 V3 I1 \: z' jCompatibility 0 x( v& ?+ c' n% m3 S) G, l1 b- c(EMC)2 z3 ]( H) R) G9 A J {9 K A condition when all electromagnetic emissions from electronic, electro-magnetic,) J4 T7 d: B" G: W) s$ ?1 Y; _ and electro-optical components of a system interact without interfering with one. S* |; X+ f; q another.1 X2 \* w, ^1 Z& Y8 N! z Electromagnetic* ?4 R* L. F& G2 \6 F( } Emanations 5 e# y! F" t- O* I3 YSignals transmitted as radiation through the air, through a vacuum, or through2 M& t4 y9 N/ ?3 a# @" t7 w conductors.9 i) C# k8 x) N6 o Electromagnetic % W& n1 }0 F9 u# c& L9 GField (EMF)4 ~8 @/ @" J# s: Q2 p/ ~& u An electric or magnetic field or combination of the two, as in an electromagnetic 7 w' I0 v" y. H+ hwave. Created by electric charges in motion, having both electric and magnetic# B+ ^9 P/ H* c# f components oriented at right angles to one another and containing a definite5 t+ W2 z9 y' o( q B amount of energy.; H' p9 G8 V7 ]8 X4 L; N7 i n7 O Electromagnetic% o! N% S& Z4 D) q* Y Gun (EMG)3 v! {, z- z y3 X y A gun in which the projectile is accelerated by electromagnetic forces rather than' D" c: R. f! f6 x" e by an explosion, as in a conventional gun.* b1 q" A( n$ U8 [ l Electromagnetic 9 P- O8 J# E4 ~Interference (EMI) 1 H5 X i' C4 w4 u8 L, jAny electromagnetic disturbance that interrupts, obstructs, or otherwise5 N. L+ [" L( C& X+ w degrades or limits the effective performance of electronics/electrical equipment. ) f, z4 u- Z/ F1 [5 l0 [+ |It can be induced intentionally, as in some forms of electronic warfare, or 6 ~! a/ q+ `7 {4 yunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.9 v+ A/ H8 c9 p. y; g4 H6 K H6 c3 @* c Electromagnetic$ _8 S& _7 q0 K/ R, A6 } Pulse (EMP)8 y! f; _ P& R' g6 G% ]3 E The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of* [, w1 Q6 a: P& u the nuclear device or in a surrounding medium. The resulting electric and1 V/ Z) X! X7 ^. {3 h magnetic fields may couple with electrical/electronic systems to produce 9 s% S* M2 s# p6 m; l% q: hdamaging current and voltage surges. May also be caused by non-nuclear, {5 r% J B U* {( Z7 a means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic + b- t. t1 r* H# m& ]( p+ B [Radiation (EMR) 1 e! p3 F3 H% k0 S L) s(1) A form of propagated energy, arising from electric charges in motion that & U! L3 T4 n& l. \5 ~produces a simultaneous wavelike variation of electric and magnetic 6 v k" A: V6 F) p3 Sfields in space. The highest frequencies (or shortest wavelengths) of " g0 c, ` g& j5 b- isuch radiation are possessed by gamma rays, which originate from6 Z; K/ ]- G' R% m7 l processes within atomic nuclei. As one goes to lower frequencies, the 1 _6 ?# J6 ?/ D3 k, uelectromagnetic spectrum includes x-rays, ultraviolet light, visible light,, V; w0 r% O: |' O) ^ infrared light, microwaves, and radio waves.; B) t/ E. ] W+ \5 E! _+ l" x (2) Radiation made up of oscillating electric and magnetic fields and 4 N0 t2 S5 r$ Dpropagated with the speed of light. Includes gamma radiation, X-rays, ' Y' ` D( M* S# @ q7 o, ?ultraviolet, visible, and infrared radiation, and radar and radio waves. 4 a# u% f/ A( C! k" \: r# LElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices ; R0 X( k+ k Zused in system/subsystem design, excluding employment in the RF spectrum. `1 R# Y8 l3 d+ F Electromagnetic . a! k- A& j4 N G6 o- F- i7 fSpectrum# m a% b- `: o0 J: U+ j( t2 r The range of frequencies of electromagnetic radiation from zero to infinity. It is 0 D" ^5 i! H! O# o8 [' gdivided into 26 alphabetically designated bands. 7 E* J7 y$ Q9 W" _8 EMDA GLOSSARY, VER. 4.0 E; L7 I }2 c+ c: m 913 h# z7 K6 A% Z Electronic: {" j% k1 h! W* x Counter- ' W: T3 o) ^! z3 N9 x7 dCountermeasure & ]" V2 L* L3 I% `$ L4 I! v. Ms (ECCM)% h) X f( J2 T8 Y( z$ @! K That division of electronic warfare involving actions taken to insure friendly/ l+ [; S! w8 |; e4 ^/ w0 `. g effective use of the electromagnetic, optical, and acoustic spectra despite the + p; p- @, y8 e, r4 G' ?* venemy’s use of electronic warfare to include high power microwave techniques.& m! M- q) G% V% J, Q$ l Electronic 4 q/ A' b1 y1 d. o0 e' q; M3 y: [Countermeasure1 D y& Y5 Q3 ^+ P8 M. ^ (ECM) & [! `7 `8 y/ `4 TThat division of electronic warfare involving actions taken to prevent or reduce an! e' w5 |( N; Y. {3 D. `3 q enemy’s effective use of the electromagnetic spectrum. ' ?+ ]- _% N- Y. \, \Electronic1 x& j: T) R! J Industries8 Y* ^. ^4 }# k3 x% d, i) t. Y$ y Association (EIA) , N% v: o; J- D' CA standards organization specializing in the electrical and functional 2 ~ m/ O( t4 ?- Q( v% P, U3 A ncharacteristics of interface equipment. {6 J% O1 J3 c+ ^- Y! OElectronic 3 [- i; Y! {$ W S3 H/ w( cWarfare (EW) ! |! U" F% J9 b7 A2 SAny military activity involving the use of electromagnetic and directed energy to; r# t6 v. t8 y! h8 X( ? control the electromagnetic spectrum or to attack the enemy. The three major + D1 ]1 t9 L' ^subdivisions are: / b/ V+ j. w i' r. n" X•Electronic attack – Involves the use of electromagnetic or directed energy to 6 p) d" c! h% ^" Eattack personnel, facilities, or equipment with the intent of degrading,6 W! `0 Z% l4 q+ F/ r neutralizing, or destroying enemy combat capability. Also known as EA. 4 d; m5 x1 a9 }& ^2 wIncludes: 1) actions taken to prevent or reduce an enemy’s effective use of) D/ ` C8 H5 S( Y- A the electromagnetic spectrum, such as jamming and electromagnetic; h! e- x' b$ h% U( ?8 X deception, and 2) employment of weapons that use either electromagnetic or/ W5 b8 B# _! f directed energy as their primary destructive mechanism (lasers, radio; h! p- s) Q( l: G; ?; Y) G frequency weapons, particle beams).) m$ H7 f6 o7 ^% F. D0 w) F. [# v •Electronic protection -- Involves actions taken to protect personnel, facilities,1 q8 H0 H! P" H/ M! [* A( z and equipment from any effects of friendly or enemy employment of0 l% `/ \7 K0 e4 v% ]/ m electronic warfare that degrade, neutralize, or destroy friendly combat8 j7 p( P; ^) `# c8 D! w capability. Also called EP. 9 k0 l! i; Q8 B/ o* [: Y% d, u6 t7 ^: y•Electronic warfare support – Involves actions tasked by, or under direct # k% S6 I1 w" Q7 m: T8 ]) F' Vcontrol of, an operational commander to search for, intercept, identify, and0 @3 Y3 ]5 J5 ]8 I# o locate sources of intentional and unintentional radiated electromagnetic % T/ Z5 ]/ g! F4 y9 Oenergy for the purpose of immediate threat recognition. Thus, electronic 7 R( L9 o! n( Swarfare support provides information required for immediate decisions2 p3 ~+ S; F/ V# L6 }% A2 g involving electronic warfare operations and other tactical actions such as 7 L/ L3 h% X; d& |4 ~) c: uthreat avoidance, targeting, and homing. Also called ES. 0 m/ h: R5 n2 l4 a' W- z% ?4 R$ V/ zElectronic 6 i8 c9 r/ f* P# H" _4 r/ QWarfare (EW) f! Z6 E& p4 I( L9 ` Environments) E$ x& {4 ?4 u6 F* h- P' f: p6 H Electronic warfare environments result from radar and communications jamming3 ]" t% F" C9 a8 g& @/ Q and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD6 O T" F+ k) M- u. X: W system. 2 i# I" w9 y1 ?0 }, q: tElectronics 4 k8 s6 p Q- i# _- T% v- pIntelligence , Q4 v% G. u! O* _. G- G+ @: n. `" w(ELINT) 1 H% J- j5 U% k% q! H. {- JTechnical and geo-location intelligence derived from foreign non-communications5 G) g) ?2 F+ y- N electromagnetic radiations emanating from other than nuclear detonations or/ i4 h& U( q0 O! I0 x# H8 A' a radioactive sources.( J' _) ^3 p% m- ^/ f Electronics , i* \+ ] A8 W0 p- Q1 ]Security (ELSEC)/ L% i! o6 Y" u; n5 v The protection resulting from all measures designed to deny unauthorized " T0 Y" J% f% m5 z( `4 s4 t3 Npersons information of value that might be derived from their interception and 6 r) w6 O1 A; s4 a+ V: Y' B) xstudy of non-communications electromagnetic radiations, e.g. radar. & }: `% X8 g9 `+ u$ w! dElectro-Optics , W" b# M) b" v* l3 J4 OInfrared (EO/IR)% Q( ]3 `5 K4 D7 E5 ]3 R+ S: z) G Technologies/techniques employed by optical sensors in the wavelength% w! R' O; [; h3 A spectrum slightly longer than visible but shorter than radio.+ {4 F. G9 I" } MDA GLOSSARY, VER. 4.0 E 8 r% b( ^ k8 n% l0 ^926 D' w- c) Y% x, A0 `1 w" g Element A complete, integrated set of components capable of autonomously providing6 E! u( k( v9 e0 H BMDS capability.6 S4 Z" L+ Y3 M/ d Element 9 \ h) s$ ^6 h# i7 W X* i6 h$ ZCapability 5 n* y3 X& x% L) A* ^$ oSpecification2 f0 t- f" C- ]4 J- j1 R (ECS)' V1 }; A7 k! ^4 y" v$ a A document that identifies the element-level BMDS capabilities and& w% Q; b Q, ]1 p# K3 k4 t) z specifications necessary to achieve the system capabilities identified in the SCS., y# C& R, L: ~1 g The ECS further defines the SCS-apportioned mission/technical performance 1 H; ]0 ]2 p" Q. s* u; L" v; m2 Zcapabilities and allocates these capabilities to the element’s components. S! `' ~1 S1 R2 G k9 \4 w' VElement Control ! w% _4 z% X0 o/ n. iDirectives (ECDs) ; m$ p( l6 u% f4 b$ ^. d+ i9 nThe command and control data instructions to control the conduct of the " W1 l! ^/ q% |0 a3 dengagement. ECDs are developed by command and control software based 6 X. g( h: |0 J l, o3 x6 U+ R5 oupon variable parameter input by the operators (both pre-planned and real time), % K0 W! G0 v+ V' q; @5 m: F g7 hand operator defined rule sets embedded in the software. The individual battle : h! x }9 K1 Smanagement processors use these instructions to accomplish the assigned tasks$ g9 w8 s: t0 j% o& M7 L I from the operations order. ECDs are contained within a Task and represent the9 ]% t* E8 A' O form of parameter values that influence the resource management processes of5 U3 O; U5 q4 J+ @. ~ Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and! ^ Q, n! s% i/ t. Z) T Communications Management (CM). There will be numerous ECDs per Task.0 C, z q! i8 w Element 3 ^' ^" i$ d! P4 i6 B7 ]Operations - p1 X$ y3 S0 r: r& |! N: i& vCenter (EOC)" K3 l A/ t4 v An Air Force operations center, which operates and maintains a BMD weapon or: v6 N% T5 y5 j$ b7 p, J sensor suite. (USSPACECOM)0 W; M; M: e) G# ~0 ?* L ELF Extremely Low Frequency.& P6 l/ X' l& R3 y ELIAS Earth Limb Infrared Atomic Structure.6 f- [* v9 M8 ?6 f ELINFOSEC Electronic Information Security. ) D6 ~" l4 e2 D2 `- A8 ^6 J9 G2 Q0 UELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-6-28 21:53 , Processed in 0.050003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部