航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation 7 h b0 K. b" o) ^; `COMSEC Communications Security.9 d |3 J* d7 Y3 ~ Concept 7 E6 i7 Z& s2 O1 U- [# O& dExploration & * G& n; H( f1 h9 T9 x9 X4 bDefinition ) t& h, {, x7 b$ ZThe initial phase (Phase 0) of the system acquisition process, beginning at! [" p$ A1 a/ b1 C* L, K. x Mission Need Determination. During this phase, the acquisition strategy is ! C" i) p% J* a! ^: r' d( Ndeveloped, system alternatives are proposed and examined, and the system 0 q! Q( {0 \3 Q# kprogram requirements document is expanded to support subsequent phases. : E) B4 s; o5 S/ UConcept of4 z1 N7 f f. z1 U Operations 5 ]9 G Z2 R# d' V0 z(CONOPS). q+ _( x1 q/ z! i (1) A statement, in broad outline, of a commander’s outline or intent in regard to9 l) S7 R7 u, c4 b, m) o* H an operation or series of operations. The concept is designed to give an overall# W# _# ^7 x% n3 W% ^& H7 x picture of the operation. (MDA Lexicon) ) a+ p! |: D6 W. S3 I* l& A6 a(2) A verbal or graphic statement, in broad outline, of a commander’s- _- G! C6 J. U/ ?8 C assumptions or intent in regard to an operation or series of operations. The$ g. r: t# ?+ i concept of operations frequently is embodied in campaign plans and operation . J \$ C& m. nplans; in the later case, particularly when the plans cover a series of connected* s# z4 s4 x# ], k3 Z( h/ B operations to be carried out simultaneously or in succession. The concept is * N1 c& i- U8 s; vdesigned to give an overall picture of the operation. It is included primarily for ) F6 p+ a* I) O8 [, fadditional clarity of purpose. 6 ^4 P% Q" O) g& o' r$ W# s- FConcept Plan An operation plan in concept format. Also called CONPLAN. 6 x/ C- z4 o4 m' pConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of& ^" o5 a* H8 T. x' h+ \: W the acquisition process, or combines development T&E with operational T&E.4 i4 I) t- j$ k# j/ k/ y" r' o Concurrent2 |4 G/ y; X# a Engineering2 m8 x: f! }# q" b( I8 ]1 [ A systematic approach to the integrated, simultaneous design of products and 7 r O2 v' \$ \* ptheir related processes, including manufacture and support. This approach is3 C# i: u6 A5 M; C intended to cause developers, from the beginning, to consider all elements of4 l0 d' |4 U. o* A9 I7 e: S) j$ \ the system life cycle from requirements development through dispersal, including ?& \- a$ y, V% A0 N& x2 Lcost, schedule, and performance. b# e" k+ O9 j$ h$ p* Z5 p8 e1 a) x CONEX CONOPS Exerciser. 3 r8 X; X6 ]5 ~$ g; EConfiguration A collection of an item’s descriptive and governing characteristics, which can be5 u' G2 w3 n5 L: c& l) `* G- x4 b expressed in functional terms (i.e., what performance the item is expected to4 f* |( `3 I, N+ P& N achieve); and in physical terms (i.e., what the item should look like and consist of8 P. R* u: Q2 k! ]4 g+ Z7 }2 P( L when it is built)., l. q' k# i: I, l; b MDA GLOSSARY, VER. 4.0 C- Z( w8 G4 k7 a( {* [4 Z 59; F9 F, R9 |4 O% Q1 W) r Configuration 9 o5 k* r# B/ X9 F" X: ?' h, t4 _Audit. d* K' q2 X' m8 `. y One of the Configuration Management tasks which includes a functional ( I% b% ]0 Z$ n- zconfiguration audit (FCA) to validate that the development of a configuration item# G/ I7 ?9 _4 Z! B, U% K( K has been completed satisfactorily and that the configuration item has achieved& J9 H0 a' R r" W3 x; _ p9 j3 m+ z- x to specified performance and functional characteristics, and also includes a9 u7 l1 k8 ^& t- j physical configuration audit (PCA) to verify that the configuration item “As Built”8 \& U' i2 \: {/ X4 s conforms to the technical documentation which defines the configuration item. . Z( e3 y# T8 I0 o( \. ?5 `8 `& o7 |Configuration 7 i$ j0 X) k+ U `- B8 hBaseline6 O6 D, V" |. a6 q7 r$ B The configuration documentation formally designated by the Government at a- B1 Z# p# S) }' g7 c& w. r5 j specific time during a system’s or configuration item’s life cycle. Configuration0 f( H7 h5 L/ N) \; i: r baselines, plus approved changes from those baselines, constitute the current; v2 U/ _) y9 _: v* w configuration baselines, namely the functional, allocated, and product baselines.0 {3 ?0 C; E, o% L9 R Configuration 9 p$ k1 C8 K, T2 aControl : J/ d9 `7 T+ q6 ]4 w ?One of the Configuration Management tasks that involves the systematic& e2 k' p0 E4 }/ J evaluation, coordination, approval, or disapproval of proposed changes to the # u m+ V$ K: d( M$ L" n8 Gdesign and construction of a configuration item whose configuration has been& U% M0 S" W" t( ~ formally approved. * y& A; z: }9 }/ T: [9 c9 X% nConfiguration7 n7 f6 d; b* N% s$ t Identification , k$ P0 L5 A& B! @7 K2 {One of the Configuration Management tasks, which require that for every/ ?1 T8 d; Q1 j4 |0 a1 }: h4 s change that is made to an Automated Data processing (ADP) system, the design ( a8 d. ^. b. Zand requirements of the changed version of the system should be identified.! ~& |: L3 A: O1 B7 n# K1 k5 ]) C7 u Configuration 5 l. m' U. d( p6 R) E4 |Item (CI) 6 v# `$ T' l! r: fAn aggregation of system elements that satisfies an end use function and is ' |, J4 V; {' w `designated by the Government for separate configuration management.' }. P# h$ m" y) D$ p; G Configuration items vary widely in complexity, size, and type. Any item required # h' A( G( d2 A4 _for logistic support and designated for separate procurement is a configuration0 Z- `. K+ B! O7 O% ~' x item. Configuration items are traceable to the work breakdown structure (WBS). * W- }0 R, l; E% s4 GConfiguration - G: v. B# y7 k8 G# j* jManagement2 a: S! F* H7 ]; F; T) z" e- P, c (CM)6 i# B& k" }$ E$ e1 c0 v4 l; h In computer modeling and simulation, a discipline applying technical and7 p" Q+ V9 b1 r6 X8 T administrative oversight and control to identify and document the functional & k4 k9 L3 T: N: H1 m5 L Yrequirements and capabilities of a model or simulation and its supporting ! s* ~0 A# @) Q) V* G* vdatabases, control changes to those capabilities, and document and report the ) u ^* M! B' a7 L7 `0 E1 Cchanges. See also Accreditation.# x8 [. p, m4 P$ k% d& w" f CONOPS Concept of Operations. ( Q' T, c& z j: z6 qCONPLAN Concept Plan 7 }- G: G) V" k8 ?CONS Contracting Squadron. I9 t; B7 d' s+ E6 H" o; j Consolidated 7 M$ k: M; i- E) |7 WCommand Center $ r( ^( ~( D. h% d(CCC) * l' Y1 y. Y$ w: }1 w3 QA single command center from which USCINCSPACE/CINCNORAD can direct all & `$ o+ k5 ^% G, F) b0 |his assigned missions, to include BMD. (USSPACECOM) Located in Colorado2 R6 L* n3 p1 C$ Q. x7 Q Springs, CO. ; [& G2 y4 ^& o2 t& rConsolidated) `- ~) O0 [" n) T& T i5 b9 r Intelligence5 r+ l( f, t+ d6 C/ V* G2 f9 g Watch (CIW) / p% c0 C% y' O8 p. ?6 IA consolidation of intelligence watch functions within the Intelligence Operations , j) L a8 r4 _2 [+ W1 c r* wCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD# }7 q; U( b* H% Z: B/ g2 [ Aerospace Defense Intelligence Center (ADIC), and the Air Force Space 8 l6 `0 Z% _: o6 u- `$ V1 n+ fCommand Space Intelligence Element (SIE).( ~( l3 a( c0 G I. z6 d/ w3 g4 {" L Consolidated 0 d5 G, z" p; k) z9 [: @Space5 K6 V+ D) {: ]% R Operations ! g$ H' \" R( S& |+ F2 ?( UCenter (CSOC)0 J# \6 a2 d6 I Series of centers at Falcon AFB, CO, which operationally control and maintain : k0 s$ a, U% Jassigned DoD satellites. - `2 n/ J1 `# v( Q: q. E. f" ~Consolidated : Z7 W3 Q I% vSpace Test , G% t/ f1 R% }" q$ yCenter (CSTC)6 e# L* Z. \9 n, ]5 F. L( X Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and 8 P2 @$ A3 q+ M. finitial on-orbit checkout of operational satellites, operate R&D satellites, and " W3 h- F# D d" u6 n3 I# O' gserves as a backup to CSOC for operational DoD satellites.: L2 K5 [: {4 D, z MDA GLOSSARY, VER. 4.0 C4 Z( v; H3 T6 X1 j% M 60 ' Q* q. o6 h% i" ^Constellation ' ?* O- I% [1 _Size (CSIZE) : F H2 v; M( pThe number of satellites of a particular system placed in orbit about the earth.8 h4 E# }% D) k. R. W$ {& t Contact Fuse Device used to detonate warhead on physical contact with another object.2 P2 M% d! V5 P/ n' J# H Contingency & |3 h' a) ~. E/ o% JDeployment Plan - U0 T* M+ D( y1 h; v) _% C(CDP) 2 L u" Q* K+ e# N5 O0 cAn executable plan designed to deploy an early missile defense capability and / F. c' p$ C9 _3 _9 Rreduce deployment time. The plan provides specific executable deployment3 ]/ t- f& L% G" I options and describes activities required before and after a deployment decision.* E6 O% d' \) G The plan also allows decision makers to have oversight on technical progress," ]* V! ?' m# T; u+ i cost, schedule, and risks associated with a deployment system./ N: f k: K" m# Y Continuity of ) ^9 X8 Z4 _* X* v6 ]( c* v. }Command3 f$ m; y& |5 T' X/ R( X( e The degree or state of being continuous in the exercise of the authority vested 4 u' K6 x' H4 J2 r( J0 v& s. @: uin an individual of the armed forces for the direction, coordination, and control of " r" Y" v- A0 i- s, b4 Jmilitary forces. ( O' s3 a8 h- i) _# p8 c4 vContinuity of 8 s. g. u) z7 _2 R, B, QOperations1 }) }5 R$ C+ { The degree or state of being continuous in the conduct of functions, tasks, or' ^/ g. j0 N# ?) c duties necessary to accomplish a military action or mission in carrying out the - A" F( F3 G+ ^" [" L9 V, G$ Anational military strategy. It includes the functions and duties of the commander, # B" K$ R% l7 p3 R* x9 }as well as the supporting functions and duties performed by the staff and others5 s Q6 D0 ~3 d) s, g+ Q6 G! @ K; ?0 z acting under the authority and direction of the commander. . U: K R' _' @Contract4 i2 Q7 ? o* O: x Administration " s3 o- h( c) }+ k7 p/ jOffice (CAO) : V% |7 i7 a# ?# C3 cThe activity identified in the DoD Directory of Contract Administration Services1 \$ o) ^2 c% G; ] Q3 q) C. c o Components assigned to perform contract administration responsibilities. It is a 5 P$ Y+ {! e+ P$ Mgeneral term and includes Defense Contract Management Regions (DCMRs),- v; Q q. f: U* ]! W }; ^ Defense Contract Management Area Operations (DCMAOs), and Defense Plant " F8 l& e3 p, A3 }Representative Offices (DPROs). (Defense Systems Management College $ H8 C$ d& r: L1 ~/ c$ kGlossary) 6 I5 v$ Y, H4 d N) e1 FContract Data , s: A' S! X$ _6 w7 IRequirements & c0 D; z$ }/ X. BList (CDRL) 8 m2 X$ k* A( g+ }/ s) [Document used to order (“buy”) and require delivery of data. Tells contractor; W$ T0 p+ [& X( Q, O what data to deliver, when and how it will be accepted, where to look for1 I* u# z# s. `/ u instructions, etc. , I# ?, a7 f3 Y! c/ RContract7 Q0 }2 j D5 l; J; U, H1 q9 f# p Definition : ~( m' D' H; `& bA funded effort, normally by two or more competing contractors, to establish # k/ V+ Q& Q" ~7 f2 n+ |specifications, to select technical approaches, to identify high-risk areas, and to' Y; P) n2 N8 G& I7 u" t& M! ]5 i make cost and production time estimates for developing large weapons systems.: R9 f. p2 n' e0 O% [0 j" p Contract Work" \* U6 k" U9 d! t Breakdown ) [: M/ m h2 F# s/ {& C# x, HStructure * u8 X- s9 P4 g' U+ p- UThe complete WBS for a contract developed and used by a contractor within the* Q- S3 z) v5 u* ^$ z2 f. q- ` guidelines of MIL-STD 881A, and in accordance with the contract statement of' c+ l4 R% @; s7 e M7 F0 Z work. % W i* t3 c/ m4 @Contracting* i% R/ M0 ?1 @. d; b, m$ s Officer (CO)0 l# u [ ~% Z7 V+ H. j5 `& g A person with the authority to enter into, administer, or terminate contracts and 6 f6 K% }& _! Y" U) O* ?- z- amake related determinations and findings. The term includes any authorized % K0 _9 I' P2 _+ o$ Irepresentatives of the CO acting within the limits of their authority. A CO whose, o0 L; @5 W( ] primary responsibility is to administer contracts is an Administrative Contracting2 O: a: F/ ~% p% w+ }" y a/ M Officer. One whose primary responsibility is to terminate contracts and/or settle % L& Q- v& d# j# p) Z' `8 Dterminated contracts is a Termination Contracting Officer. A single contracting1 z- L% P }$ r6 c officer may be responsible for duties in any or all of these areas.$ c- p) @' ~1 V* h7 o Control Authority that may be less than full command exercised by a commander over 2 }0 }7 L8 l# }4 _$ Fpart of the activities of subordinate or other organizations.% l" d# N2 Z5 x# v9 g+ q Control' f0 o$ ` b j8 S Abstraction& P6 n- i6 ^3 w b1 }) f (Software) The process of extracting the essential characteristics of control by ' [7 f, @8 x0 v G G# O3 ndefining abstract mechanisms and their associated characteristics while: U* m8 q4 T" v0 e disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C7 H( m5 t8 v* v7 n 61/ e- ]. ~2 ]" k% t" T! v3 U/ E Control and8 j% ^% l, ?$ x1 I Reporting Center! J* u# M% h. t$ { An element of the US Air Force tactical air control system, subordinate to the/ X+ @# q* B( J tactical air control center, from which radar control and warning operations are V4 o {; s' N: ]& ~/ G9 Bconducted within its area of responsibility.) X$ m5 y+ x# [" D* { Control and 8 d! n/ @; c, H/ u6 G8 XReporting Post4 q9 q4 ]# I8 L% s An element of the US Air Force tactical air control system, subordinate to the 6 e7 L* o# ^9 M5 k1 e5 L$ Ccontrol and reporting center, that provides radar control and surveillance within2 k2 o) H( d1 ^9 X+ I* l8 `% r its area of responsibility. 2 A' Q" x; c Y% J1 XControl Area A controlled airspace extending upwards from a specified limit above the Earth. 6 ? E p/ U- }7 r- y( r8 M$ J4 [Controlled 3 B! i! M4 M. q- b9 a; k; fEnvironment / x' T% u' c# i: U! F# E7 C, ^3 rArea where entry into the radiation hazard area is controlled. : U z, J/ b4 m" j( n* gControl' y) f' `# s" E' S: a) h Procedure 3 c' A. F K" E9 y5 DThe means used to control the orderly communication of information between ) e* c: E! S$ L; ?1 sstations on a data link. Also called line discipline. 7 E, }1 @: e. [9 h- m- b) AControl Station The station on a network, which supervises the network control procedures such* P9 t0 q2 M/ T, r2 h! h/ H7 ^ as polling, selecting, and recovery. It also is responsible for establishing order/ n6 j$ m, C* \: H! N( M1 `* h on the line in the event of contention, or any other abnormal situation, arising * S4 A% Z% h7 obetween any stations on the network.3 b# W6 U4 r5 {6 H Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to ; r" v1 y/ W) y: v0 c$ x8 b6 lprocess sensitive defense information and that is under sufficient physical and : N# K- W' c/ Btechnical control to preclude an unauthorized entry or compromise. / K/ W& s: i, O# }7 K9 JCONUS Continental United States. 6 X+ c9 v- r& w3 ]4 {! w3 l; @Conventional Co- ! X' @6 D% r3 O+ A$ \5 R# E4 p: B( sProduction . A( f5 @( {9 u# iAn effort between governments to produce the same end item, or components + K6 H- U3 y0 }: uof the same end item, in concert. # Z7 O) r. v) GConventional. U6 }/ h7 S$ [9 ] Weapon 6 [9 U5 c$ A, q t* [A weapon that is neither nuclear, biological, nor chemical. ; t* O4 O: ~! gCoop Cooperative + m, s. e1 }0 L- [! ZCoordinated ' E9 [) L& k6 zEngagement ) }; C) N; l/ N) yPlanning/Actions 5 j! i1 U& o2 hNecessary coordination among engagement components to ensure maximum ) p8 g/ C9 C- Aeffectiveness of the SDS and resources are not wasted on targets already6 I1 X2 x: ?% s6 X! R targeted. 0 C u2 Y: N3 P. V. F" eCoordinating ) y+ c8 o8 a$ aAuthority . ^, H& w" a- w5 y% K8 hA commander or individual assigned responsibility for coordinating specific 6 N4 F9 Z+ z( |- q& W: cfunctions of activities involving forces of two or more Services or two or more 4 Q# H4 I- }' r. T7 P. d' B# Z/ Pforces of the same Service. The commander or individual has the authority to+ E1 I7 I6 H0 ~; H, c) P X require consultation between the agencies involved, but does not have the$ L6 X* y& i) b$ B authority to compel agreement. In the event that essential agreement cannot be# L X! K- H7 _ reached, the matter shall be referred to the appointing authority. 7 M) ^) t& l6 x, l; HCOP Committee of Principals 4 d) w, N' z) a* jCOR Contracting Officer’s Representative. Contracting Officer.$ Y& A$ w! F( S: K9 Q CORBA Common Object Request Broker Architecture.: S% B( P3 n9 }% Q7 X$ r7 i; i CORM Commission on Roles and Missions.1 F$ n6 E, N5 \, ] MDA GLOSSARY, VER. 4.0 C3 M' R, l, c H) i' {4 M 62 6 V$ g, f" ~1 F$ V) t1 p- Y' qCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens) i2 y- \5 d9 U _ perpendicular to one another, designed to act as a radar target or9 A1 d/ U7 N2 ] marker. * A$ @( i0 B6 F$ T+ R: R(2) In radar interpretation, an object that, by means of multiple reflections: U; ^+ Y7 Y% F# H: N; A4 R from smooth surfaces, produces a radar return of greater magnitude than# r7 k8 x5 h3 ~ might be expected from the physical size of the object. 2 S% e( n' b8 _# A/ p+ s. G0 ?Corps SAM OBSOLETE. See Medium Extended Air Defense System.9 k0 s2 {; U5 [6 \& V" r Correlation (1) The process of relating observations or tracks from one set of data to , w2 z, M/ R( v: I E0 U) Y ^. ]7 lobservations or tracks from another set of data, i.e., collecting data from l( [; q2 _+ r' G/ D5 V6 J different frames or sensors that presumably relate to the same target. (2), v* \9 d# {# N5 ^ In air defense, the determination that an aircraft appearing on a& M* S; q- P' C1 O- U& k radarscope, on a plotting board, or visual is the same as that on which 9 s4 W, i' ], x* \. dinformation is being received form another source. (3) In intelligence . ]4 C0 F; n% Z* Y8 pusage, the process which associates and combines data on a single8 }0 A7 \+ U7 S( [+ B entity or subject from independent observations, in order to improve the/ g. ]* x+ `0 i reliability or credibility or the information. 9 x( t9 H7 X# Y b0 W6 M" |8 @" JCOSEMS Evolving architecture operations support tool. * a5 B. U. c8 M9 z: w/ y8 U mCOSM Computer System Operator’s Manual 3 \) ~; i" `6 i4 t. qCOSMIC NATO security category. + y/ U. R2 D1 w+ x8 @Cost Analysis2 d5 D5 T# ^. t3 N3 B* s1 F, M Improvement. v9 |: m* \% |$ j) o Group (CAIG) 2 M7 G2 h% _) e5 P0 l7 {* X- cAn organization within the office of OSD Director, PA&E which advises the DAB4 l( P, s1 p$ v* C on all matters concerning the estimation, review, and presentation of cost! `% p5 _9 n8 v9 @% m) @ analysis of future weapon systems. The CAIG also develops common cost 7 R) B) R) z2 L- s+ b; K' i+ mestimating procedures for DoD. - e) v' v' i+ ^ y0 `& U; TCost Analysis ( S5 J# p- q/ s; @Requirements2 N8 _9 N$ S9 f" P Document1 K) s# A$ D3 b. s+ p8 b8 g0 Y (CARD)( `* J& Y6 o5 p3 `) x( E* | The document describing the technical baseline, which is a subset of current 7 p! t* p E/ I" rsystem technical data and is used to generate the baseline cost estimate for an : `/ G, p {4 I. z( A: x" pSDS element. It includes, but is not limited to, the element description,, {# Y2 |4 s8 N interfaces, operational concept quantity requirements, manpower requirements, ' H8 e5 t; ?4 ~' p4 a: h/ s1 mactivity rates, schedules, research and development-phasing plan, and facilities, [) o$ q% R7 n% [' H requirements. d) b7 `) Q% iCost and8 [1 u. Q: g+ B/ f; W |( a$ k Operational s+ U) P) k2 s2 Y3 D Effectiveness 3 i* } k# t9 H& w9 |' nAnalysis (COEA)7 Z" V) ]9 H! L* ? x f# K4 s An analysis of the estimated costs and operational effectiveness of alternative6 G+ ~4 x. O" O- M8 {; e; P7 c materiel systems to meet a mission need, and the associated program for 9 n5 R/ S* n7 n: _, Tacquiring each alternative./ G" j B% l) {% `( f9 D Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk4 t/ S" N8 s/ G" E$ } due to cost estimating errors and the statistical uncertainty in the estimate. p4 _. p$ x* ^3 ?1 uSchedule/technical risk is risk due to inability to conquer the problems posed by * k7 t! m Q+ d$ ] t3 ythe intended design 6 g; G4 } V$ n" H; \ G3 N" wCOTR Contracting Officer’s Technical Representative. See Contracting Officer. , ]6 U0 k; S4 G! w( O eCOTS Commercial Off-The-Shelf.+ p5 @) @2 N0 f' X Counterair A US Air Force term for air operations conducted to attain and maintain a desired! o* C( G5 Y3 ?' a degree of air superiority by the destruction or neutralization or enemy forces. * B' L g+ @$ b9 ^+ i" ?Both air offensive and air defensive actions are involved. The former range5 m* Y! U! Y, ?4 t! I6 V: u5 @$ r throughout enemy territory and are generally conducted at the initiative of8 l* C2 t3 y7 X' r friendly forces. The latter are conducted near or over friendly territory and are & _/ Z! j. m9 z+ ?8 S# ggenerally reactive to the initiative of the enemy air forces.' w: E7 ~, T( f7 F0 j1 O5 W, z MDA GLOSSARY, VER. 4.0 C 1 ?. B2 ]! g3 H4 L6 N2 N63 2 k; f4 |6 e0 R) xCountercountermeasures + h# j" j: ]; `+ K9 L(CCM); ]* b0 c8 m0 W/ n* ^5 |2 U9 s1 l Measures taken by the defense to defeat offensive countermeasures.# N5 ]2 B$ r( a/ w- n( x1 {$ l Counterforce The employment of strategic air and missile forces in an effort to destroy, or! j/ h6 W: _, \- m( w render impotent, selected military capabilities of an enemy force under any of the % [8 t* o0 |7 c( I5 Ocircumstances by which hostilities may be initiated.0 G2 e; Y. b2 U/ b6 L6 n Countermeasure A design or procedural measure taken against covert or overt attacks.) m% r- a6 @) l, U7 q Countermeasure4 n* q; l, j+ D# w" _; S s (CM) Y* ^! i3 W" ^; L7 m. F That form of military science that by the employment of devices and/or% A& J" k% B% A5 D& P techniques has as its objective the impairment of the operational effectiveness of , X/ Q6 I2 R. g4 I1 x' Ienemy activity. 2 ?1 }) t3 |- |# U+ x) t' C4 W( X7 _Countermeasure 3 i5 o7 y; Q. k4 _- Ys Rejection5 m4 ^! A* }" e: t1 o1 p0 u: ` (Surveillance). e* q( k0 y6 M* L4 G. H Improvement or rejection of an object signal in the presence of" j9 ?/ y+ }# }) U- _ countermeasures. 3 Q. b3 c7 E7 ~$ y7 {Course of Action : _5 v5 t3 l7 n G6 g. \2 R& l(COA)* L( x: D& v( G$ Z (1) Any sequence of acts that an individual or unit may follow. (2) A possible 7 s0 R# f9 a3 Q+ d) Eplan open to an individual or command that would accomplish or is & i9 i7 N+ N. `" {related to the accomplishment of his mission. (3) The scheme adopted; \8 n7 ?+ D! r6 @1 C to accomplish a job or mission. (4) A line of conduct in an engagement., k# y2 E W2 F s) P (5) A plan to accomplish a mission. It describes the execution concept 6 D: h' S' B% l& s! R# Kfor BMD of North America. It will specify the engagement priorities,, Q- b8 g1 S7 H* ? O- } resource allocation and desired results by Area of Operation (AO). , H' s: b8 z6 q, W; I(USSPACECOM) (6) The scheme adopted to accomplish a task or/ U4 `; D# {9 ^) N% ^8 J mission. It is a product of the Joint Operation Planning and Execution8 M9 O3 q# Z, _$ I3 C0 p System concept development phase. The supported commander will, h: }/ s" \+ I: f2 \- e4 x include a recommended course of action in the commander’s estimate. $ b2 ?: K, C$ }. B+ vThe recommended course of action will include the concept of ! @4 l0 e$ t! j% Toperations, evaluation of supportability estimates of supporting3 V0 ]' E4 x9 D; n' T( }3 T organizations, and an integrated time-phased data base of combat,( v+ x' e. J# y3 k6 @7 c combat support, and combat service support forces and sustainment. g% R# A# P% kRefinement of this database will be contingent on the time available for , V# R* _ ^' s, P; K# v/ `course of action development. When approved, the course of action 1 t+ L2 J. N- C( wbecomes the basis for the development of an operation plan or 6 Z& v; k, d1 M+ R+ Q- ?& joperation order. # J3 C% V( r: X9 N, ~ rCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps, + B6 v. M( h# E! N) rand other geographical presentation systems. (2) Cover or protection, as $ x4 b* G) X: m; X9 \the coverage of troops by supporting fire. (3) The extent to which% O: `/ h1 T- I9 n( b( s5 O intelligence information is available in respect to any specified area of3 A& H0 ~0 O& e' x+ z7 ]1 R( I interest. (4) The summation of the geographical areas and volumes of* D( B f! u5 R2 q aerospace under surveillance.) _+ E( {2 p$ D: ?. f Covert Timing / K' `( w5 V9 b i6 \Channel 0 i. o {: C# e! J$ h, |( IA covert channel in which one process signals information to another by * m* w$ V3 S. W s2 t# u) G* Wmodulating its own use of system resources in such a way that this manipulation S7 A% f; v7 }6 Iaffects the real response time observed by the second process. ) ]. U+ G1 _$ I# H6 R% ^CP Command Post.) O* ^1 ~& T/ z& Y. ^8 k* j CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.8 P6 C5 L! E4 S4 S5 L" R f CPAF Cost Plus Award Fee.5 W4 J8 }- K4 H' q8 D CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) ( A& {( l* P) L' Q: q, Y' QMDA GLOSSARY, VER. 4.0 C 3 q/ P( M B8 Z y- q3 r. K# u648 f9 ] T; n/ X CPAR Cost Performance Assessment Report. ; y& {9 x; `% X3 T0 U3 cCPAT Critical Process Assessment Tool 0 p: H5 l: ~( ^, s$ [9 UCPB Charged Particle Beam. 9 U3 y9 ]0 Q8 z! {9 D# RCPEV Communications/Processor [Network] Experimental Version.1 I7 Q! [7 Z' h, _( V: u3 _ CPFF Cost Plus Fixed Fee. . Y% r! }- W, H: ^9 x# \* S# n8 xCPIF Cost Plus Incentive Fee. 4 T, _. F6 y- F: P% z* mCPIPT Cost-Performance Integrated Product (Process) Team.0 n7 ~# _ O: s" Y. x. h! T CPM (1) Critical Path Method. (2) Contractor Performance Measurement.3 s% j( c: I( n& D CPP Critical Performance Parameter.* Z7 z$ A4 X8 i$ O8 K' ?, j3 T0 E CPR Cost Performance Report. 8 g; P2 `: @( |5 @3 J' oCPR/NC Cost Performance Report/No Criteria (Contract management term).% A$ F& O/ B# F$ A$ D3 Z J; V CPS (1) Consolidated Program Summary. D4 s! G+ X- r" f1 @7 a7 B (2) Competitive Prototyping Strategy. ; g7 h- f c) w% G7 |(3) Current Program Status.! r& E4 j; T& s9 J$ @ CPU Central Processing Unit (TelComm/Computer term).9 _+ N8 ~8 E4 d, t CPX See Command Post Exercise.+ }$ t4 B K; Z7 G CQAE Chief/Contract Quality Assurance Evaluator.+ s% `& _, _$ r& L- _3 Y CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).1 `2 \- X" @! [7 ? CR-UAV Close Range Unmanned Aerial Vehicle. - B! A2 f" V: e6 D0 ` A& W2 fCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement : f' E7 X% J5 Z( z3 `2 ECRADA Cooperative Research and Development Agreement. ; |5 P+ P5 X6 ] cCRAM (1) Control Random Access Memory., D1 r4 o% s1 t (2) Cross-tie Random Access Memory (Computer term). 7 [5 Q( D `# qCRB Configuration Review Board. 9 D/ C3 W2 Q! d( S# CCRC Control and Reporting Center. 7 [6 S. Y, T1 xCRD (1) Capstone Requirements Document.; u+ k; o% X/ M (2) Component Requirements Document. , y- g% h( F9 E' ?0 O( Q& J* X& nCRDA Cooperative Research and Development Agreement. 4 z9 C4 u; c1 pCRG Communications Relay Groups (PATRIOT). 9 L/ o9 V+ S! i. k. RCRI Classification, Recognition and Identification./ l+ }/ `3 L5 m: C3 }0 [7 R0 H CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 8 u2 p3 F5 I* A; |( ~! B; O3 [5 a2 I65/ i0 N3 V& M2 \0 c' V$ L" D. ` Critical Design3 n1 D8 J% L0 B1 ^ Review (CDR)# k# i- c1 S. D0 c& L/ [: @2 P A review conducted to determine that the detailed design satisfies the' Z1 Q- d4 V# J2 c1 y# w performance and engineering requirements of the development specification; to4 P7 k- O5 F& J0 X establish the detailed design compatibility between the item and other items of6 [! y- V& q( P" o6 o equipment, facilities, computer programs, and personnel; to assess producibility6 K2 C% O; b4 j9 X# Q* \7 c and risk areas; and to review the preliminary product specifications. Conducted" y4 Q+ z3 V6 b during Phase I, Demonstration and Validation (for prototypes) and Phase II, * B% D% O, I( R0 \* YEngineering and Manufacturing Development.( M' W. H1 Z/ E" g y# P Critical ! ~$ k) k; I4 c& ]Information9 b1 \# ?" F; a) f0 L Specific facts about friendly intentions, capabilities, and activities vitally needed 8 b" H# p- W! s' _# c$ oby adversaries for them to plan and act effectively so as to guarantee failure or! K, G. ~; l( U unacceptable consequences for friendly mission accomplishment.) f D+ z, w3 k* r Critical$ s% D0 Y. \8 R1 K% n* i Intelligence 7 C* B$ q: n7 N( z4 xParameter $ c P7 S9 V9 h/ C7 b) p5 C* \1 I' H/ h7 PA threat capability or threshold established by the program, changes to which / Z. A( D. B# y# L. o; `could critically impact on the effectiveness and survivability of the proposed 8 ?- ?7 S$ M8 msystem. % Y2 `3 j# t2 D% J, W$ K- iCritical Issues Those aspects of a system’s capability, either operational, technical, or other,; ? R2 m' i5 M/ B that must be questioned before a system’s overall suitability can be known, and5 P9 w$ D. K: f$ L which are of primary importance to the decision authority in reaching a decision ) {3 G! H$ s% m+ k/ ]' Fto allow the system to advance into the next phase of design, development, ; W \8 x8 a) a/ vproduction, or post-production. , f4 K0 g+ P! \* }3 O/ _Critical" \) Z8 T2 x' r( x' p* c Operational7 E# ]4 O. o. v Issue3 O: d8 `! A- x! e- k) @9 g& @ A key operational effectiveness or operational suitability issue that must be3 _/ P) |! n6 ~2 W. u examined in operational test and evaluation to determine the system’s capability- G2 t3 J8 s% X! Z; j to perform its mission. A critical operational issue is normally phrased as a' U! {) Y/ r/ x1 n+ y question to be answered in evaluating a system’s operational effectiveness( N$ q5 h5 T/ A+ o1 U/ h7 A and/or operational suitability. ( d- i0 N& |2 I+ T) G+ _1 ^Critical Path$ @" K8 r1 a( g/ | Method * i$ ?# I( q" v( L- iA technique that aids dependency of other activities and the time required to 1 k' q4 y6 ]( Z0 ^2 mcomplete. Activities, which when delayed have an impact on the total project) C5 v$ L5 b* {& o2 t6 L- T5 s; F9 M schedule, are critical and are said to be on the critical path.7 D4 C2 i- |: K& ?' J Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to - Q# u/ _5 N# N3 i/ ?% {the viability or the operational effectiveness of the SDS. 5 d0 E$ h, c: U" ]/ Y; r% ?, dCritical Security 9 J" [6 T6 E# {$ j* vRisk " ^3 r/ t5 \8 }2 h& IThe existence of a security vulnerability that, if exploited by an adversary, could 4 S! J7 r) S" h& ?cause exceptionally grave damage to the viability of the BMD or the operational J! s4 m2 o, k9 M$ } effectiveness of the SDS. Critical risks assume an adversary’s capability to8 l2 X# U+ J" F) v) Z# _0 a# s' g cause major system disruption or degradation (e.g., single point failure),+ m$ Y, X7 Z1 C( Y4 T destruction of mission-critical components, or usurpation of system functions. 6 i f y8 A- f' gCritical , Q( Y1 K, K3 {# USupporting ) C' r/ b% D$ A Z/ _& mTechnology 9 Q3 `# S" @$ B5 t* ^7 @* n: WA technology that program management personnel consider a critical part of the 4 I/ Y; i1 q3 l& A1 \program being described.: v" [! J( y9 A$ H0 l0 m. J CRLCMP Computer Resources Life-Cycle Management Plan.; j c' e d6 T2 T# M& [: d& r CRM Computer Resources Management.+ A* T# ?; ~) D0 s* b1 I CRMP Computer Resources Management Plan. # F- u+ a6 h' eCRO Chemical Release Observation.7 g1 ^$ i: W; Q/ Z7 d; ` CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC & s# a% n- t# M8 Q$ @term.) ! h# d B0 z7 v9 R9 f) IMDA GLOSSARY, VER. 4.0 C . @6 i3 L8 P' V4 ~* H661 m" W: ]* }' H c3 U) i CRS (1) Computer Resources Support. (2) Congressional Research Service. (3)0 u3 V% U( M+ _ Contractor Reporting System.8 a/ H& W0 f' t" j& Q: v5 c CRT Cathode Ray Tube.- q( f& |* H6 ~) f5 M0 w8 T CRWG Computer Resource Working Group. " v! w6 Y- c# I/ S$ t! P5 VCryocoolers Cryogenic Coolers. F# G& }, ^& k U+ Z0 l; j4 r Cryogenic Of or related to cryogens (substances which are used to obtain low 0 q& G+ R, ]- j$ [2 ^0 S7 o6 ftemperatures).( N' G; T1 J5 d7 d& E5 n6 i Crypto A designation or marking which identifies classified operational keying material,( u: L9 S+ ]- s- M# k and which indicates that this material requires special consideration with respect / n' n& S+ Q: G) p1 l" L( Rto access, storage and handling. , A% \! i A3 Q" B& i* GCryptographic& u, o ^: Z6 s' Q3 q# a3 W System$ f1 N. S; x( |; ]4 s) V; q The documents, devices, equipment, and associated techniques that are used 2 [7 W- x7 W. p Y! H( J4 uas a unit to provide a single means of encryption (enciphering or encoding).6 t4 `& z% B" |( ~! Q- ?3 ^ Cryptology The science that deals with hidden, disguised, or encrypted communications. It* K" F5 m) e4 ]: H0 J# f includes communications security and communications intelligence. ! F* B8 f' |: N6 H% _7 ~9 f lCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. 0 B/ w- d5 Y. ^5 WCS/CSS Combat Support and Combat Service Support (USAF budget term). 2 h9 k) ?* ? T3 _4 B- {- VCSA Chief of Staff of the Army.: [2 a+ E# |- Y8 M) f2 O! Y. _ CSAF Chief of Staff of the Air Force. ( F: J1 e; r! g: O% Z" D/ aCSC Computer Software Component. ) X6 S! k/ w1 v5 ]2 l! MCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) - B8 _1 w1 P5 y7 XCSCSC Cost/Schedule Control System Criteria. ) t9 z- ^: _: {/ {# M2 e0 W4 y/ VCSD (1) Constant Speed Drive. (2) Critical System Demonstration.7 z( R" l4 b1 U CSE Center for Security Evaluations (DCI). : ?% n; B+ g' U3 mCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon. p \$ Q+ q! b2 ` System, located in Cherry Hill, NJ." V$ [# J: e6 \5 E CSF Consolidated Support Facility, Arlington, VA.* e. Q3 X( q% o3 ] CSI (1) Critical Safety Item. (2) Critical Sustainability Item. % q. Q! L0 ^. j+ ZCSIP Current Systems Improvement Program.0 K- Q$ ^! V6 ~8 N CSIZE Constellation Size. # O ]' |* l% P+ UCSL Computer Systems Laboratory. $ p% A P2 O$ r4 nCSM (1) Core Support Module (*C2E term). (2) Communications Support Model.8 H. _/ r1 b* M3 A: X B4 Y CSNI Communications Shared Network Interface (NATO term). 1 p. M4 D; ]' f+ lMDA GLOSSARY, VER. 4.0 C ! _8 U$ b6 L$ z0 _" X67+ w4 @; f. ^3 u3 t" c CSO Closely Spaced Objects.% e A! O4 M, M9 Q; S, J CSOC See Consolidated Space Operations Center., u& |4 _' \) p6 q) @1 Y" a CSOM Computer System Operator’s Manual 1 j$ w7 ^5 I/ I0 `CSOSS Combat System Operational System Sequencing 7 e3 Q: a& @3 K G& z" v& E4 x! YCSP Communications Support Processor (numerous locations, including USAF Air % _1 H6 Z( e) G @* E( \* d2 bDevelopment Center, Rome, NY term). ; u, |7 Q- d- [9 P7 v9 [CSRD Computer System Requirements Document. 3 k& |+ N) Q8 i, ^0 sCSS (1) Cooperating Space System. (2) Communications System Segment. (3)- p, K$ P, J$ [" W8 p p Contractor Support Services. (4) Common Sharing System. (5) Communications / |! V/ c8 l9 y" oSupport System (Navy term). (6) Common Support System. (7) Combat Service # e1 }7 e: y+ ?& V; t9 n* v( Q4 cSupport.5 Z5 o6 U* F7 G/ n* j/ N! K! f# E CSSCS Combat Service Support Control System (USA term).) r: S0 ?' l2 v3 ^1 ~* A CSSPAB Computer System Security and Privacy Advisory Board.3 U: G+ R/ z3 r9 n3 b CSSO Computer Systems Security Officer. $ T, k" _; l1 }CSSTSS Combat Service Support Training Simulation System (US Army term). # c0 b* \& [; Y6 PCSTC Consolidated Space Test Center. 2 V7 c; b5 l& @' Z I5 L8 }CSTI Civil Space Technology Initiative. % b( j7 A% u, o$ QCSU (1) Computer Software Unit. (2) Communications System Utilization. ; [6 x' |- I7 m5 NCSUR Communications System Utilization Report.1 |% j2 O& I o& G CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.- v0 G+ c: ]7 c G# }. F9 ?0 M (4) Cryptologic Technician (Navy occupation specialty).; y" v4 g$ d% v CTACS Contingency Theater Air Control System (JFACC term).5 B- X9 \, I$ H5 ?4 A* }. t8 G CTAPS Contingency Theater Automated Planning System (USAF).* u) v8 o. t, L, g CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ! z9 V( Q# }$ E9 a+ WCTBM Conventionally-0armed TBM.* l, E2 U* E/ F: A CTC Combat Training Center, Ft. Leavenworth, KS.7 e3 w$ Y8 m$ ?/ L" X3 \" m CTCC Critical Technology Coordinating Committee. . {# T7 ?9 l" T# YCTD Communications Test Driver. ) D3 I ^9 W1 b( Q; ECTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. ' d/ ~/ T- h8 O/ y3 r: n1 \. u. Z" ~CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally - Q7 }1 n, N8 hfunding selected test investments proposed by the Services and Defense 4 }6 z$ q/ e/ \5 r5 V- f$ uAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C 9 N( x" B0 V0 q! m, u5 X2 U68 / t9 p; n4 Z) n4 T1 K( U! w5 fCTF Controlled Test Flights.9 U+ E( B9 P; F! q. M CTI Concept Technology Insertion.+ H7 N9 l5 N v CTN CALS Test Network. ) i- R: }4 F& j# T4 Z: UCTOC Corps Tactical Operations Center.& M3 D1 A( k& e- p n, D) r CTOL Conventional Takeoff/Landing aircraft.; K- B4 f& K/ h7 K3 `* v CTP (1) Critical Technical Parameters.' Y6 M6 Z1 R0 R$ j (2) Communication Tasking Plan.6 V8 n! T) c, M$ A7 s$ F (3) Consolidated Targets Program. & X7 m% l9 u l/ Y2 _CTPE Central Tactical Processing Element.1 m" P" e6 ]! L6 h2 s CTPP Consolidated Targets Program Plan. + G7 d0 A+ J/ D; I" M% lCTR Cooperative Threat Reduction (Treaty negotiation term). 9 B* j; a& @# d" U5 _" {" ]CTRS Centers 5 @: W6 k L- S L6 mCTS (1) Clear To Send (TelComm/Computer term). : ~ @- W4 d2 t2 G; G/ q2 f7 [0 G(2) Contact Test Set (USA IFTE term).( W# j4 H$ H9 T- h- b CTSS Computer and Telecommunications Staff.) T9 q( w# R4 n. @" M! t* p# [ CTT Commander’s Tactical Terminal (US Army). " J+ P& w$ B' A4 H0 ?2 t& t: tCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). & X& c7 h& P5 y. n7 X6 GCTV Control Test Vehicle(s). / p* d+ l; T6 q2 dCUDIXS Common User Digital Information Exchange System. f# U4 i# \( |. |1 \2 X! x& v Cued Operation The directing of one sensor based upon the data received from another sensor.7 z$ N5 }+ t) v. ]$ V6 W- y Cueing Command The command within a tactic, which specifies the sensor element’s coverage 9 w# S% V. b: pvolume. ( j, N3 H" C# h5 L R0 \Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage . u+ j% h+ v* R, i: |' V/ evolume. 6 o# j7 h' c- N2 O: L! U" MCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. ; A4 \: t: Z) K- a; q4 r5 kCV/BM Carrier Vehicle/Battle Management. - F0 t) l* x7 R/ I% o& [7 y$ uCVBG USN aircraft carrier battle group.9 I5 }8 f+ h" ] CVHG Carrier, Aircraft (V/STOL), Guided missile.0 c+ \1 ~3 H0 }* c" S; P% W CVISC Combat Visual Information Support Center. ?# ~! }& U( L- D* t) ~, |" }1 x CVL Copper Vapor Lasers.0 y5 a" p/ g; z7 Q) z* J' l5 ? CVN USN nuclear powered aircraft carrier.9 S* y8 \/ B" @7 L8 ~% f MDA GLOSSARY, VER. 4.0 C- C$ {2 {# r1 ]0 H 692 G g: H$ Z# F5 \1 q3 n O CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 1 i- J/ E2 X; L# J5 g8 TCWAR Continuous Wave Acquisition Cycle (Hawk).0 r# Y4 |$ t4 H |+ n# U# C/ C& t CWBS Contract Work Breakdown Structure.( t8 d7 L: e# }: x/ u CWDD Continuous Wave Deuterium Demonstrator. ' m3 S' A5 ?( F, b1 e7 ], |CWIPT Cost Working group integrated Product Team.+ \, r3 J1 `+ C) c8 H% \; X% G3 x CY Calendar Year.( n& g& K! Y- `3 U } MDA GLOSSARY, VER. 4.0 D ; I" h! n. k$ n2 e9 x% } ~71 # @8 O" p9 ]3 s% Y5 f2 MD Deuterium 8 c, V, Q* m, Q) _ z# DD Spec Process specification.. b! j+ ~% F) x2 ` s' g5 ]0 A D Star Measure of infrared sensor sensitivity.- Q# N1 `8 U# o% m1 D. m D&D Design and Development 4 g8 L/ M6 G* K2 H* N4 F4 p9 {D&T Detection and Tracking.6 s; w7 u/ j6 [7 [4 B( r: { D-IFOG Depolarized-Interferometric Fiber Optic Gyro.3 s" l4 o7 L y) O- ^5 l D-Level Depot Level (ILS term). 5 Y) A" T6 B2 s. n: ND/A Digital-to-Analog " S& z1 V0 Q) A$ U2 c' yD/V Demonstration and Validation. 1 m# D5 v6 v5 W7 C0 ND2 Projective (interceptor) in the Hyper-Velocity Gun program.7 t5 I& `6 t( N. u$ e4 p( ? DA (1) Department of the Army. & U* k/ A8 \( V, h: k- W(2) Department of Administration.! I' R7 V+ y# `7 T( A (3) Decision Analysis. % k) _ @$ e: }9 @% M' m! C(4) Developing Agency/Activity. F5 h' Q8 {7 X% n- |1 g(5) Data Administrator. & ]! L3 S2 Q( x6 M0 Y, {" |& _(6) Direct Action.1 w5 I$ l6 ]; U (7) Data Adapter.2 l$ m8 a7 w3 w" R/ B" L, F' Y5 n: P DAA Designated Approval Authority (DD 5000 term).! h% r" e8 u) p9 n- K DAASAT Direct Ascent Anti-Satellite. 0 i3 ~1 ^. Y! ?DAB See Defense Acquisition Board. $ _1 n, ]- }+ l2 r& I1 j& r/ Y, h' {8 [5 aDAC (1) Days After Contract [Award].5 R) ]/ X; t' i7 s w (2) Department of the Army Civilian.3 G' x6 u( ~* H9 K (3) Directed Attack Characterization.) Y3 C% V ^! p) L: t! o (4) Deploy ACCS Component.4 `! u' s' g( V# d9 @1 w6 K (5) Digital-to-Analog Converter. - ?0 v, h, ^' e% d- u- HDACS Divert and Attitude Control System. : H7 {1 [! v1 r& z; Z7 `; j; CDAD Defense Acquisition Deskbook.2 X- X- d4 Y6 t4 N0 J3 J/ N DADS Distributed Air Defense Study (1993). $ R+ Z! a9 U5 I( \' EDAE Defense Acquisition Executive. 6 G# a; ~' L; Q- i7 k/ I1 VDAES Defense Acquisition Executive Summary. 5 ?) ]: `- [# u4 ODAGGR Depressed Altitude Guided Gun Round. 3 |8 E- l+ d$ nDAHQ Department of the Army Headquarters. ( ?. f2 L+ i! K" g1 s! CDAI Damage Assessment Indicator (targets).# T: I. o3 R5 D! N. \ DAL Defended Asset List. 1 |9 {. c6 e9 g& Q$ cMDA GLOSSARY, VER. 4.0 D& g, s3 I3 s, J+ I `/ V 72 8 k K+ A% m9 M4 c. M5 X1 u/ C5 HDAMA Demand Assigned Multiple Access. 7 y7 J; \4 {5 G. a) _, SDANASAT Direct Ascent Nuclear Anti-Satellite.) F. \. ?- m/ X# x+ f( c DAPR Director’s Annual Program Review (SDIO term)6 Q/ g* |* e5 H. W5 t7 f! N. x4 X DARO Defense Aeronautical Reconnaissance Office (OSD). $ i6 _! A3 t3 a, N7 O# CDARP Defense Aeronautical Reconnaissance Program.& D: @, v X- E P( `1 U DARPA Defense Advanced Research Projects Agency. See ARPA.3 C3 i7 `; L Z5 X L- Y# C DART OBSOLETE. Defense Acquisition Review Team. $ q- R4 n3 P* B. kDASA German Aerospace. Member of the MEADS Program Team.6 d4 u0 w6 \) t. r5 T DASC Deep Air Support Center (JFACC term)., x* \; X; I3 f2 Q8 m! E% q DASD OBSOLETE. Deputy Assistant Secretary of Defense. . A7 w. [9 }& KDASD (C3) Deputy/Assistant Secretary of Defense (C3)' P, k3 p) W( X4 t! S& R- } DASO Demonstration and Shakedown Operation. ( }4 X# O! h9 g5 \Data Integrity The state that exists when computerized data is the same as that in the source z) Q# R/ F- d, Y+ Z4 r documents and has not been exposed to accidental or malicious alteration or3 {" l4 [% }3 j0 d3 w destruction. 5 y6 i0 D+ M2 ODatalink (1) The means of connecting one location to another for the purpose of6 h/ w! M- r h transmitting and receiving data.0 v/ g8 V8 T- w& u- w (2) A particular path between two nodes over which data is transmitted. It/ ` u3 ?' J( C; v includes not only the transmission medium, but also digital to analog; V1 W$ ]5 @: q9 P0 k% ?& T converters, modems, transmission equipment, antennas, etc., associated ( l2 Z8 o# ]" T9 U; n& Uwith this path. In the SDS backbone network, it was a path between two : C; M1 |6 P: ^SDS elements. In space these datalinks were microwave or laser. On) U, I% }- ?" x3 _ the ground, they could have been wire line, microwave, or optical fiber. ! [. l3 A9 c/ z, p* ~$ _1 GDAU Defense Acquisition University, Ft. Belvoir, VA. 6 Z0 o2 K; w6 g! pDAVID Development of Advanced Very long wavelength Infrared Detector (USAF 8 z2 q6 h0 L: F0 T2 D/ I2 h2 rPhillips Lab term). ! O! t7 z% X9 D: X0 R. uDAWS Defense Automated Warning System." r4 [! m( V1 c7 w) n9 r ` Dazzling The temporary blinding of a sensor by overloading it with an intense signal of 9 O; G+ ?$ v4 X1 m) T% Eelectromagnetic radiation (e.g., from a laser or a nuclear explosion).; i W. X; m! ]1 s DB Bata Base 1 ?: g0 L" ~. rDBME Database Management Environment (Computer term). , w0 `( |/ Y& X, k- L3 V9 FDBMS Database Management System. , e7 }( s- `7 J% J% t7 cDBOF Defense Business Operations Fund. 5 W8 u c3 t4 w/ U( RDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D' v1 r; E6 x- k4 K5 ~* p) | 73 ' d! W7 i( p& D1 \: jDbsm Decibels per square meter.- r7 S4 S0 L2 ? DBSM Database System Management.; t; u! p8 f6 }6 P" E- h) r DC (1) Disarmament Commission. (2) Direct Current." z0 p2 [$ K5 `9 w DC-X Delta Clipper Experiment.3 a. o: D- b: i5 T+ v1 N DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications ! j, U& N5 |: x& j1 v0 a" z. I |' FAgency. (Now known as Defense Information Systems Agency (DISA)). $ I, G& k! I( v4 D/ g, UDCAA Defense Contract Audit Agency. - g5 u( o$ j% dDCAS Defense Contract Administrative Services.3 |/ C' [" R1 I7 g* y/ U1 j! s6 ^$ g DCCO Defense Commercial Communications Office (of DISA)., ?1 O1 |- X7 R+ r1 Y4 p DCDS Distributed Computer Design/Development System.; D0 |2 C* o v2 l% M1 E7 j DCE (1) Data Communications Equipment (TelComm/Computer term). & g7 D1 H$ \5 e3 Y9 I/ ]+ p. J(2) Distributed Computer Environment.) W0 N0 M+ h+ L; p DCEC Defense Communications Electronics Command. 0 m( ?: V& B# F4 t6 |DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. / t% P8 x. d7 K' `5 I/ SDCINC Deputy Commander-in-Chief. 7 [5 B8 [- E) l0 Y. g$ ADCM Defensive Counter Measures.# \/ o0 P8 ?6 \; r, o# X' q DCMC Defense Contract Management Command 6 f; c, x1 i( U& bDCN Document Change Notice. R% e5 z! R6 ? DCO Director of Combat Operations (JFACC term).* d: q/ @- s3 _% K( r4 c2 i DCP (1) Decision Coordination Paper (see ADM).9 e1 A. O5 ^+ t9 t6 _% x (2) Director of Combat Plans (JFACC term). : S" e4 U1 ^: n: Y. S) {* uDCPG Digital Clock Pulse Generator.1 i6 f9 l7 m; n( q: w) | DCS Deputy Chief of Staff.2 O; [ }: g6 p8 M7 t DCSOPS Deputy Chief of Staff for Operations and Plans (Army). . h* H- b) V" j0 K* dDCT Digital Communications Terminal$ v. {/ Y, t2 r& w' ~ DCTN Defense Commercial Telecommunications Network. 3 N: ]. t% w a) iDD Variation of DoD. 2 G! ~5 \ b4 D5 r* a9 GDDCI Deputy Director of Central Intelligence. $ f. {0 D: Q0 \ A- h1 r" ODDEL Dwight David Eisenhower Library, Abilene, KN (army term).0 W3 T# L8 M0 ]$ g. ^8 F) P) @! o DDG USN guided missile destroyer.8 ^% W* o- p8 ]1 P0 r0 L MDA GLOSSARY, VER. 4.0 D% p+ }$ b0 `( Q) E 74# J3 D; [1 o$ v4 q! D DDL Disclosure authority letter.$ A. N- f5 o1 m9 m DDN Defense Data Network., _! C/ E6 g/ S6 g- V: U0 j! [4 b DDR&E Director, Defense Research and Engineering.8 }: r* N" p2 G- q9 X DDDR&E Deputy Director, Defense Research and Engineering. ' L7 G; e; H7 B u. B8 IDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). . [ ~; y8 c UDE (1) See Directed Energy. (2) Delay Equalizer. 1 _( v4 ?( J9 r* Q2 L& N, \+ eDEBRA Debris, Radiance Model.* N- |3 w8 H/ {; ?" I$ ^3 \ Decentralized' [3 r: T, G! X6 l$ N, [3 g Control - _$ _( f ~$ a/ {# p+ P# zIn air defense, the normal mode whereby a higher echelon monitors unit actions,$ d+ b5 H! k" A( }& t/ \2 q making direct target assignments to units only when necessary to ensure proper V: Q T$ I' r* ?' jfire distribution or to prevent engagement of friendly aircraft. ) _$ X2 p' `# E) A5 o( cDecentralized # H+ N+ _7 I/ F. v5 n3 p4 P- h; |Execution) g9 S1 n" m9 N7 Z The distributed and integrated implementation of USCINCSPACE direction by* a; Z. {/ l6 L% @! V W7 u0 V* ^! l; O the BMD forces. (AFSPACECOM)/ ], K6 K D3 W8 | {" V Decommissionin * x$ e7 p' P7 U1 I7 C" _) A( L4 ig' C8 w' B" G _( F The removal or the rendering useless of obsolete or no longer needed2 T" u: Z! K6 Q) H components of the BMD system from service. ! b8 M8 j2 Y/ q }6 ^( v7 ]; v( ODecrement A directed funding level reduction for an acquisition program.- r" P: m t# r5 `( q7 r- C. g DED Data Element Definition (Computer term).$ b3 h |/ x* B5 j' j Dedicated Mode / r1 f6 E3 X$ ~- [- n1 K" Xof Operation7 s. k& I! W6 g5 L/ J (ADP Security) ! j3 A& p" f$ q7 _) l, V+ ^' X; y lA mode of operation where all users of the AIS possess the required personnel & D1 H+ p( R2 O' S |% J. asecurity clearance or authorization, formal access approval (if required), and a $ s& E4 `. l9 W+ G- F. ENeed-to-Know for all data included in the AIS. / n7 K, ?6 P2 c& B T( S' lDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about + P1 o- X3 G9 H6 A4 j8 D2 A, a) [6 Z5,600 kilometers) above the earth’s surface. o0 S) u9 a- h" PDef Definition. 9 n2 v) q3 q; iDEF (1) Defense. (2) Demilitarization Enterprise Fund.; c0 B) t4 K+ n( e# d DEFCON Defense Readiness Conditions.3 ^# k" t: p( a: h0 B) _! G Defended area . o' S1 [6 l5 k6 Z ycoverage * z6 [2 ? n0 S& hDefended Asset2 ^9 A7 f. u9 k* K1 D. s List (DAL) " S/ a3 C2 O5 i( `5 T1 E3 G3 xThe geographical region that the BMDS can protect from ballistic missile attacks ) k( {* }) f2 |. q2 Gwith a specified level of probability of negation. May be specified for a particular 4 H4 T% r# E) T% @threat type, launch point(s), launch regions, raid size, etc.2 `8 e, h* Q" \. R0 Q A ranked listing of facilities, forces, and national political items that require) P5 N# q9 I F7 j- ^2 P2 H/ P protection from attack or hostile surveillance. The list is compiled from Federal8 j% x+ M1 m1 D: S; `' y departments and agencies, Unified and Specified Commands, and the Armed 0 F1 Y1 [/ q0 JServices to ensure National Security Emergency Preparedness functions. - l& [7 z8 c. E4 z! {$ F zMDA GLOSSARY, VER. 4.0 D 4 E3 H7 g& V: k3 E/ b" z! X75 $ A9 D8 \) N! t! `2 _! z7 U: ^4 yDefense ; A0 y' B' C# Z$ |* ?8 i1 zAcquisition4 b* ~) `3 {+ b1 s* C$ @1 v Board (DAB)0 ]. ~. o% G4 I" R" t7 m The senior DoD acquisition review board chaired by the Under Secretary of" E% H/ x2 y0 g+ ` Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the 0 Q5 P5 {* G S5 U8 C8 }( nVice-Chair. Other members of the Board are the Deputy Under Secretary of _4 K0 m! _6 R2 L. f Defense for Acquisition and Technology, Service Acquisition Executives of the - A g2 q* I& y+ t2 ^, zArmy, Navy, and Air Force; the Director of Defense Research and Engineering; 8 V. T |/ k' r1 W) X6 y( Wthe Assistant Secretary of Defense for Program Analysis and Evaluation; the : E9 e$ T6 Z9 ^8 hComptroller of the Department of Defense; the Director of Operational Test and) p: o$ r2 R+ b. f& s) z( j Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the6 l' |, H$ ?1 j6 k Defense Acquisition Board Executive Secretary. Other persons may attend at- x" T/ x6 ^8 m5 C/ `4 f3 X: Z: X& t the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition; K: s2 W2 n5 E8 h Board.”)8 X; ~% Y0 _1 g Defense : o# }5 r5 F" E+ S' jAcquisition ( }4 b3 N4 `) q1 qBoard Committee- {' d- i$ q1 y Advisory review groups subordinate to the Defense Acquisition Board. The 4 v# _% q- I1 t. q Y4 hUnder Secretary of Defense for Acquisition determines the number of4 ~& @6 Q% r# d Committees. The purpose of the Committee is to review DoD Component 4 F$ r3 @( Y) D W* J3 ]9 H/ Wprograms prior to a Defense Acquisition Board review in order to make an 4 z$ u# a q4 d% F1 t8 q- B3 `& d1 V4 ]independent assessment and recommendation to the Board regarding the 2 D7 Q9 W# T& V2 M3 Hprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense( e# O V6 M) c# k& J Acquisition7 t( n& R0 C/ z Executive (DAE); t1 J8 v. c( p. g The principal advisor to the Secretary of Defense on all matters pertaining to the $ ?: E ]* E: c' f3 fDepartment of Defense Acquisition System. The USD (A) is the DAE and the4 `. S- G( [/ e, X- \; S" { Defense Procurement Executive (DoD Directive 5134.1).) [# d+ p" B( C" y" a Defense : A& l" E6 Y! \Acquisition9 x W' t8 k. E; ?$ U; E Executive% g$ `5 D* I1 R( k7 I; @) B0 Q# J Summary (DAES)( l8 C# F& A- z; r% C5 D The DAE’s principal mechanism for tracking programs between milestone% a, [2 e. g* L; L+ Q9 h# w5 C5 ~ reviews. Includes programs subject to the Selected Acquisition Report (SAR), 6 |) G3 c$ u6 x p, m% {and any non-SAR programs subject to review by the Defense Acquisition Board. 0 n( d1 O' z$ B6 QDefense ! L* }; \, Q/ e; l3 |# pEmployment; _* _* ?; \$ w Q. N" `! E+ g Option (DEO)5 C2 ?4 ^: i4 J9 k# K Engagement strategy provided to USSPACECOM component forces to achieve8 ^3 p2 B4 }3 N& i/ T; S specific military objectives against a ballistic missile attack. It defines hostile& t: ]6 N' p7 p target priorities, provides assets to defend, and allocates SDS resources to be/ S9 m* W! u! i# P9 Z& T% m B employed. A number of DEOs may reside in a particular Preplanned Response : p( v; Y6 ^$ [0 s5 n# XOption (PRO). However, default DEOs (those believed to be best suited to% b9 V$ E* z$ P# @7 Y4 L counter the threat initially) will be automatically processed and executed when; l, T0 U4 J) W- R! P Defense Activation Authority (DAA) is given by USCINCSPACE.8 ?$ L1 [" Y* U; c& E5 ` Defense ' e% I# P6 q* DEnterprise * m6 a9 W% b+ ]+ x9 l' xProgram (DEP) ( x+ {* {7 g) n% C. b% _- f. n* BAn Acquisition program designed to streamline the acquisition process by waiver * ^2 u! I) S' y8 nof selected regulatory requirements. : l3 L' N" j# q& m2 RDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb 1 D5 `" K: V. a1 ~, r9 K9 Yand progressively weaken an attack, prevent initial observations of the entire+ v" D4 D6 S+ w) c position by the enemy, and allow the commander to maneuver his reserve.# R1 {3 a" {" w" K K$ d7 { Defense " i, B6 i2 R0 g6 uMeteorological . V9 _ x; @; \4 @Satellite Program/ a& E6 f/ @/ S A0 Y (DMSP)- q5 o, e7 N& ^9 F$ o Satellites designed to meet unique military requirements for weather information.3 T. ^/ ~# x- s Used to detect and observe developing cloud patterns and follow existing ; x0 l: O3 E. g8 ^/ N9 tweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.) g( }: q4 ]& Y$ O$ @' p1 K. _+ l Defense Planning/ L5 b i: I5 _ and Resources2 R' }2 d# q c$ M! T7 v Board (DPRB). s6 m X0 k! d A board, chaired by the Deputy Secretary of Defense, established to facilitate + Z5 o( V. M9 b% _decision making during all phases of the planning, programming, and budgeting0 }3 V1 H, `/ x system process. Board members include the Secretaries of the Military 4 J" p$ p6 \4 ADepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of/ m q- H+ `! C% }' ^$ _ Defense for Acquisition and Technology, and Policy, the Assistant Secretary of9 ]% l1 }+ p+ o- m* P Defense for Program Analysis and Evaluation, and the Comptroller of the 2 _; E* l, }) o0 C% z7 JDepartment of Defense.9 \& z$ K0 }* B( R MDA GLOSSARY, VER. 4.0 D . d2 X# C% s1 b& f76" _* E; M: O) h6 q Defense Planning# L, m1 @7 b2 Y$ D# F; a6 [9 [' v Guidance (DPG)4 E: r: S- F F* s3 B5 J) N3 u2 G$ w$ { Document issued by SECDEF to DoD components providing strategic framework / v0 W# @) A5 B9 Sfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, 9 a z; f u3 Z$ n: q$ b( z0 `2 }+ `and Services. In connection with two-year budget process, DPG is issued every : O. H" O- E$ rother (even) year.! j w% Y, Y% x' k& B2 f Defense Priority - K9 u! a" X- V l4 u; fand Allocation |$ k6 K, I, |. v8 Z* C System (DPAS)9 V' L+ p' C) u; `! | The implementation of a statutory requirement where contracts in support of& z# T( z5 j/ _9 Z H7 D national defense must be accepted and performed on a priority basis over all% M* I( u- t- ?4 K/ P: Z other contracts, and which requires the allocation of materials and facilities in, Z9 H( p% r6 y* ~' h such a manner as to promote the national defense. See “DO” and “DX.” . i6 L1 m) ~ d) tDefense6 Q, w2 J: E p2 U3 Z1 v% A0 f$ M Readiness8 j3 C% g# s# p! s+ ^2 q# k Conditions. a5 h1 g. \2 Z! j7 P/ p- q3 ~ (DEFCON) 3 h" U- V; _& a( N3 BA uniform system of progressive alert postures for use between the Chairman of+ v& x T& h3 _$ O p+ J" N3 c the Joint Chiefs of Staff and the commanders of unified and specified commands C/ c( i" L9 y" n# V" N and for use by the Services. Defense readiness conditions are graduated to " X) `7 @, s1 bmatch situations of varying military severity (status of alert). Defense Readiness ! K: z: z! d' [% F3 e& \Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as6 P \* ?$ D! w D( D appropriate. * E7 T. Q, ~6 E7 D# a5 ? ZDefense Satellite / K$ Z# T; P# uCommunications+ W4 M4 S) Q. r9 K7 b Systems (DSCS)$ X. h6 f9 q0 K* x0 f Advanced communications satellites in synchronous orbit around the earth. - G% M! v, \; N" i6 m" iProvides high-capacity, super high-frequency (SHF) secure voice and data links : P: }2 O, N+ u' ]for the Worldwide Military Command and Control System (WWMCCS). They : @/ }4 H* f: s7 ^support terminal deployments for contingencies; restoration of disrupted service+ P# o# l, H7 H% Q/ Y overseas; presidential travel; global connectivity for the Diplomatic ; a. @. l& N* C! `' H' FTelecommunications Services; and transmission to the continental United States " }8 q/ d8 P2 H/ Mof some surveillance, intelligence, and early warning data. 4 o0 E1 w; t# o% ~- ^- w3 tDefense Satellite ) x& y8 {" l, S# H5 ~ R& c' Y(DSAT) Weapon ; @( i+ l* W' x4 IA device that is intended to defend satellites by destroying attacking ASAT4 Z/ P( p" V: @& G weapons., a5 h' o; N0 |# u Defense Support 5 N3 k/ n% g. _6 dProgram (DSP) 1 O- C6 h/ ^" { N, I' J) lA system of satellites in geo-stationary orbits, fixed and mobile ground8 H: h- h, v: p9 _* d/ y; h processing stations, one multi-purpose facility, and a ground communications . c% e! @- o( Z+ K d" lnetwork (GCN). DSP’s primary mission is to provide tactical warning and limited $ P8 [( i3 V" ]3 Qattack assessment of a ballistic missile attack. 1 u6 [) O; j, N# k1 wDefense 6 _, S* W8 N( z5 d, |$ E1 lSuppression; n _! J J T4 i1 E Temporary or transient degradation of the performance of a defensive system6 u8 a4 \$ _( _# M& { G. J below the level needed to fulfill its mission objectives, by an opposing force. ! G5 a; P5 B- h% m, F. }(USSPACECOM)$ u5 J, k4 |4 `9 `9 [/ v3 G1 K$ K Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic/ g2 \' F8 `) Y9 ^0 E/ S missile trajectory; i.e., boost, post-boost, midcourse, and terminal. ; H3 H) e/ z; a' Z3 o: z FDefensive ( Q; J% W5 G$ h7 gCounter ! J3 Q* |- [) U/ ^$ M* m- ~4 OMeasures (DCM)7 T4 z0 ]$ {' k) L4 p Actions taken to eliminate an ASAT attack. 5 d8 ]8 F. |/ x7 c# c* hDefensive6 S3 b- t4 _5 P- g. t" | Technologies 9 c( O* W" c5 a* ^; b9 n1 UStudy Team( [; W7 [$ h7 ~% `7 u. P3 Z (DTST)2 o6 d, B7 M1 W. @- p+ A A committee, generally known as the “Fletcher Panel” after its Chairman, $ g9 K7 o& r) h( v: r; Bappointed by (former) President Reagan to investigate the technologies of 8 k m0 e1 J, P8 Mpotential BMD systems. ) r: ]/ w) W9 @% fDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.# u* A" X! s: M# J! {7 ?/ H$ D2 i DEIS Defense Enterprise Integration Services (ex-DTIS).' |* W9 j0 M9 _3 X$ f DEL Delivery.0 H. |( K- { D% b Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion4 w. D/ l; W" v5 c of shots about the aiming point. See also Circular Error Probable. ; C5 P* s/ q7 _) @6 s, M% e4 SMDA GLOSSARY, VER. 4.0 D 2 i3 N2 ^+ e+ t4 b/ t3 k77 - m6 f0 m( Q: h3 u& XDelta-V A numerical index of the maneuverability of a satellite or rocket. It is the ! z/ ]8 G- ]: l9 }; T7 v2 imaximum change in velocity, which a spacecraft could achieve in the absence of & I; q' m: u) M6 Z( ]5 F* Z+ aa gravitational field. * j) X8 w. Y2 Q/ z3 k& Q) W6 iDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).. f( n6 G% ~* m' A: N5 \: s$ ?0 J e Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its$ ]$ k7 u) q. r; m6 D desired function (matching RV characteristics, screening RV, etc.)1 A2 W- k, a( U4 z! ]- _% u Y7 Y5 j DEMO Demonstration. 9 `) s- Q3 ?% C& EDemonstration % z, q. X7 R9 Q! Eand Validation( q! u/ j2 _( B7 J$ B1 l (Dem/Val) 8 _; d0 x) v7 c, F9 v$ TThe acquisition phase when major program characteristics and product designs8 @9 j6 H } r) ] are refined through extensive study and analysis, hardware development, test,+ t% ^4 N+ |5 p% p6 ` and evaluations. The objective is to validate the choice of alternatives and to$ V% P; o, m, T4 L- e Z( T1 @ provide the basis for determining whether or not to proceed into Engineering and/ y3 p* `! R! k. \ Manufacturing Development (EMD)." {7 L; y2 I* I/ p Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.6 P" K$ D1 v' p9 J. C, _$ B: }) Q9 _ It may include destruction, removal, contamination, or erection of obstructions.* @9 |" I& o9 o7 k# Y4 ~" M% j& f6 Z DEO Defense Employment Option.; h$ m# ?9 g9 q0 X7 f" f" r Department of) u. N& ]/ Z8 C! ^ Defense j0 {2 \2 _3 N9 r! }4 c* T& h Acquisition+ w; p5 B* q) D, \1 Z- E. l System+ |( A* x! _: }; l A single uniform system whereby all equipment, facilities, and services are* ]% n0 H* L% Y! r0 b planned, designed, developed, acquired, maintained, and disposed of within the # K! X' E9 K: s7 U2 d( XDepartment of Defense. The system encompasses establishing and enforcing* x: P. l) Q* v policies and practices that govern acquisitions, to include documenting mission 1 w! x4 W9 ?' |3 r! p- S, `needs and establishing performance goals and baselines; determining and . }3 S% ?) U8 w% Iprioritizing resource requirements for acquisition programs; planning and % G/ @- g; S# O# H6 h$ Q2 Cexecuting acquisition programs; directing and controlling the acquisition review , u, z5 _; a- K% F/ g/ Z+ o# r( ?$ iprocess; developing and assessing logistics implications; contracting; monitoring : h- m+ s" G; {the execution status of approved programs; and reporting to Congress. (See* I9 W j& W# @) V DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) 5 U8 B- M& h5 I1 u4 S0 t1 o9 c. v2 lDeployment (1) The placement of force elements in battle positions to obtain a higher : _6 u+ @$ W3 A" Tstate of readiness. 4 E2 s, a( v! U8 P) Z3 x(2) The movement required to place force elements in battle positions.) e3 m2 z5 B* q) a( D. U. ?/ t0 P (3) Fielding the weapons system by placing it into operational use with units7 d' \" G6 G0 m" ^$ e1 c in the field/fleet.! l( a/ |* m; q5 Y5 p% T! U (4) To arrange, place, or move strategically. ) p* {, L+ O s7 z3 `Deployment ; n% l' a7 b: b9 H* [. Y2 {Planning * k0 N. ^2 i; m# o(1) The development and maintenance of plans required to initially deploy,3 T) ?- U/ w* F1 d maintain, and evolve the operational system in accordance with 0 r4 L" p; L. P* y2 D- ?0 p2 @, o8 e& Ischedules and priorities. It includes factors such as launch facility* F+ R# m5 K w# n9 C# o% Q availability and planning for the availability of other required elements- U" I) f* u) n) y such as trained personnel or units. In addition, it identifies the impact of 4 x' m+ T: m7 n' @* y0 tdeployment on operational readiness and any testing constraints 2 T# A5 ?& p% C ~( l5 x3 rassociated with deployment. % u8 m7 `8 B9 }$ ?(2) Encompasses all activities from origin or home station through ) y4 W& f0 Y" ]3 g: E3 odestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding 4 |# j: m1 m2 K9 K6 Kareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment 5 J& s2 K/ z4 ~* I7 {Testing : V8 e+ ]+ r9 oThe testing and/or simulation of system assets in the physical and operational ?- E1 L4 I/ e, u1 y) i environment in which they are expected to perform., W3 e: e" u/ }1 ^. { DepOpsDep Service Deputy Operations Deputies. ) M* N: F# q9 @6 uMDA GLOSSARY, VER. 4.0 D ( K% X+ {+ t" g8 z78 % Q8 M. ?" D! F( WDepressed - L# ]% g# \2 F" J4 `% r' g6 `" fTrajectory- V% F. m9 ]# j" A Trajectory with an apogee below that of the minimum-energy trajectory. R2 f$ i7 f8 n% Y. s& o) y8 V. x DEPSCoR Defense Experimental Program to Stimulate Competitive Research. & j" ]& u) Q( k7 @DEPSECDEF Deputy Secretary of Defense.* U" B, |3 Q3 E( E4 G DeSecState Deputy Secretary of State. ( V, U3 S" S1 ]& y0 vDERA Defense Evaluation and Research Agency. Consolidated research and( I& ]; N" S" H development resources of the U.K. Ministry Defence. Headquartered in - V1 M$ @% C# j# g& |: ^: l9 N6 \Farnborough, England. ! Q v. R. A0 x& t9 Z D% \Derivative 7 _2 R; t. h2 t. s# f6 N# ^Classification 0 A5 \0 V* J8 g3 f: {% Q5 }0 dA determination that information is in substance the same as information ; w, ^6 u# B* D2 gcurrently classified and the application of the same classification marking. ! ?& y) W4 d, h. f" i# b$ J( DDES Data Encryption Standard.3 j/ G/ f$ \% o DESC Defense Electronics Supply Center (DLA term).8 l$ `- M# u7 u" P w, Y Design 4 \3 x) z5 T7 `Constraints6 g3 C& e# }& t7 E$ |- F Boundary conditions within which the developer must remain while allocating 5 f# o% b4 [# o: O4 Iperformance requirements and/or synthesizing system elements. 3 c* q2 Y2 p3 KDesign # H0 x% `8 \# L. X! w6 W+ W, g; yParameters ! V2 x( I4 y* c+ `1 jQualitative, quantitative, physical, and functional value characteristics that are3 B* |* p( y2 {9 S G3 O5 F f inputs to the design process, for use in design tradeoffs, risk analyses, and 1 a, q* ~& I y4 ?3 Mdevelopment of a system that is responsive to system requirements." D1 N" ?7 n5 c Design Phase A period of time in the software life cycle during which the designs for - K" S/ H9 V6 ?% Q+ `5 `architecture, software components, interfaces, and data are created," ]4 Y* N; W& j3 E- B documented, and verified to satisfy requirements. 2 Q: z& ?' e, A% D! b: T4 \Design-to-Cost 2 W) d, V. ^5 J7 \4 m( X1 }- q(DTC) Goal! {/ V' f1 n) j0 t' { Management concept wherein rigorous cost goals are established during / r, t* ^7 d, \! A0 o7 c- mdevelopment, and the control of systems costs (acquisition, operating, and6 J# }) P* N4 @6 y: ?' Z% G support) to these goals is achieved by practical tradeoffs between operational) B5 [8 G {- @, C1 ^ capability, performance, costs, and schedule. Cost, as a key design parameter,% D3 {5 X- @! c1 d is addressed on a continuing basis and as an inherent part of the development 0 A5 Q3 @, g* jand production process. A DTC goal should be in the form of average unit4 b9 C7 R$ @ e8 v3 A/ H flyaway cost. Also, DTC parameters for operation and support will be3 m' Z6 P$ W6 e N* `: g selected—parameters that are design-controllable, significantly affect O&S costs, & y* N m; _% c9 q& q2 `" t/ O9 Mand can be measured during test and evaluation. Parameters may be . b; V* l6 \! {- A; rexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or8 l0 g& i2 z) V/ ]( F maintainability. Firm goals and thresholds will be established no later than entry 2 c, [$ m9 E6 q: qinto EMD (Milestone II). This is an in-house goal, almost contractual in nature,4 n! t* F/ P, C$ G4 M between the PM (Service) and the SECDEF. Allocations from this goal will4 r. t' Y5 G3 c$ j0 C A/ g1 ? become the contractual DTC goals for contractors supporting the program. - v: w8 i2 ~# u. g7 SDet Detachment. * s! E. |9 }# t3 Z: t7 t3 g3 YDETEC Defense Technology Evaluation Code. + q6 C3 q# m* k! [! WDetector A passive IR, visible, UV detector turns photons into an electrical signal. The" z- K" Y8 `( g& r0 W( _5 [% j4 E IFOV of the detector is its solid angular sub-tense. There is sometimes 8 ^0 b0 h" }6 b; sconfusion between the detector sub-tense (size) and the pixel (picture element& h, w1 Y8 S3 m4 I/ t8 [2 u size). They are the same for a staring sensor, but in a scanner it depends on5 `6 f" J; P+ X7 {3 E& m( m: u+ ? the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. : q7 ~: H4 @# b. LMDA GLOSSARY, VER. 4.0 D5 l$ b2 m; |5 C) @" w- y: D 79 $ c+ y: D8 ?7 R; x6 B. uDEV ENV Development Environment.1 z# O3 _: R' ` Development 9 h" u. w- K5 {4 ?6 v& iTest (DT)4 @! m9 X- O) n* O Test conducted by the development test organization to achieve specified test # e. C$ ] F& m9 hobjectives. It may be a complete test, a subtest, or a phase of a test. 1 ^. \9 V1 ]* N7 l" nDevelopment , K7 q! k* L& L# N x( h" LTest I (DT I) , b! A5 n E+ C; _* Y' @4 xA series of tests conducted during the demonstration and validation phase.* v& Y3 y- {" c# i1 e Components, subsystems, or the total (or full) system are examined to determine- ?$ b9 D. [8 Z, W, Q* R( I whether the system is ready for EMD. State-of-the-art technology is addressed) z) |5 | d: Q4 ? in DT I.# x# p: z% P; }: t Development/ A5 @) _. y4 [. X/ y5 @ Test II (DT II)0 u" _5 U9 h/ ~' H A series of tests, normally during EMD, which provide the technical data - o7 p. W% a) c( ?: y1 enecessary to assess whether the system is ready for low-rate initial or full6 L3 Y! M0 J! S/ f/ z production. It measures the technical performance and safety characteristics of 1 B Y1 t# X5 b+ A: e: R" X$ q+ |3 mthe item and evaluates its associated tools, test equipment, training package, / W, d i& _0 Kand maintenance test package as described in the development plan. DT II - a: I; S9 U+ s9 ?" n5 r" Saddresses accomplishment of engineering design goals and the fulfillment of 5 p& c- U! O0 G" d# _7 a2 P* z5 lcontract specifications.* I) d9 u/ O! R) }; _4 y1 J Development4 v" x2 w% j& N) [0 Y8 a2 x Test III (DT III) ) S2 \/ L. a) z' ?! w9 NTests conducted during production. K* E5 Q8 z' T6 A4 E1 ? Development- ^( D7 V- x6 f1 B2 t2 R" ~4 p Test and " M3 {2 z0 Y* K% d5 t- A3 Q( sEvaluation0 ]& N2 d- z3 H' V. F, Y$ t4 ] (DT&E) & [6 j; u# e# A+ B9 CTest and evaluation conducted to measure progress, usually of 2 `. M! x/ |1 o/ j$ H0 G/ Rcomponent/subsystems, and the proofing of manufacturing processes and 6 X3 K9 n' ~$ m" zcontrols and to assist the engineering design and development process and " F; M4 ?) m O- D. uverify attainment of technical performance specifications and objectives. Usually) e2 ` O m8 v' r6 N7 d/ g! V! ^5 @( S conducted under controlled or laboratory conditions. Can be conducted before8 c$ w1 J/ |: S" F: e% M4 @5 o or after production begins. / Y" F( w) Q$ m1 Y- dDevelopment E! T; @& x( e1 q Test (DT) ! O$ w8 Q0 l9 U& S2 OTest conducted by the development test organization to achieve specified test 6 e' E$ ]# ?% vobjectives. It may be a complete test, a subtest, or a phase of a test. # U2 p: a: @# ]' z9 r% p) c- kDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost,4 G: j& x& S; E3 W0 J schedule, or performance without authorization from the milestone decision / A8 j; n [8 n6 Zauthority. Acquisition Program Baseline (APB) thresholds represent these , p! a$ h9 R$ v6 u) gparameters.2 L0 z' N7 \6 T( H$ h Devolution of9 B% W0 |# e9 t, b" O7 q- Q Command* r: T, y7 w Q" m1 M( P1 a- v Minimal essential operational capability to perform C2 provided in an orderly and- m; h5 V5 t, R8 c2 v' N$ M# m$ N/ i timely fashion to a duly authorized successor. ; ]/ V, I; ?; Y9 TDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.4 g7 g- f+ t2 B6 A z& _ DEW/D Directed Energy Weapon/Discrimination.+ W3 B; z, J1 ]: b1 x' R DEWG, O Directed Energy Weapon Ground, Orbital & a. ~8 o, x {2 y4 l7 _DEWL Directed Energy Weapon, Laser (thermal or impulse). ; R+ V" M8 Q; d: o3 tDEWP Directed Energy Weapon, Particle Beam (neutral or charged).2 K5 g8 t- }/ {9 E DF-KBS Data Fusion Knowledge Based System.! `5 B# k! e; ^/ ?5 W+ u DF2 Deuterium Fluoride.( r6 S- ]; c+ K$ b2 \ DFAR Defense Federal Acquisition Regulation. J, ^$ V1 p# }: z: ?6 H0 U DFARS Defense Federal Acquisition Regulation Supplement. & o8 B+ i! g' ]$ oMDA GLOSSARY, VER. 4.0 D & ]; X$ P0 W$ P8 z' `- y5 d) f80/ p. s; ^+ Q B N# k% w: B1 H; t DFAS Defense Financing and Accounting Service.9 \& i1 F# R) ^( @ DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. 5 J, H# {% a$ {3 E+ v) M( i BDGA Director General of Armaments (France).: c+ n3 W( a3 U, C9 ~6 X6 t& ~ DGP Defense Group on Proliferation. 7 Y q Z- `$ [" }4 n9 f: a) kDI (1) Data Item. (2) Developmental Item." m' G8 w! M' P& j DIA Defense Intelligence Agency. 9 N; C' z4 Z# o7 Y6 F# |DIAC Defense Intelligence Analysis Center. . v% o. c& o+ B- A. tDIAM Defense Intelligence Agency Manual- M4 X. G0 }5 k$ n Diameter (Optics) The unit of measure of the light gathering power of a lens. 0 ~: m) N# f0 F7 s4 l$ }. T6 E6 BDICE Digital Integrated Combat Evaluator./ o& I& [: U9 I% X4 H) f DID Data Item Description.7 U) {2 K1 k& |& {8 h3 H! l Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The# G M( v b+ h; g angle of spread, which cannot be eliminated by focusing, is proportional to the% q) C- E0 O. Z, r- F! k" s ratio of the wavelength of radiation to the diameter of the aperture. 8 u9 ]" R- K9 d, @* a$ oDigital5 e; o( d: y. o- H4 u/ k0 g0 D1 m Processing 9 [% f& |" \ i+ f* R2 w6 I$ NThe most familiar type of computing, in which problems are solved through the& h6 @ K4 S; L& @ mathematical manipulation of streams of bits., o. T4 ~) m5 Q! j' Y- Q DII Defense Information Infrastructure 0 C: H! n! }' C8 `4 @Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to; ]& h9 \, f: Y/ k( w/ K 12 km) between wake termination and de-sheathing.1 D# E, f) @: ?# O# O+ B& d$ _ DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).) H7 }$ T# P* C) H DIR Director. 1 O" J8 }3 ?% g$ h& oDirect Air 7 B2 A- K, K5 v. ^7 @Support Center; H2 G% o5 u. [+ J7 s* H( Q A subordinate operational component of a tactical air control system designed x% m9 r# n& |; {2 Cfor control and direction of close air support and other tactical air support' r) C: b: w( H ]% | operations, and normally collocated with fire support coordination elements. : R+ Q! e) N9 _2 hDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not: M; j4 g6 u2 S" | necessarily limited to items that are incorporated into the end product as labor or- _6 _/ k; P c6 O material.; x( c: L7 y. b1 u, a9 h Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing : \ V: J0 K( mdirect labor includes fabrication, assembly, inspection and test for constructing 1 ~* v& k; |1 Q8 F! Pthe end product. Engineering direct labor consists of engineering labor such as4 Q" A0 g% P$ Y' z: N3 x reliability, quality assurance, test, design, etc., that is readily identified with the, B5 H3 x. I! j end product. 8 s2 E' T6 ~* N, C0 y! ADirected Energy/ T8 ]8 W2 Y" U (DE) 0 t8 E7 @/ z' r7 B* ?% P" T# X4 o1. Energy in the form of atomic particles, pellets, or focused electromagnetic ' G3 _# m6 m' X- y& b# Bbeams that can be sent long distances at, or nearly at, the speed of6 g# S4 m9 t* n0 V$ Q4 M9 H light. 9 o: R- m1 q/ G2. An umbrella term covering technologies that relate to the production of a0 P8 D1 K6 O2 A* B: ? beam of concentrated electromagnetic energy or atomic or subatomic particles.7 Q7 H3 P- k: L* ^2 J MDA GLOSSARY, VER. 4.0 D # g2 C* X8 G: A' s% V81" S% H" c/ O5 N$ j Directed Energy ) n) E) y( |! S! E# ~( q c5 B: kDevice) f( `+ }0 M3 ?2 l A system using directed energy primarily for a purpose other than as a weapon. 0 ], e( _2 F$ G% IDirected energy devices may produce effects that could allow the device to be! C/ c, H& r$ A4 t/ b used as a weapon against certain threats, for example, laser rangefinders. ( _; L: M; I' u: Z9 l9 s* G1 ^5 ADirected Energy 5 ]) P r( `" ?& FWeapon (DEW) 8 V5 X+ o" i. }. ~/ H; mA system using directed energy primarily as a direct means to damage or destroy" e3 n) v+ e; V: ~ enemy equipment, facilities, and personnel.# c9 E) j8 o1 J DIRLAUTH Direct Liaison Authorized. 6 |- }% `' F2 ~DIRNSA Director, National Security Agency.. m2 c& h; l! L9 @ DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.; a, A, z6 b1 m- k- F DISA Defense Information Systems Agency, Washington, DC. (Formerly known as9 x. k( B9 ]; U& f Defense Communications Agency). , L, R/ o( Z3 K1 k7 W9 TDISCO Defense Industrial Security Clearance Office" |7 r* G* \# U" D DISCOM Division Support Command (US Army term). . M$ Q- \0 K# @ d) qDiscretionary - r3 K0 [; I9 o- F1 tJudgment) ~8 I `9 J. Z" P$ y& v The authority given USCINCSPACE or his duly authorized representative to4 \ b/ h1 M: f perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination0 g. @4 b3 c9 Y DISN Defense Information System Network (DISA term)." w: L S+ h8 v. c2 A* k5 o$ U' y( k DISSP Defense-wide Information Systems Security Program.. ]9 h. l& `2 @# I; p5 J DISUM Daily Intelligence Summary (JFACC term). 8 Y$ B7 z) J1 RDITDS Defense Intelligence Threat Data System.* J- K+ b/ {+ P% ` DITP Discriminating Interceptor Technology Program. The objective of DITP is the3 u% r% r/ |% A! \ development of advanced interceptor seekers to counter advanced threats. T8 w& G: T2 eDITP will integrate passive and active sensors into an interceptor seeker that 3 R/ T" T& ]$ ^- I/ b( [$ ^' {integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP ( e7 E' N7 r. i, \: }* vflight demonstrations will involve the tracking and interceptor on-board # G2 v" V7 W* `3 a4 Kdiscrimination of targets of opportunity while providing fusion processor data 9 r7 m1 i4 t |telemetry. (See also ASTP). # v: k9 x8 p4 ZDIVARTY Division Artillery (US Army term). 3 o$ V: i, e: |; V6 {DIW Defensive Information Warfare. 4 ?! ^ k! ?* C) XDLA Defense Logistics Agency, Alexandria, VA." {# Y4 K/ v4 Y! j& m& s1 j% s+ U DLSC Defense Logistics Services Center (Battle Creek, MI). " O* M4 b/ i- W0 Z. vDM Data Management * }; I9 b. h1 Q6 `1 ~ M% w$ xDMA Defense Mapping Agency, Fairfax, VA.& n4 T1 K1 ~6 n- i1 b DME Distributed Management Environment. $ ]$ W) C: e3 ?4 Q' g4 ^DMI Dual-Mode Interceptor.$ ~2 M% t. V5 w( V7 F MDA GLOSSARY, VER. 4.0 D - @0 S1 I: l3 ^- d! X82% i/ F' m- k5 h( B* S DMRD Defense Management Review Decision., J, r; u5 s6 F' O DMS (1) Defense Message System.5 `; O5 P4 N) V& w, D [% `+ _ (2) Dissimilar Mission Simulator. , n! f- B: B) F3 E7 _! } IDMSO Defense Modeling and Simulation Office (OSD).9 l; A% U; l8 M. a DMSP Defense Meteorological Satellite Program., l4 q% |- ] {* ^- O8 j DMU Disk Memory Unit. $ Y2 ~: c7 ^! \& mDNA Defense Nuclear Agency, Alexandria, VA.- r$ J5 `6 a/ L" u DNMS Distributed Network Management System.$ Y- x" C4 N1 c" X2 p7 }3 f3 G DNSIX DoDIIS Network Security Information Exchange $ R* J" ]/ H2 EDNSO Defense Network Systems Organization. % q0 [8 K: J# C5 [6 ?) w; JDO The lowest rating under the DPAS. All “DO” orders take preference over unrated 5 B, w! Y E6 a6 F0 Dorders to meet a required delivery date. & B! k. y3 @, V/ N8 H& Z& ?Doc Document 6 t& j. H- U$ D# sDOCPREP Documentation Preparation.5 a( D: v/ Y9 v- w3 p2 A, J0 Q- y1 [ Doctrine Fundamental principles by which the military forces or elements thereof guide/ s: ]3 o2 h9 R/ M& t/ a their actions in support of national objectives. It is authoritative but requires' {0 u6 `& r+ O judgment in the application. See also Combined Doctrine. 5 h# [) F% }, n* J/ l7 [& T/ \DoD Department of Defense / i. D! l1 M' H1 j' xDoD Component ! @ c R/ h1 z: z4 MAcquisition4 \+ J p6 |; w( S& D Executive & k9 G/ b% p: oA single official within a DoD Component who is responsible for all acquisition' {! K* X! _3 i8 y, _2 O+ w J) G% Y functions within that Component. This includes Service Acquisition Executives 8 v4 H3 p! h( j8 Pfor the Military Departments and Acquisition Executives in other DoD/ s X2 D! D3 U/ t6 c Components who have acquisition management responsibilities." s/ W' l' o8 n* U DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, 6 X8 @& ]' K }# [0 [Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the ' m, \& f% Q7 Q! [1 U$ f% BDefense Agencies; and DoD Field Activities.' d$ G9 f- N/ M, G* h2 ` DoDD DoD Directive.4 b4 g4 q0 A% m DoD Directive * v4 y) Z+ [0 T: ^6 a( _+ K5000.14 X0 h4 l' @! t& b% A “Defense Acquisition.” The principal DoD directive on acquisition. It establishes 2 T( g9 G3 m+ l" _0 `policies, practices and procedures of governing the acquisition of defense$ j/ N G' F3 a* ~ acquisition programs.% U2 T+ n3 \4 k. \3 m+ T DoDI DoD Instruction.6 a2 r U5 n4 m2 ~7 `2 e DoD Instruction0 v' J5 Q7 e9 ~8 M& d2 d2 o ]& A# D# N 5000.2 , q* R, J6 Z; k“Defense Acquisition Management Policies and Procedures.” Implements DODD - ]7 q7 A0 `$ e8 g6 r, u5000.1. ! Q2 k3 @& ^5 w/ Q) J: x6 eDoDIIS DoD Intelligence Information System.% S( k6 i, W# k7 p DoDISS DoD Index of Specifications and Standards. , Q1 x' Z! y; j2 g1 @5 U1 g. R3 fDoD-M DoD Manual.) h# g7 I1 A/ I5 E MDA GLOSSARY, VER. 4.0 D * v) I; P, ~3 R83 ' O6 J' n( S6 u- z) F! sDoDR Department of Defense Regulation. 0 Z w2 S8 N- x$ EDOD-STD Department of Defense Standard. % k8 W) n3 o- u0 CDoE Department of Energy.) l9 B; v3 ~3 [3 [$ L3 V DOF Degrees of Freedom.9 j( c8 t* }! M7 `; s% a Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system( S: q8 G$ @0 n+ [: p) k$ l having a detection range of approximately 3000 km. It is believed to provide 0 \4 `" |8 r5 Q1 Xbattle management for the totality of Moscow defenses. " ]! D7 ~8 M; a: C. A/ Z, w/ ZDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).1 v" P, J: o) F DOPAA Description of Proposed Actions and Alternative (environmental term). ( @ R0 _0 J: KDoppler Effect The phenomenon evidenced by the change in the observed frequency of a$ `$ K8 b7 i5 ]$ c. N9 P4 C: ] sound or radio wave caused by a time rate of change in the effective length of# x4 o! `+ R5 D0 f1 w* Z4 Q the path of travel between the source and the point of observation. % U \; f0 z; _, k4 rDoS Department of State (US). % V% [+ o0 Z9 j4 TDOS Disk Operating System (TelComm/Computer term)./ x$ _4 u. M' X8 H v DoT Department of Transportation [US].( Z/ K K1 v. C1 v5 Y E DOT Designated Optical Tracker. 6 ?$ R+ b- G: q6 {5 d/ fDOT&E Director, Operational Test & Evaluation.1 Y2 w. r$ R9 o& P w( H DOTH Defense of the Homeland. / u7 |$ r* z0 i* |/ g6 S# _" ?1 B/ |5 \Down Select To reduce the number of contractors working on a program by eliminating one or; Z. r3 F' b4 ~" ?2 H more for the next phase. 0 i! k# N6 f" P6 QDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. 5 G$ W% B5 ~% n4 v/ |: K, J) zDPA Defense Production Act." o* t) e* H+ q: Q DPA&E Director, Program Analysis and Evaluation.9 x- [. p9 \/ z& W1 n m% ` DPAS Defense Priority and Allocation System. & r l% E! e9 p, x. K4 xDPAT Dynamic Program Analysis Tool.- a+ `9 d2 x! V& u( Y# K6 l W DPB Defense Policy Board. 2 F, W2 f _2 s4 }( p9 nDPG Defense Planning Guidance.1 H; C" ^, _ H% A& f7 u+ G: a DPM Deputy Program Manager.) V, H+ X0 z; o DPML Deputy Program Manager for Logistics . u6 g7 Q b8 KDPP Distributed and Parallel Processing (Computer term). - K1 r8 }% C1 k' U3 x# M: g; GDPR Defense Performance Review. " z. ^: Y/ r' T* B: `MDA GLOSSARY, VER. 4.0 D' ^! r& d S' B3 U 84 1 l0 p6 @# G6 i0 G1 dDPRB See Defense Planning and Resources Board.+ t: n4 h/ u0 a: t2 {( p DPRK Democratic People’s Republic of Korea (North Korea). % X; ?( u9 D6 U7 W2 q9 i1 B7 iDPRO Defense Plant Representatives Office. . M: F- ?( U% }6 B }DPSSL Diode-Pumped Solid State Laser.1 \ z! ?2 Z5 Q) f' o0 s% o4 | DR Deployment Review.* {- I( x$ D L* M0 ^& C Z, U DRAM Dynamic Random Access Memory.2 p( q- ]$ O- e! j( Q4 Q Draw-down Curve A method used to encapsulate the overall performance of a BMD system that ; U6 q9 D8 W0 A z8 V3 t) _! U: p/ x5 Wplots the probability of survival on the vertical axis versus the number of attacking - g; _0 t8 q7 T. u' l2 w# |RVs on the horizontal axis. Used in conjunction with attack price, they are the $ O2 u* P+ x/ S7 h: [) N8 pmost important expressions of a BMD capability.# E: T, S7 \2 ^) z5 j DRB Defense Resources Board.2 W V3 G8 ^) [ n/ o: a DREN Defense Research and Engineering Network. . B- O8 F+ r- F& l3 T/ X( F; t+ a* nDRFP Draft Request for Proposal.' ^: a; C7 B) Y5 E8 n$ w Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from & Q9 W1 Q5 f8 {( {" J3 Ugravitational and atmospherically induced torques on the spinning projectile.7 e. M0 I. b; M' \9 [ DRM DAB Readiness Meeting (DD 5000.2 term)." n' |. I& I- P Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also & g' c! d8 ~. j! s5 R, XRemotely Piloted Vehicle. 7 _; s! } O: dDRP (1) Deployment Readiness Plan (US Army term). ) U/ U; E# y( l K" ?(2) Deployment Readiness Program.8 z- c1 z8 B6 `1 ]: T4 |- K DRR Digital Receiver Replacement (USN term)., d, t9 W6 |* q0 k3 t0 j DS Deep Space. / N8 z9 z8 `5 w+ C) z3 h7 vDS-1 Category of telecommunications circuit capability.3 l# R l; l* h- z/ i( f DS-3 LAN Category of telecommunications circuit for a Local Area Network.. D6 h# D$ U+ L# q DSAA Defense Security Assistance Agency (OSD).8 ~; A5 |5 X5 J M) G DSAT Defense Satellite Weapon.% k# ]5 L) }7 S DSB Defense Science Board.1 a5 D# j3 p, X7 P- D& z DSCS Defense Satellite Communications Systems. e# J4 t9 Y' e* `8 X( yDSCS-3 Defense Satellite Communications System Three. _9 z4 ~7 N# m" N: |" N DSCSOC Defense Satellite Communications System Ops Center.( G: L% y, B7 F } DSI Defense Simulation Internet" u& n) N9 `$ Q! h: [' N6 ?# L MDA GLOSSARY, VER. 4.0 D, [; s# W r2 k" S" Z 85 - G5 {1 r) N- [# M( T- \6 l3 o+ R; `- jDSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 4 I3 }* A, [# K9 s( ^/ z# XSystem. ! g$ q# V1 K2 q; L% l' h% a6 C) B" IDSM Decision Support Matrix6 N8 S6 Q( ~) _7 J' v DSMAC Digital Scene-Matching Area Correlation.3 S; Z& u) g( P: A; a DSMC Defense Systems Management College. ' F! T0 @) ~3 l7 ~% f$ g, BDSN (1) Defense Switched Network (formerly AUTOVON). 4 N/ o& A S. X(2) Deep Space Network (NASA term). , @# l; J$ X6 u) i1 [/ wDSP (1) Defense Support Program. (2) Defense Standardization Program.; R9 ^8 {# w# D4 D. E" o1 \ DSPRTM Defense Support Program Real-Time Model., f) G9 u# M) i, b) _: x DSR Data Set Ready (TelComm/Computer term).- M7 X1 Z( @- i- A' ], g DSRCE Down Scooped Radio Control Equipment (TelComms term).& k- h! V! H/ p( ~* y: u DSS (1) Defense Supply Service. (2) Digital Signature Standard. . G; X+ N1 D3 b/ wDST Defense Suppression Threat. * E/ C' \* m, Y9 ?9 i& d# g5 q# G3 ~DSTAR Defense Strategic and Tactical Array Reproducibility., K0 |. b. c- L1 h7 ]+ e) Z DSTO Defence Science Technology Organization (Australia).& R: P; l% k { DSU Digital Service Unit (Telecomm/Computer term).9 B7 l- [3 x% y5 I DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to8 q& e1 F" o% S0 h the DNA.2 T3 e. H4 P. Q! ~ DT (1) Discrimination Technique.* P7 H m q, e6 U (2) Development Testing.* [5 x; ?* o/ v% p d (3) See Development Test I, II, III. ; _4 Y& L, d- g' }. A% S# u; M* @1 i+ d: f(4) Down Time (ILS term).& F {/ ?0 O3 l0 R+ ^ (5) Depressed Trajectory.5 T# y; X5 ^$ S& o) A8 Q (6) Dedicated Target.5 [0 Z! ?* Q8 w DT&E Development Test and Evaluation.4 R. J) S N: E. |: D DT/OA Development Test/Operational Assessment./ j. M k- N4 X# d DT/OT Developmental Test/Operational Test.% [2 i$ e) X3 q- _) [ DTAP Defense Technology Area Plan. ) R2 G0 {" {# c9 x2 Q* w A4 YDTC Design-to-Cost., d h! Y/ t- q# G: R: F7 q' P, \$ a+ W DTD Digital Transfer Device (TelComm/Computer term).& R; N( ?8 y* a2 { DTE Data Terminal Equipment (TelComm/Computer term). [9 U8 i1 s7 bDTED Digital Terrain Elevation Data.2 J: x% ]3 q# x DTIC Defense Technical Information Center, Alexandria, VA. " u: H# r9 ]4 s, k5 w0 o6 aMDA GLOSSARY, VER. 4.0 D, H' O5 D! S6 U 86# i2 M* f6 i% j/ Q# P; g5 d DTIS Defense Technical Information Services (now DEIS).* ?6 Y0 ~1 d1 }! q$ X DTLCC Design to Life-Cycle Cost. 2 i: W: K$ c$ f7 P1 U2 ], \DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL' x; C( n5 ^/ k3 n term). 4 M. z3 } H" C9 l- z! z3 aDTLS Descriptive Top-Level Specification. * j- O" B/ @/ l; j; dDTMF Data Tone Multiple Frequency (TelComm/Computer term). / s1 _) c4 S. {0 z g5 Y9 c) mDTO Defense Technology Objectives./ S: }+ {7 r" n: m# o2 h DTOC Division Tactical Operations Center.6 E1 Z* `& O5 K9 s4 n$ B; P, c DTR (1) Demonstration Test Round. (2) Development Test Round.) I& v+ e& l" O DTRM Dual Thrust Rocket Motor. 3 Y. [4 l! G$ m( {1 \5 t: gDTSA Defense Technology Security Administration. Q6 k: Q3 K% V. T G1 e1 e* k' i/ EDTSE&E Director, Test Systems Engineering and Evaluation. + c! |8 q( w/ \8 \9 r2 w* [5 uDTST Defensive Technologies Study Team. : u8 U) N/ S) U7 Q9 j% {9 UDTT Design-To Threat l K( y3 E7 b" b6 q DTWT Dual Traveling Wave Tube (Electronics Engineering term).. u: N, z( L, J6 ]7 ~2 L2 B" t* q DU Depleted Uranium.0 X# W' A. M6 K; O DUA Design Upgrade Assessment. 2 f2 \+ N: L9 z- P, e+ c# X* pDual Source Two contractors producing the same components or end items for the same/ A' L0 w: D- P; F3 t; h program. - R0 o: E8 }" L3 ~# b7 O! ]DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). ! P6 K+ ~" b: E6 G3 L/ h% _DURIP Defense University Research Instrumentation Program.2 c) h, |: @9 b# ` DUSD Deputy Under Secretary of Defense.; `' A3 P+ w* ?4 E( s7 U: Z1 T, m DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).+ [# `0 T p; \+ P DVAL Demonstration Validation. _& l, Y1 M5 b/ gDX The highest rating under the DPAS. It takes preference over all other rated and : t& s# \) C9 Z% o# Ynot rated orders on a contractor’s production line. The BMD program carries a! U6 D1 [& E f3 d “DX” rating. , s8 _6 N- I( C& TMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87) t' A: M( i3 q4 a L& U( D6 _ E East 3 t; v6 i# g( SE2 I See Endo-Exoatmospheric Interceptor.% v( l! A- @; [2 u- _8 W E2SRD Effectively Two-System Requirement Document.9 h9 {/ U3 \) Y$ w: D5 ? E3 (1) Electromagnetic Environmental Effects. / o8 v Z1 N1 Y- Q(2) Electrical, Electronic, and Electromechanical.0 e5 _: X5 b7 y- h k/ I E Spec Materiel Specification. ; r4 N% W% q- U2 N0 dEA (1) Environmental Assessment. % O5 S5 V% N1 U. j(2) Engagement Authorization.; v' T$ E+ d, n1 N% I7 W3 Y (3) Executing Agent. # v1 a0 e# e, [(4) Evolutionary Acquisition. + ^+ D9 I3 \7 x; V- e$ O(5) Environmental Analysis (environmental term).9 p/ j. F7 \; i8 \) E& J% q (6) Executive Agent.5 P0 T! B& D5 t8 R! P; N" i( p; A EAC Estimated Cost at Completion. $ F0 G; d* \6 |- l4 pEAD (1) Engineering Analysis and Design. (2) Extended air defense.8 W Y, ]) r4 ^+ D9 \ @5 H) r EAD/D Engineering, Analysis, Design and Development.1 `; D2 W" c# A8 D4 F3 n t EADSIM Extended Air Defense Simulation.9 c3 g, Y& b. W, B$ [# b/ L9 Y+ x5 C+ C EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing" l# D5 ?: Y0 z; M5 V0 ]% ~ Y. ^ D users to model military response to airborne and ballistic missile threats. - F/ B1 f# m5 M& [ l$ ]EADTBP Extended Air Defense Test Bed Program. ! q2 K) y m5 T: Z# VEAGLE Extended Airborne Global Launch Evaluator.7 V4 H2 v6 U# f) m1 X4 ? EAM Emergency Action Message. z1 l4 h5 h, l+ E. F$ Y3 mEAR Export Administration Regulations. 6 ^" \! `- b' B2 e, r) c( ~* eEarly Operational+ K4 g% G* p* _& h Assessment6 x$ m1 O7 F5 j" b& t An operational assessment conducted prior to, or in support of, Milestone II. + `) |2 `* @# z* S, gEarly User Test $ j. Y V, w6 y' t, r0 m(EUT) z! B- _5 G/ q# z; t3 dA test employing representative users to examine materiel concepts, training or$ u! Y6 S' P/ i9 C3 W i1 w logistics planning, or inter-operability issues. EUT can be accomplished during ; h$ p) d1 ~, m; A9 T) uDEM/VAL on brassboard configurations, experimental prototypes, or surrogates* ]- B+ Q) K* s6 C( h# W to provide data leading to the decision to enter full-scale development. - `; O8 K4 g- g. H+ GEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of, j1 V) x) B- z5 d5 ?% w surveillance satellites and long range radar. 6 V* p0 Z( {5 y6 A& [6 F(2) Early notification of the launch or approach of unknown weapons or) H' Z4 V& ^9 z3 t& u" I weapon carriers.; Q( Q0 B3 T& u6 K Earth Limb The apparent outer edge of the earth as viewed from space.; v" o t% B7 e" ] Eastern Test 0 w8 {" N$ D/ i* B8 o8 rRange (ETR)4 N @/ z. h7 ^ Beginning at Patrick AFB, FL, this range stretches halfway around the globe; ~; V: `* _& B1 | where it meets the Western Test Range. An array of launch complexes, sensors,5 `! v8 S9 i6 W( K and tracking sites make up the Eastern Test Range. The ETR is now operated& V$ n3 e6 D2 I" ]: r3 ] by AFSPACECOM as shown in WTR definition. # p5 R( Y+ T) |$ ^5 b. B6 RMDA GLOSSARY, VER. 4.0 E , e! A: w" K( w: ]+ j88 0 c7 k" g- V% i( U% ^EB (1) Electron Beam. (2) Enhanced Blast.9 Q6 l' H' y" H6 W EBB Electronic Bulletin Board.6 k% M. G7 q/ t( Z9 x3 b7 u EBCDIC Extended Binary Code Decimal Interchange Code.% \: r7 g! n+ @0 Z: a EBW Electron Beam Welding.) [* A' g f' i EC (1) Electronic Combat. 6 L! c7 q1 W- d; {(2) Error Control. , S# t- Q t- c5 A(3) OBSOLETE. European Community. Now known as the European Union - |+ ], ^9 X% ^(EU). 0 T0 `# J7 _7 A/ bEC/EDI Electronic Commerce/Electronic Data Interchange! O. i9 }3 h! a8 v ECAC Electromagnetic Compatibility Analysis Center.0 q1 j X# k) f3 T9 W j ECB Engineering Change Board. 8 W# ?1 E9 S6 ?1 M5 kECC (1) Equipment Control Center. (2) Element Control Center (USAF term). " I% R% g, ~% J9 T/ V# HECCM Electronic Counter-Countermeasures. 5 e7 |; l, h" r9 y! UECDs Element Control Directives.! ^* Y& l: |- P6 q- F ECLS ERINT Command and Launch System. 6 c1 P) v4 i1 v; }ECM Electronic Countermeasures. 8 I' O) B; c9 `" H1 k, {* ^ECN Engineering Change Notice. : H I9 t& ~' S- O% pECO Engagement Control Orders./ f9 j& z0 u, A- Q! G ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. , A' b0 z& z, V( ~1 q& B' iECPMO Electronic Commerce Program Management Office.' z: w2 Q; C" g$ }! M1 B ECS Engagement Control Station (PATRIOT)." G7 [% p- S2 h+ e! s ECU Environmental Control Unit. { ^8 I m: R6 o( eEDAC Error Detection and Correction % E$ q! l. F$ S; Q% f7 {9 oEDGES Electronic Data/Guidelines for Element Survivability. + b. @. ^; Z- hEDL Electrical Discharge Laser5 t& m" k5 X% W* s+ ]! Z EDM Engineering Development Model./ q% x$ B. K+ f {$ z0 g- a EDP Engineering Development Process8 S/ m; \" c* F! x: K6 C EDR Embedded Data Recorder (PATRIOT).( M5 M* _0 V* [+ L4 h' c2 X EDS Electronic Data Systems Corporation! _, ]5 H" g4 a7 r$ Z EDWA Engagement Determination and Weapons Assignment (PATRIOT).( |5 D- V {0 Y8 p- U4 x- _) @# g MDA GLOSSARY, VER. 4.0 E 2 }( r V- ~! ~89 f+ ^2 G8 s! }3 b* O- J0 K EDX Exoatmospheric Discrimination Experiment: M8 A$ {) T% Z$ z EE (1) Electrical Engineering. (2) Engineering Estimate. 5 T0 K" n6 C$ C5 X/ a% M( p: vEED Electro-Explosive Device. $ d/ { h. h+ iEEEV End-to-End Experimental Version. 1 Y, m- ?4 z' O" CEEFI Essential Elements of Friendly Information. 5 z3 O( j& o' F/ g I/ Q+ XEEI Essential Elements of Information.4 c4 S1 L6 X9 q% d4 D" X# ` EEIC Element of Expense Investment Code.; X' T/ |' ~# ~/ t1 G EELV Evolved Expendable Launch Vehicle (USAF term) 6 B' l# ~' x0 S- b8 Q1 |8 ]EEU Electronic Equipment Unit. 0 G3 ]8 x0 M* a$ kEFEX Endo-Aeromechanics Flight Experiment.& J& M5 b& H: i! H EFF Electronic Frontier Foundation. 1 v5 |' A, _/ R" V3 ?Effectivity A designation given to the BMDS configuration and demonstrated capability at ' W: w- r. |2 s ca point in time, becoming effective at each increment when an element or, O; j/ d* {" U3 E; E) d6 h/ w component is inserted into a particular Block. b/ i$ h/ i; E1 d) q, x3 k Effective Damage That damage necessary to render a target element inoperative, unserviceable,% k0 S: r0 V9 K. n nonproductive, or uninhabitable. 3 U7 T5 q! W, a z& n/ u! L* NEffluent Plume The pathway of movement of effluents through surface water or air. ! A, C5 M, `! K: a9 ]% VEFP Explosively Formed Projectile.! d6 o9 z) ]8 ^7 N5 I' _8 |9 q EGP End Game Processor.+ J" }9 S# f: v% M& d: P EGTR Eglin [AFB] Gulf Test Range. : _- V& |7 c( \% L4 n, [" s# rEHC Enhance Hit Capability (USN term, related to SM2 Block IVA)." u$ z6 @! |$ L. ]+ f EHF Extremely High Frequency.; m8 g: e+ f0 R9 x5 o ehp Equivalent Horsepower. 8 {1 ? d9 _2 ^EIA (1) Environmental Impact Assessment.: C( s8 _2 w$ S ]: J0 C! @ (2) Electronic Industries Association. # G+ @. D8 b& Q5 TEIAP Environmental Impact Analysis Process. 7 o9 l1 q" T2 s6 J7 T' P5 WEIP Exoatmospheric Interceptor Propulsion.$ l9 q6 M7 e0 i9 _) W- q1 Z EIPC Electronic Information Privacy Center. / y; g \+ H; `0 y6 NEIPT (1) Element IPT. (2) Engineering IPT.# r, t" \, e% B* y2 z EIS (1) Environmental Impact Statement. (2) Explosive Initiation System. 9 L. Y6 Z- y( l) |3 x5 xEISA Extended Industry Standard Architecture (Telecomm/Computer term). * @+ C/ N( h" kMDA GLOSSARY, VER. 4.0 E ! h5 o8 t+ N6 {) [/ r9 o90- {- T! A8 \: D/ W! y/ p' k/ z: n k EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.5 W" c$ c$ t O# ? N: Z b Elastic Range The stress range in which a material will recover its original form when the force( c* t9 I; J/ ]3 {% N$ L9 V; @ (or loading) is removed. Elastic deformation refers to dimensional changes6 I, i/ [1 X, i' V: L occurring within the elastic range.* I" y7 @2 q8 T7 K: k4 {2 k Electro-Optics 8 I' t* Y5 y9 T8 c/ T# l3 V& ~Infrared (EO/IR) 2 ]( y, a7 Q$ eTechnologies/techniques employed by optical sensors in the wavelength) n( |6 H9 n- x# M: k spectrum slightly longer than visible but shorter than radio.; }$ C( j" p3 S) O Electromagnetic - v* x& M- k' g) q3 O/ ~7 r6 W2 ^Compatibility: T8 g7 f, }5 o5 h3 E (EMC)- R4 ^, z# g6 p; C A condition when all electromagnetic emissions from electronic, electro-magnetic, 5 K2 G2 c% ]8 E- S7 wand electro-optical components of a system interact without interfering with one, w. p u3 s7 t/ J" Z another.3 T6 v7 R' P+ Z) N Electromagnetic& z( {/ m9 v' R4 M3 _' W Emanations2 O z2 ~7 b! O$ C, ]( r3 [6 ` Signals transmitted as radiation through the air, through a vacuum, or through% z/ I: T! v7 ?$ ^ conductors. 3 y" j( l; O& c6 yElectromagnetic # z" w5 ^3 K2 @Field (EMF) 3 E8 e$ v: N9 f" }An electric or magnetic field or combination of the two, as in an electromagnetic$ G0 A& B' H: Q: C o" W wave. Created by electric charges in motion, having both electric and magnetic7 A7 K1 @$ s7 P0 i components oriented at right angles to one another and containing a definite 2 G- E! N" j2 Y2 E9 x8 Camount of energy. + E) Z6 Q6 A/ F3 m# n; \3 ]Electromagnetic 0 t- j; n X7 l7 zGun (EMG) % d3 w6 p7 h9 U: f4 G: D- VA gun in which the projectile is accelerated by electromagnetic forces rather than : B4 j0 o, v8 W0 X2 bby an explosion, as in a conventional gun., [6 L& o! _4 G. l0 l1 u" f Electromagnetic + `2 i. V/ R5 R8 ZInterference (EMI) , \5 ]3 b* i3 MAny electromagnetic disturbance that interrupts, obstructs, or otherwise 4 A M& T: r3 _3 R7 X0 ?6 t3 Xdegrades or limits the effective performance of electronics/electrical equipment.' |5 C! A9 J( r. P It can be induced intentionally, as in some forms of electronic warfare, or) F2 [. b- K$ n9 t5 Q unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. 4 m4 Q. F: I1 n- n0 K1 zElectromagnetic+ Z7 w8 [1 R; F/ C& Q( M# Y Pulse (EMP) 2 s* Q( |9 i8 N/ oThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of - t/ w- [( v, q- h0 nthe nuclear device or in a surrounding medium. The resulting electric and" ~ O9 E, Q/ a magnetic fields may couple with electrical/electronic systems to produce) ^8 H# ?# ]4 p2 ]/ I' `( Z damaging current and voltage surges. May also be caused by non-nuclear" b* r2 c( ]& p$ z5 Y) z means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic 2 s* F6 j) ]- L; s) _Radiation (EMR)7 }) J9 b* Y# p" O (1) A form of propagated energy, arising from electric charges in motion that8 ^+ E: [8 f' s6 \6 E* i- k6 ] produces a simultaneous wavelike variation of electric and magnetic . {. b Z; G( S7 C. E% Lfields in space. The highest frequencies (or shortest wavelengths) of7 y9 a* Q! z" p2 R- r) A4 {! c: k# b such radiation are possessed by gamma rays, which originate from# o- m3 O, ^! {: R processes within atomic nuclei. As one goes to lower frequencies, the 4 E, i; `. e# yelectromagnetic spectrum includes x-rays, ultraviolet light, visible light, & N* Q9 ?9 m$ ?7 xinfrared light, microwaves, and radio waves.: s- i/ T' j( A6 x# ? (2) Radiation made up of oscillating electric and magnetic fields and# [2 N0 S0 o5 O* ^! r9 R- N propagated with the speed of light. Includes gamma radiation, X-rays, ( ?9 }5 l" ~: nultraviolet, visible, and infrared radiation, and radar and radio waves.' ^$ x! m: |1 y" k |) Q3 _" m& | I Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices . v1 P0 |! M, W }/ H3 rused in system/subsystem design, excluding employment in the RF spectrum.9 S8 N; {( v c- |. M1 z# G, U Electromagnetic1 ^1 I+ }8 d1 y4 B1 O U2 D1 E6 {7 o Spectrum 1 F; l3 ?1 |9 ?8 ^; q& t6 hThe range of frequencies of electromagnetic radiation from zero to infinity. It is* K* ^- w& u) W3 B divided into 26 alphabetically designated bands. $ ?! n9 K+ F# h* k% B3 dMDA GLOSSARY, VER. 4.0 E 5 ~5 y5 l8 j9 G$ W' Q917 j. D6 \1 w' e" n Electronic; k) H; ]' ]0 x; L% e) d* K Counter- 9 Y* u+ g+ U# I }- r; zCountermeasure 9 Y; O d8 J% d" ls (ECCM) ; `: j4 J; I7 f# y: HThat division of electronic warfare involving actions taken to insure friendly, A' c3 a$ h. w. l/ } effective use of the electromagnetic, optical, and acoustic spectra despite the6 Y; V3 B. Y0 ^3 M" J i enemy’s use of electronic warfare to include high power microwave techniques.! [6 a5 a! Z6 O# ?9 E( L# N Electronic% S- R! _$ P# L! J7 } Countermeasure 4 {% G4 D5 b/ @ @: E(ECM)3 B0 c( i% h9 b; P That division of electronic warfare involving actions taken to prevent or reduce an 9 Y- i( W, u9 ~7 kenemy’s effective use of the electromagnetic spectrum.+ ]3 j' t( {' l7 Z& |: M9 u3 Z Electronic 1 i* i2 {: c6 n3 mIndustries7 \/ ]+ b3 s* Z' t$ v' V/ f Association (EIA) & R4 W( A# l5 C8 j/ f- BA standards organization specializing in the electrical and functional$ |* n' G) k% R- K7 {2 g6 f characteristics of interface equipment. : `. s0 `% ?$ z1 _( a' L7 [; UElectronic / T) g. n1 j- F3 E1 I+ R" QWarfare (EW)+ b3 F; ^- ?& a- r& u9 i" h @; b Any military activity involving the use of electromagnetic and directed energy to2 ^, l3 N! ^5 p5 E; i control the electromagnetic spectrum or to attack the enemy. The three major0 z& J. `. K* V; |5 _* x subdivisions are:* y8 ^9 I f N/ w3 \, O •Electronic attack – Involves the use of electromagnetic or directed energy to 5 u) p7 _" ?- c. f9 r4 p5 `) battack personnel, facilities, or equipment with the intent of degrading, $ x6 Y6 r( F1 q6 P' C0 oneutralizing, or destroying enemy combat capability. Also known as EA.9 b6 l. X! F3 V$ x; V; X Includes: 1) actions taken to prevent or reduce an enemy’s effective use of5 y; x- i1 F& [+ K6 A the electromagnetic spectrum, such as jamming and electromagnetic / G r6 u& |* B( h s& y9 Ddeception, and 2) employment of weapons that use either electromagnetic or 1 K' j, M' I# j* c# wdirected energy as their primary destructive mechanism (lasers, radio1 c% l( c5 g4 ]6 P8 o6 c& ? frequency weapons, particle beams). " A3 e: c! G2 b* E4 C•Electronic protection -- Involves actions taken to protect personnel, facilities, 3 Z4 x/ h8 R% f- ]. |8 ^- iand equipment from any effects of friendly or enemy employment of- j' g4 S* M0 s* ` electronic warfare that degrade, neutralize, or destroy friendly combat * j+ \" O5 P$ C) l* fcapability. Also called EP. i- N) V! A3 P" }; a•Electronic warfare support – Involves actions tasked by, or under direct! u/ L! e f2 k( h9 k' b" k control of, an operational commander to search for, intercept, identify, and ! y# D: o7 `# D+ ~' P) X$ Alocate sources of intentional and unintentional radiated electromagnetic ; g! e6 J! d* ~energy for the purpose of immediate threat recognition. Thus, electronic; b9 b2 I9 C! H warfare support provides information required for immediate decisions 8 T7 L; l- p! {5 [involving electronic warfare operations and other tactical actions such as : t% l5 b e4 W" A4 ^% Kthreat avoidance, targeting, and homing. Also called ES. # j5 C; r( ]" X {) EElectronic 2 `- z' |1 ]9 hWarfare (EW)7 c5 }) |: g# r. }2 u8 o# e Environments% N8 ?. k6 @6 z, K/ v Electronic warfare environments result from radar and communications jamming ) q+ K# ?7 q: p& M- Tand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD$ i5 j2 `( b- P& t/ {0 M system. ; L0 W/ K) {5 G7 E8 P2 P WElectronics" Z7 x6 d8 K) H Intelligence d0 J! I P. ^9 N5 i8 [(ELINT) $ g6 J$ m/ v* h: OTechnical and geo-location intelligence derived from foreign non-communications 5 p9 G8 C0 F- g- Z$ B; E9 Oelectromagnetic radiations emanating from other than nuclear detonations or6 x; Y8 x* m, M& [2 S: c radioactive sources. 1 q# a9 b$ F U' l1 [Electronics & k$ A0 k; E1 J# V7 WSecurity (ELSEC)# p% m2 N% W) V+ B) Y* q% _3 j The protection resulting from all measures designed to deny unauthorized, y: a& i* r2 n( ~2 L% J- o' { D3 G( ` persons information of value that might be derived from their interception and4 e. f$ Y, s0 e L7 Q/ _6 J* F2 E9 V study of non-communications electromagnetic radiations, e.g. radar. . D; Q% ?' A8 t, V: ?( N' y8 OElectro-Optics7 }# b4 N9 y) V8 K5 c0 ]: G Infrared (EO/IR) ' i/ Y p) Z* k+ L$ L" q, }( S: M# RTechnologies/techniques employed by optical sensors in the wavelength & S' W0 N" r$ O( ]spectrum slightly longer than visible but shorter than radio.+ s- f8 K9 b, O" K9 s7 L MDA GLOSSARY, VER. 4.0 E ' F1 \* t! g" w; C/ ~92 8 ~5 }: X8 ~! r0 N4 o& q" \, R- rElement A complete, integrated set of components capable of autonomously providing 0 `9 ?. p+ e( C4 b! K1 xBMDS capability.- v0 }$ P* E. d0 W0 q. x% n' s Element9 T9 x/ }3 I2 }9 a Capability # T5 r2 {& M2 a# y0 Q3 u$ kSpecification5 E2 A0 ?, L( _+ u (ECS)& y9 S1 T( \, U. g* ~+ N' H' b A document that identifies the element-level BMDS capabilities and5 [! r4 T! Q0 \. V! ~ specifications necessary to achieve the system capabilities identified in the SCS.) Z4 f# H( s& i) }7 D$ d The ECS further defines the SCS-apportioned mission/technical performance0 h. c# o' G4 f+ s$ a capabilities and allocates these capabilities to the element’s components. : G4 Z3 S7 e+ [Element Control 7 y9 k, D3 }3 x$ _) V) r L4 H9 ~Directives (ECDs)1 X6 t, g" h" G- j% v- ` The command and control data instructions to control the conduct of the1 |0 S0 N9 c2 W; \' _; y9 N engagement. ECDs are developed by command and control software based 0 {1 j' t. I/ @5 n; J% U. V- nupon variable parameter input by the operators (both pre-planned and real time),/ ^/ ?- n4 ~3 m/ w, [ and operator defined rule sets embedded in the software. The individual battle# @- y; C8 |* G management processors use these instructions to accomplish the assigned tasks6 a: P/ ]% m; F1 ] from the operations order. ECDs are contained within a Task and represent the 6 {: K; S" g s" h( jform of parameter values that influence the resource management processes of* I. y5 f! N* Y Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and, O- K1 \' x: n# B Communications Management (CM). There will be numerous ECDs per Task. ( P W0 x- |8 d# zElement ( N. e# H8 R' z) V$ p, b3 oOperations " }) K1 J. j. LCenter (EOC)+ W& M- H0 f5 b4 P An Air Force operations center, which operates and maintains a BMD weapon or 0 ~) O6 H) i \$ I1 `4 `sensor suite. (USSPACECOM) 9 r& ~) z* w, D+ e- q2 `' lELF Extremely Low Frequency. . ?( [; \- V" H" K/ F& m, lELIAS Earth Limb Infrared Atomic Structure. * a/ c7 X7 T7 P- ^* n" wELINFOSEC Electronic Information Security. + e# M W. G6 x# @: V# H6 B; s" |ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2024-11-25 07:53 , Processed in 0.051003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部