航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation# V9 r# J6 u/ R' Z COMSEC Communications Security.4 s: Z& A( s% Q3 p4 ^ Concept ( O* x u9 B% U6 _, FExploration & 5 g, W- y2 Y; k' z* o6 H# c$ ^Definition ! Y% |0 w( q8 C' |) ]The initial phase (Phase 0) of the system acquisition process, beginning at . F6 o0 J* }8 G# A/ m$ Z' U( m; ~Mission Need Determination. During this phase, the acquisition strategy is ! ]& a+ C. b2 q5 l7 ~3 ~developed, system alternatives are proposed and examined, and the system7 T3 n4 |( Y0 Z4 ~ program requirements document is expanded to support subsequent phases.* z% P# |, g" ?, C Concept of9 }5 r2 O+ i/ @; z: @( i Operations 4 `( f( [2 W/ U6 M(CONOPS)9 Z/ N l) x( u' T0 A; n (1) A statement, in broad outline, of a commander’s outline or intent in regard to ! L2 A1 A) G" N" qan operation or series of operations. The concept is designed to give an overall" i) L* \" n5 _# }9 l2 Q7 G8 L, l1 Z picture of the operation. (MDA Lexicon)/ @3 L! K1 V" d8 B' M (2) A verbal or graphic statement, in broad outline, of a commander’s& \' z6 ?: f5 w4 h assumptions or intent in regard to an operation or series of operations. The, v6 c' }" o1 s) f t2 j v concept of operations frequently is embodied in campaign plans and operation . D* [# r- X1 f: O8 e* G7 nplans; in the later case, particularly when the plans cover a series of connected ' O9 o- f& @. n4 ?* p$ Hoperations to be carried out simultaneously or in succession. The concept is , P7 h4 w$ L- Adesigned to give an overall picture of the operation. It is included primarily for, C7 r( r7 i; G1 D% n- } additional clarity of purpose.5 G2 s- \0 @! \$ F Concept Plan An operation plan in concept format. Also called CONPLAN. ) C+ V$ e" n4 F1 C VConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of' c5 _3 h! G& o- g the acquisition process, or combines development T&E with operational T&E./ O" Q% {9 \* `4 Y' A. L7 C Concurrent9 ] G) b! V- r/ X4 H! N8 x Engineering6 B4 ?5 ^8 T" R" J% d& P A systematic approach to the integrated, simultaneous design of products and ; e- X/ ^: y2 k6 H( a, xtheir related processes, including manufacture and support. This approach is; I$ V3 _1 O! F) ?8 V intended to cause developers, from the beginning, to consider all elements of+ P6 }' a0 w" C1 m) P' V$ k& }% T2 I the system life cycle from requirements development through dispersal, including' ^8 X8 U& \- M cost, schedule, and performance.1 z0 `& J3 u3 c; ~- J CONEX CONOPS Exerciser.0 t9 F+ B! O5 p" y/ ~& w, b4 { Configuration A collection of an item’s descriptive and governing characteristics, which can be g) }! V! e" s% ]/ C& t3 yexpressed in functional terms (i.e., what performance the item is expected to6 A& \8 N6 b4 E4 Y achieve); and in physical terms (i.e., what the item should look like and consist of - i* ~: M% M3 M& @$ pwhen it is built).# A* `7 p7 A2 J5 S MDA GLOSSARY, VER. 4.0 C* p: `5 _4 ?& u9 W- `$ ]4 k! q4 R5 J 59 , v% Y* b2 n: m b" OConfiguration 7 h: k) N+ w7 O. g I: I' u, d& aAudit + w! O3 _% J; `) I* c. GOne of the Configuration Management tasks which includes a functional# b( {0 I9 [+ {: _7 ^1 \! j1 S configuration audit (FCA) to validate that the development of a configuration item . e+ M- D9 L3 U% b4 mhas been completed satisfactorily and that the configuration item has achieved 1 G; N/ O6 ~5 \to specified performance and functional characteristics, and also includes a: L6 I y. S& V; {) m" ~ physical configuration audit (PCA) to verify that the configuration item “As Built”: E) e8 H6 c" F% S: O conforms to the technical documentation which defines the configuration item.8 d8 b3 Y! G. O5 w, w Configuration 7 ~& O* N; i! E rBaseline & G4 C: K9 L6 ?7 t6 L1 HThe configuration documentation formally designated by the Government at a# Z; d$ I' [5 Q6 S9 n specific time during a system’s or configuration item’s life cycle. Configuration ) H/ r7 z' G+ |' nbaselines, plus approved changes from those baselines, constitute the current3 F( z/ v {1 J* r1 R) q configuration baselines, namely the functional, allocated, and product baselines. : R4 a3 A2 f) S0 kConfiguration2 N0 g/ }/ ]8 y1 J7 N& b) z Control$ M( c" ^4 a# I. T/ ~1 m% e One of the Configuration Management tasks that involves the systematic 8 |4 g8 {6 ]1 X! cevaluation, coordination, approval, or disapproval of proposed changes to the5 `0 @: a" U, ?* V* y V: ? design and construction of a configuration item whose configuration has been: L1 K+ s* Z4 s; ~ formally approved. " j6 {5 C' h8 n, F3 d6 j) AConfiguration0 [; g7 s) u$ u Identification % P# X6 \) x$ f3 d/ q# GOne of the Configuration Management tasks, which require that for every 5 \! p/ D7 J* \* Q2 q4 _change that is made to an Automated Data processing (ADP) system, the design8 W5 m( L u: w and requirements of the changed version of the system should be identified.5 Q4 C1 j( h3 {) D$ I0 D Configuration( r& }9 t- f) x, ]4 } Item (CI) ) i8 t5 B! K+ G4 _+ s* YAn aggregation of system elements that satisfies an end use function and is # z+ E- z! g5 i( e. w; F/ C! Rdesignated by the Government for separate configuration management.& j; K1 g0 s) w) t3 l! A+ [ Configuration items vary widely in complexity, size, and type. Any item required * v, N2 b4 J8 F ?: tfor logistic support and designated for separate procurement is a configuration& Q; M1 F1 l X item. Configuration items are traceable to the work breakdown structure (WBS).5 a* E5 E) O1 z1 E6 Q Configuration 3 Q) G2 }4 p% L/ J- _Management + s5 q9 A( I0 w5 c, k8 D1 t" D(CM) * x7 J/ q3 h7 B2 t: o) u e; jIn computer modeling and simulation, a discipline applying technical and * _$ B ? U+ _, ?% A' madministrative oversight and control to identify and document the functional/ I( j* Y- ]; J! O3 S requirements and capabilities of a model or simulation and its supporting ; N$ i; D! `0 Sdatabases, control changes to those capabilities, and document and report the ! d9 c! V$ ?' o& \* z3 uchanges. See also Accreditation. 2 d3 b7 i! r! B9 ~% tCONOPS Concept of Operations.# |2 z/ d8 `0 \& Q) h9 x" ] CONPLAN Concept Plan 9 [% M" f& |# j" t( vCONS Contracting Squadron. % V3 Q7 [9 b! P4 j ?Consolidated , r) a/ B9 M' |/ L* A! B# ECommand Center 3 n2 l% ^' a# g5 X+ P(CCC) ! t3 g$ [+ N+ UA single command center from which USCINCSPACE/CINCNORAD can direct all7 y9 u# R. i# X1 M( n( _8 T his assigned missions, to include BMD. (USSPACECOM) Located in Colorado J/ N: j! e a: t* f5 A+ A6 ] Springs, CO. % n2 S% A, p8 H- J3 ?6 fConsolidated 0 j: {- } r; J8 a+ l( BIntelligence( ]4 A2 b2 a' |! G% W1 V Watch (CIW) 7 i f% L! Q8 p+ \' L NA consolidation of intelligence watch functions within the Intelligence Operations / {4 S4 \7 ]! i: [Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD5 B' {: [5 q* { Aerospace Defense Intelligence Center (ADIC), and the Air Force Space ) z$ {" L, j {2 hCommand Space Intelligence Element (SIE). ; l* o. J8 N8 l5 q4 S9 U3 ^1 D" gConsolidated) M$ U" w$ t& X5 O$ ?, | Space ' G- W5 [% v" T9 Q {- D$ HOperations! E/ G3 ^0 j5 B; { Center (CSOC) 2 V/ [+ r8 `* G3 x, \Series of centers at Falcon AFB, CO, which operationally control and maintain T% k7 s* G" I% S, ^$ Passigned DoD satellites.# }+ B& f. ]( J5 K8 x Consolidated E/ b! \2 D3 ~) g. h9 sSpace Test ' {* Z4 y. v( z" i6 OCenter (CSTC)4 g$ F i# Q$ ? Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and / j. D5 c3 Z a9 {initial on-orbit checkout of operational satellites, operate R&D satellites, and( E1 Z1 F6 b6 M3 t4 G. x serves as a backup to CSOC for operational DoD satellites. 1 ^" h# k1 { F2 i2 q; X4 wMDA GLOSSARY, VER. 4.0 C9 J3 X% V: z& i# e 60 ( I2 a. o3 W" ]* m2 W+ wConstellation : K1 x, D" O* d6 G% L# k L; fSize (CSIZE)% a/ u# q1 a0 B% e6 n: G The number of satellites of a particular system placed in orbit about the earth.; \4 v9 O1 }# S& S% k, E Contact Fuse Device used to detonate warhead on physical contact with another object. & b) t- Y0 [0 o4 w2 AContingency 4 {* H' }( Z4 G3 [/ Q9 nDeployment Plan ; l: u5 Z k! f% K+ [(CDP), T% X$ S+ I! b" I6 |; I) j5 j An executable plan designed to deploy an early missile defense capability and ; ]7 w0 m* V* Wreduce deployment time. The plan provides specific executable deployment 1 z" N& i: ~/ Hoptions and describes activities required before and after a deployment decision.+ v* i6 D) [" Z% m( a, O8 U The plan also allows decision makers to have oversight on technical progress,; R" W3 r1 q) V6 u: |3 }( } cost, schedule, and risks associated with a deployment system. - `: O+ e* n% |# NContinuity of 5 M" S! o0 s5 B" l' o* s) cCommand/ ]9 B5 [$ `8 Q c) f/ J Y The degree or state of being continuous in the exercise of the authority vested : Z! u1 z3 S0 o! N, a. _in an individual of the armed forces for the direction, coordination, and control of4 I' y; H8 W( E military forces. 5 G1 }6 I+ ]% a5 `Continuity of7 @ g6 M. h$ X Operations 1 R/ s0 f$ S$ K: J# dThe degree or state of being continuous in the conduct of functions, tasks, or9 R ~0 l3 T; J( ]" j duties necessary to accomplish a military action or mission in carrying out the ' y# i; a- o9 L, S* Q( lnational military strategy. It includes the functions and duties of the commander,: O5 K% P- N$ }# U- O5 M- M as well as the supporting functions and duties performed by the staff and others 2 r9 I( M7 C0 R+ @' G& E% Macting under the authority and direction of the commander.$ c! I7 h7 I* n0 L Contract! g3 P2 m) L% j% o- L+ I* w6 T Administration8 t+ l4 [# e, l/ X6 x! D9 N( D- U Office (CAO) 0 j4 K K; N2 M! q6 m. e/ qThe activity identified in the DoD Directory of Contract Administration Services l6 R1 G0 D. [9 |: JComponents assigned to perform contract administration responsibilities. It is a , B* ]6 `% [& \* f7 I% xgeneral term and includes Defense Contract Management Regions (DCMRs),+ H% y, z; x0 z& z! c Defense Contract Management Area Operations (DCMAOs), and Defense Plant * l' `( z1 K" }Representative Offices (DPROs). (Defense Systems Management College3 b$ M4 u) U( H9 g! n: m3 b Glossary) # [4 [. P3 ^' v$ z5 Z* A5 g% A: C( q% lContract Data 0 j" q5 ~, |+ O+ a. @; k* pRequirements 7 [/ L; \" ?* \) ^) lList (CDRL) , ^3 y; e: p: l4 P0 |" _Document used to order (“buy”) and require delivery of data. Tells contractor/ }7 o6 e+ {1 E4 z% c what data to deliver, when and how it will be accepted, where to look for # v2 X+ {0 v. Z5 t7 Einstructions, etc.; F, i6 v, N/ D: D2 ^ Contract, T2 s" T! }- @0 B Definition" e$ L# Z/ N5 v. O, R* t A funded effort, normally by two or more competing contractors, to establish : R4 e1 u% j' Y# fspecifications, to select technical approaches, to identify high-risk areas, and to , F5 m! K9 I3 [8 hmake cost and production time estimates for developing large weapons systems. & T, n5 A9 N; Q' XContract Work / B' i, d+ b& H; J+ ^1 xBreakdown ! a) K# M2 \0 \ g& cStructure 5 h! t: t3 e" ^7 s5 a6 ~# y5 M2 @The complete WBS for a contract developed and used by a contractor within the- _/ h+ e9 P, Q }8 k guidelines of MIL-STD 881A, and in accordance with the contract statement of3 E/ Y7 g! W. m' _/ B, i work.8 D! ^4 ^2 @9 O7 K( _% ~* r Contracting 0 [, o6 r$ r# D! [3 lOfficer (CO) 9 L/ z$ }' d* E6 h0 _1 }A person with the authority to enter into, administer, or terminate contracts and & K9 F9 ]1 n& Emake related determinations and findings. The term includes any authorized 8 [, v3 R2 }& S& Drepresentatives of the CO acting within the limits of their authority. A CO whose & |* ` }) j* N) bprimary responsibility is to administer contracts is an Administrative Contracting " ?4 U2 z/ T4 N7 {" k7 L2 A; dOfficer. One whose primary responsibility is to terminate contracts and/or settle$ L6 k5 w/ l0 }/ U8 r terminated contracts is a Termination Contracting Officer. A single contracting* [/ ?3 u/ Z0 c1 s7 V officer may be responsible for duties in any or all of these areas. 6 H: ~ E) [0 I" aControl Authority that may be less than full command exercised by a commander over & y5 ~# {2 J7 n) q, bpart of the activities of subordinate or other organizations. % p1 V! l& c5 t3 IControl 3 Z/ d1 \$ S( g' A* f: fAbstraction " a9 P3 [% d6 T I% e) ?(Software) The process of extracting the essential characteristics of control by6 E0 q3 j1 N, a+ t defining abstract mechanisms and their associated characteristics while ' ?" N7 @9 }3 x3 U7 B" l: Adisregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C " k6 A7 {+ w8 f61/ ?4 c: @* R* t0 }) g, E Control and " K9 |. M& A) e. Q8 H% _Reporting Center, x6 j8 j4 B6 T$ { An element of the US Air Force tactical air control system, subordinate to the : V, h& s& A5 T+ |# q# |! mtactical air control center, from which radar control and warning operations are( A( b/ h# R7 ]. ^+ `2 _0 O/ v conducted within its area of responsibility.7 k: j6 @8 D1 z+ u, |1 D Control and! c2 D& }) V V W% l6 m- _ Reporting Post . m. a& t4 w G' x: E7 qAn element of the US Air Force tactical air control system, subordinate to the% G. M% Z9 u/ t" c% J control and reporting center, that provides radar control and surveillance within- v- A% X, g7 e3 V# {, K Q its area of responsibility. . o1 e1 u0 i% iControl Area A controlled airspace extending upwards from a specified limit above the Earth. 5 ^+ J( b+ a* ], B- k4 K6 `Controlled0 _3 W% d0 ~8 n5 s Environment % L/ I+ D0 \* V3 C: x/ C jArea where entry into the radiation hazard area is controlled. # a y+ ~2 R( @6 y+ _+ s3 iControl( {$ a* |8 H8 V$ X6 |3 y Procedure & D0 T/ o1 q* u3 T3 ~The means used to control the orderly communication of information between+ C. A' U( e4 N9 ? stations on a data link. Also called line discipline. 5 Z3 D% {6 N6 XControl Station The station on a network, which supervises the network control procedures such 9 o* r# O; B9 b3 b# j( i* das polling, selecting, and recovery. It also is responsible for establishing order 4 _. M7 `! W% H% h- i. Gon the line in the event of contention, or any other abnormal situation, arising ! s4 P+ C5 w- Hbetween any stations on the network. ' a! u7 b9 f0 c* |! t: f5 D# v1 bControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to# z$ o0 I& u- V! u+ q" C process sensitive defense information and that is under sufficient physical and 4 x. Y, A7 A. ntechnical control to preclude an unauthorized entry or compromise. - n, m9 A Q& FCONUS Continental United States.% f" y( Y8 m5 _* _% K Conventional Co- 9 J5 m' W5 L& J2 |3 MProduction : g4 ?2 M( o8 q/ \ dAn effort between governments to produce the same end item, or components " P; z' f' `4 t3 A& _6 z n8 mof the same end item, in concert.9 }3 w; o% w7 t Conventional+ N; [! ]& {2 g8 R Weapon' p7 o' U2 B1 W! h A weapon that is neither nuclear, biological, nor chemical. 7 r8 M* e' c B5 i+ v+ }Coop Cooperative : m* F! s; h$ ^Coordinated( h7 L8 ~! l5 q2 j) u2 L* V4 ? Engagement7 D& J0 U% P, ]; [- B/ U; R! `/ d; K Planning/Actions. F1 d) R* A" k' t9 i4 A; V) U+ N Necessary coordination among engagement components to ensure maximum: b/ j9 U' I" \5 I( W effectiveness of the SDS and resources are not wasted on targets already ' g/ @" A2 ?2 R3 `5 }; I, V3 Ftargeted.5 `. a0 o2 c( C! C* d% q# L Coordinating) q) ^3 f `' n7 [: T4 U Authority& [4 E. `. Q- M* Y A commander or individual assigned responsibility for coordinating specific, d* I8 [. j \6 i/ h% m. F( H functions of activities involving forces of two or more Services or two or more ' V9 J& ~ d" p( v" D. Pforces of the same Service. The commander or individual has the authority to 3 q9 ~8 C6 m4 d# m: mrequire consultation between the agencies involved, but does not have the % }7 ]) k+ M( }2 Zauthority to compel agreement. In the event that essential agreement cannot be9 ] G# n/ B8 N, ? reached, the matter shall be referred to the appointing authority." k( d- T; |, [; J COP Committee of Principals) d2 o. R7 p+ s7 t' B: m4 \$ C3 u COR Contracting Officer’s Representative. Contracting Officer.5 o& ^5 |* n1 v# v# G7 g CORBA Common Object Request Broker Architecture. 0 F+ T: {( \9 Q4 K& |6 iCORM Commission on Roles and Missions. 8 v( P; Q. h, @; dMDA GLOSSARY, VER. 4.0 C/ a4 W) V5 V9 N( p9 S* B 62 * j5 t5 x$ ^( [/ }" j# I$ ZCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens 8 |; p& m$ e; T" _- Pperpendicular to one another, designed to act as a radar target or4 Q; z0 o1 v. _) X. H marker.& P4 ~& W, \* V7 g5 m2 V* I (2) In radar interpretation, an object that, by means of multiple reflections" n2 [7 ^' f9 M from smooth surfaces, produces a radar return of greater magnitude than 7 q' }+ a: L1 @1 w1 bmight be expected from the physical size of the object.( ]" h$ F$ W4 g4 G9 Z: T Corps SAM OBSOLETE. See Medium Extended Air Defense System. h& t, K8 W: m n Correlation (1) The process of relating observations or tracks from one set of data to9 w/ D( e, T! K% Y& k' _6 s observations or tracks from another set of data, i.e., collecting data from ! C8 X2 Y5 n/ T! `) P# bdifferent frames or sensors that presumably relate to the same target. (2) S; t$ H. M7 Z3 z In air defense, the determination that an aircraft appearing on a . f( z! T( O1 ]0 u% w _radarscope, on a plotting board, or visual is the same as that on which5 O6 ^1 N7 M& k; y5 n7 w information is being received form another source. (3) In intelligence / P, l5 J9 g6 i' Q: tusage, the process which associates and combines data on a single : O, ^0 J0 [1 y! \7 ]1 Pentity or subject from independent observations, in order to improve the , Q2 V R+ t2 _" ?4 f, mreliability or credibility or the information.( n G' ~& Q, P3 K; J/ R2 l+ O3 l COSEMS Evolving architecture operations support tool.; l/ A; a' u1 F# B4 X5 b( G COSM Computer System Operator’s Manual# {# B1 S K. n COSMIC NATO security category.9 f, W6 r- @ V9 I* I* P Cost Analysis # I# M4 R. h% b% t! aImprovement 4 p+ ]: Y& I; ?9 X, x6 T+ R# r, oGroup (CAIG)* [3 F$ @9 g& p9 K5 X7 d c: ^ An organization within the office of OSD Director, PA&E which advises the DAB9 i j6 A% [( t* Q! F on all matters concerning the estimation, review, and presentation of cost5 z4 s2 D/ S3 _ S C1 q analysis of future weapon systems. The CAIG also develops common cost4 I5 P8 F$ g" E' ?6 v estimating procedures for DoD. 8 x; I+ s2 k5 `+ v3 RCost Analysis; X2 i6 I3 A8 U Requirements9 s# |9 q- G) H/ r7 P' H- {, ?6 _2 s Document7 R% r% y5 w: }9 F g- p# ~2 ~ (CARD)$ s8 p l, r8 a) D5 Y7 f7 J The document describing the technical baseline, which is a subset of current+ H1 S' Z) H2 p$ Q system technical data and is used to generate the baseline cost estimate for an 7 }. R1 S5 E/ f3 I$ G" JSDS element. It includes, but is not limited to, the element description,! z3 {& p0 L/ s' x5 K/ P interfaces, operational concept quantity requirements, manpower requirements,- f) c2 Z" ]$ J4 N! U6 n activity rates, schedules, research and development-phasing plan, and facilities; c4 L: A' ^. W requirements.2 P2 Q" s' F% _# F Cost and$ L% G# @1 l4 Q M, \/ A/ R# I Operational2 ]5 B5 l- t8 H% N% B' w3 U Effectiveness 7 |+ P% l+ v' A4 ]1 v* LAnalysis (COEA); j2 a# w) b4 d7 l2 U% W) \! ` An analysis of the estimated costs and operational effectiveness of alternative# m& n- ?0 w6 f8 l0 g7 Q$ w) [ materiel systems to meet a mission need, and the associated program for. w2 |" N! @4 U u- D acquiring each alternative.& K, O; i1 V' S$ ]3 e _ Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk# \& t" P9 m. l0 E: h: s due to cost estimating errors and the statistical uncertainty in the estimate. / q& j$ H6 i C' v. cSchedule/technical risk is risk due to inability to conquer the problems posed by, ]- T$ g1 z8 {& z5 P the intended design) L, F) B1 K- b# }& F) I# m t COTR Contracting Officer’s Technical Representative. See Contracting Officer.9 o7 ?) W4 i2 [# | COTS Commercial Off-The-Shelf. 4 G8 ~$ R- y7 [# k+ ~; b. F: D* mCounterair A US Air Force term for air operations conducted to attain and maintain a desired # J# V d. J) G& T! _degree of air superiority by the destruction or neutralization or enemy forces. & ^1 T: S1 `9 H% |4 PBoth air offensive and air defensive actions are involved. The former range $ H" `* ?6 S* E' k4 Vthroughout enemy territory and are generally conducted at the initiative of9 p2 V2 `7 I) d9 B b: }3 E friendly forces. The latter are conducted near or over friendly territory and are% U8 b" I- E8 }6 x0 _9 y generally reactive to the initiative of the enemy air forces. ; g# G5 _6 ? r K# c3 @MDA GLOSSARY, VER. 4.0 C9 v2 Z8 w5 Q+ A! q f+ n 63 7 {% G8 [ r' i8 O/ @( T1 cCountercountermeasures Z( X5 ]$ k* T, |1 V% K. U: v(CCM)) i7 W, } M1 B( V Measures taken by the defense to defeat offensive countermeasures.9 V- m( p3 J5 q) G# R* P. e% K1 r Counterforce The employment of strategic air and missile forces in an effort to destroy, or3 _! ~6 N, Z4 k9 i& u/ r& ~ render impotent, selected military capabilities of an enemy force under any of the : }/ u8 Q3 Y* O) X: Icircumstances by which hostilities may be initiated. 2 b* x4 t% M' o. l% ~ ?Countermeasure A design or procedural measure taken against covert or overt attacks.9 u/ p0 V* \' Q5 v+ D' F Countermeasure 8 @& B% j: [; j) j+ \s (CM) . p$ ^6 W- y* NThat form of military science that by the employment of devices and/or : H5 {7 k! ?, `7 W2 M/ t7 utechniques has as its objective the impairment of the operational effectiveness of2 i$ r `- Y5 }6 [" N7 [/ t4 r enemy activity., ~0 T$ R+ _( y& n) |% e; W) o Countermeasure & W" m6 T- S8 @' y9 f% D8 ls Rejection' W0 m" n8 u& ] (Surveillance)( C. [% ~" ^0 q5 s) B% r Improvement or rejection of an object signal in the presence of - M$ q) \" S# L% D1 _* A+ gcountermeasures. 6 S" p$ A0 }2 n+ U1 `9 HCourse of Action . h; [* { f% n# d(COA) ( |' D! @$ ]' k7 X% {(1) Any sequence of acts that an individual or unit may follow. (2) A possible# z' D. |0 i' s f) _8 }1 ]( E plan open to an individual or command that would accomplish or is , ~5 j# V) ^8 e8 d7 u! b7 `8 Srelated to the accomplishment of his mission. (3) The scheme adopted : h8 D) U3 h# y4 ~to accomplish a job or mission. (4) A line of conduct in an engagement.3 q& B) L @9 Z: e/ Q, n4 q9 [ (5) A plan to accomplish a mission. It describes the execution concept 0 P( b( V- h2 L& q. r& C2 l5 }for BMD of North America. It will specify the engagement priorities,7 n' K f. a9 w7 @+ M resource allocation and desired results by Area of Operation (AO).1 {+ ?+ g0 }+ Q: p' ^) O a3 ?, J& ~ (USSPACECOM) (6) The scheme adopted to accomplish a task or" s G" O5 m7 J8 f+ r mission. It is a product of the Joint Operation Planning and Execution 0 k) {6 e0 e2 U4 M% b) j" bSystem concept development phase. The supported commander will" N! Y: ~) ^5 v0 B include a recommended course of action in the commander’s estimate. * ]$ E3 H% A3 Y8 _/ {; t8 gThe recommended course of action will include the concept of8 H* r0 V0 L% z9 x2 X: n$ x; e operations, evaluation of supportability estimates of supporting& N; \( G5 R% X' D+ _- X organizations, and an integrated time-phased data base of combat, 2 x. d% V! l- x7 r+ g f8 Ncombat support, and combat service support forces and sustainment.' z. m8 _8 z E: \7 l$ H. i Refinement of this database will be contingent on the time available for: \3 _& S+ o |4 |: i course of action development. When approved, the course of action! a9 L$ y; ^% P4 B becomes the basis for the development of an operation plan or 6 C4 [; Y* e7 k- f% I: ]5 ]operation order.; w( u: a P5 {! V# i+ g+ S5 H Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, 7 v/ s h6 W/ J) l4 L4 hand other geographical presentation systems. (2) Cover or protection, as/ s0 r, O7 o2 g( R3 k! R3 b the coverage of troops by supporting fire. (3) The extent to which r x1 Y j# P9 J intelligence information is available in respect to any specified area of 8 P" p* A0 I4 A: a. linterest. (4) The summation of the geographical areas and volumes of ) J0 D8 Z; a. U% V% e: daerospace under surveillance." r$ \* S" W4 p+ E7 G# Z- v Covert Timing % z+ G0 z' h# e9 f% bChannel: u6 {4 k4 C1 T! R9 {, |1 j; D2 l! ] A covert channel in which one process signals information to another by ( i" {9 C9 p2 q Hmodulating its own use of system resources in such a way that this manipulation8 V$ Q0 G% x. j1 o affects the real response time observed by the second process. 2 s' L$ R5 l* G+ ~8 T2 [CP Command Post. * u( @1 _9 M8 `! D5 g: JCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.. g, J# H' |" h% X# W" N CPAF Cost Plus Award Fee.3 i5 w) O4 J+ _# N8 t& Y CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)# A& w5 C; u0 S `) @ MDA GLOSSARY, VER. 4.0 C$ z) @; L5 z3 ^% F 645 N3 t! c% h* m2 I" t( n CPAR Cost Performance Assessment Report. 6 H* I3 D+ e% b% mCPAT Critical Process Assessment Tool 1 y/ p! U& O0 ?6 R) s* ^CPB Charged Particle Beam.; L) {, o- G5 ~ P9 _ CPEV Communications/Processor [Network] Experimental Version.8 ?! b) v, D& _/ Z CPFF Cost Plus Fixed Fee.+ I' l7 P4 m6 x9 h9 w CPIF Cost Plus Incentive Fee.# f% R% s* [6 T6 F CPIPT Cost-Performance Integrated Product (Process) Team. : H/ b9 r9 i4 e+ yCPM (1) Critical Path Method. (2) Contractor Performance Measurement./ q; }* S& H7 D3 N CPP Critical Performance Parameter.0 n+ \) n: ?3 G7 f J CPR Cost Performance Report. ; J3 M) `+ T) a; \4 _" ICPR/NC Cost Performance Report/No Criteria (Contract management term)." T6 u% T. \ t CPS (1) Consolidated Program Summary.$ Y' q2 M! o* m7 n" C (2) Competitive Prototyping Strategy. [- m0 l# D9 f7 f* P(3) Current Program Status.' p/ y% A( f6 G- Y4 ^ CPU Central Processing Unit (TelComm/Computer term).9 X0 u0 K& |4 Q% u- d \4 H CPX See Command Post Exercise.4 N; s8 L& d. v# H) O CQAE Chief/Contract Quality Assurance Evaluator. 9 S3 z! x" t5 kCR (1) Computer Resources. (2) Continuing Resolution (US Congress term).! X0 H! w4 ~, p0 o$ v CR-UAV Close Range Unmanned Aerial Vehicle.: d" E( u6 E! p$ ~+ m! O% d# Z7 \! s CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement) \7 M/ g% \- n# Q CRADA Cooperative Research and Development Agreement.' p i% W( d. I3 L CRAM (1) Control Random Access Memory. j0 N( d2 a0 J6 d. o b(2) Cross-tie Random Access Memory (Computer term).1 c3 @" Q% T4 U+ b CRB Configuration Review Board. + H. @% W' m4 R! yCRC Control and Reporting Center.; ?0 G9 ?/ W6 y* E7 p CRD (1) Capstone Requirements Document. 5 t0 i0 T* W7 x' x" b4 ^& n(2) Component Requirements Document. / t" ?1 {% x" A; M7 J5 Z/ h" UCRDA Cooperative Research and Development Agreement.6 v4 M% p( a m+ ~1 p2 o CRG Communications Relay Groups (PATRIOT).: |# V7 P* I) b! f CRI Classification, Recognition and Identification.: R1 ^" h9 u3 h CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 0 H! D) ~9 @. C& B' ^65. A C5 y: _8 `5 Y3 d1 Y Critical Design K3 J, U3 v: ~8 ]- u6 {1 WReview (CDR) 0 g" s8 S9 s3 b8 _* V1 H/ Z0 QA review conducted to determine that the detailed design satisfies the 5 ^( t" c& S- B: @4 i8 _& D# S, {performance and engineering requirements of the development specification; to + g: Z( Y! M) h) V" Nestablish the detailed design compatibility between the item and other items of! m$ b1 }$ h# N: K9 z% j equipment, facilities, computer programs, and personnel; to assess producibility 0 ^# {1 \. c( } Rand risk areas; and to review the preliminary product specifications. Conducted / W5 c( {- H. b2 e2 l3 n9 oduring Phase I, Demonstration and Validation (for prototypes) and Phase II, # ^* i- P- B! F$ CEngineering and Manufacturing Development. ( I( W5 S% c4 N8 yCritical# i/ f/ L3 ^4 m- I Information . o% h' m! m6 H8 M# nSpecific facts about friendly intentions, capabilities, and activities vitally needed+ F) O: z! r A# J- h by adversaries for them to plan and act effectively so as to guarantee failure or # g2 \, g8 k" I# w; u4 Lunacceptable consequences for friendly mission accomplishment. ' [9 M3 X9 @9 t( c# C4 gCritical # k D. I# s t1 H6 Y, k; OIntelligence * D' `) c& b3 O- o+ QParameter1 g3 W+ j' R+ q' Y# k8 f G A threat capability or threshold established by the program, changes to which, Y4 e3 B x' s( H0 l" S could critically impact on the effectiveness and survivability of the proposed , x( k: O$ u; a8 ?: V% Qsystem.5 }' ~* X0 c* h9 @ Critical Issues Those aspects of a system’s capability, either operational, technical, or other,) j* Z! r! B+ k+ g4 y that must be questioned before a system’s overall suitability can be known, and " o* b' ~8 w+ e& P1 wwhich are of primary importance to the decision authority in reaching a decision * D; d2 e9 l; H/ y) x/ Hto allow the system to advance into the next phase of design, development, 2 J7 d, w; ]3 E9 W) W! j( Xproduction, or post-production.4 M/ B5 ^7 `6 l) O: T( l& I4 a8 z Critical : `) r) f# a6 w+ Y SOperational % w' S# l* j5 |2 ?/ q: dIssue* } ~* ?- ?# P; \! p, p A key operational effectiveness or operational suitability issue that must be) {" L3 X$ z* `, T( ~& s1 I4 L examined in operational test and evaluation to determine the system’s capability . A0 R% N3 a) o Lto perform its mission. A critical operational issue is normally phrased as a , V% M6 h* \- Nquestion to be answered in evaluating a system’s operational effectiveness " L' S5 K( ]( `% _and/or operational suitability. 5 [- v( K* V9 x% R3 uCritical Path 5 p" C/ n8 N8 K `Method5 ?, s0 A0 r6 C8 @& R } p1 { A technique that aids dependency of other activities and the time required to ) v+ i4 f2 M6 l8 v/ f P( Pcomplete. Activities, which when delayed have an impact on the total project & h( x- w7 M6 D( V8 G+ |/ ~schedule, are critical and are said to be on the critical path. ; b n3 N+ G5 J% @, U8 D; OCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to5 z& X( h, x* J1 B, V! J the viability or the operational effectiveness of the SDS.7 j9 U! w7 L# _8 P Critical Security9 t$ x+ F. }4 P- [ @$ z Risk ( }5 Y) {. R3 \% q. pThe existence of a security vulnerability that, if exploited by an adversary, could * o$ Z4 R8 @' T) b8 p2 T* Gcause exceptionally grave damage to the viability of the BMD or the operational $ k, I7 {7 t3 p& Aeffectiveness of the SDS. Critical risks assume an adversary’s capability to 5 q' |! \( l7 B. O& N$ i$ n' J* Lcause major system disruption or degradation (e.g., single point failure), : c! q$ `& C2 x( m' x# hdestruction of mission-critical components, or usurpation of system functions. 5 m2 }# E. p2 {Critical . m ~3 e# g, _# H- t: o- x- \0 LSupporting e' V! }3 ^$ |( GTechnology ( [* c" \" E8 g; C3 W" xA technology that program management personnel consider a critical part of the * H" L! x0 z% W4 _' Qprogram being described. 0 [6 g0 l7 L9 y1 t5 T+ kCRLCMP Computer Resources Life-Cycle Management Plan. 1 R) Y9 X/ x8 h1 h/ A! kCRM Computer Resources Management. 6 D4 v6 \, d+ E: pCRMP Computer Resources Management Plan. 0 V4 i8 h( {9 j X. oCRO Chemical Release Observation. ) V0 G; ]; {6 N1 t, E nCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC # S3 A: N+ @& S; `term.) 7 R& s6 Y8 J; YMDA GLOSSARY, VER. 4.0 C$ x: P# o9 O3 h" V( S# ^! d8 V 666 v* _& k$ V5 k E CRS (1) Computer Resources Support. (2) Congressional Research Service. (3)" j2 t9 p2 C1 x Contractor Reporting System. . p3 y& h% J# Q+ S3 C0 e oCRT Cathode Ray Tube., d& w; J4 s% H, H2 Y% W CRWG Computer Resource Working Group. / h. u' i, g+ I3 Z5 e# ZCryocoolers Cryogenic Coolers. 0 |3 w& o r1 N& aCryogenic Of or related to cryogens (substances which are used to obtain low' q9 u( j% e& U8 C" P0 E) N+ k temperatures). & R8 p+ e/ R7 a' `4 k( s- _1 {Crypto A designation or marking which identifies classified operational keying material, t% o7 O9 m7 i( e and which indicates that this material requires special consideration with respect 5 w: i* B) F5 s F U( u# `to access, storage and handling. 6 e e4 v8 b& JCryptographic& ^! F* |$ i, {- o2 ?! x2 X5 Y- K System- _' b/ G$ ^6 e% p The documents, devices, equipment, and associated techniques that are used' `. p7 b. z1 K, k7 |& h$ y as a unit to provide a single means of encryption (enciphering or encoding).+ | I) h. @8 \* B* E" S% W# R Cryptology The science that deals with hidden, disguised, or encrypted communications. It7 W- d7 ?4 v" S includes communications security and communications intelligence. ; ] [ |7 \9 f8 Z2 R9 ~! W* t& RCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.: g B+ ^$ T& |! E8 E CS/CSS Combat Support and Combat Service Support (USAF budget term). L X |3 F" ]) Z8 a" iCSA Chief of Staff of the Army. ( i6 G# `7 L$ L7 E* f9 `CSAF Chief of Staff of the Air Force.: [; Y$ \/ q0 O1 R, J' j CSC Computer Software Component.* M/ e/ W' y T2 D CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)- _9 v- c6 a( c) ] CSCSC Cost/Schedule Control System Criteria. 5 F) ^# P" W, B- C8 \CSD (1) Constant Speed Drive. (2) Critical System Demonstration. " T9 r/ _1 z- n8 T; P+ G* LCSE Center for Security Evaluations (DCI). # D& T- v7 y0 @$ Z" n0 P- ~' ^CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon* @. }8 T7 {3 j9 s' x7 _ System, located in Cherry Hill, NJ. / [5 v2 g7 N7 r" F+ ?' d( xCSF Consolidated Support Facility, Arlington, VA.9 |* X" [6 d4 d; T5 c CSI (1) Critical Safety Item. (2) Critical Sustainability Item. # p8 r# d* x5 s9 U! D8 LCSIP Current Systems Improvement Program.' N) ^" Z/ z2 t CSIZE Constellation Size.! {: I1 |! Y3 g; G* r- n% s CSL Computer Systems Laboratory. 5 V2 y5 C( D, C2 g" sCSM (1) Core Support Module (*C2E term). (2) Communications Support Model. 4 M- C; q4 R0 Y4 ~2 ^: T# B) ACSNI Communications Shared Network Interface (NATO term).* [+ E, @$ _+ ?% l& W$ A MDA GLOSSARY, VER. 4.0 C 8 g- h o% W- C. j; U/ X0 v7 l67 % \5 Q) r! M7 J/ UCSO Closely Spaced Objects.; p3 o8 @% b* c R: u8 O CSOC See Consolidated Space Operations Center.5 Q I* E6 L2 ^- n CSOM Computer System Operator’s Manual$ K) G# H; G, r* [, Q+ w, V CSOSS Combat System Operational System Sequencing" D( Z# `! ~* t1 j1 a CSP Communications Support Processor (numerous locations, including USAF Air+ ?4 S3 \; d& Y5 Y5 S. H" h Development Center, Rome, NY term).; `; N& u1 w. c5 D) f, [( P CSRD Computer System Requirements Document. 5 K. J4 j- l' f0 X5 _4 A* h4 QCSS (1) Cooperating Space System. (2) Communications System Segment. (3)- S6 J B5 S/ Z" f8 Y1 l* ^ Contractor Support Services. (4) Common Sharing System. (5) Communications 9 Y X* \' G. F+ y9 L6 C2 U- USupport System (Navy term). (6) Common Support System. (7) Combat Service. [( o3 v& g# L* |% D% P Support. ) O) M! s: V' @CSSCS Combat Service Support Control System (USA term). & |. I& ~) W+ r5 N. }CSSPAB Computer System Security and Privacy Advisory Board.8 j4 y) O! q2 D6 }5 N CSSO Computer Systems Security Officer.) Q5 e5 l+ P: \8 D3 U CSSTSS Combat Service Support Training Simulation System (US Army term). . o/ E! A2 }5 P& G2 i( ZCSTC Consolidated Space Test Center. % b4 {) y$ M7 \0 hCSTI Civil Space Technology Initiative.; S2 ^6 U" f/ N, C: c7 O8 ? CSU (1) Computer Software Unit. (2) Communications System Utilization.& E9 m9 V n3 h8 b CSUR Communications System Utilization Report. + o( O* ~& o! F0 \( s0 MCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. , I, W) [1 l" P& h2 h2 O* ?6 n4 L1 r(4) Cryptologic Technician (Navy occupation specialty).' V5 F& g+ ?9 L9 z- O1 j/ _1 a: @' @ n CTACS Contingency Theater Air Control System (JFACC term). . d) o5 b- U& d: K0 P* l; QCTAPS Contingency Theater Automated Planning System (USAF).; J* K( _5 p- w! b( H8 \ CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ; d9 s! B& c& V3 uCTBM Conventionally-0armed TBM." k1 k, b' _, U {* R% D CTC Combat Training Center, Ft. Leavenworth, KS.- {5 k' U& L/ d* X3 m' ~ CTCC Critical Technology Coordinating Committee. 6 ^6 E" H; j8 G$ @( i8 JCTD Communications Test Driver. ' D! _* @, u' oCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. 5 ]6 p5 O) t( RCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally% }. J9 b8 }7 y! H funding selected test investments proposed by the Services and Defense + K# w7 ` m3 l0 u$ s* mAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C ' c5 g( Z5 y% k, Y4 V! R68 ( a/ ~. Q, Y% F$ h: rCTF Controlled Test Flights. " p/ q5 `9 q, m; N4 x8 W: j- z( ^CTI Concept Technology Insertion. # o- Z1 ]9 J# k# y5 HCTN CALS Test Network. / [6 O$ Q, l6 U! F( b% PCTOC Corps Tactical Operations Center.: k# l: S% s7 q% Z! i; _ CTOL Conventional Takeoff/Landing aircraft.& }2 B/ C; i) @6 o8 K9 |& F) N CTP (1) Critical Technical Parameters.( H+ w q/ |; F (2) Communication Tasking Plan. . w8 o- C- E j(3) Consolidated Targets Program. $ Y \. u, o5 Z4 t. s0 fCTPE Central Tactical Processing Element. * u! t3 N$ U4 |2 |; W BCTPP Consolidated Targets Program Plan.$ d T8 A" h$ l" g6 P1 M CTR Cooperative Threat Reduction (Treaty negotiation term).4 [+ q( ^( t) N' K9 E& m* S; ^( A CTRS Centers+ [7 ?9 I- d; h* a3 d1 c5 X CTS (1) Clear To Send (TelComm/Computer term).5 l- m9 \! p& p8 l" c; l1 r1 M (2) Contact Test Set (USA IFTE term). 2 o# X g3 F k8 ]) uCTSS Computer and Telecommunications Staff." u$ U- }4 i. z CTT Commander’s Tactical Terminal (US Army). . w7 u' |3 [3 MCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). ) d2 P, j6 ^2 g) J! V5 w2 HCTV Control Test Vehicle(s). , p, s" b7 [! v0 a2 ^CUDIXS Common User Digital Information Exchange System." _ l/ ?' N* |2 V* _ Cued Operation The directing of one sensor based upon the data received from another sensor. 9 V( P9 _2 c+ @9 G. JCueing Command The command within a tactic, which specifies the sensor element’s coverage 3 R) B: @. `8 X( f1 a& \volume." a5 l& s/ g; S$ A5 u Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage ! y* s; L2 C2 Z7 {+ i) @$ xvolume. : g+ B3 D e, L% t2 N6 S; hCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. : C# o$ |0 m! ^CV/BM Carrier Vehicle/Battle Management. % Q' e7 X0 ]7 dCVBG USN aircraft carrier battle group.2 _& l9 k @: ~* s CVHG Carrier, Aircraft (V/STOL), Guided missile. , w0 i& u9 Q/ {5 y5 W2 q; q, qCVISC Combat Visual Information Support Center. % H( M+ n1 C$ x; \( ?' w, wCVL Copper Vapor Lasers./ {2 d& a) E8 s$ q+ [ CVN USN nuclear powered aircraft carrier.( N6 O, z0 n9 G0 t/ d; O6 h1 p8 h MDA GLOSSARY, VER. 4.0 C3 t, E6 k4 o% c U) p6 M; q" R/ N5 z 69. i# R! n1 W4 y/ k/ y( V. ^$ O CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. / c( k5 ?7 P: x4 E& T- P9 \CWAR Continuous Wave Acquisition Cycle (Hawk)./ N8 Z3 c/ I6 J/ I CWBS Contract Work Breakdown Structure.. n: c! `! W# h% k1 K/ k$ l CWDD Continuous Wave Deuterium Demonstrator./ H$ `) e7 ^) z% F CWIPT Cost Working group integrated Product Team. % N6 @" y8 Q) R! d$ ZCY Calendar Year. , j# Z$ {; F6 V1 q1 UMDA GLOSSARY, VER. 4.0 D$ p5 K+ v }# g: g( t 71 3 [, n E0 c; S' T* i5 VD Deuterium: |8 ?( E+ T: n# J j6 ^0 `. G4 q D Spec Process specification. 9 h4 B3 J! J" O7 O2 eD Star Measure of infrared sensor sensitivity. : z- u: u' x9 g# I! [# ]D&D Design and Development2 b0 K0 i& O/ [- O+ d, ~ D&T Detection and Tracking./ J1 g4 o( P! b: h( {& V D-IFOG Depolarized-Interferometric Fiber Optic Gyro. 7 R' H/ r) z$ K/ I3 B# h' X. xD-Level Depot Level (ILS term). : U1 M. M: D N5 @D/A Digital-to-Analog / ~$ D7 z+ p" ^3 ]/ fD/V Demonstration and Validation.% L5 D4 J# X8 \: C8 R D2 Projective (interceptor) in the Hyper-Velocity Gun program. # a* j; q7 R+ G' vDA (1) Department of the Army.0 M Y2 g' E% B' _; K+ \! S (2) Department of Administration./ [9 {8 E9 A6 l* Q (3) Decision Analysis. 5 U& A# w% K, r$ k% v5 L5 T) Y(4) Developing Agency/Activity. : C) _5 t. s) H( i) F4 ?(5) Data Administrator. P8 q3 ]( s3 Y8 p" n (6) Direct Action.' A( ]7 Q+ g. Y+ U: m. ^ (7) Data Adapter.! a0 ]. y# y7 K DAA Designated Approval Authority (DD 5000 term).! @; |) j( D" Q6 R DAASAT Direct Ascent Anti-Satellite. ; s" ?- E% @ b+ x) u& L2 p% rDAB See Defense Acquisition Board." j# ?& W h) ~- G& C3 T# }* _% m DAC (1) Days After Contract [Award].) y) h/ h$ G9 }; f7 B) V+ H (2) Department of the Army Civilian.- E% d' d% N3 \! U: Z' K (3) Directed Attack Characterization.7 @- P5 `. v& U* e' D4 ` ? (4) Deploy ACCS Component. # u, i. N* _* X" A! @+ S- J(5) Digital-to-Analog Converter.- k/ m; W/ R6 E+ g DACS Divert and Attitude Control System.( x, X# q/ v3 Y4 w( K% m1 n# I DAD Defense Acquisition Deskbook.% ~+ B! m# N4 ?, p% c& w DADS Distributed Air Defense Study (1993).9 t8 M g" M2 N" Y( o5 P, ? DAE Defense Acquisition Executive. 1 `7 d. t" G; rDAES Defense Acquisition Executive Summary. 0 j3 ?. G. d9 U u8 ?; X% K9 PDAGGR Depressed Altitude Guided Gun Round. / I! ~' h3 O, ]/ m& z9 w/ R1 _DAHQ Department of the Army Headquarters.! W" R4 e9 y9 I3 h8 J DAI Damage Assessment Indicator (targets).2 k- C( X# A' A7 n DAL Defended Asset List.# `8 v1 k% o" Z6 T+ e2 R MDA GLOSSARY, VER. 4.0 D 8 [+ r& }: ?. Q0 ]& Q72 A- i, ]' J# j. U" o3 T' r0 D DAMA Demand Assigned Multiple Access. 1 P. T, t$ l1 V# ?DANASAT Direct Ascent Nuclear Anti-Satellite. : e! x6 W( [& q/ V: yDAPR Director’s Annual Program Review (SDIO term) & L4 h3 R. I+ e+ ]: zDARO Defense Aeronautical Reconnaissance Office (OSD).8 ]9 \) h/ U$ m+ B* _" h DARP Defense Aeronautical Reconnaissance Program. 3 f6 j/ ~% E9 k5 mDARPA Defense Advanced Research Projects Agency. See ARPA. , x* `3 b/ j" v# s& NDART OBSOLETE. Defense Acquisition Review Team. 6 g9 Y! ~2 d, KDASA German Aerospace. Member of the MEADS Program Team. 0 p' s3 z! Z$ }+ @! NDASC Deep Air Support Center (JFACC term). - h" H Z: } I% L8 |6 B" `DASD OBSOLETE. Deputy Assistant Secretary of Defense. ; x! G" G8 W7 VDASD (C3) Deputy/Assistant Secretary of Defense (C3)8 B# k# R% U& x3 F# K7 P0 s DASO Demonstration and Shakedown Operation. ! m# |8 p' C5 }5 rData Integrity The state that exists when computerized data is the same as that in the source + q& a u( C; R C a' p: x' Rdocuments and has not been exposed to accidental or malicious alteration or * T$ u1 @5 }$ i' w4 H% ~: _destruction.; x9 C+ i" E- C5 q+ @0 J Datalink (1) The means of connecting one location to another for the purpose of$ }+ `5 I( n* C4 u8 G transmitting and receiving data., p3 J( x* {, k2 I) A (2) A particular path between two nodes over which data is transmitted. It8 @* P2 N- i+ G0 {( z includes not only the transmission medium, but also digital to analog0 j5 ]1 ?$ b4 L+ r v, u converters, modems, transmission equipment, antennas, etc., associated $ ?, f. [0 V& B* ?with this path. In the SDS backbone network, it was a path between two . V# f6 }: F: I8 u$ s4 _SDS elements. In space these datalinks were microwave or laser. On# w$ `4 Q7 |3 q$ j' a; U" ^ the ground, they could have been wire line, microwave, or optical fiber.7 Q' N) T- R- a0 ^& u DAU Defense Acquisition University, Ft. Belvoir, VA.$ e: Q* A ~0 w0 F/ I: d% l DAVID Development of Advanced Very long wavelength Infrared Detector (USAF+ l' _+ F5 F- C& T8 l/ U Phillips Lab term).5 T& N( F! [- X DAWS Defense Automated Warning System.2 L. S& R& e0 [% a' a0 U$ S p Dazzling The temporary blinding of a sensor by overloading it with an intense signal of& H0 M1 `2 d% I electromagnetic radiation (e.g., from a laser or a nuclear explosion)./ G- }5 |' c! U0 A1 O DB Bata Base 0 f1 Q: s: X. J e- [( d; t- GDBME Database Management Environment (Computer term).; J- b! B' V1 m DBMS Database Management System.5 g; H2 |$ N7 Z% L- w3 D5 ~! F DBOF Defense Business Operations Fund.5 I, w& @- x. M4 a DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D0 U7 s7 l5 l0 N1 _9 u4 ? 73" ~: w0 F/ i! ~- j5 U8 x# K3 J Dbsm Decibels per square meter.0 a. K2 _2 e* _/ K DBSM Database System Management. * r6 V6 e% q0 u/ S6 d5 [: w1 kDC (1) Disarmament Commission. (2) Direct Current./ S( T2 r! H1 @. K DC-X Delta Clipper Experiment., A& N& y5 B% j( T+ m( \/ ?" N DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications2 g5 g2 J; D* }; { y X Agency. (Now known as Defense Information Systems Agency (DISA)).* w0 H% R. a$ b2 ?+ R; k DCAA Defense Contract Audit Agency. / H d1 C" o% }8 I7 ]DCAS Defense Contract Administrative Services. % m1 E/ g- }9 g/ d4 uDCCO Defense Commercial Communications Office (of DISA).8 o/ [* r: F( X$ F DCDS Distributed Computer Design/Development System.$ i- \1 F1 ]5 s DCE (1) Data Communications Equipment (TelComm/Computer term). " |% B$ I6 C0 W- v(2) Distributed Computer Environment.& H- s+ p2 p2 O% i O DCEC Defense Communications Electronics Command. ) I+ n r: r; T( W/ H4 vDCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. , R" t) Z) Z D f6 FDCINC Deputy Commander-in-Chief.. {; |. ^% u% z DCM Defensive Counter Measures.0 r) g9 d! n+ o DCMC Defense Contract Management Command8 U- k* D* E) ~9 y6 b6 a: ` DCN Document Change Notice. 8 |' T# j! W9 I7 R7 y! a4 S% SDCO Director of Combat Operations (JFACC term).- l, y1 L8 p6 F0 m6 k1 J3 ?/ v+ m DCP (1) Decision Coordination Paper (see ADM). 6 }2 n9 E! Z( X(2) Director of Combat Plans (JFACC term). * T- @5 O" M7 h0 h0 C# PDCPG Digital Clock Pulse Generator.* u- r k# e+ f' k$ O5 i6 V- V DCS Deputy Chief of Staff.) w& w) H; j$ _3 O) @9 _ DCSOPS Deputy Chief of Staff for Operations and Plans (Army).7 D+ w1 u& w' Z% n* m3 C DCT Digital Communications Terminal5 ]1 Z0 G; I/ ^. R! K+ W' c* ` DCTN Defense Commercial Telecommunications Network. 5 ~. M" I, Y# c6 m$ q2 NDD Variation of DoD. ( F# B/ ^& |6 K" E( XDDCI Deputy Director of Central Intelligence.& k/ \3 S, z* O1 e, L& p) a3 ~* ? DDEL Dwight David Eisenhower Library, Abilene, KN (army term).* \7 G5 f2 v$ Z& p( n# U' k DDG USN guided missile destroyer.) K* K7 ^+ Y" u- m9 J5 K# g MDA GLOSSARY, VER. 4.0 D % P' ~$ ?- j* B74 ; ?; p3 A' g. N5 Z$ bDDL Disclosure authority letter.& j1 E4 c! B7 s; C DDN Defense Data Network.2 ~( A4 Y2 m& k! l6 m$ o DDR&E Director, Defense Research and Engineering.1 [8 s: N' F2 s9 y% C DDDR&E Deputy Director, Defense Research and Engineering. 6 p/ W5 Q ~# p" }* }DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). % D) x: {8 s- a; o5 q: _DE (1) See Directed Energy. (2) Delay Equalizer.; V3 }* E4 F4 J u5 H/ X( K/ o4 U4 p1 q DEBRA Debris, Radiance Model. 7 l4 R2 S0 a+ ?' i2 s+ L' C: Q! wDecentralized: L: t( l9 j+ g3 \ Control % w0 w! x! c X% ^; ^In air defense, the normal mode whereby a higher echelon monitors unit actions,6 F; ^. y. C' M/ I3 c1 L7 Z3 U making direct target assignments to units only when necessary to ensure proper - L1 }6 d; i* @fire distribution or to prevent engagement of friendly aircraft. F" u, R* L [' m' \ Decentralized % Y2 S6 ?( ~, B% u" T C6 I5 Z: G. _Execution 6 ?1 z( P/ G: u8 w eThe distributed and integrated implementation of USCINCSPACE direction by/ I4 Z+ L/ D R7 h% g+ t: O the BMD forces. (AFSPACECOM)) }) D- i& G; s; n V1 u# U! Y; p Decommissionin0 g( e7 c& T6 T# Y g1 D# Z6 I( }6 E/ M0 B) ` The removal or the rendering useless of obsolete or no longer needed ( h/ Q) c( w6 z. l; |components of the BMD system from service. 3 R! i: x6 L* G3 z: U+ wDecrement A directed funding level reduction for an acquisition program.- r2 ?% C( z( l1 a( B, f. J DED Data Element Definition (Computer term).; n7 R: ?) |7 ~8 z9 E% E Dedicated Mode 2 ~ t& s# k, C0 {5 {* pof Operation # i' Z& U. L$ ^2 C* e(ADP Security) 5 M) e) z1 [: p0 K, V0 u/ vA mode of operation where all users of the AIS possess the required personnel! |3 t+ K! b6 e. f security clearance or authorization, formal access approval (if required), and a : k; U& n' x* u0 k# aNeed-to-Know for all data included in the AIS. 4 t0 ~4 S( |- |( r `3 [; d) RDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about 9 d: z' A8 [7 r b( \5,600 kilometers) above the earth’s surface. 3 A/ q3 g# V% LDef Definition. ) N6 L6 i3 I' Q+ G* ^ _DEF (1) Defense. (2) Demilitarization Enterprise Fund.) _ m' q) H9 J0 y1 k DEFCON Defense Readiness Conditions.% ]# ?" J5 P9 J, r, g Defended area/ ~; l W$ H- b5 x- l& ~( R coverage+ D4 O0 T: y* b( F Defended Asset & Y/ L }) K% W- Y4 O9 [) BList (DAL)' q+ |/ ?1 U, L0 X2 G, O. { The geographical region that the BMDS can protect from ballistic missile attacks / w# \: R, g! d2 ?( b0 Q/ Fwith a specified level of probability of negation. May be specified for a particular - r) c3 k' x( ?! v5 ?threat type, launch point(s), launch regions, raid size, etc. ) N& x1 A8 L. I! L0 h4 X6 SA ranked listing of facilities, forces, and national political items that require% O0 E9 k. c# [. W) w, E! _$ K2 x protection from attack or hostile surveillance. The list is compiled from Federal1 v# J! `' w+ B' m2 Z) O departments and agencies, Unified and Specified Commands, and the Armed 1 e& S: ^+ t0 P3 AServices to ensure National Security Emergency Preparedness functions. * I O0 S) S( s8 PMDA GLOSSARY, VER. 4.0 D ( |+ C' d' o7 ?2 E5 Q" F750 `1 l! R& U8 W1 ~; j Defense 1 ]: L9 G6 s* |# T$ I% \Acquisition7 p; J: J6 d5 m" x! z9 Y7 O Board (DAB) ! E; m! f0 `% A4 q* H) xThe senior DoD acquisition review board chaired by the Under Secretary of w; o. [! ?* d/ y; J) @. @ Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the' n/ d- M# E- H% O( A- q Vice-Chair. Other members of the Board are the Deputy Under Secretary of" y. a) h9 Z! w7 R( c8 k" M Defense for Acquisition and Technology, Service Acquisition Executives of the' h# Q [2 }9 J* H0 w! B9 n Army, Navy, and Air Force; the Director of Defense Research and Engineering;4 ?2 a6 i9 f* Z; F' _/ h: R the Assistant Secretary of Defense for Program Analysis and Evaluation; the+ G& f% \9 J# s! R2 P Comptroller of the Department of Defense; the Director of Operational Test and# W7 | P5 ~, W6 ?$ h. C Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the % t- W+ }. p" p5 CDefense Acquisition Board Executive Secretary. Other persons may attend at2 }) Z& ^' y+ W8 f \ the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition6 E3 x( T9 t5 J Board.”) 8 C6 N- J% k: I# R8 IDefense; ~( t. c; J8 y$ k* K( x- T Acquisition& O O7 d- L" Z2 [* L4 S Board Committee# m. [6 h& @! w+ A8 _! q Advisory review groups subordinate to the Defense Acquisition Board. The $ f# U( E1 P( g1 nUnder Secretary of Defense for Acquisition determines the number of : [" Q& ?' O4 @6 a* ICommittees. The purpose of the Committee is to review DoD Component5 [* `; F |4 J8 {% [$ P programs prior to a Defense Acquisition Board review in order to make an 5 C/ a4 i8 k3 ~- {1 ~independent assessment and recommendation to the Board regarding the+ n8 q. U: q; m& V& O program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense, X( @% J# l0 g! o/ v Acquisition ( B) J9 H9 Q5 C7 `Executive (DAE) + @* a* ^7 d) G; ?The principal advisor to the Secretary of Defense on all matters pertaining to the ! v/ T* A/ J" h! i6 c3 UDepartment of Defense Acquisition System. The USD (A) is the DAE and the - [( c' ^! ^- DDefense Procurement Executive (DoD Directive 5134.1).; B& S* H5 x4 h( ^0 p Defense b: s6 X2 ]2 _: y0 R0 U6 P5 UAcquisition7 W$ E. X* s$ r t( I Executive$ W" C- E' h( k9 ~; T: `9 y2 ]. U! W Summary (DAES) ( p$ E+ L/ _$ q0 {4 I2 }The DAE’s principal mechanism for tracking programs between milestone " r- _2 x9 s, Lreviews. Includes programs subject to the Selected Acquisition Report (SAR),3 o$ R- u- c/ L- q2 g( m Q and any non-SAR programs subject to review by the Defense Acquisition Board.2 }; |" P, Z n! T7 Q Defense, L7 f/ p( ^! f1 B% g# h Employment" m. W9 |+ s0 m9 e4 ~, ~ Option (DEO) 5 g5 C4 E" Q/ L& IEngagement strategy provided to USSPACECOM component forces to achieve b) x9 i/ ~, H" o# u specific military objectives against a ballistic missile attack. It defines hostile4 ^9 n- A8 b% d: ~) n, D2 D" Q2 ? target priorities, provides assets to defend, and allocates SDS resources to be # Z) k' _8 V1 Xemployed. A number of DEOs may reside in a particular Preplanned Response1 S! j% W3 u$ z/ z5 T6 m; T' m Option (PRO). However, default DEOs (those believed to be best suited to, I# k9 h9 w, g8 S r O( n; g counter the threat initially) will be automatically processed and executed when ) ^6 f& A! \0 i* v. h$ sDefense Activation Authority (DAA) is given by USCINCSPACE.4 d: o" g D9 Y3 X; ?, Y Defense8 s- n% i0 s7 ]9 O& A* g Enterprise: j( _1 o8 {$ U0 Y4 L$ ^ Program (DEP) : m* K' P" Y% X. U( RAn Acquisition program designed to streamline the acquisition process by waiver 7 N0 d) l. ?) g# n5 C7 n0 G# ^0 gof selected regulatory requirements.. L( M1 C, c. s) V Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb 1 g+ `% t+ R1 K2 S! g+ r' c. Qand progressively weaken an attack, prevent initial observations of the entire# K( Q6 u$ O. P. J; Y; j1 n$ C position by the enemy, and allow the commander to maneuver his reserve.% {4 K9 J5 D7 t5 M4 m3 r. a* R Defense 2 V7 F3 T5 L# B, n3 LMeteorological5 Q7 l, F, x/ K' S R# n Satellite Program 2 ]; u) ^9 m% p' m1 Q(DMSP) 1 r9 c* e+ ^& r! A% ?Satellites designed to meet unique military requirements for weather information., E7 \. H4 `, _7 G# [, [7 f Used to detect and observe developing cloud patterns and follow existing2 D o, k* t( P, ~- h weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.9 I$ h$ c J" l @/ |* a! y6 m7 f Defense Planning 6 o. k8 d# h+ v4 l9 Hand Resources1 e4 }' ?/ C& t Board (DPRB), i, I3 i) A, F( H' n' r6 F! O6 u A board, chaired by the Deputy Secretary of Defense, established to facilitate * C' F0 ~& x) v% hdecision making during all phases of the planning, programming, and budgeting3 z! J5 p3 g; f9 u system process. Board members include the Secretaries of the Military 9 Q% F9 o( @; _* G9 F' g8 yDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of 5 `7 ]( B/ t L- G% B4 JDefense for Acquisition and Technology, and Policy, the Assistant Secretary of/ h/ N1 F# M% F" @& m1 @ Defense for Program Analysis and Evaluation, and the Comptroller of the9 |; B2 V3 D* L9 P3 a8 \ Department of Defense.( {* o9 q5 K" f% C; I MDA GLOSSARY, VER. 4.0 D ( Y' n" Y3 B+ u9 ?76+ i: A7 Z$ [4 V$ u Defense Planning3 h ?4 I& I5 k5 M G! R; | Guidance (DPG). Q2 J5 ]* l( M( e Document issued by SECDEF to DoD components providing strategic framework 8 _0 n+ d. C( x5 `* D% mfor developing the Service POMs. Result of planning effort by Joint Staff, OSD,! _8 m! C- R! w8 x and Services. In connection with two-year budget process, DPG is issued every 0 x' d" a2 T5 S% [7 S* `: jother (even) year.# @0 f4 A q) @ D Defense Priority; Z: Q) \! N; |* L and Allocation ' j+ s9 c" N7 qSystem (DPAS) 1 F2 ^0 ?7 l- y4 r$ F) |The implementation of a statutory requirement where contracts in support of2 [$ i: x6 B8 Z6 J, Q9 T+ g2 ]. B national defense must be accepted and performed on a priority basis over all ' |( U; ~& C7 K0 j. h' ^other contracts, and which requires the allocation of materials and facilities in 0 v8 Y& {) B. Y) N3 Tsuch a manner as to promote the national defense. See “DO” and “DX.” * ]6 r% K- R$ {- r- oDefense& E$ p y* T+ |5 K" i! b% { Readiness F4 l: b! T5 V' WConditions . G- V) v( Z9 D+ {(DEFCON)' w J# } L# d+ J, N: I A uniform system of progressive alert postures for use between the Chairman of # v+ f% J' {4 D/ o0 y& |2 N+ Xthe Joint Chiefs of Staff and the commanders of unified and specified commands 1 ]- k' }* V% N Z9 Zand for use by the Services. Defense readiness conditions are graduated to# E: P$ p6 l0 y( r' C& X match situations of varying military severity (status of alert). Defense Readiness/ y2 E. _: e% }% g4 o$ O1 T Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as & I) B! L4 N- C5 Q" R9 [/ J0 Vappropriate. ' I2 ?! r7 O. G Q- f+ u9 \) XDefense Satellite 8 t: b# Q/ U* X) R0 { OCommunications + P- P, [9 N5 f. r2 ? v& jSystems (DSCS)4 ?6 p2 s f( d0 @2 O" O Advanced communications satellites in synchronous orbit around the earth. + y0 d- g& F: N$ rProvides high-capacity, super high-frequency (SHF) secure voice and data links $ J' v: O& ~2 P8 X" \for the Worldwide Military Command and Control System (WWMCCS). They9 B5 h- x, I! p6 Q7 R# G; ` support terminal deployments for contingencies; restoration of disrupted service# o) K4 L4 w: Q overseas; presidential travel; global connectivity for the Diplomatic 5 W0 A6 ^/ t! F$ BTelecommunications Services; and transmission to the continental United States( I3 w9 ~0 x, d- V# B of some surveillance, intelligence, and early warning data. 4 v/ a) u1 q) m3 oDefense Satellite3 k/ S# R3 c, v- Q! ]0 h- P0 B (DSAT) Weapon 1 J y3 I/ w! W2 |1 m; NA device that is intended to defend satellites by destroying attacking ASAT * `7 E4 c# c5 D7 \" n; Vweapons.& k, \* M- K% X' d/ [ Defense Support 4 O* k, s+ D0 J$ \0 MProgram (DSP); l. t) n8 V, E3 n& { K, n A system of satellites in geo-stationary orbits, fixed and mobile ground" `- v, `% d! x# _/ { processing stations, one multi-purpose facility, and a ground communications! l V7 A& O) ^& F( U# [ network (GCN). DSP’s primary mission is to provide tactical warning and limited4 ~, @6 G' H8 {2 f& }7 p6 v3 m attack assessment of a ballistic missile attack.) [8 m" z# }+ o; u/ d Defense @( U* N% C( m* X6 S& H Suppression# p4 C! k# [5 u- x& d! B6 C Temporary or transient degradation of the performance of a defensive system, d9 v* o$ S& u- n; T- H! P1 t. x below the level needed to fulfill its mission objectives, by an opposing force.9 m+ G2 ^& [3 [ (USSPACECOM)! T7 p4 O- {) b, g0 d& R Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic 2 z" ^( `: X+ tmissile trajectory; i.e., boost, post-boost, midcourse, and terminal.# |" D& L* }' |, h1 H( d Defensive 3 `& [" D& T6 B" I0 f; l' W. `" U# UCounter % J: [8 C% }# y7 p% v: _- UMeasures (DCM)! o0 _! @# Y" Y Actions taken to eliminate an ASAT attack.. Z; q% `9 B; b# r# L4 }6 u5 ? Defensive3 \) T2 o7 X8 Q! Q+ _5 d& Q% J Technologies s. w" g; h) ^ p: u8 ~5 ]Study Team/ d1 z7 n w3 z( U$ V+ c7 ? (DTST) 2 `2 O. F. S" i! fA committee, generally known as the “Fletcher Panel” after its Chairman,; H! k/ w9 Z {+ n+ {, M appointed by (former) President Reagan to investigate the technologies of7 p$ f4 r( j, j' u8 E3 H potential BMD systems. * g0 x# {3 r! k# d) gDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.- E' q1 C& ^, i8 |0 F- h& E+ H DEIS Defense Enterprise Integration Services (ex-DTIS). `. k" T J- b' ZDEL Delivery. U- o+ b1 Z" E; D0 h" hDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion ( {! q- C1 O1 O lof shots about the aiming point. See also Circular Error Probable.% |5 S p0 T' O. e5 N' j MDA GLOSSARY, VER. 4.0 D# f: e5 `! x' }. ^& A9 O% q 77+ `3 W# h$ p& i! h, X) E+ q$ Z; N Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the7 ]! M* T2 W% T: Y, d8 G8 B4 F( Y maximum change in velocity, which a spacecraft could achieve in the absence of Z/ H! l+ q. Q( z! P a gravitational field.5 |% P Y, P. x7 ~7 B7 x Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).6 w# k/ _8 H4 @0 x" s* y) Q Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its , y, S9 P" l& e. Ndesired function (matching RV characteristics, screening RV, etc.)$ [2 G. {3 J! \( A9 B( A8 ] DEMO Demonstration. : t( d w7 `( b4 b8 U3 c" C3 ODemonstration t$ z8 w% z3 P, o% u4 D2 }$ V and Validation/ W/ K2 S6 J" j6 J8 C' T (Dem/Val), U: q% J: |2 v+ v+ w" F& N The acquisition phase when major program characteristics and product designs $ R$ o8 t- h7 V- l$ ?9 aare refined through extensive study and analysis, hardware development, test, % M! p! z8 i/ Cand evaluations. The objective is to validate the choice of alternatives and to- y3 V& O' P' N* _: G8 e provide the basis for determining whether or not to proceed into Engineering and! Q/ \0 v3 T0 X2 r8 z& N# O Manufacturing Development (EMD). 4 w/ r8 m; P! ~; c( `6 M2 m2 h: z! fDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. * F' g' ~) Q" X3 m8 n' xIt may include destruction, removal, contamination, or erection of obstructions.6 T* z6 q8 f( j3 m0 G DEO Defense Employment Option. + W2 {: B9 }5 b; I9 m: r; P; q' X' UDepartment of 5 b, _ Z3 g/ }. ]5 f9 ?Defense& |. |2 `9 Y5 G' ~5 V* Y! V( Z Acquisition5 B% k# r0 f8 Y& N$ e- R8 r( { n4 k$ C System ; x% D4 B( s+ AA single uniform system whereby all equipment, facilities, and services are * z! h/ ~! B1 e7 W# ?7 \planned, designed, developed, acquired, maintained, and disposed of within the - C1 a$ b/ N; ~/ f" EDepartment of Defense. The system encompasses establishing and enforcing ! q/ m C' M. [( H: B1 Mpolicies and practices that govern acquisitions, to include documenting mission 8 D3 x+ J6 t- h" wneeds and establishing performance goals and baselines; determining and8 Q) {) D! A0 v2 I) Z" U( U; ^ prioritizing resource requirements for acquisition programs; planning and 9 ] F U# p: B% h0 A0 Y. Oexecuting acquisition programs; directing and controlling the acquisition review 6 ~+ V k) n1 H+ ]process; developing and assessing logistics implications; contracting; monitoring. ^. y6 x/ D9 e$ U the execution status of approved programs; and reporting to Congress. (See 9 G$ W- E$ k7 @4 }# _DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) . a" v1 r4 t" K5 }! a& Y! hDeployment (1) The placement of force elements in battle positions to obtain a higher- I" f1 [. n. @ state of readiness. $ c1 h7 D, ~5 ~0 d; G9 b8 Q" j(2) The movement required to place force elements in battle positions. , y8 l7 e2 X1 u2 ^' V* ~(3) Fielding the weapons system by placing it into operational use with units; k1 b9 a: T+ ^4 W in the field/fleet.6 C( T. O$ m# v, p6 B; L9 I (4) To arrange, place, or move strategically. ) t% i. p- c8 F+ bDeployment$ o2 G0 C8 m% {6 j( b Planning 8 J4 T# t' ^3 L# w(1) The development and maintenance of plans required to initially deploy, # i; J' ~9 o& O- K0 kmaintain, and evolve the operational system in accordance with# v$ Z# q# W0 O8 X2 j schedules and priorities. It includes factors such as launch facility ( p& R1 t( H$ `, U) f0 Kavailability and planning for the availability of other required elements @! m7 q7 b# l' }" d such as trained personnel or units. In addition, it identifies the impact of7 C; p0 p; p1 L9 } B7 C% @ deployment on operational readiness and any testing constraints1 o* _# a, o7 d! ~ associated with deployment.5 N9 F, X9 t% S (2) Encompasses all activities from origin or home station through % d; p8 R# j( R% Bdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding5 R( e3 ]! g2 r* @& i: C areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment 2 H, J" [7 k: E7 P& \Testing K3 L8 j$ E$ h7 j- F8 ]# iThe testing and/or simulation of system assets in the physical and operational V( N5 y& T* X* v6 {/ K( q environment in which they are expected to perform. 0 ^* T# S d4 ~' SDepOpsDep Service Deputy Operations Deputies. : e, E; q: a: v% u& U2 }) ^% @+ sMDA GLOSSARY, VER. 4.0 D# f$ F7 V4 `/ B1 w- d% g 78 : i3 _: p4 P7 ~& ~Depressed % w- B. g7 o. }Trajectory+ Q# M0 }6 K3 g. M Trajectory with an apogee below that of the minimum-energy trajectory.1 i. D" l9 c$ N0 v" K DEPSCoR Defense Experimental Program to Stimulate Competitive Research. 4 s& X S% ]) O# Q f/ f( hDEPSECDEF Deputy Secretary of Defense. 6 X/ c: R# i* V+ e7 v3 \. Z3 UDeSecState Deputy Secretary of State.( \- o# @& M+ F" i2 y5 y DERA Defense Evaluation and Research Agency. Consolidated research and0 F$ y0 y0 J( Q development resources of the U.K. Ministry Defence. Headquartered in& v% t) v* m7 r; |9 O Farnborough, England. # w% w3 q1 s$ M7 qDerivative/ _+ Y, M5 u+ v4 U. c Classification - `& y7 O; x* O+ `. CA determination that information is in substance the same as information * w% r) z1 k* v: t4 {! t5 Rcurrently classified and the application of the same classification marking. $ M! I# L1 {6 N2 oDES Data Encryption Standard.2 v5 N7 |# d" T6 s/ y9 @" d9 z Z% [& @ DESC Defense Electronics Supply Center (DLA term). 2 O/ o7 e/ d- DDesign! s* p" ]" V+ I- W: t Constraints ) D& R& i5 h' z- t* _( ABoundary conditions within which the developer must remain while allocating, f: k I7 g7 c5 j* l performance requirements and/or synthesizing system elements. 4 j( v5 M2 u7 a( zDesign, n$ ~$ c( K( k$ q; m% f4 n) v% e Parameters 3 z7 T2 {" v6 ` m7 }6 AQualitative, quantitative, physical, and functional value characteristics that are , r c4 D5 [1 F$ j; ^# Y; iinputs to the design process, for use in design tradeoffs, risk analyses, and* ^7 t& `( s- w+ K development of a system that is responsive to system requirements.3 n" |- G& k! ?" ` Design Phase A period of time in the software life cycle during which the designs for8 P/ f* X* ^* Z0 d- N# Y9 `0 T, x5 V architecture, software components, interfaces, and data are created, # G* H# G9 f8 o0 vdocumented, and verified to satisfy requirements.& I: f" @0 z% W9 j Design-to-Cost 5 `) j! P: y8 n W( U% J(DTC) Goal# ?- f0 B: }8 m- k0 _ Management concept wherein rigorous cost goals are established during : q$ p3 G8 o. v Pdevelopment, and the control of systems costs (acquisition, operating, and9 @. j, D; n6 b1 k support) to these goals is achieved by practical tradeoffs between operational : L* z! v1 ^. x, ^. I# Kcapability, performance, costs, and schedule. Cost, as a key design parameter,- p/ [4 J/ ?1 V2 i is addressed on a continuing basis and as an inherent part of the development ! L R3 t6 R4 y& }1 h% N6 Cand production process. A DTC goal should be in the form of average unit( P' x: Q! T8 z! G/ j flyaway cost. Also, DTC parameters for operation and support will be- F$ o6 Y% z M7 J5 S selected—parameters that are design-controllable, significantly affect O&S costs, % Y% x! ^; K; }0 A$ q$ Jand can be measured during test and evaluation. Parameters may be 0 }, J3 n6 Y5 q, p( ~1 |: gexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or" j* |1 {7 s4 g2 z8 A maintainability. Firm goals and thresholds will be established no later than entry% ~9 n1 U% \/ A T9 J. [- x into EMD (Milestone II). This is an in-house goal, almost contractual in nature, ) x; E1 e" f% e& Gbetween the PM (Service) and the SECDEF. Allocations from this goal will . ^ X/ S6 x% J/ X( Z& Cbecome the contractual DTC goals for contractors supporting the program. ! { Z) J+ f4 z" @ LDet Detachment.. U$ Z4 x# J7 f) F DETEC Defense Technology Evaluation Code. 4 v- n7 H+ z& p9 I- sDetector A passive IR, visible, UV detector turns photons into an electrical signal. The2 w8 W. y: ?. V5 q( C IFOV of the detector is its solid angular sub-tense. There is sometimes6 d0 V- {4 I+ e5 i# l: H confusion between the detector sub-tense (size) and the pixel (picture element / T0 }* t! E8 m' @size). They are the same for a staring sensor, but in a scanner it depends on; l7 |9 C" G1 l4 R' C: v/ k the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. 6 M# q6 N3 M3 o7 h3 gMDA GLOSSARY, VER. 4.0 D , R |! [; g4 n$ I1 q0 y% `79 , U0 x \- O9 QDEV ENV Development Environment. 4 @: z& N& D& e4 K( I: N9 @Development0 Y3 @& r5 ^* B! f9 R Test (DT) & A4 G" ?4 R0 r4 n" NTest conducted by the development test organization to achieve specified test 8 j+ ^% p6 N2 }objectives. It may be a complete test, a subtest, or a phase of a test. , P7 u& j# Z- `3 FDevelopment% t- D% Y5 `2 T" ~; q5 Q2 i Test I (DT I) , S0 B. F5 h! n( G$ ^2 xA series of tests conducted during the demonstration and validation phase. H: l5 l3 C! L4 k) q7 H, y* b; NComponents, subsystems, or the total (or full) system are examined to determine3 M% ?4 ^5 K8 v* y whether the system is ready for EMD. State-of-the-art technology is addressed ! z* T! }3 F1 ^# G7 |in DT I. . |$ R% a5 X* [6 `+ ?$ N, {Development4 r9 n; z. R* Y- [9 L Test II (DT II) 8 ], L# p3 }( x/ O2 WA series of tests, normally during EMD, which provide the technical data + x r9 m1 f% \" rnecessary to assess whether the system is ready for low-rate initial or full, u, I9 G3 m$ M9 w+ Q) B production. It measures the technical performance and safety characteristics of ! e% a7 v i) a3 R2 g# `' d8 Qthe item and evaluates its associated tools, test equipment, training package, . b7 m& B; k# Z9 ]9 D* Iand maintenance test package as described in the development plan. DT II 7 U6 Q- [1 z# r3 m" k& i9 a3 waddresses accomplishment of engineering design goals and the fulfillment of . Z( W0 ?3 C {4 d ?* s3 Z1 pcontract specifications. 0 |* M* j! p( U7 b: m4 aDevelopment 4 t7 t# u8 O, q4 u+ _7 \Test III (DT III)0 y0 e, H& w3 S: E% u Tests conducted during production.7 |4 k! ?8 H* M Development$ r- [: E% x8 Z T/ O Test and8 W7 } ~8 P% j( x Evaluation* H' L* u8 ]7 b# K6 e/ D (DT&E) ! n! t" N- x3 q3 V( y: aTest and evaluation conducted to measure progress, usually of 1 s1 A6 g% g% R, K$ ^3 Ycomponent/subsystems, and the proofing of manufacturing processes and8 b% M$ U4 B7 c" [ controls and to assist the engineering design and development process and; v: k# N/ t) w& M0 ?' ~3 B2 N$ [ verify attainment of technical performance specifications and objectives. Usually4 i7 y2 j* k2 a conducted under controlled or laboratory conditions. Can be conducted before $ T+ D6 a3 W, U& K5 Hor after production begins.$ y6 \( o& A% c9 U# T5 X Development & k! |; w% t' }- g4 M1 ~0 A1 _Test (DT): l( i# L5 _- R# l' E Test conducted by the development test organization to achieve specified test& R( B6 z) V) @6 B1 @1 ? objectives. It may be a complete test, a subtest, or a phase of a test. \, ?3 [" H1 \+ x z! \0 r5 z! z Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, 2 V8 t9 `2 g0 c( cschedule, or performance without authorization from the milestone decision9 k( [9 T9 l0 B( m0 @ authority. Acquisition Program Baseline (APB) thresholds represent these A0 d) F3 d6 Z7 a M7 tparameters.2 O8 u1 V1 j2 T! y2 Z$ f' ? Devolution of+ Z! J4 x8 Y: \/ k1 v: M1 | Command ( O D9 |, N3 UMinimal essential operational capability to perform C2 provided in an orderly and 2 f8 H6 @0 N& v+ z Otimely fashion to a duly authorized successor.- q+ I# F. O0 U' k) |$ U3 d DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.1 v) R' _" A# N6 v DEW/D Directed Energy Weapon/Discrimination. # _5 \( ]. [: j. Q/ m& Y ZDEWG, O Directed Energy Weapon Ground, Orbital1 ^+ b" p# ]5 g2 h) u: ~! f$ H, U DEWL Directed Energy Weapon, Laser (thermal or impulse).$ K J' e0 Z0 c' F5 H; a DEWP Directed Energy Weapon, Particle Beam (neutral or charged).) o6 f1 w9 V7 N0 ` DF-KBS Data Fusion Knowledge Based System. / B8 _& [( l( b$ ?9 @( m% [DF2 Deuterium Fluoride. 2 U4 k4 }! D+ p' r5 `DFAR Defense Federal Acquisition Regulation1 \* v4 S0 v- K h DFARS Defense Federal Acquisition Regulation Supplement." G h5 `. G3 T! R% x: |" F MDA GLOSSARY, VER. 4.0 D- _& j; E# |* `+ C& e- B! B 80 " v7 _: i/ u. i7 ^2 gDFAS Defense Financing and Accounting Service. 2 Z+ n- T( Y4 ]3 o, X, T4 tDG OBSOLETE. Defense Guidance. See Defense Planning Guidance.- ?$ n1 E9 K8 m& ?3 K DGA Director General of Armaments (France).- ?0 z5 j; K# U* p4 q7 Z7 U DGP Defense Group on Proliferation.# P: u) F/ _5 {3 J9 Z8 | DI (1) Data Item. (2) Developmental Item. - k" F6 m' O7 B- @) dDIA Defense Intelligence Agency. : ]7 |' K- a$ E0 w5 h8 YDIAC Defense Intelligence Analysis Center. 4 v3 j8 ~/ g! w7 ~3 ?5 H0 ~* uDIAM Defense Intelligence Agency Manual & J$ I0 [" W/ `( bDiameter (Optics) The unit of measure of the light gathering power of a lens. c) E. {. }# V. j# G# eDICE Digital Integrated Combat Evaluator.& [/ o n( [$ |: N% j DID Data Item Description.& d* Q1 \9 Z$ X4 S; v* b Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The ; W2 K: R+ G" @+ X( c) Jangle of spread, which cannot be eliminated by focusing, is proportional to the * F5 j+ ]: ?- o: ^ratio of the wavelength of radiation to the diameter of the aperture.7 q/ N- t9 o5 I g8 q1 N Digital 8 |1 ^+ f9 |1 y+ W4 V0 i+ R4 N, KProcessing }+ a4 ]' U; |( ?1 ]( z7 {The most familiar type of computing, in which problems are solved through the7 |1 I, y5 p5 K% W mathematical manipulation of streams of bits.+ J; Y4 R \. n8 w5 a* Q$ y DII Defense Information Infrastructure$ [2 A2 b2 @. C( q& e" i Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to7 |7 a) @3 i2 I+ v 12 km) between wake termination and de-sheathing. / \! @& A# [! m/ `9 E. fDIPS Dynamic Isotope Power System (which provides up to 10 kW of power).7 Q4 u. P; v6 y2 L* c' w. n DIR Director. ( X0 c1 j' T( P* `Direct Air* @' f) s- r' f: N Support Center 7 e0 M* G T/ ^) K+ Z3 P2 WA subordinate operational component of a tactical air control system designed) @, ~/ H/ `# \" }' h) t for control and direction of close air support and other tactical air support 3 k, @/ k1 c. N+ d Voperations, and normally collocated with fire support coordination elements. Z, \$ s/ `1 o% ^. vDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not * w- v- \4 H U1 q+ [/ ]necessarily limited to items that are incorporated into the end product as labor or, p, ?: n5 B4 ~* x material. 2 Q S5 d: p3 F7 L2 VDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing4 F: P; W4 x/ n/ |0 P direct labor includes fabrication, assembly, inspection and test for constructing % Q) x- k$ p' Z4 {) a' A$ A4 k: \the end product. Engineering direct labor consists of engineering labor such as ( N2 t) d7 Z$ k3 l6 B. ~' Q# [) Xreliability, quality assurance, test, design, etc., that is readily identified with the3 H2 R( j/ B& J. E z, D) Z: V6 P end product.5 z2 S1 o' Y9 P, e0 j/ [, I Directed Energy ! y' o. f) i" C, Z G8 e(DE) ( q7 q1 `4 U, q1 X1. Energy in the form of atomic particles, pellets, or focused electromagnetic ! h/ l! S& K1 O. Y2 d9 k& r7 \4 _beams that can be sent long distances at, or nearly at, the speed of8 e- Z* P5 Y1 Z6 I0 }; X( W8 h0 p light. : {9 j0 y N5 N0 t7 M9 E2. An umbrella term covering technologies that relate to the production of a $ U5 f! N/ Z% g$ H- `1 Nbeam of concentrated electromagnetic energy or atomic or subatomic particles. 5 o$ C9 b! j5 v, ]MDA GLOSSARY, VER. 4.0 D ; ^- m8 r3 ~( F4 u3 c4 I81. U3 r* H' r# F Directed Energy + P4 F2 o' n; W1 LDevice % z: ]- u4 |* [7 R6 kA system using directed energy primarily for a purpose other than as a weapon.3 S# `( t9 ], z6 f+ [ Directed energy devices may produce effects that could allow the device to be- [( i) U3 I# ]% k" @0 o used as a weapon against certain threats, for example, laser rangefinders. J% C4 K7 p' w3 R# w' S, ?& PDirected Energy3 ~) {8 Y# {) d# u9 u- R Weapon (DEW)/ u; L& M3 U2 [8 P4 ]% j/ A A system using directed energy primarily as a direct means to damage or destroy1 c! W$ ~% N2 l' k! `/ }1 x enemy equipment, facilities, and personnel.- I5 T! k8 t+ U) j4 X: L3 l DIRLAUTH Direct Liaison Authorized. ! D& S8 J# v. @% Q& GDIRNSA Director, National Security Agency.$ k2 C8 n8 A; [0 T6 _) I! z DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. 6 F; y% Q6 I) V% r% YDISA Defense Information Systems Agency, Washington, DC. (Formerly known as, E' |- U* c/ }' m4 b% ?* N+ T Defense Communications Agency). 6 A4 v7 t4 T F7 Y" v: E4 {DISCO Defense Industrial Security Clearance Office: m' J6 Q3 i% r6 d4 j DISCOM Division Support Command (US Army term). 2 K* H: a* y M# SDiscretionary % L' C# ~' |- v9 r4 T7 VJudgment 3 ?4 M: }0 e# h/ mThe authority given USCINCSPACE or his duly authorized representative to, Z/ G1 R4 L2 [/ Z( h perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination, d n( ?& e/ u7 S, T0 U% U$ L DISN Defense Information System Network (DISA term).( @$ Q+ }8 A6 j0 h DISSP Defense-wide Information Systems Security Program.' i' d; Q; w; W9 `) g# l0 A( e DISUM Daily Intelligence Summary (JFACC term).8 Y4 o& H" X# x% Z DITDS Defense Intelligence Threat Data System.5 I: c( T- M Q DITP Discriminating Interceptor Technology Program. The objective of DITP is the: w' X! X4 J. a" e development of advanced interceptor seekers to counter advanced threats.( R! i6 y6 i2 u* n+ o- h DITP will integrate passive and active sensors into an interceptor seeker that $ n6 m, Z5 x% k) i7 @* A bintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP1 U$ y% E# l! P6 ] flight demonstrations will involve the tracking and interceptor on-board4 o7 U% G& ?6 F$ ]4 g( ^" p discrimination of targets of opportunity while providing fusion processor data + y" N2 P1 I% ]0 q2 l/ \telemetry. (See also ASTP). 0 U% P# X! }% B- V2 z6 D4 H+ G9 {6 ]DIVARTY Division Artillery (US Army term).: m7 I( l$ f5 ~4 E/ @" J) X1 r; S0 V DIW Defensive Information Warfare.; }2 E9 N% F% H+ d( D3 j: {! x DLA Defense Logistics Agency, Alexandria, VA. ) s; @$ h/ I+ H8 m( @DLSC Defense Logistics Services Center (Battle Creek, MI)./ G/ v( W. g* {! s' @ DM Data Management 1 a& X6 K; E5 M) H# {, j8 rDMA Defense Mapping Agency, Fairfax, VA. 4 w: Z" `( J( D! |4 pDME Distributed Management Environment. . L# }) G* ^4 }* V Z6 VDMI Dual-Mode Interceptor.1 t$ o$ ~$ f% H* Z6 H MDA GLOSSARY, VER. 4.0 D - q- }# h9 X \, f; }9 E3 v82 , [; ~+ K& ^% f9 z5 I5 JDMRD Defense Management Review Decision. 6 k$ t; h& _4 T$ q' t/ z5 A! A9 E* cDMS (1) Defense Message System.; g6 y) N% v! |' S (2) Dissimilar Mission Simulator.7 X' [' n: u8 a1 J, T) M DMSO Defense Modeling and Simulation Office (OSD). 5 j2 k9 ?( A5 o8 z' ]/ VDMSP Defense Meteorological Satellite Program. # a8 N$ o/ ^. l) I5 zDMU Disk Memory Unit." N( F% o; L2 u8 @ o( v% O DNA Defense Nuclear Agency, Alexandria, VA.& H/ y$ v+ }1 S2 a" n3 B" q+ j& H DNMS Distributed Network Management System.9 { X3 R! Q' b" u1 g% X* n0 F DNSIX DoDIIS Network Security Information Exchange 5 v& ?% i' l" \2 j) e% dDNSO Defense Network Systems Organization. 1 E; G2 S6 B0 S" M# EDO The lowest rating under the DPAS. All “DO” orders take preference over unrated $ {2 T6 ?& y, [orders to meet a required delivery date.- F( q; i. w! G5 ^ Doc Document) d; n! U2 i8 F; H7 |" D% z, Z DOCPREP Documentation Preparation. # u# W' s1 C) \2 XDoctrine Fundamental principles by which the military forces or elements thereof guide . b7 L' Z3 f& V* ~- q5 ctheir actions in support of national objectives. It is authoritative but requires# s% }. c8 Y7 n1 n9 R$ A- H judgment in the application. See also Combined Doctrine.; ^, S" i [" K DoD Department of Defense2 T0 V5 B- X! `* ~5 ]5 I DoD Component4 B1 q& ]3 z% W Acquisition # X/ M7 s. o" ?% r3 @( j" YExecutive ) d4 W: ?0 s0 L" S6 z( `A single official within a DoD Component who is responsible for all acquisition2 M9 C" e9 i% I5 X$ `- ^ functions within that Component. This includes Service Acquisition Executives 4 c8 u& v$ w" d( X: N* vfor the Military Departments and Acquisition Executives in other DoD $ Y: p7 f4 i) [! R8 AComponents who have acquisition management responsibilities. + M0 M3 x2 M; ?7 V3 w: P, j* PDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, 6 Y1 T! d2 D; g3 k2 m" k* @) ]Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the+ V2 x5 H- ]% q" Q" t, E Defense Agencies; and DoD Field Activities.6 b8 C+ _8 Q" `5 z' F- ` DoDD DoD Directive. ' ~0 c2 g/ w) Z9 ]1 ]DoD Directive! E2 C$ O% }. R: p5 A 5000.1/ s( m3 H3 y1 \5 ~4 N( v6 H5 J “Defense Acquisition.” The principal DoD directive on acquisition. It establishes4 _) ?6 b8 y/ T$ Y% O8 g policies, practices and procedures of governing the acquisition of defense* x$ L2 ~3 ]( ` acquisition programs.0 K: y4 N3 l4 d: Z* ^8 l+ t- }( T: H DoDI DoD Instruction.5 O/ u; r7 j9 O4 t% j3 q. h DoD Instruction2 x. m3 u3 [) p! p" A. {7 f, z 5000.2) `& W- W1 S3 c4 x" `) J “Defense Acquisition Management Policies and Procedures.” Implements DODD! K! c& ~6 L" i4 B3 j 5000.1.! U9 |, }2 S% ?2 g5 O. ^& v DoDIIS DoD Intelligence Information System. $ P7 m5 C" ~8 V E3 D, ADoDISS DoD Index of Specifications and Standards.! ~9 `; E0 V. I* z DoD-M DoD Manual. * K$ Z" f, g! vMDA GLOSSARY, VER. 4.0 D. ~% W. C' l/ V( Z' j6 j( { 83 , b" J8 r0 @: u% c3 PDoDR Department of Defense Regulation.: O. T2 W* A) T5 ] DOD-STD Department of Defense Standard.% v. P. [0 F0 @8 n. |4 k- K DoE Department of Energy., }+ Y* ]+ c9 n6 b DOF Degrees of Freedom. 2 H( J/ z0 l N& t3 v3 ?Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system * a; ~+ a9 Q( ghaving a detection range of approximately 3000 km. It is believed to provide 1 `& P/ C' `2 I) Kbattle management for the totality of Moscow defenses.. S( @% ]; B8 w% ~* ?- U' E DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).- l! f9 x; B+ _8 A6 F$ }8 E* X5 i DOPAA Description of Proposed Actions and Alternative (environmental term).+ m( \# ?! B% D5 A: B: t$ J3 Z Doppler Effect The phenomenon evidenced by the change in the observed frequency of a $ P7 l2 `, F9 S4 g4 jsound or radio wave caused by a time rate of change in the effective length of- N% q# w! U4 C3 o( i" o8 L0 `+ ?/ I the path of travel between the source and the point of observation. . x" K0 g7 t9 b- u$ X9 @& t0 A, l! GDoS Department of State (US).7 u9 |$ s6 r4 u! b" x8 X+ Y DOS Disk Operating System (TelComm/Computer term).* N& O/ m, ^0 Z: j8 ` l) A0 g/ X DoT Department of Transportation [US]. , S2 I# T! T; F( X- U; KDOT Designated Optical Tracker.& s3 e" W$ A9 `5 ~# G3 B7 l% k3 ~ DOT&E Director, Operational Test & Evaluation. - W- O+ K; r+ J: d. R( g6 s. j0 ]7 IDOTH Defense of the Homeland.4 N$ V3 Z9 p! k; i7 |, C Down Select To reduce the number of contractors working on a program by eliminating one or; n( W6 z6 I6 d! N0 r- l, f more for the next phase." ^) A$ U4 T8 K4 ?; @6 g DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. / A3 z( W: }% cDPA Defense Production Act.7 h3 B6 S3 w1 W- u$ X8 n& r DPA&E Director, Program Analysis and Evaluation., u6 u2 E, O6 \& L) h2 C DPAS Defense Priority and Allocation System.% `; A6 u' Z6 n$ P DPAT Dynamic Program Analysis Tool.3 i8 o) P% l! `2 x3 u( Q9 k DPB Defense Policy Board. " {" X2 p L) A% ^% D1 }DPG Defense Planning Guidance. ) j/ @+ T! e$ V4 Y J# X- nDPM Deputy Program Manager. ' ^, L/ v& C4 lDPML Deputy Program Manager for Logistics3 _) j' W2 _8 }& Z6 E/ v7 Q7 ` DPP Distributed and Parallel Processing (Computer term).6 ~4 ~+ e+ t3 v& g. r DPR Defense Performance Review.2 l) L- h$ \1 w5 X MDA GLOSSARY, VER. 4.0 D" a; o8 B( X7 t/ f9 h1 X7 \ 84 + m: _" L X3 L; D D/ Y3 x1 @/ hDPRB See Defense Planning and Resources Board.! [; V2 c. d1 M V9 c9 j9 k DPRK Democratic People’s Republic of Korea (North Korea). j% q3 }' S4 a8 _& f/ eDPRO Defense Plant Representatives Office.4 z2 M6 x: h( h4 T. ^( b6 \: ~ DPSSL Diode-Pumped Solid State Laser. ; ^6 r/ V( t$ g* G' j' p& QDR Deployment Review. 2 y4 {$ d) z9 y! y- oDRAM Dynamic Random Access Memory. " [6 x0 u, {4 a" |5 U" \Draw-down Curve A method used to encapsulate the overall performance of a BMD system that , H, f8 A: f6 o, r6 ?plots the probability of survival on the vertical axis versus the number of attacking + E" G1 P! E4 S) F( A; b/ VRVs on the horizontal axis. Used in conjunction with attack price, they are the7 A5 o2 q3 X4 g' o# w; v$ u; f most important expressions of a BMD capability.$ _5 \ p" {5 [9 T" I! _ DRB Defense Resources Board.: O/ n8 U8 Y8 _, i DREN Defense Research and Engineering Network. 2 W, z3 w) z; [% S# o8 _DRFP Draft Request for Proposal. 8 h3 p( a2 I1 D& IDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from$ A, F1 A7 o; |7 W2 B% Y gravitational and atmospherically induced torques on the spinning projectile.3 B7 T: z. M3 s& M DRM DAB Readiness Meeting (DD 5000.2 term).: l- j; P; N Y; t( L& q/ M Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also: j* E: i5 M2 l: [* v) [$ f Remotely Piloted Vehicle.! \: }5 R; A5 O; D7 G DRP (1) Deployment Readiness Plan (US Army term). : k* ^0 f- P4 @: J' W$ k0 O6 u(2) Deployment Readiness Program. * N& P, f0 m* S0 Q2 J& zDRR Digital Receiver Replacement (USN term).4 Y b: }2 R; z' U& J7 [$ Z4 q) t DS Deep Space./ p c8 ^7 o" z( j. b6 B DS-1 Category of telecommunications circuit capability.5 Z$ x- x0 p, ?- `, L DS-3 LAN Category of telecommunications circuit for a Local Area Network.9 k% ?7 x: X) I9 v8 L: Z M; K DSAA Defense Security Assistance Agency (OSD). 0 @( B/ K. {! ~, HDSAT Defense Satellite Weapon. {" z( }+ W% h2 l/ p DSB Defense Science Board. ) K' h, u- E" P. ?9 `DSCS Defense Satellite Communications Systems.& ?( h! z m, _ O* y: _ DSCS-3 Defense Satellite Communications System Three.. h/ n" ?4 ?- e3 T } DSCSOC Defense Satellite Communications System Ops Center. 2 C4 }- l0 @( v* [DSI Defense Simulation Internet6 O- Y7 }! ~( D MDA GLOSSARY, VER. 4.0 D, [% [& @2 Y8 t8 R7 x _ 859 \% o* Y' \1 Q/ E, v d+ Z: [. Y DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet . [1 ~7 c7 g9 n. G J2 n1 cSystem.8 D0 q5 C+ l" X: Q; x DSM Decision Support Matrix . h; c) j2 L+ U6 N# vDSMAC Digital Scene-Matching Area Correlation.0 F$ J7 z9 ?6 W DSMC Defense Systems Management College.2 {: S @& `/ W) n q% o DSN (1) Defense Switched Network (formerly AUTOVON). 2 E8 U8 r z5 j( D' `8 ]* v(2) Deep Space Network (NASA term). 5 {4 h' U3 w. }/ Q& qDSP (1) Defense Support Program. (2) Defense Standardization Program. 7 I8 j8 Z$ a" m- L# B' tDSPRTM Defense Support Program Real-Time Model." {; {9 e) Q9 l0 r$ _! x3 i+ h6 H DSR Data Set Ready (TelComm/Computer term).& T( p8 o1 @8 a3 Y$ N$ t" y DSRCE Down Scooped Radio Control Equipment (TelComms term). & M0 N/ p2 D1 e3 Z* v( B! ~DSS (1) Defense Supply Service. (2) Digital Signature Standard. 3 l2 P' N& y6 J# e9 }DST Defense Suppression Threat. 1 [, I8 u8 S* }( t$ CDSTAR Defense Strategic and Tactical Array Reproducibility. 8 z0 Q4 s# Q# ^# o( kDSTO Defence Science Technology Organization (Australia).4 B; M" N7 u3 p1 C' ^% G DSU Digital Service Unit (Telecomm/Computer term)." Z4 y/ i) T- g% j1 C DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to3 ?6 [& D( i0 |4 U the DNA. 9 ]6 D: c& [7 y( ]9 c+ mDT (1) Discrimination Technique.* i; Z% R1 t* J: a* _ (2) Development Testing. " h+ ^" `1 `9 S, V5 M5 _8 M2 x& k(3) See Development Test I, II, III.) f! A' ]! ]% ], _5 y; V, y (4) Down Time (ILS term)./ R9 ~6 X% K! ^& j" X/ P/ x (5) Depressed Trajectory. d/ v7 n, c8 A+ s/ g (6) Dedicated Target. 4 I+ a/ [0 s9 K9 g- O4 O; h% EDT&E Development Test and Evaluation. J/ m" V4 r9 x. |: k% dDT/OA Development Test/Operational Assessment. ; K3 N N9 z9 l. DDT/OT Developmental Test/Operational Test. ' x3 ?0 o0 Z2 h: q7 rDTAP Defense Technology Area Plan.2 E4 I b7 u* m DTC Design-to-Cost. , Y7 j& v! I3 a, B j6 u3 u0 [DTD Digital Transfer Device (TelComm/Computer term). 9 Y% l7 P8 G5 j6 ^) H% w) W- f& L$ |DTE Data Terminal Equipment (TelComm/Computer term).' N: h8 W* _, E5 q$ ~ DTED Digital Terrain Elevation Data. ; l* u! c3 c gDTIC Defense Technical Information Center, Alexandria, VA.) z) m& X# `5 I' w5 x& m7 i MDA GLOSSARY, VER. 4.0 D& r! V! z) n: H# L9 H, z5 X) ~ 86! }9 }, `7 r: x H: `0 V% T/ p DTIS Defense Technical Information Services (now DEIS).6 a- I4 h' r8 J( S5 Y; N: Y2 q DTLCC Design to Life-Cycle Cost. ( Q3 l3 R8 d9 g+ N- q( nDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL) n- C+ G" t/ E9 O8 e term). 0 S9 ^. X7 j& e% a3 \DTLS Descriptive Top-Level Specification.% L& p4 ^. u: c DTMF Data Tone Multiple Frequency (TelComm/Computer term).9 [) I6 M7 w0 d( U- P: g DTO Defense Technology Objectives. ( R" N; g+ l3 r* IDTOC Division Tactical Operations Center. 8 Z( W- Y; [0 ]) s O; c6 RDTR (1) Demonstration Test Round. (2) Development Test Round. " Z, K) C K8 A4 {DTRM Dual Thrust Rocket Motor. 8 A# W4 n2 y( [' N* _# {( ZDTSA Defense Technology Security Administration.1 S' Z9 R% e3 p& H9 U: x# Z/ X DTSE&E Director, Test Systems Engineering and Evaluation. ! q; V; s. Y C+ @! j0 KDTST Defensive Technologies Study Team.. y. C# i5 w. h- R9 g DTT Design-To Threat( R3 |" m/ d+ D; A/ ~+ y& P$ ?) e DTWT Dual Traveling Wave Tube (Electronics Engineering term).: J! f% ?7 C! i u# c, Q DU Depleted Uranium.! p$ h! J0 z9 }7 V6 j9 m8 ~ DUA Design Upgrade Assessment. 1 N1 B n& B! w8 XDual Source Two contractors producing the same components or end items for the same5 v& K5 x1 D7 w program.' v2 P T5 e, G7 q. S DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). 8 T2 v, I; s) ?/ k$ R/ e! T- uDURIP Defense University Research Instrumentation Program.2 z/ i" v1 Z" \3 a3 t& d1 I9 Y DUSD Deputy Under Secretary of Defense.( A: u5 v3 ?# Q! j- b) ^5 A DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). ~; ~' \; W0 n4 g4 V0 Y0 m DVAL Demonstration Validation. s* e' k* k; _8 H. X( t4 ^, CDX The highest rating under the DPAS. It takes preference over all other rated and 1 ~; c, f; |2 l. {not rated orders on a contractor’s production line. The BMD program carries a6 {4 F$ m. {* Z2 e. J “DX” rating.3 L: P; B! I5 ^, Y" D% \4 Y MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87+ { @; @9 ?" J9 ? E East ( @* }, X5 }0 e# A8 E) H- e/ Q5 {E2 I See Endo-Exoatmospheric Interceptor. 1 u9 u- K" z6 c4 \& R) QE2SRD Effectively Two-System Requirement Document. . z4 ~- j2 ^6 UE3 (1) Electromagnetic Environmental Effects. 8 e. {8 |* Z3 C(2) Electrical, Electronic, and Electromechanical. w& C1 k9 h: Y2 r/ Y- | E Spec Materiel Specification.* @. S% [+ x9 r& z. e EA (1) Environmental Assessment. " c# C" v( I/ W1 f0 Z+ r1 \! `(2) Engagement Authorization. - \" i1 H& y: p- M2 G; P(3) Executing Agent.2 h9 r7 X) a3 N3 h$ [. M: p2 p; J (4) Evolutionary Acquisition. % J; K. C1 \6 b+ i' r! z(5) Environmental Analysis (environmental term). 0 M1 u4 o$ A5 q6 i7 w1 g3 \(6) Executive Agent. 3 W: h, v9 ]3 o0 p1 t" @6 nEAC Estimated Cost at Completion. : o& I& W$ H% cEAD (1) Engineering Analysis and Design. (2) Extended air defense.& M) z/ y$ `3 \4 w; \9 i9 A EAD/D Engineering, Analysis, Design and Development. g# n, L4 K5 bEADSIM Extended Air Defense Simulation. 5 z: H( |! X( uEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing5 D N- j3 v8 O( @ users to model military response to airborne and ballistic missile threats. 0 M7 D, x2 m& ]% Y5 ]( n) VEADTBP Extended Air Defense Test Bed Program.' I g' e& k* p1 U5 S2 x EAGLE Extended Airborne Global Launch Evaluator.: m V5 ]/ w) f" ?/ M2 H& E0 Q EAM Emergency Action Message.1 D8 J6 G% w' a8 f EAR Export Administration Regulations. + d2 J' S$ s- a( _( k, CEarly Operational2 @; `2 k) P- _& X Assessment" _9 T. @7 r" Q An operational assessment conducted prior to, or in support of, Milestone II.) ]& Z9 \& ?8 G" @0 I5 g: H& m% h9 J Early User Test 0 }' ]' s, K7 d0 N: [2 X( H(EUT) 5 t# k; i6 h/ f5 }, k0 M6 W. MA test employing representative users to examine materiel concepts, training or C) }2 @: Q6 P: g) ~/ k. o9 xlogistics planning, or inter-operability issues. EUT can be accomplished during 8 {& }. d7 N3 K* Y. N* g+ R( TDEM/VAL on brassboard configurations, experimental prototypes, or surrogates' j: r2 {4 X( E0 v4 J4 D, B to provide data leading to the decision to enter full-scale development.6 I) V+ G, H; ~) u Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of 1 E z1 B9 I0 _* psurveillance satellites and long range radar.( O# o- P5 b$ J$ a( u; n u (2) Early notification of the launch or approach of unknown weapons or0 o" z- O, q0 V7 C weapon carriers. " q! y8 D, o+ H2 U2 E' l) u4 }Earth Limb The apparent outer edge of the earth as viewed from space. / V5 X2 P4 H+ c' k+ q. fEastern Test 9 j7 E4 @: \/ {6 a* Q7 TRange (ETR)3 {3 r6 M6 g+ {7 k. t/ F% ~( F Beginning at Patrick AFB, FL, this range stretches halfway around the globe. N* }' M* ~7 W7 P& l& c where it meets the Western Test Range. An array of launch complexes, sensors, ; n8 ^) P; ~4 ]0 n( yand tracking sites make up the Eastern Test Range. The ETR is now operated! {3 F) S7 p6 M: T& M2 [ by AFSPACECOM as shown in WTR definition. & G' `# S0 S$ y& Y8 H2 JMDA GLOSSARY, VER. 4.0 E + |4 f) M8 y- h/ F6 d88; `+ M Y; M4 F7 r* h* _) M. X8 @ EB (1) Electron Beam. (2) Enhanced Blast., C) Q& x$ t3 r: `" O1 C6 \4 C( \8 p EBB Electronic Bulletin Board. , F G+ |% T; pEBCDIC Extended Binary Code Decimal Interchange Code.; `/ v6 w9 a7 X" I& Q$ U2 u% Q: I2 X EBW Electron Beam Welding.% R7 ]/ |/ @% |# E1 R3 _. f: R EC (1) Electronic Combat. 2 N# M$ L6 G/ O(2) Error Control.3 X8 [* \0 H9 C/ y7 M (3) OBSOLETE. European Community. Now known as the European Union: v3 d" t2 v/ ]8 w (EU). 9 Z1 o z9 r A% _" NEC/EDI Electronic Commerce/Electronic Data Interchange! ]9 I' {5 x2 o M C ECAC Electromagnetic Compatibility Analysis Center. % d5 G5 W* \$ N8 dECB Engineering Change Board. ( c: ]/ n6 T6 @ D l) }% i1 f7 ~ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). & x" [7 M8 ^( u/ B3 uECCM Electronic Counter-Countermeasures. $ m1 u8 \: {$ A6 zECDs Element Control Directives.1 R! v# O+ U4 ~3 R- f ECLS ERINT Command and Launch System.' U5 ^# l3 C5 ]1 }- V% j$ _ ECM Electronic Countermeasures. 8 M: Q. @9 K3 |7 y, W- h" Z# MECN Engineering Change Notice.6 m( o4 R- k& B. n, G. x ECO Engagement Control Orders.7 B9 L6 R! R( ^ n' Y8 Z, Q ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.6 X5 R4 g) n( p" Y+ U0 E2 a1 u ECPMO Electronic Commerce Program Management Office. 4 G' B+ c9 F) x Q/ `ECS Engagement Control Station (PATRIOT).7 I: A5 ^0 P$ E! W1 K- ~ ECU Environmental Control Unit.! G' P: X9 y6 X( X8 g EDAC Error Detection and Correction+ R7 n, e9 l! d& z EDGES Electronic Data/Guidelines for Element Survivability.% U X" c6 S& }* w- Z. h* q u EDL Electrical Discharge Laser- I, s2 D k; i: A. r! |) [ EDM Engineering Development Model. [# n/ u& Z1 }EDP Engineering Development Process. R* q2 c. H& E7 h3 n' b' G EDR Embedded Data Recorder (PATRIOT). 0 Z; h( v( ~% x9 W; CEDS Electronic Data Systems Corporation 5 K/ f f' E/ l! k. R( xEDWA Engagement Determination and Weapons Assignment (PATRIOT).0 J# ]6 K# }) S* T; t( y MDA GLOSSARY, VER. 4.0 E D3 E4 d+ H, Y5 z 89 ; N3 d1 Q8 z2 C8 l3 d$ [EDX Exoatmospheric Discrimination Experiment1 j2 k: E9 g7 k* P/ F EE (1) Electrical Engineering. (2) Engineering Estimate.( N b8 V7 i) L6 d1 Z. r; s: e/ F# M EED Electro-Explosive Device. : {6 {$ T) l T) z& sEEEV End-to-End Experimental Version.; ]5 ^6 i% p) p# b- q( I EEFI Essential Elements of Friendly Information. 6 Y- |* N: @4 e& v: ^% h5 T t9 dEEI Essential Elements of Information.* a7 v# N( ^9 ?' m EEIC Element of Expense Investment Code.+ Q" V3 j4 ]+ i% q- q EELV Evolved Expendable Launch Vehicle (USAF term) 5 A! a. `; ~8 B* M* EEEU Electronic Equipment Unit. 3 m* P6 {2 w5 g% }6 REFEX Endo-Aeromechanics Flight Experiment. # d6 j( C1 t* W! }& @5 Y7 r2 AEFF Electronic Frontier Foundation.- G. F' A% _ C7 M Effectivity A designation given to the BMDS configuration and demonstrated capability at " i) l# a6 V" E9 U* ra point in time, becoming effective at each increment when an element or 6 B2 e$ L3 _* M& L4 dcomponent is inserted into a particular Block.1 O) q+ Z) @; W( D3 W Effective Damage That damage necessary to render a target element inoperative, unserviceable,3 N& d1 C' b) _$ U4 B) |3 `- [ nonproductive, or uninhabitable.' T% \7 |* t. m( g Effluent Plume The pathway of movement of effluents through surface water or air.; r. D3 ~% L! d EFP Explosively Formed Projectile. 6 S# ?1 C4 M. i6 dEGP End Game Processor. # s; p3 m; G3 \* LEGTR Eglin [AFB] Gulf Test Range. # y" h" F; C. I% Q3 I' E; bEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). ; d1 F" X! _; l5 u" t( ]7 sEHF Extremely High Frequency. + D) J5 B; x2 z7 C$ Xehp Equivalent Horsepower.+ L- x0 f/ @5 q6 \9 B6 B* I! a EIA (1) Environmental Impact Assessment.8 H0 H1 |( I9 C8 D$ U+ B' z (2) Electronic Industries Association. " D* t! r( K1 _; pEIAP Environmental Impact Analysis Process. # R4 r$ e; S2 kEIP Exoatmospheric Interceptor Propulsion.& j) a9 M' A1 b/ Z1 [( V EIPC Electronic Information Privacy Center. 2 b. X( f9 I, j5 C7 C6 J6 aEIPT (1) Element IPT. (2) Engineering IPT. ' n7 k) {% ~0 p" ^1 ]7 H: {EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.5 l* p% @1 C- X r* x) { EISA Extended Industry Standard Architecture (Telecomm/Computer term). . [' E7 w8 e) O. L2 G0 |: @8 ]MDA GLOSSARY, VER. 4.0 E' }; W: E2 x+ k1 x5 |) t. Q/ O9 A 90( e8 ^0 z0 H0 y+ H/ t2 Y7 s& u. ~ EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.3 @8 V3 c% s2 @6 h3 p( Q7 E9 } Elastic Range The stress range in which a material will recover its original form when the force + K. e9 e0 @: `; b# u( ](or loading) is removed. Elastic deformation refers to dimensional changes . `% y) R1 |( |' w! uoccurring within the elastic range.& u$ N- k1 D: ~/ \' f Electro-Optics& k( v( L2 O; P: e Infrared (EO/IR)! W, k/ ]3 y% i$ h. b& k' h Technologies/techniques employed by optical sensors in the wavelength% T$ O" @' x) |6 {- r: H- E8 a) T. [ spectrum slightly longer than visible but shorter than radio. 0 h( V/ n: n1 d yElectromagnetic 7 n+ O B' D7 S$ t! ^Compatibility A6 m: m. @6 p(EMC) - q$ o4 }- t' T7 t1 @A condition when all electromagnetic emissions from electronic, electro-magnetic, 1 Q: V: I: o4 i3 @" ^- \and electro-optical components of a system interact without interfering with one! Y5 w6 ^9 w; P another. 8 q4 z- k7 a/ l K8 w! R1 L5 M/ \4 `Electromagnetic( X6 m- p9 s( K2 y' c6 Z( u Emanations ' O" Y9 g/ m# d- o& x6 CSignals transmitted as radiation through the air, through a vacuum, or through- W4 ]: E. ]- i- ~3 |( l+ l" m( f conductors. # V/ E# L/ y# T5 \, H8 u. e! LElectromagnetic - z$ q* x* \/ j; Y! MField (EMF) $ V9 J3 G) O/ s* k! a, I! d! FAn electric or magnetic field or combination of the two, as in an electromagnetic R! S' u- T2 s# Q) f) s8 }wave. Created by electric charges in motion, having both electric and magnetic3 `' C6 u3 T. D- O! L6 E components oriented at right angles to one another and containing a definite ; ~2 K9 A, W+ j5 F8 Xamount of energy. ; F3 e% ?* c+ D8 pElectromagnetic4 A5 z( B- ` I+ `% ^ Gun (EMG)( ?' A2 g) Q) J A gun in which the projectile is accelerated by electromagnetic forces rather than 9 e* K& Y( M+ I" V% `: fby an explosion, as in a conventional gun. 6 [- z8 u1 m: l$ h& D1 ZElectromagnetic4 u3 s; _- M' l7 u Interference (EMI)) z* B; M% J+ v( k2 i Any electromagnetic disturbance that interrupts, obstructs, or otherwise 3 w3 j7 b2 m1 L$ ~) cdegrades or limits the effective performance of electronics/electrical equipment. i2 A. j2 e6 R' X8 m: gIt can be induced intentionally, as in some forms of electronic warfare, or 3 n6 {. B! W& o. f$ C, vunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. 0 G9 n) j" x2 m, IElectromagnetic9 Z* J1 }9 K. Z5 p0 W z! C Pulse (EMP); b1 u( m6 Y) H The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of& g4 Q6 T6 d# u( ~" Y the nuclear device or in a surrounding medium. The resulting electric and$ p2 D0 n5 ]' ?" R+ ^ magnetic fields may couple with electrical/electronic systems to produce( }, O0 r9 W( E/ A damaging current and voltage surges. May also be caused by non-nuclear9 ]9 O0 R6 \0 q7 \! [% I means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic ( N$ [; N8 g/ X) t0 ]2 b$ }5 xRadiation (EMR) 4 t" ^; \9 a4 z! I0 E(1) A form of propagated energy, arising from electric charges in motion that' V$ O0 }) M& E7 Y7 U' m4 V ^ produces a simultaneous wavelike variation of electric and magnetic " L T( i& q: {) A! A! |" T. J7 a6 q$ N* Lfields in space. The highest frequencies (or shortest wavelengths) of 2 K( ?* a3 h7 @ m9 P3 ssuch radiation are possessed by gamma rays, which originate from 6 I1 \( I1 {2 a# B% Aprocesses within atomic nuclei. As one goes to lower frequencies, the 7 @5 C0 A! @0 [% j3 J! Celectromagnetic spectrum includes x-rays, ultraviolet light, visible light,2 g( ~4 [$ b: ?8 `8 N infrared light, microwaves, and radio waves.. h [2 m. V' ?& B0 ]& N; J. I (2) Radiation made up of oscillating electric and magnetic fields and/ m# ]4 [0 \' ^) |( D1 s9 c propagated with the speed of light. Includes gamma radiation, X-rays,! c& p2 Q2 J+ q; E u9 b$ o+ p ultraviolet, visible, and infrared radiation, and radar and radio waves. 8 `1 a; l' S5 w. VElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices7 ~, ~2 f" m6 y- H4 v5 d used in system/subsystem design, excluding employment in the RF spectrum.( j- Y6 r$ _" N5 n$ [: g Electromagnetic 0 w+ [0 V* E& P/ }/ ?( W) J' m2 RSpectrum q4 I1 I+ D1 y9 q: ?" XThe range of frequencies of electromagnetic radiation from zero to infinity. It is; S5 Y/ i! z: h. N" q4 O9 E: V divided into 26 alphabetically designated bands. 3 d+ I4 z) [2 I5 q4 iMDA GLOSSARY, VER. 4.0 E* n, O1 s% v( B) Y4 x. s 91+ `) L: h& A+ o! l2 m9 @ Electronic% }7 C ^$ n9 t3 X Counter- H/ s# r, g8 S$ y$ u3 x Countermeasure5 \& a1 [' R' E# ~ s (ECCM) $ f) B, @1 Q4 n3 ~4 D( JThat division of electronic warfare involving actions taken to insure friendly2 N' B* t) F! V8 I$ r- B4 {! K effective use of the electromagnetic, optical, and acoustic spectra despite the& X! b, V# }" p8 {; V; W. Y# R4 s% u enemy’s use of electronic warfare to include high power microwave techniques. ; Q* ^8 |( X5 D9 A bElectronic6 W/ P: ]" t6 V8 f- c Countermeasure : C; \7 t/ h/ s* C% O [' U e(ECM)$ y& i2 V$ I7 j$ z That division of electronic warfare involving actions taken to prevent or reduce an1 F3 X& `" t" A; V' O+ t7 r9 ^ enemy’s effective use of the electromagnetic spectrum." y5 z+ W' H5 [7 R. h Electronic Z2 I1 `3 N1 }* | Industries# ]0 ?% U: d2 r( o' x! c( i2 \% y Association (EIA) 7 X* Z: A0 S4 WA standards organization specializing in the electrical and functional : y: t& q% w- }, r7 _' Icharacteristics of interface equipment. 3 I% j0 \- e6 h, q4 x9 L2 yElectronic; z8 F* |; a8 t$ i% }7 g: X+ _ Warfare (EW)8 y2 |) P5 X* H. S9 c Any military activity involving the use of electromagnetic and directed energy to) @4 {" ], q m0 ?7 K8 }" u control the electromagnetic spectrum or to attack the enemy. The three major ! m1 d* z' m. a& h: F( t0 c' bsubdivisions are:9 U; |0 R" [! I9 K •Electronic attack – Involves the use of electromagnetic or directed energy to+ l' b6 R- [4 e0 i8 L attack personnel, facilities, or equipment with the intent of degrading, & n( T% F+ w+ Q. ]neutralizing, or destroying enemy combat capability. Also known as EA. - R9 q4 P5 G, A; d7 _Includes: 1) actions taken to prevent or reduce an enemy’s effective use of ; a. k1 B G' z5 H$ _% r" Z- L* @2 Othe electromagnetic spectrum, such as jamming and electromagnetic # X8 ^+ O% o. J1 Tdeception, and 2) employment of weapons that use either electromagnetic or A0 a& | O: K( Y# X- ?! t1 F9 `directed energy as their primary destructive mechanism (lasers, radio $ I' U0 D6 h0 u! c, X& J: r3 ufrequency weapons, particle beams).1 d$ m9 X# i% G% k •Electronic protection -- Involves actions taken to protect personnel, facilities, & O! R5 N. w2 }4 N4 d6 Kand equipment from any effects of friendly or enemy employment of 3 m" B: }- B# d3 _electronic warfare that degrade, neutralize, or destroy friendly combat ( g/ B& Y3 M; ^ Scapability. Also called EP. I3 X# e9 z$ S5 v4 T) U z•Electronic warfare support – Involves actions tasked by, or under direct . g! a4 k- p& L* t7 Qcontrol of, an operational commander to search for, intercept, identify, and ) O( W$ N$ T) m' c1 klocate sources of intentional and unintentional radiated electromagnetic/ E/ a* p7 L- P energy for the purpose of immediate threat recognition. Thus, electronic 9 Z$ o& f! P3 W) {* C/ I' {1 W2 lwarfare support provides information required for immediate decisions 2 F! P8 [. I. q# U6 }* Hinvolving electronic warfare operations and other tactical actions such as % Y. g. b0 v, Tthreat avoidance, targeting, and homing. Also called ES.1 L5 s) ?1 N% x8 X Electronic; B! V8 d, x& {& _9 t Warfare (EW)4 x5 _# m. y- V. C8 R" ?* {! V Environments 8 G* c: ^2 p; x+ p' H7 @+ ^Electronic warfare environments result from radar and communications jamming 4 I- w% z: }0 C" r" W+ @* cand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD. ]3 n/ @7 X0 ` system. / M8 ]# n0 ~2 y9 C1 G3 N- w3 HElectronics+ K) {4 y1 P3 m& ^3 x Intelligence+ g/ X% g- u1 ~2 o (ELINT). ?8 \3 c) `. Y2 A _ A Technical and geo-location intelligence derived from foreign non-communications ( k9 P3 m1 E5 q: y; a$ Telectromagnetic radiations emanating from other than nuclear detonations or/ X" u" }; r) M& a. G, m: C& N% W radioactive sources./ W2 |- b, A U# Y Electronics % A5 H# f1 }6 G4 l% s# Z3 L% SSecurity (ELSEC); \. p" \; U+ C' b! {6 n/ t" ^ The protection resulting from all measures designed to deny unauthorized # o A/ L3 s$ G3 f+ I* ? Lpersons information of value that might be derived from their interception and7 r0 @! x: W6 K; U study of non-communications electromagnetic radiations, e.g. radar. & C: a" T& ^/ a. I9 D: FElectro-Optics8 q/ f; C& B0 Q! |5 l0 F7 @ Infrared (EO/IR)2 A' e0 J( f; J5 D- [ Technologies/techniques employed by optical sensors in the wavelength8 R: V5 \' ]1 x* M" m( q' U- P spectrum slightly longer than visible but shorter than radio. $ s, E" R! x8 ^9 Y* e5 P" p5 p, IMDA GLOSSARY, VER. 4.0 E * A% O, o* B* J' x9 t ~$ R92 T# F: v9 J& I- h Element A complete, integrated set of components capable of autonomously providing; }+ t- n/ o; q u3 M9 r BMDS capability.* S4 E, y% d6 V3 E& K+ @# Y {" c Element 6 M" C6 m6 ]( XCapability 3 t& g% v2 D" @1 T6 DSpecification+ h. f2 R/ d4 f6 P$ ~ (ECS) + j& X. k. w' \A document that identifies the element-level BMDS capabilities and 9 P" B- u8 l! P+ K' i$ Dspecifications necessary to achieve the system capabilities identified in the SCS. : L! M6 c# h' j: U! W/ OThe ECS further defines the SCS-apportioned mission/technical performance 5 Z, c% G: {$ _- X* Acapabilities and allocates these capabilities to the element’s components., P# ^' B0 p2 H' J% R8 {6 r0 C Element Control7 g( p: C# g. F& e. c6 M Directives (ECDs) 2 q$ `7 D# M3 Q E8 c" MThe command and control data instructions to control the conduct of the+ x! R& u2 K* N9 a8 a" o j5 H4 R engagement. ECDs are developed by command and control software based9 T7 i$ {; p( o upon variable parameter input by the operators (both pre-planned and real time),2 F0 h0 D/ e/ C& A5 a& ` and operator defined rule sets embedded in the software. The individual battle. Z4 b2 Z& S( ~5 y: z/ O management processors use these instructions to accomplish the assigned tasks 9 u# O8 f2 ?1 Z8 S+ E( r6 `, {+ a& jfrom the operations order. ECDs are contained within a Task and represent the 0 q5 |4 X+ B3 o5 k% t" l& j0 `" Cform of parameter values that influence the resource management processes of ; N7 d3 w5 V6 Y8 \9 }. r: R) ^Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and ) y7 A# ]: ^( @2 E2 c u9 S& lCommunications Management (CM). There will be numerous ECDs per Task. 9 i" `+ r1 v$ ~1 K; {% X) T' K( cElement 7 ~' J" @) w& ]8 E, t$ tOperations% ?6 T% f( E3 K' j1 Y5 d. l! y Center (EOC) ) y6 M) D2 M4 B( v0 p$ }7 S5 \An Air Force operations center, which operates and maintains a BMD weapon or - }5 z. M, ^9 W% }# m# fsensor suite. (USSPACECOM) . s, ~! n; _4 X( J$ H: qELF Extremely Low Frequency. ; v' E+ n8 M; fELIAS Earth Limb Infrared Atomic Structure. ' c2 u& w1 K/ E: t# LELINFOSEC Electronic Information Security.0 w3 o8 V; L; ~! h; r0 e. g ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-11 23:07 , Processed in 0.052003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部