航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation+ F- b& w8 C( ? COMSEC Communications Security. $ v$ E8 a% O xConcept5 {" d: J% j& D4 ]- p* m1 P Exploration & 3 b9 U- k4 B4 C7 Q; aDefinition$ Z/ n, o8 `1 J* p. y; C The initial phase (Phase 0) of the system acquisition process, beginning at2 q. u$ p6 O) Y$ ~2 u Mission Need Determination. During this phase, the acquisition strategy is7 i4 F' h$ p0 q% k( n developed, system alternatives are proposed and examined, and the system( v% v- a5 f5 L7 P4 ~9 H" Q program requirements document is expanded to support subsequent phases. : J' i V4 w6 [Concept of) y! s3 |# j6 V$ C1 } Operations0 y; z2 P6 E: u- T/ G! G (CONOPS) 5 D9 A: Z! t' Y$ z(1) A statement, in broad outline, of a commander’s outline or intent in regard to & ~) l- m+ a; v6 Y" L5 Oan operation or series of operations. The concept is designed to give an overall , K' X6 f$ h% N8 b( q( npicture of the operation. (MDA Lexicon) 7 N% M5 e! R% V7 Y/ ](2) A verbal or graphic statement, in broad outline, of a commander’s # r3 j8 L( _4 `& @, |assumptions or intent in regard to an operation or series of operations. The8 ~2 P7 J$ M2 |5 J9 T1 c concept of operations frequently is embodied in campaign plans and operation : {; M4 Q: P+ ] i Q- Kplans; in the later case, particularly when the plans cover a series of connected4 E6 Z. m9 @# N operations to be carried out simultaneously or in succession. The concept is + P8 Q" j$ j2 b9 u* t, T tdesigned to give an overall picture of the operation. It is included primarily for9 v0 d4 U' t: |3 z additional clarity of purpose. 4 U6 @- H- C8 d* {0 QConcept Plan An operation plan in concept format. Also called CONPLAN./ P$ Y" c$ U F' f8 q& a$ D Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of # V5 x) F: B2 D- X4 c/ _the acquisition process, or combines development T&E with operational T&E. * E9 d" Z3 e2 N6 { nConcurrent % e8 [/ M0 |3 C k7 eEngineering % ]- T* V6 U& V% ^A systematic approach to the integrated, simultaneous design of products and % I' u& j3 g3 q. Ttheir related processes, including manufacture and support. This approach is : K3 \- ^& C0 s7 u: vintended to cause developers, from the beginning, to consider all elements of ) p( n! b9 L7 x& j! i, Uthe system life cycle from requirements development through dispersal, including * N# ~8 n6 |9 _+ @) Bcost, schedule, and performance. 5 h. V) r9 `: y' E" ~2 L5 W3 rCONEX CONOPS Exerciser. # u: I( z- e: A2 r4 j& YConfiguration A collection of an item’s descriptive and governing characteristics, which can be ' W. O) X# H0 o5 n5 _expressed in functional terms (i.e., what performance the item is expected to % j; @" e/ k9 E6 ?achieve); and in physical terms (i.e., what the item should look like and consist of . L' z. g0 c ?. P! [0 t/ lwhen it is built). 0 ?. f M) p, d4 u2 OMDA GLOSSARY, VER. 4.0 C) u6 }+ }6 X. H4 P$ S$ f 59 # o% s9 F( l5 F7 |Configuration, V+ }% D, y! j( _1 h5 h8 Z- ~ Audit: T4 k1 `; T- D# O; V1 K* m One of the Configuration Management tasks which includes a functional x, u3 Q* x: H& X4 \( e& |, `2 econfiguration audit (FCA) to validate that the development of a configuration item2 y& U4 L( j7 ?" `5 T+ y% t1 W has been completed satisfactorily and that the configuration item has achieved 7 u @; j" u) I1 bto specified performance and functional characteristics, and also includes a , t" g% y3 J1 [6 \5 _physical configuration audit (PCA) to verify that the configuration item “As Built” X7 n. g2 V3 [- [- K. z conforms to the technical documentation which defines the configuration item. 6 G! {7 O# ]( |2 b) ?: K8 FConfiguration ; L: Z8 ?6 n6 P3 G2 R( WBaseline ( |) m% j* ?$ N1 h& c& [! |The configuration documentation formally designated by the Government at a+ F- t4 h- A3 E: |% e specific time during a system’s or configuration item’s life cycle. Configuration 4 G! a& Q5 L( _( X2 n, b$ w' H% @8 a; q( Obaselines, plus approved changes from those baselines, constitute the current i# H2 V- v! ^$ @, D- Y* `8 [ configuration baselines, namely the functional, allocated, and product baselines. # o4 t- p6 [9 u/ s& o% z. {! _! ZConfiguration 3 C+ W* K/ Y' U A* R W# ^; RControl7 |5 T7 I/ q, j! m4 u C ? One of the Configuration Management tasks that involves the systematic' i+ R% e6 X& H0 A% n evaluation, coordination, approval, or disapproval of proposed changes to the # E- @4 L4 t- L2 S7 n# ldesign and construction of a configuration item whose configuration has been & G1 w8 [/ N i# @7 X' ]formally approved. # d2 X# a$ ?" m! }) @! q; ]! K8 MConfiguration% W; ?5 c% @* b" F Identification5 o+ H9 k; }- N1 q One of the Configuration Management tasks, which require that for every. J; d$ b0 t, _6 A( { change that is made to an Automated Data processing (ADP) system, the design) q# n, V' e+ i$ e1 {; }4 E and requirements of the changed version of the system should be identified.9 u6 W- t6 \! _( Q Configuration' C/ {9 h+ _5 z$ ?& k8 ? Item (CI) / w+ `3 U Y& VAn aggregation of system elements that satisfies an end use function and is ! J! S& r) C+ xdesignated by the Government for separate configuration management. & j- g+ b! J# p6 D' ]( l! yConfiguration items vary widely in complexity, size, and type. Any item required' \3 S7 I0 d2 W8 G( ?, R7 g for logistic support and designated for separate procurement is a configuration2 J1 ^# `& f2 q, W. j item. Configuration items are traceable to the work breakdown structure (WBS). ' H3 R" D M+ m @2 k2 w: mConfiguration 1 j9 u. j3 T4 VManagement) i0 B- [5 D; t- Y6 ^9 O q (CM)9 a3 h% l+ p4 W1 @5 k1 n In computer modeling and simulation, a discipline applying technical and # M8 W/ t2 z+ nadministrative oversight and control to identify and document the functional 3 w/ i5 k( G3 T' c; {; Y) _+ grequirements and capabilities of a model or simulation and its supporting) d6 _+ t/ [! n4 P: _3 N% [! R databases, control changes to those capabilities, and document and report the/ C) t( \9 f2 |7 l changes. See also Accreditation.8 b$ ~0 M G) w, B1 ] CONOPS Concept of Operations.3 G, W/ Q' T3 n1 e) A$ b# n8 W( @ CONPLAN Concept Plan 5 _. D" d3 c$ [9 g, B; bCONS Contracting Squadron.- _7 c! j, A2 G0 w Consolidated - t+ C a' r7 G" e; z- eCommand Center; F+ P, ]4 G# b1 ?- Q1 v) R" y4 |+ q: i (CCC) # y, p6 _ ~9 ^A single command center from which USCINCSPACE/CINCNORAD can direct all( F, V' `+ A/ r# t his assigned missions, to include BMD. (USSPACECOM) Located in Colorado 1 G- q4 } Q$ ]' hSprings, CO. 3 ]5 v2 t5 x) T7 }Consolidated ! N7 k+ o" x- _# z9 a% VIntelligence * C$ p, \5 V. b [0 y0 S% bWatch (CIW); u' e S/ n' k# n$ E$ { A consolidation of intelligence watch functions within the Intelligence Operations ; W3 b4 D/ v) n% l1 a0 L; G) b' VCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD/ _6 ~8 k2 E* z Aerospace Defense Intelligence Center (ADIC), and the Air Force Space4 H7 c* Q: F$ [% `+ V) N Command Space Intelligence Element (SIE). 9 \2 A1 s2 N ?; L8 A& _" v( G( zConsolidated( P! S1 L+ Q7 v* T) A4 g7 i Space* _2 _* u9 _( |' n Operations ! ]8 X* C# A) d, @) [. KCenter (CSOC) % |5 a' Q* W1 t. y' iSeries of centers at Falcon AFB, CO, which operationally control and maintain4 X2 ]! \% z2 ^, g+ a assigned DoD satellites. 2 ~% f7 z- L( p, a3 CConsolidated 8 l, S5 w3 `; [Space Test 9 Y6 z0 F" P; s* ^Center (CSTC) * x7 V( Y' j7 nSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and/ i5 b ^( A! E0 Y0 i- m initial on-orbit checkout of operational satellites, operate R&D satellites, and " h$ u, S, ~4 @/ p5 t$ Lserves as a backup to CSOC for operational DoD satellites. # R$ C) h4 X0 A% N2 | QMDA GLOSSARY, VER. 4.0 C ; o0 k( Q4 {( t607 a/ z! q8 {4 E) a Constellation" p* {4 _: z+ E& N# i3 B Size (CSIZE) 2 Q1 Y5 D( t1 NThe number of satellites of a particular system placed in orbit about the earth.* W7 L6 P: G! O0 Y/ o Contact Fuse Device used to detonate warhead on physical contact with another object. 6 N+ W' L0 H5 C# DContingency 4 V [* U0 N! K& d5 { CDeployment Plan ; j8 A, D" h# ^1 z/ e3 f' l(CDP) 4 ?3 H( h% V+ @; U0 kAn executable plan designed to deploy an early missile defense capability and ) D' d% e( b6 J% x5 rreduce deployment time. The plan provides specific executable deployment + ]( ~: I) J. `, B% k Yoptions and describes activities required before and after a deployment decision. ! S' s }' N6 _! ~6 x! uThe plan also allows decision makers to have oversight on technical progress, ; {0 S/ |! V$ }5 S6 x2 Mcost, schedule, and risks associated with a deployment system.$ r) r# Y( k& l3 E K- g' b. X Continuity of j* i6 f+ p4 P5 X) n0 uCommand 8 t5 b. f# t& j0 I8 U, FThe degree or state of being continuous in the exercise of the authority vested & t4 Z& U4 s+ E( k0 ~4 n+ U9 W: Kin an individual of the armed forces for the direction, coordination, and control of+ i' M5 w+ A, R8 H" O8 W! Y military forces. / _. P( d: H1 nContinuity of' w$ y8 Y( Q2 ]- A2 ` Operations2 v" e" W7 e0 J4 \# n The degree or state of being continuous in the conduct of functions, tasks, or ( p! U1 N6 `9 T! l$ [duties necessary to accomplish a military action or mission in carrying out the4 o7 {5 @- t E E national military strategy. It includes the functions and duties of the commander,$ T' m2 Z; V6 T& n; p. G as well as the supporting functions and duties performed by the staff and others4 h; P7 U6 x2 f; G0 H D& i acting under the authority and direction of the commander. 4 b) ~0 M; N- `8 r7 NContract 5 O; k# G/ M6 s+ Y8 oAdministration( j( M: X" f$ K% Z1 h7 ` Office (CAO) # X5 X% ]; z0 u, O( SThe activity identified in the DoD Directory of Contract Administration Services7 A3 S/ v9 h9 t2 q l( R- Y Components assigned to perform contract administration responsibilities. It is a / i! f* J9 e0 tgeneral term and includes Defense Contract Management Regions (DCMRs), ) X( R" q" l* aDefense Contract Management Area Operations (DCMAOs), and Defense Plant 1 @! U, J+ I f- NRepresentative Offices (DPROs). (Defense Systems Management College( d. o: L8 O2 p3 I5 h* f! s6 X, X' T Glossary) 3 u0 P* g% r. I1 z( e) d ~& OContract Data: S5 f o7 g5 j$ H6 {' B Requirements+ J6 R$ R- {# i- N1 V List (CDRL) 8 `; ~2 l3 J; l" z8 bDocument used to order (“buy”) and require delivery of data. Tells contractor : T e" u) A+ S. ~what data to deliver, when and how it will be accepted, where to look for # _# T% e$ Z+ |/ Vinstructions, etc. " Q7 a* \" E+ s& I/ w) j# UContract- \, q x. t9 U: E' W Definition" n, ?" x/ w x3 g C& l9 g A funded effort, normally by two or more competing contractors, to establish 3 h* R2 _) `8 L7 Pspecifications, to select technical approaches, to identify high-risk areas, and to, ~( ?+ Y" J0 b7 q5 e) Q make cost and production time estimates for developing large weapons systems. ) ~. M5 g# @& Z9 ^1 c& oContract Work" T) y' A8 F1 F+ S7 B- K Breakdown + d0 Z' i) b2 H, I& @) B3 h: p- J# BStructure+ w4 S1 j: E+ t- z( C The complete WBS for a contract developed and used by a contractor within the0 \1 E0 V7 _5 j2 _ guidelines of MIL-STD 881A, and in accordance with the contract statement of # ?! ?2 t* b* J8 P% }work. 4 f2 b% N" o! m7 _Contracting 1 K v: Y$ \' [/ K$ g0 sOfficer (CO) * _: E% O1 A2 R9 LA person with the authority to enter into, administer, or terminate contracts and [, S" u. J2 U make related determinations and findings. The term includes any authorized 4 l! ]3 [5 u: c7 M" H! k5 U! e( V, mrepresentatives of the CO acting within the limits of their authority. A CO whose q: V% X9 S# V; z: Y, hprimary responsibility is to administer contracts is an Administrative Contracting ; v" e6 \6 x S! o7 R$ _Officer. One whose primary responsibility is to terminate contracts and/or settle% x9 e1 ]% B6 ]4 R/ A terminated contracts is a Termination Contracting Officer. A single contracting" Y, I; l! i7 @6 k' t$ C; [9 K officer may be responsible for duties in any or all of these areas. 3 T3 D, T% D9 H- I/ ]Control Authority that may be less than full command exercised by a commander over$ [1 L) B/ m7 O8 E. \1 [ part of the activities of subordinate or other organizations.7 y0 U7 U+ J9 f4 @ Control# b7 s) u" h# M/ `* a5 n( k Abstraction 8 s7 ?4 U8 f, c+ w% C/ P(Software) The process of extracting the essential characteristics of control by ( a y! _4 m5 `3 {defining abstract mechanisms and their associated characteristics while ( Y( T8 c I0 d3 ]disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C7 {& J0 N8 ~/ j- q2 n. w 61 & x* V& l9 j. B& [6 K# F7 }4 gControl and W$ K0 U+ d; p2 O/ s! X L) bReporting Center ( d4 s+ O- A! G" H; EAn element of the US Air Force tactical air control system, subordinate to the6 A/ G; q: ~3 B+ W) U* W4 a$ ], ? tactical air control center, from which radar control and warning operations are 3 u0 K. W+ ]) i% ^conducted within its area of responsibility.! b$ g) N7 w0 g5 ^. C Control and ; Y) n) l! h1 \- ?' u: KReporting Post# b2 S- C- e2 C* d# s* ^: k6 e An element of the US Air Force tactical air control system, subordinate to the ) I) U; U: N3 E* s9 |control and reporting center, that provides radar control and surveillance within# x. A/ H: B0 U" E its area of responsibility. 2 T& ^- H" y8 L/ u1 iControl Area A controlled airspace extending upwards from a specified limit above the Earth. F4 d: a, [, r: T, [6 w% yControlled 6 O# t4 O) L" CEnvironment 6 ], S! i K4 |1 \+ F& w( |8 Z1 G* |Area where entry into the radiation hazard area is controlled. O) z/ w8 j" XControl f( U L8 Z7 o8 Z8 [/ A3 \' a; n6 yProcedure ' j4 k" N5 [5 I5 mThe means used to control the orderly communication of information between $ {" u/ Q! {/ G4 q" d1 ~( i: Ostations on a data link. Also called line discipline. % f# {. R; r" g( u# O& |' X5 FControl Station The station on a network, which supervises the network control procedures such - U) q+ {3 [% {1 `as polling, selecting, and recovery. It also is responsible for establishing order ) r C. T1 E* \- d" hon the line in the event of contention, or any other abnormal situation, arising $ [, |9 q4 r' i0 D7 P: ebetween any stations on the network. - E) { J5 G5 k5 x8 \; z3 E$ X3 gControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to " t& u8 Y' X1 P: K- E4 L, o1 Zprocess sensitive defense information and that is under sufficient physical and # Y4 c/ i- D9 b5 B% [2 z& ]technical control to preclude an unauthorized entry or compromise., u$ z9 N3 T3 g$ E: u3 H. V CONUS Continental United States. # E I; X/ g- y2 s! r4 x* p$ RConventional Co- 7 |; E. }) w9 iProduction( X8 ]. A% @( S2 M4 A# t% { An effort between governments to produce the same end item, or components% B" ? A" L! Y" u of the same end item, in concert. $ J$ k+ v1 m! J) Y; T* M4 @Conventional) ]2 R, [2 q, j* u; A* y Weapon6 a8 j4 c w1 Z' c- \" A A weapon that is neither nuclear, biological, nor chemical.- u/ @1 ?! u8 w Coop Cooperative. x- I: _& A1 U' ~5 e, M W Coordinated ! B/ A( A- e; f2 {Engagement- E0 c$ O9 b2 H; E+ Y% ` Planning/Actions6 L- K G9 w1 l6 a y0 R& l Necessary coordination among engagement components to ensure maximum q$ m" V# L9 z1 D& U5 q/ R, peffectiveness of the SDS and resources are not wasted on targets already w8 d4 r/ e" n+ V2 ?$ ^ targeted.5 g. g' z+ F! x+ Y( ~3 \ Coordinating * b( L' h0 h" n; OAuthority. P* I9 s4 a) P3 l A commander or individual assigned responsibility for coordinating specific ' ]/ A" ^) [! w H$ {* q4 L( R8 Ufunctions of activities involving forces of two or more Services or two or more& C/ U. |. `6 K; W: S7 c forces of the same Service. The commander or individual has the authority to7 \% S8 } \9 E) {7 C# m5 ` require consultation between the agencies involved, but does not have the9 S! n+ A$ Q. c6 L( } authority to compel agreement. In the event that essential agreement cannot be. B; E5 R% }0 e6 [% s$ U reached, the matter shall be referred to the appointing authority. . g9 G7 i3 R4 V' s: a/ J( rCOP Committee of Principals+ q+ R8 q# M8 P% j( G COR Contracting Officer’s Representative. Contracting Officer. 5 K$ ]$ M# F' x2 \/ eCORBA Common Object Request Broker Architecture. 1 Y' S q/ A8 s7 hCORM Commission on Roles and Missions. # d6 U: L" ~3 X3 H8 X- wMDA GLOSSARY, VER. 4.0 C ( F1 q6 r3 c! @8 s622 Y2 N; ^3 ?1 o8 e2 D" k Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens - P$ a5 x0 q! m. t, l2 h, N+ ]& J) Pperpendicular to one another, designed to act as a radar target or0 q( ^" d* q# a marker.# _$ `# D/ V3 S$ \ V" g+ i+ L' s (2) In radar interpretation, an object that, by means of multiple reflections ; @0 n& _- g) T' _8 w! Z' Xfrom smooth surfaces, produces a radar return of greater magnitude than . W ?9 j: q2 j% \might be expected from the physical size of the object./ z, C2 p/ @7 K, p: ^, d' D Corps SAM OBSOLETE. See Medium Extended Air Defense System. ! S7 N" `% b, j/ o( p8 UCorrelation (1) The process of relating observations or tracks from one set of data to 4 ^8 ]3 \) s+ H* u8 l9 @/ yobservations or tracks from another set of data, i.e., collecting data from + ^ n, B2 I4 a2 o1 X2 Mdifferent frames or sensors that presumably relate to the same target. (2)9 W1 |2 @+ O0 x0 ? In air defense, the determination that an aircraft appearing on a % u( f# _ A7 `- ?# g6 F! cradarscope, on a plotting board, or visual is the same as that on which $ H0 A/ P5 s; b- O7 ^. Zinformation is being received form another source. (3) In intelligence5 c- E0 v! {; ~- m usage, the process which associates and combines data on a single1 y9 G4 M, F9 U/ V# v entity or subject from independent observations, in order to improve the; a+ p$ A6 o. o3 } O reliability or credibility or the information. 9 Q0 A9 s1 b( vCOSEMS Evolving architecture operations support tool.& b- [$ a' x/ V5 w5 T0 k, Y: X COSM Computer System Operator’s Manual / p8 f0 I1 g: _+ [COSMIC NATO security category.. A+ k$ o Z% c/ o0 N$ @- n Cost Analysis4 f$ H4 W2 _9 N6 Q! g( O' \0 I Improvement) O1 X0 Z- W8 s' ]( v$ e* w Group (CAIG) : ]% y1 c3 A u. g. T4 q9 K! X) ^% YAn organization within the office of OSD Director, PA&E which advises the DAB ; w S0 r) u* Z; d# l5 q7 R0 Yon all matters concerning the estimation, review, and presentation of cost 0 b) x3 F7 |5 `. b" kanalysis of future weapon systems. The CAIG also develops common cost 9 j. x, {: M* L" a$ g% |estimating procedures for DoD. - R' c! J9 s, V: D3 xCost Analysis3 y. K! E" c/ C8 K2 F- Q8 F Requirements : Z0 i; i* w: X4 [) |# t& MDocument, g. J! Z" E* _5 P6 H2 L (CARD) ! u/ E6 q$ K5 \7 f, J! P! f, H' UThe document describing the technical baseline, which is a subset of current ) E2 F7 k' v, n l6 Xsystem technical data and is used to generate the baseline cost estimate for an $ z' g' a8 o( H6 wSDS element. It includes, but is not limited to, the element description, ; y% J* y+ N1 ?: p* [interfaces, operational concept quantity requirements, manpower requirements, . C" s/ _) c/ g: @4 D) P" ^5 Wactivity rates, schedules, research and development-phasing plan, and facilities) l0 I# F6 a4 U6 O requirements.% t" N2 T4 e q, u8 l' r( p j Cost and; @6 t/ U6 J% K9 c; |6 U Operational w! f: j9 S7 ^- k/ y Effectiveness5 t6 k* U1 E. U) Y; y7 O Analysis (COEA) 3 L1 j/ x4 \; h9 |/ tAn analysis of the estimated costs and operational effectiveness of alternative) T+ R/ R @* v& |# F( f( l- y materiel systems to meet a mission need, and the associated program for, R; U0 x/ U5 q! ] s acquiring each alternative.7 M3 g- O1 [0 q& r. H( D& Z. z$ P0 v Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk; N& j# J" G, Q# V* m; n due to cost estimating errors and the statistical uncertainty in the estimate.& V0 J# D! Q, |8 [1 r9 k. c& p Schedule/technical risk is risk due to inability to conquer the problems posed by5 h6 _& y/ F! j2 \3 I the intended design . N+ W4 t# k- N. @& hCOTR Contracting Officer’s Technical Representative. See Contracting Officer. 4 k! _. I6 g+ y: M- e/ RCOTS Commercial Off-The-Shelf. ' M% n) B9 y2 y1 T( ]+ b4 \8 qCounterair A US Air Force term for air operations conducted to attain and maintain a desired/ h4 @8 A' f' S# C: Y; g$ n degree of air superiority by the destruction or neutralization or enemy forces. Q/ ^- z4 g8 Q8 V. w( n# y( N Both air offensive and air defensive actions are involved. The former range . P- v+ D% M/ ^+ Q5 ?3 kthroughout enemy territory and are generally conducted at the initiative of 7 A8 n! R6 q% |friendly forces. The latter are conducted near or over friendly territory and are4 C% e" _, T; }/ f' |; ~9 e generally reactive to the initiative of the enemy air forces.. l7 @* v) E2 O4 f; N MDA GLOSSARY, VER. 4.0 C" O+ _$ o4 V$ Y6 x' h 63 ! l7 q/ v) i4 q PCountercountermeasures # J" r" O4 [0 D: l) a* h8 u9 f* V" O(CCM) J9 |7 a& _* {9 D Measures taken by the defense to defeat offensive countermeasures." c7 p( L! P+ E3 X, q/ _" ~ Counterforce The employment of strategic air and missile forces in an effort to destroy, or1 @5 X; V: A0 { render impotent, selected military capabilities of an enemy force under any of the i/ Y# N. e: A" o3 } circumstances by which hostilities may be initiated.' B* s$ c6 f- \, J Countermeasure A design or procedural measure taken against covert or overt attacks. . }# z/ J' E% Y7 J/ LCountermeasure" C/ x: b6 ^& U3 m% }4 @( o5 | s (CM)* b2 n$ \# y& R& P That form of military science that by the employment of devices and/or ( a2 z+ c) ` o6 Itechniques has as its objective the impairment of the operational effectiveness of & _+ m- U# P* B( |enemy activity.9 s, a/ ?8 U' E3 C3 D1 p Countermeasure ) N8 W2 J9 T P* ~s Rejection, Y/ M9 u0 A: U0 R% R, ?) K (Surveillance) # g3 }/ }; O; ]$ W. F5 U! gImprovement or rejection of an object signal in the presence of + f5 M5 E$ H* ]8 H- l0 X* Ccountermeasures. ( X% v# [7 ~+ R8 t" D# v" A7 KCourse of Action 4 }$ Z$ C0 c' ^" B' \(COA) 1 A* v7 [/ k) j* Y- N9 S( z(1) Any sequence of acts that an individual or unit may follow. (2) A possible0 w% r' ^) K4 P0 ] h& M plan open to an individual or command that would accomplish or is% @+ M( } K0 Y$ V related to the accomplishment of his mission. (3) The scheme adopted ' V" h6 `7 L8 v& tto accomplish a job or mission. (4) A line of conduct in an engagement.8 q0 o. W1 x* {- k (5) A plan to accomplish a mission. It describes the execution concept! |6 J9 V5 D, ?, M7 }3 N for BMD of North America. It will specify the engagement priorities, ' x$ U- x4 k6 Y/ s0 v# Y0 Y9 vresource allocation and desired results by Area of Operation (AO).) O" s/ b/ X) g2 g+ u (USSPACECOM) (6) The scheme adopted to accomplish a task or 2 i2 {3 j' k% Y# Mmission. It is a product of the Joint Operation Planning and Execution7 H: E5 f* U w+ W2 _ System concept development phase. The supported commander will6 s& O( K. p4 T+ ]4 P1 G7 m include a recommended course of action in the commander’s estimate. # |! i U+ I8 }" `The recommended course of action will include the concept of; s" Y$ z% ~, K8 P" Z$ } operations, evaluation of supportability estimates of supporting0 L4 n& w# E2 A2 q7 e. B4 e$ H1 X/ a organizations, and an integrated time-phased data base of combat, ' V4 |0 M3 n" l5 v$ T ^( ~combat support, and combat service support forces and sustainment.: L9 s) T/ I3 G8 x1 p Refinement of this database will be contingent on the time available for- g; L' \+ V4 X8 i/ I& V7 y# y" A course of action development. When approved, the course of action 0 ~* G: v& i" @- Y, Cbecomes the basis for the development of an operation plan or & i" k& U; s) T2 j7 Aoperation order. # s$ \! w7 U6 C. n: MCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps, * @0 U8 E; A7 r6 ?% h; Aand other geographical presentation systems. (2) Cover or protection, as 0 r! l9 A# q+ w+ b% xthe coverage of troops by supporting fire. (3) The extent to which U! n! a) I W3 b/ g intelligence information is available in respect to any specified area of 5 Z' T% M+ @% ]6 x! sinterest. (4) The summation of the geographical areas and volumes of * O( S$ E) H, a9 }) `aerospace under surveillance. - Y9 g. y U7 `+ j+ RCovert Timing2 E9 T& {& c h X* s Channel" c' q% a( e( N; Y( m A covert channel in which one process signals information to another by! z$ c: v& N+ g- u4 i1 x1 R modulating its own use of system resources in such a way that this manipulation7 x7 \4 x, j5 v6 f, f- c# G affects the real response time observed by the second process. 4 z( _9 ~$ z( S0 M1 I3 G Q$ Z# ]CP Command Post. 3 y0 z' S0 F2 x1 S( `) M4 _( P2 @CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. " j f9 R; G6 V& P4 ?8 C! w5 i$ w# m OCPAF Cost Plus Award Fee.$ H6 f+ r: w' ^: g1 p$ P7 A# J CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) . ]7 J, y/ e1 d0 e' I( ZMDA GLOSSARY, VER. 4.0 C3 B- `5 \2 Z" W+ x7 s 64 ; Z; _ F$ M/ E( V$ \CPAR Cost Performance Assessment Report. 1 t& A1 W7 x# w& W. j) m bCPAT Critical Process Assessment Tool$ w' p) x1 ?8 _, y: } CPB Charged Particle Beam.! D: ]; f% `# Z& d/ ~. Y CPEV Communications/Processor [Network] Experimental Version., U# O5 ^5 V6 j5 w1 u8 J B. c$ y/ o3 x CPFF Cost Plus Fixed Fee.8 R: W) U- T* L3 D2 z. ] CPIF Cost Plus Incentive Fee. , A! V0 G2 V3 NCPIPT Cost-Performance Integrated Product (Process) Team.7 R$ u) L$ i& Q6 B# n# @' P& Y5 E8 u CPM (1) Critical Path Method. (2) Contractor Performance Measurement. q7 n- J- ?. Q' o) a. d# N. q6 K' T* v CPP Critical Performance Parameter.- z1 ^; V y' d! [9 C1 D CPR Cost Performance Report.' E" r9 I& c# y, Z5 j+ V0 m CPR/NC Cost Performance Report/No Criteria (Contract management term)./ N; O# j9 Y, _4 ] e* B J CPS (1) Consolidated Program Summary.% L4 S: p7 x9 \& b" |3 r (2) Competitive Prototyping Strategy./ G& m* M8 `7 u# x0 k( l$ _ (3) Current Program Status.3 U) }: S/ U% S3 T- f- Z1 ? CPU Central Processing Unit (TelComm/Computer term).# H3 |/ O) w6 q! _- L, p CPX See Command Post Exercise. / A% t8 G# y0 O" gCQAE Chief/Contract Quality Assurance Evaluator.. C: M( y7 B7 U6 b$ {- x3 m3 x1 F CR (1) Computer Resources. (2) Continuing Resolution (US Congress term). 0 @# S$ y4 Y7 dCR-UAV Close Range Unmanned Aerial Vehicle.: v1 r( s( F3 I5 o% t CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement . ?8 z. b% C) d: E; P [5 gCRADA Cooperative Research and Development Agreement. ! r) ^$ c* {; |+ v. iCRAM (1) Control Random Access Memory. ; C2 G, k0 [; }! I- x! L( K(2) Cross-tie Random Access Memory (Computer term).3 t. Z2 O) r0 o* x' E* ? CRB Configuration Review Board. ( ~3 D/ M0 `' n( wCRC Control and Reporting Center.! e9 V4 s1 r9 k+ ? CRD (1) Capstone Requirements Document.$ y2 b5 O" ^3 f5 V (2) Component Requirements Document. c8 L$ x/ {7 k3 X$ g, z* v# T CRDA Cooperative Research and Development Agreement.7 ]: j0 E# f- e5 s2 [& l CRG Communications Relay Groups (PATRIOT). 8 E, T4 d/ | F% FCRI Classification, Recognition and Identification. 9 e9 P, u }6 D N& f/ uCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C: @3 X# a7 H# Y- G! { 65+ h5 w) H* _0 i2 W6 o Critical Design6 Z; J) k8 @7 L x Review (CDR)( L$ o2 n. z9 }+ N- @ A review conducted to determine that the detailed design satisfies the! U% t' M$ S, F+ R- x3 P performance and engineering requirements of the development specification; to 0 a2 m3 \' G% s) x0 b! c" N6 |establish the detailed design compatibility between the item and other items of& P9 h% v0 e; b: u+ D0 T5 v equipment, facilities, computer programs, and personnel; to assess producibility ( ?9 n$ V5 n6 Z5 h$ wand risk areas; and to review the preliminary product specifications. Conducted ) \* K3 a: i1 K) L P0 _+ ~+ \during Phase I, Demonstration and Validation (for prototypes) and Phase II,' k- [/ X5 I; A Engineering and Manufacturing Development.9 W/ k; U7 Q9 w1 q2 d0 P- Z Critical0 ~6 @( z! ?" g) z, @ Information/ G' q0 X$ b2 t2 N Specific facts about friendly intentions, capabilities, and activities vitally needed! r- t1 l `$ X3 F by adversaries for them to plan and act effectively so as to guarantee failure or3 |2 l. C& ] u2 a+ Y unacceptable consequences for friendly mission accomplishment. 2 h) o7 K3 g2 b- _( MCritical ( G2 Q( w' q; a3 D- @: `# FIntelligence, {1 b# m' I! I! X8 [% w Parameter% j) v; U- [' Z$ |5 O: x- p A threat capability or threshold established by the program, changes to which5 {7 a, w' G1 C. {4 ]0 K. |$ f could critically impact on the effectiveness and survivability of the proposed , M; o, |5 s: k9 j! O$ `/ @2 `- V8 |system. ' b' J/ c* |$ V" V3 w8 UCritical Issues Those aspects of a system’s capability, either operational, technical, or other,9 M3 ]4 K- B/ E* ~ that must be questioned before a system’s overall suitability can be known, and 0 b" G$ h; K$ ]; G4 Qwhich are of primary importance to the decision authority in reaching a decision ' Z7 c9 t5 r8 Z& e' C+ H: ]to allow the system to advance into the next phase of design, development, 9 f1 V- o( p& ~; `, k9 J+ Dproduction, or post-production.& K& B/ M& ^* G% P; ?6 ^ Critical & M7 E. ?$ F! P) W5 JOperational 0 u# f0 X* m9 Y5 ZIssue : g+ d; B4 E7 _# G4 W7 }A key operational effectiveness or operational suitability issue that must be4 N' a: N. J' k. t5 } o examined in operational test and evaluation to determine the system’s capability3 }3 R% e& Y( h! ` ?, u/ M/ l# g5 W to perform its mission. A critical operational issue is normally phrased as a0 V( A8 o" g* [ question to be answered in evaluating a system’s operational effectiveness" D# c# v/ j& \0 f- w: {0 F- I and/or operational suitability. 2 H; K( a# t) ~( P. }! e, xCritical Path ! u! g- E+ `5 d3 D: T; c, gMethod2 k4 w( {( E+ i& _0 c& m A technique that aids dependency of other activities and the time required to/ U$ s) B! B4 F7 L, V" F% S: C g complete. Activities, which when delayed have an impact on the total project! ]1 W* m% Z8 F! t$ K7 C schedule, are critical and are said to be on the critical path.7 r! X v9 e% U; r8 R3 Z Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to0 M: s( w( X9 u; O& T; R the viability or the operational effectiveness of the SDS. - M% [9 _- r5 V; E2 S$ S/ q1 [, b0 ~, KCritical Security: B8 k+ @" w3 B4 H: S Risk7 Q0 g. g# K* O5 @. w7 w6 { The existence of a security vulnerability that, if exploited by an adversary, could* c& d/ A" x w6 s cause exceptionally grave damage to the viability of the BMD or the operational ) e, ?7 x6 _, {effectiveness of the SDS. Critical risks assume an adversary’s capability to ( y' n6 C3 }+ T4 i4 v2 Y, ocause major system disruption or degradation (e.g., single point failure), / f- J) V" F: Z2 ^0 ydestruction of mission-critical components, or usurpation of system functions.$ ~* Q1 h! _9 R* k Critical: [) U: k" t6 }( i, l5 q Supporting 4 S- Z, i4 U( L: b7 ~7 ~Technology 6 S2 R# ]2 q5 s* l2 w, _2 T& KA technology that program management personnel consider a critical part of the6 C) U. e; T+ b5 h# U$ _. w program being described.$ W3 l) ~3 z+ \, V7 ]" [8 ~ CRLCMP Computer Resources Life-Cycle Management Plan. # o. h/ r7 M+ X* _9 WCRM Computer Resources Management. % {- i( ~$ h) l3 P: n# X% j% rCRMP Computer Resources Management Plan. ) b% f( _- T4 U) q. M+ uCRO Chemical Release Observation.6 z5 T0 k8 e9 A- Q. L* y/ r CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC: P8 n) t) O: h9 Y5 q. ]& z term.)* {9 ^( B0 f% b1 B9 ]4 | MDA GLOSSARY, VER. 4.0 C6 q7 m) S0 z: r6 m! k 66 2 [& I/ W% F5 QCRS (1) Computer Resources Support. (2) Congressional Research Service. (3)( w4 c6 O' E V+ _2 C& D' F. L' Z' K Contractor Reporting System. r- q+ c- A3 F" G8 Z# X( K CRT Cathode Ray Tube. & ?' N3 a* h9 ?CRWG Computer Resource Working Group. & [9 G7 P) @7 o9 d* r' Q$ rCryocoolers Cryogenic Coolers., ~4 t: K* u1 ^ D% S2 U: w2 e Cryogenic Of or related to cryogens (substances which are used to obtain low 4 g, ]% y% r' c/ H: jtemperatures).7 ?% x) r# o; ^3 U Crypto A designation or marking which identifies classified operational keying material,- r0 w" i0 B5 W) Y7 n9 r. z1 T and which indicates that this material requires special consideration with respect6 W$ x9 m: s/ h5 x to access, storage and handling.8 }; \/ j/ M# Y- u' ^ Cryptographic ! I: P8 s& n' ~4 D' iSystem+ N( _& g, b6 `# [2 ~9 F4 v h' L The documents, devices, equipment, and associated techniques that are used + o6 X7 X+ M/ L( Z" Y! h) N* Pas a unit to provide a single means of encryption (enciphering or encoding).7 K0 r0 I d: D1 U$ }) ?5 [ Cryptology The science that deals with hidden, disguised, or encrypted communications. It $ O5 y4 j2 S5 B) |5 nincludes communications security and communications intelligence. + F( U% @% S/ y! T# E- H" ~2 CCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start." D; A$ e5 ~& Q' x" ]( w CS/CSS Combat Support and Combat Service Support (USAF budget term). & ]' G8 y; o* @& ^5 W6 K. x# aCSA Chief of Staff of the Army.( W; ?1 U9 X' a CSAF Chief of Staff of the Air Force. , o$ ?5 F+ w& ]) M: ` |8 {, \CSC Computer Software Component.8 r/ [3 u" t! s CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) ( M# D" o/ x$ {: V9 h% y7 w" m5 |CSCSC Cost/Schedule Control System Criteria. " X. Q" h& Q* B( k* f4 e# D/ X8 n+ hCSD (1) Constant Speed Drive. (2) Critical System Demonstration.& x/ \. p. i2 x+ P CSE Center for Security Evaluations (DCI).# u4 h& ^% H- V& S5 d& _# Q: Q CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon1 [9 |( m' M/ F+ z w# ?# L System, located in Cherry Hill, NJ. * ]8 k* h' m6 \% e- b, y$ yCSF Consolidated Support Facility, Arlington, VA. S) ~% [$ L# W. c5 i; W8 o& S4 Z CSI (1) Critical Safety Item. (2) Critical Sustainability Item. " d5 @8 t; f* C; d" \, jCSIP Current Systems Improvement Program. : v9 G4 l9 j, ^9 l$ ?2 ACSIZE Constellation Size. , x3 W; H" \# X$ Z5 l/ jCSL Computer Systems Laboratory. $ C5 l( u9 D( LCSM (1) Core Support Module (*C2E term). (2) Communications Support Model. ; @$ f% J/ d" U8 {0 h/ _CSNI Communications Shared Network Interface (NATO term).) V' X" l' `9 P( d4 P5 E MDA GLOSSARY, VER. 4.0 C + P8 w3 N* l+ _" J67 + N# h: A5 ^( z+ E1 aCSO Closely Spaced Objects.* H+ v' w. }6 `6 Z5 s" x: ?/ _ CSOC See Consolidated Space Operations Center.$ `- {; Q A- o: g! ?+ j CSOM Computer System Operator’s Manual 2 V/ Y" l2 T$ R v, e: I0 {, wCSOSS Combat System Operational System Sequencing: t3 {( r& x6 r CSP Communications Support Processor (numerous locations, including USAF Air % j6 n1 C( K+ w9 Z* uDevelopment Center, Rome, NY term). % @! w' o7 F; _, \- P' N& o: |0 DCSRD Computer System Requirements Document.; ^2 c8 ~) D( J+ g) u CSS (1) Cooperating Space System. (2) Communications System Segment. (3)7 P5 u; \- j1 j& e3 p- h3 l: Q/ { Contractor Support Services. (4) Common Sharing System. (5) Communications ( |7 A' B* f* v2 a, f' VSupport System (Navy term). (6) Common Support System. (7) Combat Service I2 x: T6 J4 R) H1 l& J# aSupport.2 o w1 d y1 o* h CSSCS Combat Service Support Control System (USA term).8 r9 d9 G% [( r1 b W1 A CSSPAB Computer System Security and Privacy Advisory Board. 9 [; c- N# ~$ f, z+ m: n& \2 C* YCSSO Computer Systems Security Officer. 3 E. E, c$ t7 y" m3 w& m- G$ i- F" QCSSTSS Combat Service Support Training Simulation System (US Army term). 4 \5 f% s' z* h- \! D/ OCSTC Consolidated Space Test Center. ( t5 A3 E0 r9 h! g" DCSTI Civil Space Technology Initiative.& b' g$ O$ `( F# I7 l, @ CSU (1) Computer Software Unit. (2) Communications System Utilization.$ D: v: [) d4 t( h, x' A CSUR Communications System Utilization Report. 0 y- K- X4 Q. d B! gCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. : H' G) w V, c$ o6 O% ^(4) Cryptologic Technician (Navy occupation specialty). + C, C: h% D4 y) p6 eCTACS Contingency Theater Air Control System (JFACC term). ( M" @0 j/ H6 ACTAPS Contingency Theater Automated Planning System (USAF). ! N+ j8 y2 \9 \0 wCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. 9 ~) N+ Q: c* |( |7 j8 hCTBM Conventionally-0armed TBM. 8 a+ w* w5 f1 @$ q' \CTC Combat Training Center, Ft. Leavenworth, KS. " G" u/ P& @; YCTCC Critical Technology Coordinating Committee.: g9 F) t( v" |' S CTD Communications Test Driver.4 a5 S. M7 n$ i- O CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment.( p9 I4 U( I4 ^2 S% Y CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally3 S7 F( h7 o# U, m funding selected test investments proposed by the Services and Defense$ y1 D5 z' v4 o- l5 m Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C + y7 D6 n, D8 {( f: [: l3 P; w( Z68 $ N' J4 {5 [# @; q* v% oCTF Controlled Test Flights. ; ~ {* D, h$ t' G+ JCTI Concept Technology Insertion.7 {+ R l9 Y% [7 T$ x( a7 H CTN CALS Test Network. w% h S) d! c: u5 _ CTOC Corps Tactical Operations Center.# @. F5 _, G7 H& p' W0 r8 o CTOL Conventional Takeoff/Landing aircraft. ; ^0 p. {) e, G7 `9 I8 f! cCTP (1) Critical Technical Parameters.+ u! _4 r! S- o$ J h (2) Communication Tasking Plan. / y3 `3 _7 h/ x+ b4 o* }3 i$ M(3) Consolidated Targets Program.9 ^0 w" S4 g$ \) g t# n, o& O CTPE Central Tactical Processing Element.- k6 L* @2 [" m8 [% \) T* Y5 @% E CTPP Consolidated Targets Program Plan. ; N9 Y, J6 ~# ]7 x k7 I7 n( HCTR Cooperative Threat Reduction (Treaty negotiation term). 0 m- I- |# a9 a K5 ^5 _0 t/ l4 JCTRS Centers+ e1 X0 C: }6 B) C1 ~1 I CTS (1) Clear To Send (TelComm/Computer term).: F6 _" A# {- m2 C (2) Contact Test Set (USA IFTE term).$ E, ^6 F% m6 g+ y CTSS Computer and Telecommunications Staff. ( l7 k: ~( {* W1 j, q& uCTT Commander’s Tactical Terminal (US Army).. ~- @( ~* c- I% t CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).+ w( f# c5 E R- J, p CTV Control Test Vehicle(s).# @- F! z* ^# \' g3 a CUDIXS Common User Digital Information Exchange System. ( l3 R' n! t( `$ p4 sCued Operation The directing of one sensor based upon the data received from another sensor. & r& w6 E* z$ e6 {3 _6 I" d; jCueing Command The command within a tactic, which specifies the sensor element’s coverage: P A2 R% c1 D `1 r3 Y volume. 1 @( {1 d8 E) E$ o& b& z$ dCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage ! v$ `$ `1 ]& F: v, c$ Yvolume. 9 ~$ I9 F! z6 o! }2 c& k: kCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.0 T; ~2 j. B6 c9 b) d i6 f CV/BM Carrier Vehicle/Battle Management. 8 U; v# V: j0 N6 m( WCVBG USN aircraft carrier battle group.) |# ~7 v/ \6 L$ W @ CVHG Carrier, Aircraft (V/STOL), Guided missile.; R, b5 Z/ I. R# q2 k CVISC Combat Visual Information Support Center.6 {) E6 O/ u8 O% h$ S ~ ^ CVL Copper Vapor Lasers.+ z$ t( }$ X. b" J CVN USN nuclear powered aircraft carrier.( Z; C3 p0 f- w: O* A MDA GLOSSARY, VER. 4.0 C : C7 G% f1 ^6 Q, Q69/ p: s, b2 P# z4 @6 x6 k7 x CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.& v* |* z& p* B" Y CWAR Continuous Wave Acquisition Cycle (Hawk).3 \+ W3 W" L8 ~ CWBS Contract Work Breakdown Structure.2 X1 {( M3 s# |8 d, z. M$ C1 p CWDD Continuous Wave Deuterium Demonstrator. + Y+ e5 k5 @$ ~$ [1 \CWIPT Cost Working group integrated Product Team. 3 ^: [1 [3 Y+ K# [: FCY Calendar Year. ; I, }( Z+ i% S/ o0 J" Z0 qMDA GLOSSARY, VER. 4.0 D , |0 ~3 t$ X, i$ A2 V/ W2 t/ o! q71 & l! C# [) i/ s7 bD Deuterium# ?: g6 n8 Y! M5 M. A% O* O# ~" S& ^ D Spec Process specification. ' h6 b; f+ h0 T) Q8 J. V3 E1 bD Star Measure of infrared sensor sensitivity.& W/ g9 ?& F# [8 A& i2 h$ v( L D&D Design and Development 3 Z6 ~2 F9 E$ q& {7 p6 I( a7 pD&T Detection and Tracking., ?" n; p1 F$ e3 f | K7 i# ? D-IFOG Depolarized-Interferometric Fiber Optic Gyro.5 S. G: Y4 v# v$ ^ D-Level Depot Level (ILS term). R9 `- l. M" T: n8 h: t1 a" a1 B1 ~ D/A Digital-to-Analog 4 X7 h, A# f! L8 sD/V Demonstration and Validation.4 q/ ^. R3 r8 [8 @; ] D2 Projective (interceptor) in the Hyper-Velocity Gun program. ' U2 @& |3 k, I9 d9 A! MDA (1) Department of the Army.3 O/ B* P1 i) _. D! ~, d: H (2) Department of Administration.% G$ `* `# E5 s" u7 B8 A (3) Decision Analysis.7 p! r0 S- P4 D* o+ b (4) Developing Agency/Activity. - a1 f# x! w1 I2 ~(5) Data Administrator.. X0 g3 V4 A0 g7 ^' y (6) Direct Action. ' U1 y9 X: n2 i. o(7) Data Adapter.2 ~1 I. u% K, n( n" Q1 B! E DAA Designated Approval Authority (DD 5000 term). ' K+ R7 M1 d+ I: H" c- zDAASAT Direct Ascent Anti-Satellite.3 R( ^$ U+ q0 | ^5 m* K9 a DAB See Defense Acquisition Board.8 \! C# m6 H# [# {7 Q& O1 E3 q DAC (1) Days After Contract [Award]. ( s6 a5 i; G* f" Z M+ E: t% ~- O(2) Department of the Army Civilian. 2 q, }; M! S' w: E8 \0 A(3) Directed Attack Characterization. 8 O, m: X$ a! d, q3 ~(4) Deploy ACCS Component. 1 ~3 ]9 P2 y9 G! ^; e8 l' r- u/ u; E! b(5) Digital-to-Analog Converter. ) Q3 Z* H( f7 \0 Y8 X6 `5 iDACS Divert and Attitude Control System.4 J# ^6 _2 p2 @4 n* q% K+ Q; ~ DAD Defense Acquisition Deskbook.- Z: J3 D1 R3 D+ d9 D DADS Distributed Air Defense Study (1993).6 H; V! ^$ P9 T9 {+ e# [5 x" P0 f5 d DAE Defense Acquisition Executive.( G S, }' q! J! a DAES Defense Acquisition Executive Summary. : \5 w9 T( U! m4 q6 Z2 m" {! J, e [7 PDAGGR Depressed Altitude Guided Gun Round.6 h) [" y$ S5 p* p0 O& B/ \ DAHQ Department of the Army Headquarters. 3 f8 n+ c+ S, V# N9 KDAI Damage Assessment Indicator (targets).. v) m; f O' {$ O2 g" e DAL Defended Asset List.' }* ?, Q- z/ c% o- i" f4 |$ z MDA GLOSSARY, VER. 4.0 D1 K! e! N/ b9 C6 S+ s7 v1 a 72 / c# }; f* T8 M) ?3 S9 zDAMA Demand Assigned Multiple Access. # g3 E) Y9 N& z, j7 o+ ^ X, }. SDANASAT Direct Ascent Nuclear Anti-Satellite.. G8 ?: ^, e) [9 ]5 t DAPR Director’s Annual Program Review (SDIO term)1 |- D! v8 j2 \* a @ DARO Defense Aeronautical Reconnaissance Office (OSD). 4 ]9 d: D; S& F4 jDARP Defense Aeronautical Reconnaissance Program. 1 N9 L( a( p; b3 X1 XDARPA Defense Advanced Research Projects Agency. See ARPA. / g5 b! @% m4 X7 R1 B' yDART OBSOLETE. Defense Acquisition Review Team. 0 P- w0 u2 x: T4 b3 IDASA German Aerospace. Member of the MEADS Program Team. 9 z/ u1 f: W$ F) U1 lDASC Deep Air Support Center (JFACC term).( W: X$ k8 P* ], H& c7 X$ n: f; D" e; ~ DASD OBSOLETE. Deputy Assistant Secretary of Defense.( D- i9 ?% L- _8 B8 e2 K/ T DASD (C3) Deputy/Assistant Secretary of Defense (C3) ) f0 D( R3 [8 M2 o4 _+ {DASO Demonstration and Shakedown Operation.- q* {4 q" p4 n% q5 S" ]; |, D Data Integrity The state that exists when computerized data is the same as that in the source 2 ^) T* j+ M0 M# }" v( Wdocuments and has not been exposed to accidental or malicious alteration or . ? I0 l% t: v/ ddestruction. , g" e/ n3 v8 B! ADatalink (1) The means of connecting one location to another for the purpose of+ K+ X* L7 E& t% D4 y* [: k- R$ W transmitting and receiving data. 6 {7 b9 C+ S# t' d, m(2) A particular path between two nodes over which data is transmitted. It / o1 u: M( k0 A9 {7 \2 Qincludes not only the transmission medium, but also digital to analog 0 x9 M) h9 }3 Gconverters, modems, transmission equipment, antennas, etc., associated - m6 n: O. g6 m ^; Pwith this path. In the SDS backbone network, it was a path between two . i6 j" H9 i% u0 PSDS elements. In space these datalinks were microwave or laser. On 6 e% V: Q4 d* L8 s; \* ^the ground, they could have been wire line, microwave, or optical fiber. * n7 L6 G* B5 M3 B @" _' ZDAU Defense Acquisition University, Ft. Belvoir, VA.4 N3 ]" z& p; f% f2 p DAVID Development of Advanced Very long wavelength Infrared Detector (USAF 4 j2 o2 q$ e" m8 A7 w0 h: XPhillips Lab term). $ b6 u5 W0 h" ], w4 `! F) H; Y. LDAWS Defense Automated Warning System. , U- b8 b5 W' m' F( G T2 MDazzling The temporary blinding of a sensor by overloading it with an intense signal of ) S6 Q; k$ Q f. d% C" qelectromagnetic radiation (e.g., from a laser or a nuclear explosion). 4 ~. V3 \" U( ]0 I( nDB Bata Base! Y4 `5 h# e% |, p$ E DBME Database Management Environment (Computer term).1 P) \; H9 h! E% z% S' k DBMS Database Management System. 4 W& ]; x {+ h& a" TDBOF Defense Business Operations Fund. P/ Y" @/ ~ \' W5 NDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D " L4 o5 S6 j' p4 v: L4 l, R737 h6 ?) D c2 v j; F a Dbsm Decibels per square meter. * ^3 u7 ]! ~7 V3 F# ^2 ~DBSM Database System Management. . Z3 X* `7 u. O- k2 p- C' a6 [+ f, ZDC (1) Disarmament Commission. (2) Direct Current." c1 X; O6 P4 o* N8 | DC-X Delta Clipper Experiment., S [) L/ C c" ]" W' V! P DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications+ U( o# ~( J) E7 }8 I( J Agency. (Now known as Defense Information Systems Agency (DISA)). . r: D" s+ t; `# L, w# h/ @" }DCAA Defense Contract Audit Agency. 6 H+ W4 g" U5 B8 _/ s, ADCAS Defense Contract Administrative Services., p- S+ Y+ M% h5 Z' c2 |! k- P9 p DCCO Defense Commercial Communications Office (of DISA).; J) D8 S1 f% T DCDS Distributed Computer Design/Development System. . d, j9 \/ Q" X3 l6 bDCE (1) Data Communications Equipment (TelComm/Computer term). 9 Q* C5 G4 g* z c! S(2) Distributed Computer Environment.: z0 u7 y% ~3 Y" \9 I5 G- A! M1 j8 m7 f DCEC Defense Communications Electronics Command.$ k: y T: u) g. Z/ a0 Z3 S DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.- E6 e# f5 z: t DCINC Deputy Commander-in-Chief. # _1 S7 b; w! y. P' JDCM Defensive Counter Measures. : }; U$ q& Q- G; l q& n. fDCMC Defense Contract Management Command4 l0 n3 z& \$ |8 I DCN Document Change Notice." \+ }7 m2 ~: a+ U$ z- D0 N DCO Director of Combat Operations (JFACC term). ! t2 g F* t" XDCP (1) Decision Coordination Paper (see ADM). , h6 M# L$ N& [* X8 G3 ?+ S(2) Director of Combat Plans (JFACC term).3 L/ p1 l8 D! c6 _) N1 r9 M: X DCPG Digital Clock Pulse Generator. / n# I* }2 y7 V' W! ?9 M! PDCS Deputy Chief of Staff.1 l; z# V; K/ C* `6 O, [" v DCSOPS Deputy Chief of Staff for Operations and Plans (Army).# p: o' l; v8 c% g }4 m DCT Digital Communications Terminal 5 a( O3 [* g9 w$ q; ?& _) h9 t+ RDCTN Defense Commercial Telecommunications Network. - z4 o* y1 T. F( LDD Variation of DoD. + O1 x. j5 Z% s9 l3 y; U' MDDCI Deputy Director of Central Intelligence.1 U$ G! R2 r- e0 j X r1 r$ t DDEL Dwight David Eisenhower Library, Abilene, KN (army term).9 z2 ` x: a1 F DDG USN guided missile destroyer. 2 q) A7 e+ d* d- s. {MDA GLOSSARY, VER. 4.0 D/ [; g7 R' m3 q3 x8 o6 n8 v1 s$ { 746 G3 B# k* ?( h* j' _" v/ S# P0 R DDL Disclosure authority letter.0 p, s' o4 B, Z' V/ f) ` DDN Defense Data Network. 7 ^ H4 `0 g) SDDR&E Director, Defense Research and Engineering.3 H* y+ z4 F2 W. \1 ^8 R DDDR&E Deputy Director, Defense Research and Engineering. ) {' w5 j8 _) B+ XDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).- [: R! G# r$ j3 I- o% L( ]& P/ f DE (1) See Directed Energy. (2) Delay Equalizer. ; Z9 C& m5 ^0 F5 L; k) K& r4 U7 LDEBRA Debris, Radiance Model. 9 }( I9 X( G7 H* g$ \" sDecentralized - [ W; a. A+ R$ w- @# S" ^& ]Control D+ L' f4 [* T6 z6 }6 W6 iIn air defense, the normal mode whereby a higher echelon monitors unit actions," l2 Z# W$ L J& G" p0 | G$ e making direct target assignments to units only when necessary to ensure proper 9 j' W% `5 [1 w0 ufire distribution or to prevent engagement of friendly aircraft. ; H. e) k! s; C0 `Decentralized( \8 V' Q s* e$ U1 p6 c Execution, `2 v; a: Q$ z5 c; q. t" M. `0 o' p The distributed and integrated implementation of USCINCSPACE direction by + ~; a7 R. w$ w2 V/ g0 sthe BMD forces. (AFSPACECOM) * {6 g8 R+ U0 r. X+ BDecommissionin9 ?1 T# V" _0 b8 g/ K7 U g 0 l6 r6 O, y# w" BThe removal or the rendering useless of obsolete or no longer needed 5 H2 V3 x% u5 y) v: f, A: Icomponents of the BMD system from service.0 a: X) g; Q4 y F Decrement A directed funding level reduction for an acquisition program. 6 G$ D- O( H! h# p# DDED Data Element Definition (Computer term).$ x, M0 {3 ~' d" r) a2 Y, s Dedicated Mode: @4 ?8 k" a- C* O of Operation 7 W/ c! b* `# H0 Z(ADP Security)8 Z! F; r- \+ }3 u A mode of operation where all users of the AIS possess the required personnel " u: Z8 y1 @" r1 b3 Q8 _+ ]) zsecurity clearance or authorization, formal access approval (if required), and a # m, {7 F2 ^8 y9 U6 S2 W/ VNeed-to-Know for all data included in the AIS. : k+ Y& [ X0 y% e' @3 F) i/ a1 XDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about* E& R( |6 R P9 M0 O 5,600 kilometers) above the earth’s surface." L+ E, t5 w' D- |: @; R Def Definition.0 z$ E, L0 F' D0 x3 d DEF (1) Defense. (2) Demilitarization Enterprise Fund. " \7 C c9 p; L* K) b) j# q0 gDEFCON Defense Readiness Conditions. f8 C, }6 ~$ b& i Defended area $ g" ~' R1 ~9 Q# U+ G# v( a6 m# tcoverage# D+ O S6 y, @( T0 V Defended Asset, O5 {0 Y! W" S2 e/ n V% H3 e0 a List (DAL)- W s9 c7 V3 w& o3 w& n The geographical region that the BMDS can protect from ballistic missile attacks $ I2 c1 |/ C/ N5 B7 ^- d" ?7 Twith a specified level of probability of negation. May be specified for a particular & I8 X6 N6 `5 w$ kthreat type, launch point(s), launch regions, raid size, etc. 0 q M6 r* f/ XA ranked listing of facilities, forces, and national political items that require# @5 h. ^/ z' u3 e6 ~' b protection from attack or hostile surveillance. The list is compiled from Federal ( h: T' ~8 q3 Q$ {5 W# Q9 J/ y; d$ u; n: bdepartments and agencies, Unified and Specified Commands, and the Armed! m" P' a, k5 g Services to ensure National Security Emergency Preparedness functions. $ `# H4 G/ X j& Y7 o; gMDA GLOSSARY, VER. 4.0 D $ o, T9 |' d3 ]* }6 l* z75) O% [/ w: t7 M. G& o Defense; X3 P% m- Y& w& G9 j7 J1 G Acquisition/ t& u& [- P3 h5 S Board (DAB)7 v4 j; O0 F' M m# m: ` The senior DoD acquisition review board chaired by the Under Secretary of % W: ]+ u m( P3 yDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the ! G! ?! U8 O0 Z6 O+ o0 gVice-Chair. Other members of the Board are the Deputy Under Secretary of * s$ K' J3 o7 o- ]$ m+ `. YDefense for Acquisition and Technology, Service Acquisition Executives of the+ P) N1 q+ d4 q- w! L- G( i# N Army, Navy, and Air Force; the Director of Defense Research and Engineering; + {* y, ~+ M& ^7 S$ |the Assistant Secretary of Defense for Program Analysis and Evaluation; the . T) n9 x6 B2 q" hComptroller of the Department of Defense; the Director of Operational Test and- ]# z5 a; [* J Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the9 ~) S6 b* E" G# ^% }6 |2 h, F& _ Defense Acquisition Board Executive Secretary. Other persons may attend at4 h. L# g* o0 H+ I* l the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition 4 X; N$ |0 g, _Board.”) 0 x: I+ a% B% Y6 Y8 R/ p& sDefense6 i2 i( J. Z% T; m$ A( {* R3 M+ n# _' o Acquisition) p" ~: b1 ~' D6 V' {8 U Board Committee . L2 p. ^' A2 C1 QAdvisory review groups subordinate to the Defense Acquisition Board. The 9 l" s2 N4 U& BUnder Secretary of Defense for Acquisition determines the number of2 M3 n3 c* L% w& G$ W9 {5 f Committees. The purpose of the Committee is to review DoD Component ! t( u& B" |$ f- ?- H2 _programs prior to a Defense Acquisition Board review in order to make an# T7 S5 C8 p7 _# A1 r independent assessment and recommendation to the Board regarding the 6 M& y& a8 j9 X2 V, K- W" e% k) }3 Dprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense & h5 N& u# }' f$ i hAcquisition 7 f, q! a* N7 |. c+ W5 M7 gExecutive (DAE) 0 i8 Q; B# {6 q) `0 E; {The principal advisor to the Secretary of Defense on all matters pertaining to the c$ `8 e6 r9 f9 aDepartment of Defense Acquisition System. The USD (A) is the DAE and the, D2 n1 Z8 G+ @. Y; \2 J4 p8 X Defense Procurement Executive (DoD Directive 5134.1). \ {/ A# o8 F7 \% y0 pDefense 3 h e) @; c# ^3 ?- J2 LAcquisition2 G4 Q$ Q! K% f' i1 h- Z" ? Executive ; C$ W5 t8 y+ X- w* Q* O7 }7 f' YSummary (DAES) , t0 F( [& z& ~The DAE’s principal mechanism for tracking programs between milestone/ Q. `# P( P" d# K$ R reviews. Includes programs subject to the Selected Acquisition Report (SAR), # e4 ~5 N# X5 e0 ]+ Dand any non-SAR programs subject to review by the Defense Acquisition Board.9 b2 G. ?* m8 [% d1 e: J: J. O Defense & k6 c( W+ ]( c' _3 h E7 @5 I+ z2 FEmployment 2 [1 Z0 P. h( N ~+ j' \% IOption (DEO) $ o2 A. V# [! h* X, N- XEngagement strategy provided to USSPACECOM component forces to achieve 7 N9 z) b: j) y- z4 tspecific military objectives against a ballistic missile attack. It defines hostile 5 v" s" I3 o/ C/ ^9 C" I5 F+ s6 \target priorities, provides assets to defend, and allocates SDS resources to be7 ^( P3 r) ~6 j& W employed. A number of DEOs may reside in a particular Preplanned Response ' ~; {2 J3 }8 T1 QOption (PRO). However, default DEOs (those believed to be best suited to8 Z' z6 |6 o! N% ^ A- D! v! Y9 S counter the threat initially) will be automatically processed and executed when ( x4 L5 m) K0 c/ Z$ cDefense Activation Authority (DAA) is given by USCINCSPACE. ) d% ]0 F) h! ^Defense + n( S4 q# b% m' u5 j% n- TEnterprise * z4 W7 ?; c& c7 zProgram (DEP)% Z+ e, I) d2 R# R6 K5 M An Acquisition program designed to streamline the acquisition process by waiver( X0 L$ c( z$ p& V of selected regulatory requirements. $ L1 O. z( q, H2 V7 a0 e0 qDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb ! x" L) X. i" _+ {; M( _and progressively weaken an attack, prevent initial observations of the entire ( U) U1 h+ ~6 f8 Z; U- y, |position by the enemy, and allow the commander to maneuver his reserve.. z6 ?/ H) e j! q5 u: D X Defense - f0 T3 t$ ?+ s( q& q- UMeteorological, x/ i* s( j& t$ G3 b- }9 f Satellite Program; r6 g* I( h% g5 q (DMSP) 7 E& k/ p3 s% Z8 ~Satellites designed to meet unique military requirements for weather information. . l+ D" U3 D1 \) ~( L1 r: {& @Used to detect and observe developing cloud patterns and follow existing4 A6 [ a% I* A1 P/ Y( U5 r& ] weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. . m8 b: U: \4 b! {( n: fDefense Planning6 u0 e. a$ a. h. k' f and Resources: C+ K& l) `/ o8 G7 Q6 S' R Board (DPRB) " s8 X( l( D; ]% K8 |5 R, x/ v2 ZA board, chaired by the Deputy Secretary of Defense, established to facilitate" \4 Y) s- ~1 }' | decision making during all phases of the planning, programming, and budgeting6 u. E: Y0 Z R system process. Board members include the Secretaries of the Military % z' j3 x2 A) y; Q) i. a* @4 VDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of * ]' k3 ^! ^& VDefense for Acquisition and Technology, and Policy, the Assistant Secretary of + S2 B# b! h rDefense for Program Analysis and Evaluation, and the Comptroller of the 9 A* C6 R; E; } }" o$ i1 DDepartment of Defense. * u# H; k6 Z7 x9 m5 c% p% W- qMDA GLOSSARY, VER. 4.0 D, Y/ Z6 M0 G$ X# D1 J 76 $ h, R+ \) y& @) Y5 SDefense Planning ' P9 l: v& j! LGuidance (DPG) 8 ~0 X I& S9 R, o7 D1 y" E0 U* B% tDocument issued by SECDEF to DoD components providing strategic framework0 S7 h3 M$ ^6 i W" @1 \ for developing the Service POMs. Result of planning effort by Joint Staff, OSD,; t- C3 o+ J+ u& U- X4 I7 {' X and Services. In connection with two-year budget process, DPG is issued every 9 N3 A$ i& y: z4 A2 q9 ^other (even) year. 0 o3 \& @0 v1 M' }Defense Priority, Y i3 E; S. H3 u z+ c and Allocation/ g; t4 E3 E" Q, t: D0 `2 U System (DPAS) ) R7 M" y. h) N6 b+ vThe implementation of a statutory requirement where contracts in support of6 T1 Z7 f+ b- M1 n0 w national defense must be accepted and performed on a priority basis over all , [4 C3 A2 W/ `& L! D! F+ }7 u A Wother contracts, and which requires the allocation of materials and facilities in$ h, M0 C; u2 E" E4 ^3 T such a manner as to promote the national defense. See “DO” and “DX.” C& u' F3 T1 d/ b8 M Defense! _& C! \& I* L4 A+ j# }3 ?8 i Readiness . c! Z; T1 i- N2 s( \* } f Z/ VConditions ) C2 ]$ W! Z* Z9 W(DEFCON) $ n A# w4 t# f5 K3 i+ MA uniform system of progressive alert postures for use between the Chairman of( X$ J* j6 o T# \0 l# u the Joint Chiefs of Staff and the commanders of unified and specified commands % c+ ]# o: x/ X: H( Q. c8 |and for use by the Services. Defense readiness conditions are graduated to) X, N: j8 W' _& }+ E match situations of varying military severity (status of alert). Defense Readiness / ~8 M9 [% @; w9 k- qConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as % G4 u7 I- M: Uappropriate. - ~, X' x. C& ]. ~9 ^! qDefense Satellite 9 |, q* V1 [/ r5 u6 S' yCommunications# J5 n9 [8 t% W8 L# x7 B Systems (DSCS) 4 G9 y4 n# l! K; Q, o! o XAdvanced communications satellites in synchronous orbit around the earth. " N' _) D: a* z7 _ A$ c/ n" @/ k4 o* n4 wProvides high-capacity, super high-frequency (SHF) secure voice and data links 1 h1 p0 S( Y% r, \' \3 T V+ Tfor the Worldwide Military Command and Control System (WWMCCS). They/ f& s+ B/ j! H support terminal deployments for contingencies; restoration of disrupted service % h' f* a4 ]; b9 B5 K9 ooverseas; presidential travel; global connectivity for the Diplomatic ) L" a, \4 q. K* P# fTelecommunications Services; and transmission to the continental United States * p; H: {% u9 m0 |9 F2 zof some surveillance, intelligence, and early warning data.. U" l& r' I3 q6 o Defense Satellite / [5 t, @# \4 X) u3 q(DSAT) Weapon & v0 {& r& z! f9 Q% s U$ A3 L+ K8 BA device that is intended to defend satellites by destroying attacking ASAT6 e) Y8 C$ J5 r) l) I) S& |/ z: t weapons. 8 H. U Q C% B! m2 uDefense Support g- \1 W5 A) p6 [+ A. w8 N k( o Program (DSP) . ~ _0 H9 r8 o( e$ SA system of satellites in geo-stationary orbits, fixed and mobile ground , e- c% m1 e; w" Q% }% X* N% p( Mprocessing stations, one multi-purpose facility, and a ground communications% b% _7 s- Y0 w* h9 |! v/ u network (GCN). DSP’s primary mission is to provide tactical warning and limited; S% l6 e W& ^! j* ~! V3 F' r* d attack assessment of a ballistic missile attack.0 b R! k6 D S) U' c" U5 n Defense! m* t8 T) z! a4 |8 E Suppression x# Z% M2 b$ s. K* WTemporary or transient degradation of the performance of a defensive system * r1 l2 S1 {6 y C- cbelow the level needed to fulfill its mission objectives, by an opposing force. 9 C( x# @3 u! M! F(USSPACECOM) 5 I7 k7 j7 i; \Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic 4 s! G+ ?6 x' j2 ~) \ S, M! _* \missile trajectory; i.e., boost, post-boost, midcourse, and terminal. , C3 p+ c7 G$ S8 t2 qDefensive " S* x1 }- J1 s0 WCounter7 f/ H1 w, A1 i8 e7 H* j Measures (DCM) ? _) G P8 S- N1 z& C3 ` Actions taken to eliminate an ASAT attack.- s# z5 s6 c' j! Q Defensive $ B& a7 _+ A. N- n6 h U, FTechnologies $ d. ^9 s- C) L, r+ UStudy Team3 l0 t1 G+ ?' y& l (DTST) # i- t4 E9 \$ {' H7 mA committee, generally known as the “Fletcher Panel” after its Chairman, 6 T5 E% h0 I7 n+ ^' eappointed by (former) President Reagan to investigate the technologies of q6 p+ d, W3 J3 n' b, D# f potential BMD systems. ' Q! u5 Y M. b+ [' B/ eDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. A/ Y& E2 j* ]DEIS Defense Enterprise Integration Services (ex-DTIS). 9 l2 M/ W, B( |DEL Delivery. $ v+ T. ]: l, yDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion$ _4 y! I" s4 {1 \0 M of shots about the aiming point. See also Circular Error Probable.+ T* P* u% z- d* H MDA GLOSSARY, VER. 4.0 D 1 Q. s8 @9 I' p77 " z+ R9 O* c; B2 x# }7 @5 @; ?4 xDelta-V A numerical index of the maneuverability of a satellite or rocket. It is the . f( ~0 G) y; u* e+ rmaximum change in velocity, which a spacecraft could achieve in the absence of : `9 J6 C1 u, f' E# H# ]a gravitational field. 2 {% U( d: E# h0 `- NDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).! r& c1 O% R k Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its5 k% X/ w- {4 z; b' B% h5 A. W desired function (matching RV characteristics, screening RV, etc.)9 B& d a2 _- c! X& q6 V) d DEMO Demonstration. 0 {) }: Q' W. |& qDemonstration- C6 H. W# e. A [( X. J and Validation . H' B- M2 H. m/ ~& d0 K7 O3 f(Dem/Val) 8 X$ i" b; _9 N1 ] f. _7 eThe acquisition phase when major program characteristics and product designs4 f4 o# g) G9 t3 \ are refined through extensive study and analysis, hardware development, test, 4 [; ]' Z3 q4 r% Z4 q- @6 b1 z/ I1 h yand evaluations. The objective is to validate the choice of alternatives and to8 p/ c2 _, L8 U: L$ _7 S provide the basis for determining whether or not to proceed into Engineering and : g4 X. B3 A0 h& y- lManufacturing Development (EMD). , B' Z7 @( q! s5 o! w$ wDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. / v( y3 z i3 K, M' E* y" n# EIt may include destruction, removal, contamination, or erection of obstructions.3 S4 j7 p# }5 r8 n6 x' q DEO Defense Employment Option. $ B" ^. d' o& G1 \$ Y1 C( NDepartment of1 R& m& @. T& w2 G4 D( N, O Defense . m' x. Y% H- F6 y. ?Acquisition" \: A. v B% |6 D0 A5 H$ s System 9 E! l' v: t) J4 A* wA single uniform system whereby all equipment, facilities, and services are 4 o+ S% R* K3 D6 P. D# \3 splanned, designed, developed, acquired, maintained, and disposed of within the 4 L- w' _( E) k4 d* EDepartment of Defense. The system encompasses establishing and enforcing & R$ w$ f2 G$ y9 l7 n5 epolicies and practices that govern acquisitions, to include documenting mission$ b' V6 K9 \& ?' r! z* c8 e3 N needs and establishing performance goals and baselines; determining and& q5 i+ c" i, C# Q4 \ prioritizing resource requirements for acquisition programs; planning and7 g5 m7 R" }) L& F( x! Z* P. {( d* \ executing acquisition programs; directing and controlling the acquisition review! T. y' s$ f/ I; n; R: Q& e/ q* q process; developing and assessing logistics implications; contracting; monitoring5 M; @5 o3 v+ v" c; g the execution status of approved programs; and reporting to Congress. (See * W4 r I9 _2 o6 d0 HDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)0 ~) }0 C6 K; Q/ N& }' l Deployment (1) The placement of force elements in battle positions to obtain a higher 0 ], k( k ]' fstate of readiness. & W# q7 i7 z" V9 h. f(2) The movement required to place force elements in battle positions. 1 @: a+ D3 N1 r3 u0 s* U) a(3) Fielding the weapons system by placing it into operational use with units" @( K6 w) h7 ~ U% l1 ^* w in the field/fleet. 7 O5 M J$ u! F; {( s, e(4) To arrange, place, or move strategically. ; x+ J, h0 T4 Q; f" J- L3 w, PDeployment2 A8 r. r) X: \ Planning) h8 I# t5 t( u9 ? (1) The development and maintenance of plans required to initially deploy, : \# B; c# c! n2 M' V/ K+ k5 omaintain, and evolve the operational system in accordance with ! \* m, Y! u. Y1 T9 e. u0 q' _schedules and priorities. It includes factors such as launch facility9 o$ c8 ~! S' L) L; L availability and planning for the availability of other required elements0 D/ |8 Y$ h0 ~+ R7 k such as trained personnel or units. In addition, it identifies the impact of 8 ?" N3 ]6 g! t. n8 hdeployment on operational readiness and any testing constraints: V1 K. f" X3 V) f! r8 b5 a6 l3 X& Z- | associated with deployment.- M7 V+ _5 o; E2 J1 ~ (2) Encompasses all activities from origin or home station through ( E1 L) R2 a: a) g qdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding7 ` j0 _0 t5 w2 p areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment * z/ i/ V# c; L. KTesting: ]; K8 w% c' Y The testing and/or simulation of system assets in the physical and operational # A G7 ?; Z% venvironment in which they are expected to perform. % t* y; l- V$ J. U# BDepOpsDep Service Deputy Operations Deputies. " c( H) a N3 |4 @: iMDA GLOSSARY, VER. 4.0 D6 b7 Z$ G9 L( p: N7 A0 r- Z 78/ D0 L* j: c( Q9 q3 ]* A- r, X Depressed 7 \5 l; h! v- q9 P ETrajectory! a9 a$ j: u" Y! d# ~' ?) t5 l Trajectory with an apogee below that of the minimum-energy trajectory. $ h3 f4 x' R( gDEPSCoR Defense Experimental Program to Stimulate Competitive Research.( `' q" D- B, n+ e8 m& Q DEPSECDEF Deputy Secretary of Defense. * K0 t7 L3 p% x$ _DeSecState Deputy Secretary of State. 1 M: _7 r( Y/ e; x; `DERA Defense Evaluation and Research Agency. Consolidated research and- m5 c7 k; u# s6 Y& w' B8 M& \ development resources of the U.K. Ministry Defence. Headquartered in. O! W* l3 J: @# _: @' J! a% R Farnborough, England. . O7 y7 t) J( L9 H! F8 T/ c& XDerivative + k7 u! j8 L: D7 ?) m! v/ z s$ t4 s, nClassification + w: W$ s+ }7 @+ a* C9 IA determination that information is in substance the same as information % s6 x( V3 _5 }' I, ^4 s( scurrently classified and the application of the same classification marking.0 }7 E2 B/ r- @, F+ d e3 M DES Data Encryption Standard. # k! b7 F0 Y% w* \' O, T) uDESC Defense Electronics Supply Center (DLA term).. D3 ` X& S. |8 ? @3 U Design# {9 B M% F9 ^( {5 T' n Constraints1 W$ x9 |# k7 h5 b" } Boundary conditions within which the developer must remain while allocating : J/ Q" L1 J3 R, N5 r' S8 e" Vperformance requirements and/or synthesizing system elements. 9 x d* M/ Q) XDesign! l5 w; P$ l1 k Parameters 7 _! m0 F* P# OQualitative, quantitative, physical, and functional value characteristics that are6 }3 D8 S p: r9 @8 b inputs to the design process, for use in design tradeoffs, risk analyses, and- \1 y% C7 m2 _. R) n/ O development of a system that is responsive to system requirements.* |; \2 b) }; X {3 ~+ a Design Phase A period of time in the software life cycle during which the designs for * H$ ~6 c5 Z2 G+ \) q0 p) x, Rarchitecture, software components, interfaces, and data are created,% r# h5 ^2 k1 }( J( }7 M) `) z documented, and verified to satisfy requirements. : i: l3 O5 x: ]- F m/ ~, {Design-to-Cost 0 P7 F2 l0 I% Q) m2 o(DTC) Goal6 C; j% `6 @; X Management concept wherein rigorous cost goals are established during2 ~; o+ m( @3 Y: j# L" \ development, and the control of systems costs (acquisition, operating, and8 k& g) ?( ^' p$ ^, m support) to these goals is achieved by practical tradeoffs between operational$ a& @$ e# \8 G0 e capability, performance, costs, and schedule. Cost, as a key design parameter,7 h$ J: E7 W; }, v. g, S is addressed on a continuing basis and as an inherent part of the development9 g [) I2 Y0 Z5 x5 H; ~ and production process. A DTC goal should be in the form of average unit + H- E+ {5 z& p/ C4 Qflyaway cost. Also, DTC parameters for operation and support will be " G; M0 v$ r) ~% ?1 p j6 Jselected—parameters that are design-controllable, significantly affect O&S costs, + V" I. c: _/ f: Pand can be measured during test and evaluation. Parameters may be' h3 O; \' }7 g/ |3 ? expressed in dollars or by other measurable factors, e.g., manpower, reliability, or- _4 }$ s) U1 h, V- a! g maintainability. Firm goals and thresholds will be established no later than entry( [6 w- m2 E; U4 V2 s into EMD (Milestone II). This is an in-house goal, almost contractual in nature,0 o7 }9 z: T; x* c between the PM (Service) and the SECDEF. Allocations from this goal will & Q& Y6 y: Z" obecome the contractual DTC goals for contractors supporting the program. 1 s& E4 y( j7 u+ C. |! G. e1 j# ]1 ~Det Detachment.$ C4 I2 k* I. A) D9 E' e }: i1 L1 ? DETEC Defense Technology Evaluation Code. 5 t0 Q& }, r4 DDetector A passive IR, visible, UV detector turns photons into an electrical signal. The ! _6 X' o/ x# {) ^9 {" bIFOV of the detector is its solid angular sub-tense. There is sometimes; B- g- d" M% R+ ]8 a confusion between the detector sub-tense (size) and the pixel (picture element( n/ j4 g- V- `4 K) X$ N3 |$ I size). They are the same for a staring sensor, but in a scanner it depends on 0 N, j9 U+ R8 v- H7 ?$ ~the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area., b, p6 a! E4 i8 g" A2 ] MDA GLOSSARY, VER. 4.0 D4 u3 p% j. x1 C, j 79( h2 E* [6 @5 \6 a6 T7 F8 i DEV ENV Development Environment. ' ^. b% b: S: O- j x9 m$ {Development 3 m$ A. J+ x) ]: h( v% C! MTest (DT)/ W y' I R: q2 c4 U+ J5 z Test conducted by the development test organization to achieve specified test" X- S0 ^5 j- c objectives. It may be a complete test, a subtest, or a phase of a test. 2 H3 w. S' t1 }! J4 R, L. D qDevelopment: L i% U0 ^6 b Test I (DT I)1 U0 @1 A8 F5 w- F$ [7 L A series of tests conducted during the demonstration and validation phase. # z& Y5 Y4 s( k+ ZComponents, subsystems, or the total (or full) system are examined to determine# b1 Z; I9 H( _7 w. X: x whether the system is ready for EMD. State-of-the-art technology is addressed/ Y! j8 Z# P! l in DT I. y8 z% n: F$ q, m8 `Development; o# S, J0 g0 X. L5 u" c Test II (DT II)' R" q( g6 X3 t* A( [; Z$ S4 @/ w A series of tests, normally during EMD, which provide the technical data - a: o0 w4 c4 \; y1 tnecessary to assess whether the system is ready for low-rate initial or full# F) m$ n4 F6 z3 r* ] production. It measures the technical performance and safety characteristics of9 y2 j; \& {* | \8 @ the item and evaluates its associated tools, test equipment, training package, ; \- @8 W5 b. `9 x. xand maintenance test package as described in the development plan. DT II 3 i9 U1 \: z; v7 waddresses accomplishment of engineering design goals and the fulfillment of 6 w, H3 Q! N x( ?contract specifications.; [4 N- k& i: i* \5 u P1 F Development 3 o& j2 J8 I' ^) G* JTest III (DT III) 0 R% s0 g9 {! QTests conducted during production. * x9 k% p0 Z. p8 Q$ D, ?) P9 aDevelopment5 J: {# o( X: y% t- @% E Test and% P7 u, Y0 v4 J# y. | Evaluation8 l+ q' U: A& H (DT&E)- M; ? J: @9 N/ Z6 L" ^ Test and evaluation conducted to measure progress, usually of 7 O0 T, l3 w0 {+ ucomponent/subsystems, and the proofing of manufacturing processes and / ~/ s$ c o3 H9 S7 H$ z7 hcontrols and to assist the engineering design and development process and , l: {! }% @1 g p" Kverify attainment of technical performance specifications and objectives. Usually ' e3 }$ T6 P9 `3 y. x' b! dconducted under controlled or laboratory conditions. Can be conducted before' P. @1 y& I" H5 u0 R1 h( [2 J4 [ or after production begins. X( B# h# R' b: q" V9 D1 JDevelopment , D( U! \" o* }4 P. M1 i/ X9 fTest (DT). d. S N7 I8 v+ W, [4 m Test conducted by the development test organization to achieve specified test0 ?0 Y: u3 N4 J7 I% h objectives. It may be a complete test, a subtest, or a phase of a test.- G/ B, ^6 W( T Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,8 u% G0 `3 n; N* e: ?% o schedule, or performance without authorization from the milestone decision, c& m& U2 k* h5 A) u' E authority. Acquisition Program Baseline (APB) thresholds represent these) s. s0 B9 t8 x parameters. " y$ |& U# w7 a! Y# F9 [Devolution of 6 d# F1 N+ ?4 I2 P3 H" H7 ICommand+ K0 g/ W: K/ @" L- A3 f Minimal essential operational capability to perform C2 provided in an orderly and 6 g5 y; k9 \- k; ]timely fashion to a duly authorized successor.) q/ [& e- o3 z DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.4 q z- o7 t/ T9 ] DEW/D Directed Energy Weapon/Discrimination., G) c! r1 ?% U5 \. Q" o/ s; a$ a DEWG, O Directed Energy Weapon Ground, Orbital / b* I! {+ N/ F! t/ LDEWL Directed Energy Weapon, Laser (thermal or impulse).5 }7 X7 f$ H! O# m# v6 m/ O; T DEWP Directed Energy Weapon, Particle Beam (neutral or charged). . y% }1 S# m( Z! u: W- y" zDF-KBS Data Fusion Knowledge Based System. + c4 e; i- g7 M: N( { D3 rDF2 Deuterium Fluoride. 4 z+ v# }3 c( {! o6 ADFAR Defense Federal Acquisition Regulation8 s$ h4 E K. c- `- p DFARS Defense Federal Acquisition Regulation Supplement.5 O' Z- E g1 `; r9 l MDA GLOSSARY, VER. 4.0 D . x: i7 u8 E9 {- r80) R3 d0 e/ k: b; i- H; A# y DFAS Defense Financing and Accounting Service.: R+ X6 S2 C6 X% @4 S0 h DG OBSOLETE. Defense Guidance. See Defense Planning Guidance.' G% [" m! u3 W& z DGA Director General of Armaments (France). $ Y) n$ o5 L3 b) v4 HDGP Defense Group on Proliferation.; H f7 `+ i& r: N. L4 a DI (1) Data Item. (2) Developmental Item. N4 t: D& R: z' J! }' L( j1 r DIA Defense Intelligence Agency.. X$ @# q; N) `" G0 o DIAC Defense Intelligence Analysis Center.9 @2 H6 q4 V7 Y$ Z5 M1 k5 p: j DIAM Defense Intelligence Agency Manual ( S! o/ M% G) ~" ?1 jDiameter (Optics) The unit of measure of the light gathering power of a lens.5 e& a6 X# F4 X5 v/ S DICE Digital Integrated Combat Evaluator. : }0 F+ L0 n; @3 uDID Data Item Description.% q$ n! ]$ i. v: ^% D Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The 9 E. O$ x( H$ I6 U0 {- Cangle of spread, which cannot be eliminated by focusing, is proportional to the+ C- O# Q5 W% e2 d3 x ratio of the wavelength of radiation to the diameter of the aperture. . P1 h& [. q8 o+ }. ~6 ~0 I& PDigital : ^( _0 ^2 E0 \3 E/ L6 e2 FProcessing7 R$ y* V: V- A8 l The most familiar type of computing, in which problems are solved through the: J" H9 D, z# p mathematical manipulation of streams of bits. 5 C# R% k$ y, y: S- y/ T! X( bDII Defense Information Infrastructure+ `- p1 k5 B& h+ d8 t% e9 p Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to V! S8 C5 [; Z* M# J 12 km) between wake termination and de-sheathing.. A% p1 v: v6 N" x) I$ w3 p DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). 7 w: ]2 H2 O1 O! I# hDIR Director. , D. h8 s- U' O& @$ m5 \! {# c( sDirect Air$ U/ [# g6 [- W+ r5 ]+ T+ G3 _ Support Center5 s5 S- V, }; H A subordinate operational component of a tactical air control system designed4 E% } d v, `) z X; X for control and direction of close air support and other tactical air support R7 K8 `# N2 K0 X- ooperations, and normally collocated with fire support coordination elements. 5 N; D- l" `6 H) O/ N: A6 ZDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not! s. `, G" |5 j necessarily limited to items that are incorporated into the end product as labor or + q. Y1 e- ~ T) v5 n6 rmaterial.3 `( [; `% B& M: I! M1 @ Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing' N( E6 n; I9 z* j. V% `8 U direct labor includes fabrication, assembly, inspection and test for constructing5 P. l& A }( N1 [ the end product. Engineering direct labor consists of engineering labor such as : v5 ? e3 W. @4 Lreliability, quality assurance, test, design, etc., that is readily identified with the% E& B' n6 Z. a( E) ^7 V8 l# Q end product. m: u3 z; |: m7 f3 lDirected Energy$ S$ u( {) u& ]8 G( P (DE)7 [" N1 t7 @1 g8 W 1. Energy in the form of atomic particles, pellets, or focused electromagnetic 7 M) c! I; p7 Zbeams that can be sent long distances at, or nearly at, the speed of) h: q6 g4 m5 C7 w5 E light. ( K( K& S8 @3 W2. An umbrella term covering technologies that relate to the production of a : x; m X/ s. C cbeam of concentrated electromagnetic energy or atomic or subatomic particles. . M1 _: C+ i7 j- q& S! QMDA GLOSSARY, VER. 4.0 D# l* Q. L; V; M" W9 D 81 6 x$ C' r/ z1 bDirected Energy! D. e! v) @- Z% `0 z; g$ i3 Z8 S Device 9 `; v' w% J9 SA system using directed energy primarily for a purpose other than as a weapon.# R# s! T9 T, V9 B# m Directed energy devices may produce effects that could allow the device to be0 x( K; m6 S$ M- r+ p used as a weapon against certain threats, for example, laser rangefinders. " n& p1 \3 c6 d. M8 WDirected Energy # G- c8 K4 @2 YWeapon (DEW)( M0 G0 c7 o5 l# l4 [9 D# x A system using directed energy primarily as a direct means to damage or destroy# u/ L! h$ @- k, i3 I2 R& ^ enemy equipment, facilities, and personnel.% Y2 I! O# s- l L0 v6 i* J2 Z DIRLAUTH Direct Liaison Authorized. . K8 r4 H* i, U3 f' E v: hDIRNSA Director, National Security Agency.6 J0 ~! b+ J! q0 E! b DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. U' C: g/ ?) A3 z* _, k2 e: A! nDISA Defense Information Systems Agency, Washington, DC. (Formerly known as ! N6 ? L. i+ o$ \+ k8 wDefense Communications Agency). $ S0 S8 @+ ^ l* gDISCO Defense Industrial Security Clearance Office$ z+ {! u# R) C DISCOM Division Support Command (US Army term). " I2 q: q6 x5 n; f' j( Z1 v0 k; dDiscretionary t: g% B9 u0 y1 Z4 V; J Judgment0 m2 k1 M, N3 S The authority given USCINCSPACE or his duly authorized representative to ) Z6 l5 \+ b! J* sperform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination* L% i5 Q8 V8 _5 M7 b& y DISN Defense Information System Network (DISA term).6 a( X) M$ Q' [) ?6 o+ Z DISSP Defense-wide Information Systems Security Program. 6 K, p& t( E: j* _ |5 f7 XDISUM Daily Intelligence Summary (JFACC term). 4 t5 C5 D" Q7 MDITDS Defense Intelligence Threat Data System.: O- @( n$ o; {/ k DITP Discriminating Interceptor Technology Program. The objective of DITP is the( D8 f( x1 _% r development of advanced interceptor seekers to counter advanced threats.2 M! }; t$ u' Z DITP will integrate passive and active sensors into an interceptor seeker that! d4 Z: A) q0 \ integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP7 p0 e6 Z5 g% n3 U6 g flight demonstrations will involve the tracking and interceptor on-board : i/ \( Z; Q% e3 Mdiscrimination of targets of opportunity while providing fusion processor data 3 m( {; R4 p9 X3 B% u: M! Z' |telemetry. (See also ASTP). 6 ~$ B& l3 x4 f# M' K' ^; DDIVARTY Division Artillery (US Army term)./ x; T5 R% i- D" D0 Z/ X7 g V DIW Defensive Information Warfare.2 n- q) Y- t; Q3 f; g DLA Defense Logistics Agency, Alexandria, VA. 1 |" V' ?: j" W5 @/ JDLSC Defense Logistics Services Center (Battle Creek, MI).. U# j$ H) Z/ f7 t% n3 W: T DM Data Management0 ^4 K+ I2 P. }8 T( |: L1 n5 x2 P DMA Defense Mapping Agency, Fairfax, VA. 1 ^$ Q* V( |( C& @6 s# f1 T* |- I2 JDME Distributed Management Environment. p3 Y+ `" ], K {5 X, i6 t& W8 |DMI Dual-Mode Interceptor. ( D; f- A j( Y/ i# I; N6 o/ U DMDA GLOSSARY, VER. 4.0 D ! d/ x( E3 w7 F6 g s' k) Y: {82 . A: C& W a, R1 {DMRD Defense Management Review Decision./ b/ S! E6 C6 n- _- p6 u DMS (1) Defense Message System.2 s- e: ?. r" T) c! F# S4 A( R4 q (2) Dissimilar Mission Simulator. $ @; r3 @% z+ @* `( Q0 NDMSO Defense Modeling and Simulation Office (OSD).* j0 g! f3 o5 P- k$ I& M: S DMSP Defense Meteorological Satellite Program. 4 n0 ? X9 B1 ~0 M) aDMU Disk Memory Unit." Q& ?3 O' s8 X/ F9 |5 A& I DNA Defense Nuclear Agency, Alexandria, VA.( ~, L( c! ?8 P DNMS Distributed Network Management System. 7 l# U* H/ R: c. b( aDNSIX DoDIIS Network Security Information Exchange , P/ ?; {% m; _" b' p' C* H% w" FDNSO Defense Network Systems Organization.8 Y, b) h( m6 N! j DO The lowest rating under the DPAS. All “DO” orders take preference over unrated9 t! u2 R$ M$ O/ I8 ^% |) V' o( B$ \ orders to meet a required delivery date." E) n8 f5 P8 C$ ~; a+ P Doc Document- t0 j, |7 K. d5 M' j3 O DOCPREP Documentation Preparation. / L1 w6 J7 P& D3 `# f6 n+ ?$ |% }Doctrine Fundamental principles by which the military forces or elements thereof guide& m: G! h' f: } their actions in support of national objectives. It is authoritative but requires# U- B5 E. T0 w& ] f judgment in the application. See also Combined Doctrine. 5 w: j, O' H& }DoD Department of Defense2 a& E: K( X( E6 _- t3 k1 k DoD Component 8 |7 F( E/ l8 wAcquisition! d' i) @, F3 V6 l T6 k8 m Executive' C+ e+ ^8 `, B. m A single official within a DoD Component who is responsible for all acquisition ; W J7 d" E, G& Vfunctions within that Component. This includes Service Acquisition Executives, R Y7 D/ l9 P5 X+ A# | for the Military Departments and Acquisition Executives in other DoD6 G. y1 ^3 Z& s$ c+ N Components who have acquisition management responsibilities. a l; h# r7 J+ u }5 _* F, f DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, * J9 u7 F1 ?0 \Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the4 F) Y& |7 j8 Y: d. @; G: C0 x& w! } Defense Agencies; and DoD Field Activities.& ~9 R4 I. M' ~8 ]- v8 v DoDD DoD Directive. E5 X. |/ H& F# nDoD Directive9 V& T' Y! f4 G8 e( D 5000.1 9 }! n3 N: i9 j8 |, ? f“Defense Acquisition.” The principal DoD directive on acquisition. It establishes F5 N7 l6 L: o1 e3 [1 _ policies, practices and procedures of governing the acquisition of defense + K4 F; \" }% B7 C* {acquisition programs. ?! V3 Y8 n& t& z7 E+ a DoDI DoD Instruction. / l2 C2 z7 N, o2 t9 ?( ]DoD Instruction8 d, p4 W0 D$ A K 5000.2" U7 o3 p4 v, f% {( R “Defense Acquisition Management Policies and Procedures.” Implements DODD A+ a% R# C8 |5000.1.$ q: S0 z8 ~! ^( }2 v& J0 K" m DoDIIS DoD Intelligence Information System.) T# ~! ^8 {2 {& w8 h) g/ X9 o DoDISS DoD Index of Specifications and Standards. 0 u7 c+ Y, [/ \' l% G3 N3 pDoD-M DoD Manual. : s, K& k" l2 u1 gMDA GLOSSARY, VER. 4.0 D $ } i$ d: V2 _( ^$ d6 {833 s2 ~' `+ C! i& P. B( f' J# w. D3 Y* e DoDR Department of Defense Regulation. K Y# b2 C1 g8 w# N ZDOD-STD Department of Defense Standard.7 h" D; I# f# H6 B8 a+ \/ | DoE Department of Energy.) k$ }+ B0 [2 N7 m: ` DOF Degrees of Freedom.0 K! [& m% z- y2 X4 O0 K% a Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system % p" m) v; k; a1 q4 h( G9 xhaving a detection range of approximately 3000 km. It is believed to provide 6 M) G! v R# g! @+ nbattle management for the totality of Moscow defenses.) F& c1 W! D, v# u h! ^1 A DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).3 M+ N; @' U& x* _. w DOPAA Description of Proposed Actions and Alternative (environmental term). 4 e! x6 a8 N, I4 hDoppler Effect The phenomenon evidenced by the change in the observed frequency of a . I# N; T' A/ j' c, N% Xsound or radio wave caused by a time rate of change in the effective length of9 Y( H6 U) K: J+ d3 w; o the path of travel between the source and the point of observation. 8 l2 F" Q" {0 S* y$ D5 o( K) JDoS Department of State (US)./ E; u8 e6 A p; V/ `1 V DOS Disk Operating System (TelComm/Computer term). - C* F4 ~; ^* Q1 n3 F) cDoT Department of Transportation [US].1 r8 C" N- |' E) ? DOT Designated Optical Tracker.8 N) H) M: K! H7 M3 q DOT&E Director, Operational Test & Evaluation. 3 ~5 F2 K2 Q3 }) \6 d1 b! Y- fDOTH Defense of the Homeland.0 v7 Z9 B. H% H9 o( `% `' a0 p Down Select To reduce the number of contractors working on a program by eliminating one or1 n. m, u# }" b t! Z& u, I more for the next phase. % a* D& Q$ |7 d$ q+ h+ M8 J2 Q3 Q/ s) SDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.& B) H M; U! M+ g DPA Defense Production Act. ' M5 k a! O5 U" p1 BDPA&E Director, Program Analysis and Evaluation.( ^ n1 P- s6 D( I4 d DPAS Defense Priority and Allocation System.6 |" n3 @* W1 k5 P: r% P4 k DPAT Dynamic Program Analysis Tool.( O: o, D, y i+ i' C8 @! h+ { DPB Defense Policy Board. - N1 h! Q) U1 {4 x2 m o! `8 NDPG Defense Planning Guidance. 6 E, P; [. x% MDPM Deputy Program Manager. 5 T# Z) Z- {6 c* e+ `* f0 ]DPML Deputy Program Manager for Logistics + d; |0 ]9 E9 N1 N \8 B. P5 }DPP Distributed and Parallel Processing (Computer term).1 p4 E# A* M+ m& `( j DPR Defense Performance Review. 7 t4 t" \1 G5 r! [0 VMDA GLOSSARY, VER. 4.0 D" M, J1 M7 u. f 84, |5 U* j6 m1 w% i" p' a. s, @ DPRB See Defense Planning and Resources Board.+ N6 g: O# i8 O2 ]# P* Y DPRK Democratic People’s Republic of Korea (North Korea).9 y: O3 }* |8 t+ X. l/ J DPRO Defense Plant Representatives Office. ) {9 ~( Z, A! }* CDPSSL Diode-Pumped Solid State Laser. [+ n: _+ H1 o1 {, UDR Deployment Review. 1 C+ m8 `9 g& _DRAM Dynamic Random Access Memory.5 I; O) m7 b |# ^; j) [1 C4 V Draw-down Curve A method used to encapsulate the overall performance of a BMD system that % E0 U: E! W o! B `plots the probability of survival on the vertical axis versus the number of attacking # | Q5 \9 [& tRVs on the horizontal axis. Used in conjunction with attack price, they are the 1 a3 u$ V$ Z; ^( h% H3 Hmost important expressions of a BMD capability.$ h) o+ A+ l0 x- I5 G DRB Defense Resources Board.1 ^9 W2 ~) j% m8 X# O DREN Defense Research and Engineering Network.6 \) w6 [- \9 _ DRFP Draft Request for Proposal. $ \) m7 I5 X, M3 r/ }Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from8 D. ]: M7 [4 |$ Z$ X gravitational and atmospherically induced torques on the spinning projectile. 1 b; b; _/ u9 [$ b. x2 wDRM DAB Readiness Meeting (DD 5000.2 term). 7 U: b( S; @8 \' M4 x- g+ uDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also* J! h; Q) k6 {, P Remotely Piloted Vehicle." U n# g+ I! ]& @) j6 ^" }( Z& U4 Q DRP (1) Deployment Readiness Plan (US Army term).1 N4 \ [+ x9 w! d4 I* K5 Y (2) Deployment Readiness Program. " F6 c! K9 B$ O( c! J" ]4 `" k+ w3 TDRR Digital Receiver Replacement (USN term).$ J: U' ~6 O* i. e DS Deep Space. . X4 J) ^: a1 ^1 FDS-1 Category of telecommunications circuit capability.7 t8 J% [; J0 Z5 j( K+ l DS-3 LAN Category of telecommunications circuit for a Local Area Network. 2 P) Q0 l) ]+ s( I$ a' F8 ^: HDSAA Defense Security Assistance Agency (OSD). , ^ S: x) Z- L) z/ T$ f) V0 hDSAT Defense Satellite Weapon. 3 I& k6 V# f' S) \+ G/ c7 M9 J) ]DSB Defense Science Board.+ s2 s K0 c5 f DSCS Defense Satellite Communications Systems. ' `; J6 W8 x' t+ S, n) S1 _DSCS-3 Defense Satellite Communications System Three. 2 n' R# ]- F0 y+ ~$ E/ }DSCSOC Defense Satellite Communications System Ops Center. 1 R& I) J& C" C$ Z2 _DSI Defense Simulation Internet6 ]9 b$ D! Z9 E ?6 ^5 ~ MDA GLOSSARY, VER. 4.0 D * l* W9 k; R5 v1 ?3 L858 c* w! t( t% r% |- O DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 9 M3 G4 [! F. s6 k: KSystem.8 E9 ^6 a4 t, B* T$ | DSM Decision Support Matrix # H x& I$ ?/ lDSMAC Digital Scene-Matching Area Correlation. ( g, o v# q" U4 S# gDSMC Defense Systems Management College. 3 @# G8 f9 ~8 B6 \) b" wDSN (1) Defense Switched Network (formerly AUTOVON).( Y) W( V! B* V+ A (2) Deep Space Network (NASA term). T3 ?; h" X1 g& y" lDSP (1) Defense Support Program. (2) Defense Standardization Program. ' ?# ^" }6 m! F5 P* aDSPRTM Defense Support Program Real-Time Model.& K% g! ~. h/ _; B DSR Data Set Ready (TelComm/Computer term). - _) e7 }. ~$ J7 k& p+ X) g; bDSRCE Down Scooped Radio Control Equipment (TelComms term)., `5 L% e- w9 f5 r7 W: i4 H8 L DSS (1) Defense Supply Service. (2) Digital Signature Standard.' _+ C* c, d! {. P' C DST Defense Suppression Threat.+ ?; _+ {5 q' \1 f5 O9 O# Y; F DSTAR Defense Strategic and Tactical Array Reproducibility.1 `% I& v; j1 t, I' y9 r- Q DSTO Defence Science Technology Organization (Australia).$ F4 Y; N+ y) L6 t3 } DSU Digital Service Unit (Telecomm/Computer term). & ]5 N" B) a- _& l) TDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to # I4 Z T2 F1 S0 n4 ethe DNA. 5 M+ Z" N K7 a8 @DT (1) Discrimination Technique.( @; s2 [5 X) q" J/ u (2) Development Testing. ' ?1 H& ?1 s. Z/ h1 X, l(3) See Development Test I, II, III.5 i* K6 F# M. f7 K: O5 I; p (4) Down Time (ILS term). 1 A% `, E; s/ c/ Y; @(5) Depressed Trajectory.9 m8 S! V3 m; {% j (6) Dedicated Target. 8 p* h; ^* G* [! v5 KDT&E Development Test and Evaluation. " Z) E" [, W5 k+ a4 tDT/OA Development Test/Operational Assessment.- p- H `8 ^2 B! S3 N( ^9 q DT/OT Developmental Test/Operational Test. / w% B# `: N8 v0 n0 |9 {DTAP Defense Technology Area Plan.$ `$ g, w) Y9 |* Q9 |0 m) c( A DTC Design-to-Cost. _; i; l8 X* B4 Q; @2 | DTD Digital Transfer Device (TelComm/Computer term).; N5 c0 o6 r3 C2 f+ a! m DTE Data Terminal Equipment (TelComm/Computer term). + Q) u/ m( V4 @6 XDTED Digital Terrain Elevation Data. / A; E$ s! _7 s5 y G1 z4 j/ q* N' FDTIC Defense Technical Information Center, Alexandria, VA. : L. T" f/ L0 W1 r! R BMDA GLOSSARY, VER. 4.0 D6 p2 I9 A+ [ P7 E+ U1 I7 N* y 866 y6 f- ~) }8 S DTIS Defense Technical Information Services (now DEIS).3 A% E! Z3 l# _! _ DTLCC Design to Life-Cycle Cost.; `3 Y1 A! G9 [/ h" l8 ]+ D DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL6 p8 U& c6 C; v term).2 i1 J# M( D7 c9 j$ H( O DTLS Descriptive Top-Level Specification.' e9 z# A. ?1 _8 J4 m6 h DTMF Data Tone Multiple Frequency (TelComm/Computer term).; U; e0 n, G9 S DTO Defense Technology Objectives.' o3 h, t T4 @+ C DTOC Division Tactical Operations Center.+ C" |% x" l+ B9 K1 [ DTR (1) Demonstration Test Round. (2) Development Test Round. # `. D) Y9 Z" JDTRM Dual Thrust Rocket Motor.* d$ q8 S7 P: S6 K9 }9 @- ?" H$ g! c DTSA Defense Technology Security Administration. 5 q9 x7 h' X% t9 N5 q8 ?+ qDTSE&E Director, Test Systems Engineering and Evaluation. 4 I: c4 c% a/ Z% fDTST Defensive Technologies Study Team.9 P! ^4 U: H/ v7 [$ N! v DTT Design-To Threat ( Y( c+ V# K5 o( i8 NDTWT Dual Traveling Wave Tube (Electronics Engineering term). ) e s. D& k4 {+ _$ ]$ WDU Depleted Uranium.# d9 ?9 a. d, I3 I$ b. z DUA Design Upgrade Assessment. $ Q+ S* J0 f: x; VDual Source Two contractors producing the same components or end items for the same1 k# H, [" M @* B- T program.( s$ V, b3 R- N7 \ DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). H; Y) O: v! P& N& U6 U+ i% l4 DDURIP Defense University Research Instrumentation Program.5 s* v0 X; c. Y DUSD Deputy Under Secretary of Defense.; r( z3 M6 l5 @% x& a DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).; k1 c6 B4 t ^% f6 S DVAL Demonstration Validation. 8 |. S3 T6 A! r& uDX The highest rating under the DPAS. It takes preference over all other rated and ( a5 D. \7 o+ x; |2 O1 H5 \* Hnot rated orders on a contractor’s production line. The BMD program carries a ! D; r* q# C+ s/ J# w4 m/ X' ^“DX” rating.+ l9 r9 z, ~. I' {1 b MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 / _$ X" s8 D/ s2 ]; yE East1 F+ _7 O/ i8 P' S E2 I See Endo-Exoatmospheric Interceptor.* P {! G% I& ` E2SRD Effectively Two-System Requirement Document./ {4 x) d3 x* w+ X" o* Z E3 (1) Electromagnetic Environmental Effects.6 i/ P" \" j' A (2) Electrical, Electronic, and Electromechanical.3 @# x0 T, V- I E Spec Materiel Specification. 7 a. o! w' m2 L- \6 P, bEA (1) Environmental Assessment.9 @8 e( k. f8 }6 e4 U" ^) {+ R (2) Engagement Authorization. 9 _3 o. a, x1 p* c1 _0 |(3) Executing Agent./ J/ Q* H' D6 f, n9 m! k, A (4) Evolutionary Acquisition. / r# Z6 ]/ U6 ], G8 N( j) p* A- ~0 w* h(5) Environmental Analysis (environmental term).1 n$ B. h9 X. k& U4 Y (6) Executive Agent.8 a( ~/ i, t: i6 _! S EAC Estimated Cost at Completion. : P7 c9 F3 u9 h0 n+ wEAD (1) Engineering Analysis and Design. (2) Extended air defense. ' h1 `, Z% `* KEAD/D Engineering, Analysis, Design and Development. ) g. ^. i7 b0 v: o- |EADSIM Extended Air Defense Simulation. U, g0 ?; M; A5 Q+ C# BEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing ; o8 u0 k% w8 R( ?, x* Iusers to model military response to airborne and ballistic missile threats. . e- a8 L) p R& NEADTBP Extended Air Defense Test Bed Program.+ f8 M& `. T! }7 N# b% X EAGLE Extended Airborne Global Launch Evaluator. # g4 T5 l' t% J* i& ^EAM Emergency Action Message. " o5 O8 u( f7 GEAR Export Administration Regulations.% B) A. Q1 L$ Z$ u [0 M Early Operational$ M$ x# a9 ]1 `5 `5 \ Assessment0 k/ M! q8 j& M% w An operational assessment conducted prior to, or in support of, Milestone II.7 y& m7 \( B' S `! N3 H Early User Test" _$ {& O% @: E7 ]- p (EUT) : W. I- B' `+ A" I% ?& Q4 sA test employing representative users to examine materiel concepts, training or/ y7 u0 j! O9 ~# Q& f- [ logistics planning, or inter-operability issues. EUT can be accomplished during0 }) s; v& ], ^* [1 t5 q DEM/VAL on brassboard configurations, experimental prototypes, or surrogates% _% j/ G R( Z5 h) w' H; ^% U) [: l to provide data leading to the decision to enter full-scale development. 8 b! J2 I! C! zEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of * j8 x" e9 N: {; d# L+ W' M1 j& W, nsurveillance satellites and long range radar. * m4 ?6 X& g+ K/ z2 a) L' ?(2) Early notification of the launch or approach of unknown weapons or - G# a6 ^7 ], n( `weapon carriers. / y; t; D+ c8 |5 c- XEarth Limb The apparent outer edge of the earth as viewed from space.9 p5 o" y% Q% n1 B7 o3 M0 m Eastern Test+ n& I- l: _% Y! @' B$ d7 b* ] Range (ETR)! r w: |; w" P, j9 g Beginning at Patrick AFB, FL, this range stretches halfway around the globe( [/ s$ A/ ]# S where it meets the Western Test Range. An array of launch complexes, sensors," D6 G: b. C% z# r and tracking sites make up the Eastern Test Range. The ETR is now operated % p: I2 I s# e. |8 w" U& Sby AFSPACECOM as shown in WTR definition. 1 u2 H ]4 @% B( p# x" W$ @MDA GLOSSARY, VER. 4.0 E , L6 m5 ~* A; [* |88 , j. }- K$ B" t- q e) D8 YEB (1) Electron Beam. (2) Enhanced Blast. 2 y. w5 D ]1 U5 D% _EBB Electronic Bulletin Board.' S6 u; }% N. ?$ d EBCDIC Extended Binary Code Decimal Interchange Code. 4 e. I! ]5 T% w( ^* Q N3 H4 k- d' VEBW Electron Beam Welding.7 W1 H( I! L- J# j5 R. K) x EC (1) Electronic Combat. 8 h4 ]9 ~2 h6 a(2) Error Control.7 l5 j* @ b8 ^; P; x' A9 r (3) OBSOLETE. European Community. Now known as the European Union 7 k. `: V% l9 Z" M5 S% q(EU)." i; t4 d; w0 j- _ Y& X EC/EDI Electronic Commerce/Electronic Data Interchange. N) O' n0 O- G- x! c* n9 J9 X; S ECAC Electromagnetic Compatibility Analysis Center. ! E' C8 ^* R6 |/ p L! Q9 EECB Engineering Change Board. ' |" C! |0 a* l3 N4 X m3 ^: A& LECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 7 J- _! A7 c, E% x3 xECCM Electronic Counter-Countermeasures.* _2 b1 v6 o v) Z" o ECDs Element Control Directives. / ~9 L- k0 n7 N- I4 SECLS ERINT Command and Launch System.# c- p; q4 [. g, G ECM Electronic Countermeasures.5 }8 @3 v! Y7 K+ R4 P$ `; C$ d ECN Engineering Change Notice. $ y; @/ A z0 _: B, RECO Engagement Control Orders. 4 v2 F8 n+ T; r- v+ LECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. # x3 _- e6 J. E$ E% M) @4 NECPMO Electronic Commerce Program Management Office. }! j1 H& z- B% G4 w9 O/ L ECS Engagement Control Station (PATRIOT). + G7 u' l8 Y6 Q7 m5 W7 v6 dECU Environmental Control Unit.$ z% X# W2 c. u7 D- A% c EDAC Error Detection and Correction8 J0 e; E/ i4 e5 m EDGES Electronic Data/Guidelines for Element Survivability. 4 `- g5 P9 y CEDL Electrical Discharge Laser8 P- x! `& `% A1 M" W" u EDM Engineering Development Model., N$ M2 G* w; {* K5 w EDP Engineering Development Process - L+ }$ y! R+ Q3 l, ZEDR Embedded Data Recorder (PATRIOT). K4 v4 J) ~1 M* i, \ EDS Electronic Data Systems Corporation 8 O" q5 O1 m: j; ^, cEDWA Engagement Determination and Weapons Assignment (PATRIOT).; J& V9 m' E# Q' D) g. O MDA GLOSSARY, VER. 4.0 E" x& E- J! I1 p1 H+ N) H9 U. o 89 : x5 [9 X% ~: L& TEDX Exoatmospheric Discrimination Experiment ' U w) i. Q6 nEE (1) Electrical Engineering. (2) Engineering Estimate. % T; q" H. J9 B& x& A0 yEED Electro-Explosive Device. 0 W* G3 w# O* G2 H& l) IEEEV End-to-End Experimental Version. ) f# J+ J9 [. mEEFI Essential Elements of Friendly Information.+ j$ U$ X0 Y, y$ ~9 R+ t EEI Essential Elements of Information.& ]; }5 U' \! E3 @/ P6 d5 g, T4 Z: P EEIC Element of Expense Investment Code. $ b4 I( E; C# iEELV Evolved Expendable Launch Vehicle (USAF term) 6 N" i* z; ?7 u8 o# w( E, R) TEEU Electronic Equipment Unit.) Y# I: V) P! h, m/ ` EFEX Endo-Aeromechanics Flight Experiment.+ |' m3 }" n6 m8 | EFF Electronic Frontier Foundation.. ?; ^' b) H. I Effectivity A designation given to the BMDS configuration and demonstrated capability at & j! W% t) K& P( ea point in time, becoming effective at each increment when an element or' K+ N/ G0 B! ]% G component is inserted into a particular Block. 1 ^. ~" H4 l v; oEffective Damage That damage necessary to render a target element inoperative, unserviceable, ! } _! r# S4 A" Lnonproductive, or uninhabitable. , B% O! q9 Z( E8 ]8 ^Effluent Plume The pathway of movement of effluents through surface water or air.* ?; p4 z2 q, m7 [; E EFP Explosively Formed Projectile." d0 M# R- Z7 y- n% n! D EGP End Game Processor. . C0 `+ \: W8 dEGTR Eglin [AFB] Gulf Test Range. $ T& P. E0 t8 z6 ^) U* C, M8 J. fEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). * l+ ?3 A5 Z$ K) Z& TEHF Extremely High Frequency." g* `% K* i2 r ehp Equivalent Horsepower. / X2 M5 w/ ~* K9 ^! o6 ^* y; OEIA (1) Environmental Impact Assessment.# ^/ H! ?( [- V6 A% t3 M (2) Electronic Industries Association.) n% r$ i& n* s9 c EIAP Environmental Impact Analysis Process./ w" L1 s+ S/ p0 A* H# k EIP Exoatmospheric Interceptor Propulsion.) }" B r) a% X2 d$ {2 g8 P( l EIPC Electronic Information Privacy Center. : c5 G3 n2 [' e1 KEIPT (1) Element IPT. (2) Engineering IPT.: }* W: e& e- F. x EIS (1) Environmental Impact Statement. (2) Explosive Initiation System. 2 N$ b% f/ v3 m, Q% J5 }: ?1 j" xEISA Extended Industry Standard Architecture (Telecomm/Computer term). , Y: X4 n8 ]- r; c2 EMDA GLOSSARY, VER. 4.0 E0 ?; N* C! c5 A- U, `1 t 90/ K" Y9 N/ J* [# l EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. 0 S" j, g T& h. e" |5 xElastic Range The stress range in which a material will recover its original form when the force / r3 Q0 Z5 D: t9 J- q, p(or loading) is removed. Elastic deformation refers to dimensional changes3 }+ h4 b- f# c+ b6 ^5 F occurring within the elastic range. # O- c- D( V) Z S* ^" |% P1 kElectro-Optics' ~. f' f& z/ ]6 G/ W0 v Infrared (EO/IR) # j+ k8 |6 Q8 N/ L- A2 ]; f, STechnologies/techniques employed by optical sensors in the wavelength ; P1 T* Z7 @, w9 [; N: dspectrum slightly longer than visible but shorter than radio. 7 L+ M$ j# e5 V$ {* D5 T# kElectromagnetic* H3 [2 ~ b- {8 f: @ Compatibility- ?7 f# ~* N, Y( N (EMC) ^0 x2 u, `1 U- \2 b A condition when all electromagnetic emissions from electronic, electro-magnetic,* D3 |% v7 t7 P; ? and electro-optical components of a system interact without interfering with one$ G" m& P2 ^9 e+ o+ e2 U another. " U; E% Z: @/ Y3 r5 d% ?% M7 lElectromagnetic + ~5 g6 H) \: q( c. S' ?( qEmanations, q4 F( X, W9 g Signals transmitted as radiation through the air, through a vacuum, or through n# B# e* }) K- X9 Aconductors.* h8 z; O$ _% I. U9 J' m" m. L0 K/ k Electromagnetic1 E& y0 b* H7 U x5 u+ p Field (EMF)9 k. `' s' C% u! B1 N" s" z8 J An electric or magnetic field or combination of the two, as in an electromagnetic , s6 r X5 k9 [* [1 bwave. Created by electric charges in motion, having both electric and magnetic9 d8 P0 i) k+ Z0 L% o. P |6 V% ?8 H components oriented at right angles to one another and containing a definite ' L: U% `: |0 u# k4 w8 jamount of energy.& k2 h" N5 X1 V4 {6 E A- t" m8 y* C Electromagnetic; }! F3 _4 x9 _; k8 t Gun (EMG)/ [8 y) E8 r9 N A gun in which the projectile is accelerated by electromagnetic forces rather than 7 j/ }8 D5 e9 Z; h8 C9 j$ Nby an explosion, as in a conventional gun. " D/ C' I1 \6 X p, mElectromagnetic) l3 p9 {2 p0 h2 |7 \ Interference (EMI)+ F2 @0 I7 i" F" x Any electromagnetic disturbance that interrupts, obstructs, or otherwise % K9 O% J) ~) |% d. ]+ a% f D/ jdegrades or limits the effective performance of electronics/electrical equipment.- v% h) e8 D6 B! Q* K' M It can be induced intentionally, as in some forms of electronic warfare, or # G4 f& E+ U- v" Bunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. * _. b. ]# [4 B* i3 ^/ J! oElectromagnetic * e1 n2 d4 i! v7 {3 E" t RPulse (EMP) 4 u2 y$ ^; c0 u; h RThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of j; V; X7 n2 G6 c7 `. Kthe nuclear device or in a surrounding medium. The resulting electric and/ @; @0 X( F5 K% o magnetic fields may couple with electrical/electronic systems to produce3 q% R+ L0 H% J" I n damaging current and voltage surges. May also be caused by non-nuclear( g: c J. a" K& n5 b means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic2 Y' w# y8 E. S1 a Radiation (EMR) 5 b. h/ A1 Z( O. w; n( I _(1) A form of propagated energy, arising from electric charges in motion that - h( J6 P* c/ _ \8 Cproduces a simultaneous wavelike variation of electric and magnetic ; G3 Y$ \# d3 d8 M: pfields in space. The highest frequencies (or shortest wavelengths) of# f4 ^5 E6 n& {! n+ z$ x" U such radiation are possessed by gamma rays, which originate from) F X% w; p: i5 k0 k7 Y# h# t processes within atomic nuclei. As one goes to lower frequencies, the2 K; C- q4 X# [+ ]; l3 q- F& c electromagnetic spectrum includes x-rays, ultraviolet light, visible light,$ F9 F' `: a/ x9 g; l infrared light, microwaves, and radio waves. 8 _: P4 w4 q& _4 v7 I3 z% [# M' [8 S7 m6 K4 h(2) Radiation made up of oscillating electric and magnetic fields and j: |& H. P; L/ }: Q2 ~9 Apropagated with the speed of light. Includes gamma radiation, X-rays," y* O' z' n- Z ultraviolet, visible, and infrared radiation, and radar and radio waves.& f* l0 ~1 J5 K+ T# P8 p- ? Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices , q! X7 _0 C6 \) c- Hused in system/subsystem design, excluding employment in the RF spectrum.4 v6 @& l+ }4 s# D) c Electromagnetic) u. y$ v) o6 m% r" t: e. G Spectrum * L7 B3 G: V8 q2 F) Q# `The range of frequencies of electromagnetic radiation from zero to infinity. It is6 J' ~. {* B- E! a2 i* n divided into 26 alphabetically designated bands. & u/ d. J7 }! _2 TMDA GLOSSARY, VER. 4.0 E 3 Z8 ]3 C/ H5 n5 k% J# p& \3 l4 `91 3 m& \$ X! v7 G. [& N, qElectronic$ f8 a3 Q1 n G1 } Counter- ; v8 E5 T2 k( ]% ?9 PCountermeasure 7 N/ [! S5 E0 v2 p2 Hs (ECCM)0 x5 D9 p, i, e- M' A, f That division of electronic warfare involving actions taken to insure friendly$ W; z8 d0 h% K6 x effective use of the electromagnetic, optical, and acoustic spectra despite the1 r+ p3 X, c0 x5 F enemy’s use of electronic warfare to include high power microwave techniques. 8 [; U! {* Q; D) t7 ~* W6 L' q& n% |, {Electronic" y& B' Y6 S& L' k$ i( Q* [ Countermeasure) k+ e- t; X8 x: Z9 V" B (ECM) : J6 N' g5 c7 GThat division of electronic warfare involving actions taken to prevent or reduce an 4 T, x% U. }: x. K4 ienemy’s effective use of the electromagnetic spectrum. 9 m1 N* x+ v6 I* W, w/ bElectronic7 v" b4 B: n4 w Industries }' Y4 x ]- g& c8 K/ l$ ~( BAssociation (EIA)& t/ X5 {- o& [- `2 Y4 { A standards organization specializing in the electrical and functional+ u# T* ?4 s1 d: V, g1 i: h characteristics of interface equipment.$ b7 {, s# H9 S% x Electronic+ h# @7 q0 v% h5 P. b* ^5 ~ Warfare (EW) ! {2 G8 [0 e3 y5 RAny military activity involving the use of electromagnetic and directed energy to( V. q- H: w1 a control the electromagnetic spectrum or to attack the enemy. The three major ' l8 e* }* I% i5 P* Q( isubdivisions are: - K% q5 k& K" G5 |9 G3 x" A+ e. Z•Electronic attack – Involves the use of electromagnetic or directed energy to 1 |3 w$ h! G% Q+ \0 Q o, G3 Battack personnel, facilities, or equipment with the intent of degrading, . g, _) I. |, ]. N2 t4 lneutralizing, or destroying enemy combat capability. Also known as EA.! k- R, X( d- \% p( [- N# z Includes: 1) actions taken to prevent or reduce an enemy’s effective use of+ x: E+ {" l0 X$ L% @2 f the electromagnetic spectrum, such as jamming and electromagnetic% _$ l+ `3 D7 K( z. a4 W+ A deception, and 2) employment of weapons that use either electromagnetic or , l1 j6 A. W+ {! _directed energy as their primary destructive mechanism (lasers, radio. X, ^+ n- g g2 e$ A& l2 l8 |' S frequency weapons, particle beams).: b ^ J8 l/ o9 b1 m# l, c •Electronic protection -- Involves actions taken to protect personnel, facilities,& `& G2 a7 A2 |0 J and equipment from any effects of friendly or enemy employment of L2 [1 x; q3 m( belectronic warfare that degrade, neutralize, or destroy friendly combat7 Z; n, @0 S7 J( J capability. Also called EP., m3 ^4 m% u) X# P4 {% |/ M) Q9 w0 t7 s •Electronic warfare support – Involves actions tasked by, or under direct + R5 I7 e; f9 Econtrol of, an operational commander to search for, intercept, identify, and; |( s4 s9 n5 v/ \) ?1 h# @7 @ locate sources of intentional and unintentional radiated electromagnetic 8 s% k+ F* l& x% ]) A, g N" r9 E' }+ renergy for the purpose of immediate threat recognition. Thus, electronic8 o( d5 `* e# K) [ warfare support provides information required for immediate decisions/ Y5 y% f. D' ^! Y involving electronic warfare operations and other tactical actions such as 1 U& f8 r8 _6 F9 }2 {2 G4 vthreat avoidance, targeting, and homing. Also called ES. , T2 X, \5 N1 c; H/ mElectronic' n0 x: K4 V( t9 k1 I( t$ `; s Warfare (EW) 7 U3 [+ T2 M) Y/ N9 V1 K7 VEnvironments8 Y2 A/ Z: |" l5 h* g Electronic warfare environments result from radar and communications jamming 9 i6 Y6 P# B7 J! jand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD% a( [* Y; i- P1 K0 k4 c system. $ x" [$ e5 }6 a. k c; `5 ~$ qElectronics ; H9 }! L' }* y2 S3 T! ]) `Intelligence- K( {- h9 i8 ^. `# u) F (ELINT) D( P, d, v4 L' b8 |5 p. d* s* D/ YTechnical and geo-location intelligence derived from foreign non-communications+ n- F7 @. G8 J& W3 G electromagnetic radiations emanating from other than nuclear detonations or1 ]" ?- K9 X! R radioactive sources. " T% z# ]! i2 L. _2 Y6 Z! @Electronics8 u% @4 H+ b! h' x$ x& } Security (ELSEC) 8 [+ _1 o$ u4 k" h2 V Z4 @( ?The protection resulting from all measures designed to deny unauthorized - s `. R2 Z# epersons information of value that might be derived from their interception and, K X& B: U+ F5 r6 H study of non-communications electromagnetic radiations, e.g. radar. 3 y7 x |- h& k9 d5 @4 RElectro-Optics * ~; f" m) B/ }0 y m6 gInfrared (EO/IR) 7 \" r3 M: I+ Z4 b" O! S; S( i& D2 vTechnologies/techniques employed by optical sensors in the wavelength4 o8 j: q: R$ h spectrum slightly longer than visible but shorter than radio.% y: F9 @9 E: O+ |% r' q MDA GLOSSARY, VER. 4.0 E ! Q! h, _2 W& L: ^5 W: Y. m92 i$ j& ^' p. b4 z8 `Element A complete, integrated set of components capable of autonomously providing 2 v k! K/ p' m! O2 hBMDS capability. j2 {8 y+ O$ WElement" O0 j/ J% [0 g( K" V0 S5 l% M Capability " _4 H$ a% V* ]6 \4 x! CSpecification' c! v0 C1 M' n/ K" r0 ^ (ECS) " N. q* H+ ~1 b& J0 y. I8 [A document that identifies the element-level BMDS capabilities and ( G* W* `/ M" `: R3 gspecifications necessary to achieve the system capabilities identified in the SCS. u& n" s8 R1 y+ F6 J( E# e8 f The ECS further defines the SCS-apportioned mission/technical performance7 W5 y: i! D- \1 \. P capabilities and allocates these capabilities to the element’s components." _7 l; |: a4 F& M9 ^ ^ Element Control* y0 I4 L7 Y* D Directives (ECDs) & y6 D; l6 i. }$ i2 |* r2 l% E, gThe command and control data instructions to control the conduct of the. s$ B) `5 Z$ ~1 D. G+ y% N engagement. ECDs are developed by command and control software based * i, u: C- ]& K/ d; |" f: o n3 `upon variable parameter input by the operators (both pre-planned and real time),/ F' m R" D2 l8 z7 w K and operator defined rule sets embedded in the software. The individual battle ' ^, | y0 i5 r( B% Mmanagement processors use these instructions to accomplish the assigned tasks7 q1 S$ p: F: w! ` from the operations order. ECDs are contained within a Task and represent the6 D. m, r% `* V. D& X8 J4 }+ t form of parameter values that influence the resource management processes of 4 d' Q" B( L" k" F3 @8 {Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and 8 X; g8 j" K. D: CCommunications Management (CM). There will be numerous ECDs per Task. 4 H- Z% ?+ Y# a7 Y; ^& y% s/ q, G7 uElement- p& Q% x( P# _ q3 | Operations # L9 ]3 z' v& Z3 e: N6 lCenter (EOC) - {$ ^. `2 v: B f9 W$ WAn Air Force operations center, which operates and maintains a BMD weapon or ; k9 t( f( P/ b3 \- Wsensor suite. (USSPACECOM)7 g! j/ N1 a5 f ELF Extremely Low Frequency.: n# U( N# J+ e8 s ELIAS Earth Limb Infrared Atomic Structure. 1 l6 V3 ]: p2 f" H/ ^1 u1 ~ELINFOSEC Electronic Information Security. 6 |$ g; S% w: q n/ `" ?$ I4 RELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-7-3 13:01 , Processed in 0.050003 second(s), 10 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部