航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ! J: }8 S3 ^3 B9 C! j' X$ d% c0 KCOMSEC Communications Security.' m0 u! W) M6 J1 Y9 p7 W0 [0 D6 ? Concept ' W$ y+ {8 M, L9 _Exploration &( }( Q5 {1 @% ~) W6 { Definition 6 i/ {, U% z/ _# {The initial phase (Phase 0) of the system acquisition process, beginning at# s* m+ A# D K ?5 \ Mission Need Determination. During this phase, the acquisition strategy is , Y; m( v( Q' U% M2 |2 q& P# |developed, system alternatives are proposed and examined, and the system+ N( T$ K9 i1 ~5 C program requirements document is expanded to support subsequent phases. 3 ]2 ?3 T0 I9 N9 H6 MConcept of& t" k$ H- ]) P) s7 M: Q+ i Operations , j& S9 r: p U) x# K5 g$ h(CONOPS) 7 p/ }0 J5 i3 v7 m; U) N1 e(1) A statement, in broad outline, of a commander’s outline or intent in regard to " O' K4 b1 f9 p* }# {) |8 Jan operation or series of operations. The concept is designed to give an overall / h) i: P9 K( @8 t+ C/ z( R$ opicture of the operation. (MDA Lexicon)9 [. m4 h) X5 E/ ` (2) A verbal or graphic statement, in broad outline, of a commander’s 1 ]! Y5 Q* y9 O+ x- F" g R% uassumptions or intent in regard to an operation or series of operations. The % w3 |4 G$ W7 z. d0 Q4 Y5 [) Q/ Mconcept of operations frequently is embodied in campaign plans and operation 9 w3 W: R% C3 t1 T* O5 `& wplans; in the later case, particularly when the plans cover a series of connected 3 w+ ]1 [ B' e. voperations to be carried out simultaneously or in succession. The concept is |( V& s# Z$ mdesigned to give an overall picture of the operation. It is included primarily for+ W! ?& X9 F/ W* D. q) N1 I3 I additional clarity of purpose. ' l" u' n. B: M# W2 k! g4 JConcept Plan An operation plan in concept format. Also called CONPLAN.3 J# |8 x& {+ J9 Q4 | Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of3 [/ g4 V% a6 [, t: d0 N the acquisition process, or combines development T&E with operational T&E.) N, M: [! B# M) l7 ]* s& k Concurrent% j6 T8 b Y$ X& d2 E Engineering4 ^! f; i; v; F+ X3 C/ t) u& H A systematic approach to the integrated, simultaneous design of products and$ {+ I; W+ M% h( @; O6 ? their related processes, including manufacture and support. This approach is" O5 x$ H3 a U) z9 r# v! v$ [; g intended to cause developers, from the beginning, to consider all elements of 8 ^/ Q( j! {: A; \+ [0 bthe system life cycle from requirements development through dispersal, including O7 A8 d a8 E* S- s8 w9 r% bcost, schedule, and performance. 7 L8 v1 t8 q/ zCONEX CONOPS Exerciser. # u" d. e0 M m8 y% ]! j* X X- ZConfiguration A collection of an item’s descriptive and governing characteristics, which can be, ~0 _. A' W' N! ~ expressed in functional terms (i.e., what performance the item is expected to" Y% v9 U9 S+ x achieve); and in physical terms (i.e., what the item should look like and consist of 9 |/ P- ?7 V) p: q# swhen it is built). 0 w0 m% O' N2 h+ XMDA GLOSSARY, VER. 4.0 C & R; w2 q9 e E/ }6 j598 j, C. a9 q( G b Configuration / \9 ^$ ?/ \ b9 x' ~, vAudit) j) d$ `! Z4 _ h4 D One of the Configuration Management tasks which includes a functional 6 z% Q+ Q4 X9 s a u5 X3 econfiguration audit (FCA) to validate that the development of a configuration item& p- y" t# ?% `/ A. \2 e+ R has been completed satisfactorily and that the configuration item has achieved' b6 `, \7 O# V* u# B3 F to specified performance and functional characteristics, and also includes a H9 C8 x$ J/ }) Gphysical configuration audit (PCA) to verify that the configuration item “As Built”0 D$ x w! H+ _ conforms to the technical documentation which defines the configuration item. 1 o \. Y% W9 W" K. q2 {Configuration 6 B0 q4 \9 ~# U/ s: ~& MBaseline! T+ N* r6 A! k The configuration documentation formally designated by the Government at a f' q0 r/ o! z: ]. o specific time during a system’s or configuration item’s life cycle. Configuration) s; v! l9 I `1 S baselines, plus approved changes from those baselines, constitute the current 3 }9 G1 f; I) m8 ?) g- S% Vconfiguration baselines, namely the functional, allocated, and product baselines." j/ _5 [9 o# Z8 R Configuration 5 `5 `( c) U, Z, g. P0 Q o% eControl : a. s I& ]; U% O i! W. H) iOne of the Configuration Management tasks that involves the systematic' U1 |. c' }9 `- [2 p/ h, O0 ?5 P evaluation, coordination, approval, or disapproval of proposed changes to the 0 e# c( l# d3 I! X# N. Jdesign and construction of a configuration item whose configuration has been0 x4 ]0 [' h& f0 K& }# P$ m f formally approved. 3 Y0 ?! V4 _- }* [' T- g8 S fConfiguration8 k2 m/ x8 v# N6 J* ]8 F7 g Identification & I+ m2 X; d, XOne of the Configuration Management tasks, which require that for every 2 D/ ` U: n7 }0 r. wchange that is made to an Automated Data processing (ADP) system, the design, I. h. e6 g r, m. s! S2 } and requirements of the changed version of the system should be identified." ?2 W. e6 N3 E9 r# u/ h Configuration* |& w' [9 R8 O& T! @0 ` Item (CI) * B# C$ Z& _. _1 @0 j FAn aggregation of system elements that satisfies an end use function and is; }0 o o* c% t6 i designated by the Government for separate configuration management.) H7 ~* F5 u& l- h3 z) p A Configuration items vary widely in complexity, size, and type. Any item required2 n* a; M2 E5 Z5 J3 l for logistic support and designated for separate procurement is a configuration 8 X* S3 [0 U2 A% D# J; Qitem. Configuration items are traceable to the work breakdown structure (WBS). # j h6 r2 I b; i& P+ j5 |Configuration* \4 x& x. L$ q6 I" g Management8 A( f6 e6 d9 M: N- _( k, w5 \ (CM)/ d+ N1 s1 @& X4 H0 W In computer modeling and simulation, a discipline applying technical and * s$ p, v/ l) ?' L/ |" Tadministrative oversight and control to identify and document the functional, T- j0 j. B% Q7 @ requirements and capabilities of a model or simulation and its supporting 7 a5 O, x9 u- z4 odatabases, control changes to those capabilities, and document and report the ) y; t- \3 A; f( Z+ Q5 g: mchanges. See also Accreditation. 5 E% _5 C1 _ ?+ D; E3 u1 \CONOPS Concept of Operations.; d. u8 d3 N( U% [: q2 `: t5 x CONPLAN Concept Plan , a `( N Q; S! |+ kCONS Contracting Squadron.9 V' s! c. G8 e I0 }, S7 ~/ V; `! P2 s Consolidated f3 E9 N1 t" B" N+ ^, G# w Command Center/ ?" ?. f' k3 r( f& f (CCC)2 I) Z- k' K6 i$ a6 c, E A single command center from which USCINCSPACE/CINCNORAD can direct all: n8 M5 [ d' K/ o his assigned missions, to include BMD. (USSPACECOM) Located in Colorado, ~7 F# G) A% |0 ^5 Y3 N7 C Springs, CO.! |/ `$ ^9 I* X T' c( g Consolidated6 X: P8 Z4 n9 e0 a$ ]# B7 A: ] Intelligence% \# K2 H$ i' ]& E/ \6 x Watch (CIW)8 v7 I4 c) F5 \" i2 \, ]" [ A consolidation of intelligence watch functions within the Intelligence Operations1 T, [; [3 T" l% Z4 P3 f Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD3 ^1 p$ ~) X; J Aerospace Defense Intelligence Center (ADIC), and the Air Force Space % }3 \9 I! \8 Y( `: s4 HCommand Space Intelligence Element (SIE). ; U" n0 M" E3 _% BConsolidated 4 M& Z; K/ x" R1 _6 I S" P. OSpace 7 }3 v q) I5 fOperations# G0 t( B4 \( M. s+ m4 U Center (CSOC) 6 I5 A8 l+ N( C7 [ HSeries of centers at Falcon AFB, CO, which operationally control and maintain 4 Q- h5 q/ v. I1 r _assigned DoD satellites. 9 K) p1 `7 i6 o2 e3 O1 N! XConsolidated% x& \ h$ B. A& _1 ^! F3 Z Space Test , c( _7 ~, V" J- M. P- o6 [Center (CSTC)! R: Q+ p3 ^4 X j! L# {; Q Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and3 H2 |9 e7 D5 L% {$ J initial on-orbit checkout of operational satellites, operate R&D satellites, and : {5 n, W s( ~6 A" Hserves as a backup to CSOC for operational DoD satellites.3 D, b6 a; D$ P+ X5 \! y' g MDA GLOSSARY, VER. 4.0 C & U. l# d- e; i) C9 e& \7 N603 ~& O4 H5 J3 G( y Constellation 5 N1 [2 ^5 d3 J" p2 j4 ~$ i$ LSize (CSIZE) : o# f$ |# x+ c gThe number of satellites of a particular system placed in orbit about the earth. . u/ G: Q+ F6 b$ r7 V4 [Contact Fuse Device used to detonate warhead on physical contact with another object. ! E" ?9 {9 [" {' r; cContingency$ C5 O3 @) e' |+ ~7 Z. L! R' N, s+ o Deployment Plan 8 t5 X" w. ?! C6 Y2 s(CDP)1 G, J3 I4 H1 L# m3 T An executable plan designed to deploy an early missile defense capability and ; x( ]2 p0 y. O5 ~* M1 @reduce deployment time. The plan provides specific executable deployment* r8 q4 q8 v8 |0 W* }3 u& s Z options and describes activities required before and after a deployment decision.& G( Q) m9 k" `( G$ j The plan also allows decision makers to have oversight on technical progress,* X& A) h- z4 z% {" R( J, A6 Z cost, schedule, and risks associated with a deployment system.3 z, n3 X* e/ {) W1 I; s* m Continuity of+ p1 W+ A7 M8 ?* e Command Z& G5 M4 D/ R+ H The degree or state of being continuous in the exercise of the authority vested ' {# R3 h- ~5 N+ f5 M# Min an individual of the armed forces for the direction, coordination, and control of # ~4 _9 T) E G$ T omilitary forces. * } w9 _' D V' N/ p, YContinuity of 7 z/ l, K# w- P+ V0 _# `! kOperations% m( Z: ]0 D- v7 [* Y( E' z The degree or state of being continuous in the conduct of functions, tasks, or% P5 E+ R# z# a: Y, H+ m+ E9 v duties necessary to accomplish a military action or mission in carrying out the 7 G6 q, O9 ~3 U) W! z4 Xnational military strategy. It includes the functions and duties of the commander,3 [* W7 z8 r+ p( q" z as well as the supporting functions and duties performed by the staff and others/ }. q$ X: X6 W+ V9 m$ L" i acting under the authority and direction of the commander.8 a9 u# t: T/ D: o* i Contract- r$ A5 G5 [4 H8 g Administration # a2 \1 a# V* q5 H1 f8 k8 y {3 H/ sOffice (CAO) v* d' H1 y( q1 ^/ Q/ s7 ZThe activity identified in the DoD Directory of Contract Administration Services . ~. d2 Q0 p- j7 b7 u; V6 R% EComponents assigned to perform contract administration responsibilities. It is a 0 w7 ?0 H2 ^8 u; B$ kgeneral term and includes Defense Contract Management Regions (DCMRs),6 N" ^3 ~# t/ U% D Defense Contract Management Area Operations (DCMAOs), and Defense Plant" z5 a% j) x& |& Q3 Y1 e0 k Representative Offices (DPROs). (Defense Systems Management College 2 l( L* C# Q/ R. }5 p8 M7 p W9 j4 TGlossary)& _" |$ U# J. E K Contract Data ) h* p* G7 j; G1 B' a( KRequirements0 u% \: ]" ]( J) P7 g List (CDRL) 0 a" f" P5 D/ ADocument used to order (“buy”) and require delivery of data. Tells contractor, |9 l9 W8 d/ T what data to deliver, when and how it will be accepted, where to look for& b. f( L- y) T7 i' B. @ instructions, etc.( U3 X8 D/ M, X+ s. G3 {" O5 f Contract ; k! H' `, ^% x4 lDefinition! r8 o, U" f* h3 W/ o2 P' Y- E A funded effort, normally by two or more competing contractors, to establish 9 J, @6 ^! }& g! ospecifications, to select technical approaches, to identify high-risk areas, and to ' I: F! J( \" g& W+ B2 kmake cost and production time estimates for developing large weapons systems. 1 V5 l2 W5 A5 v$ Z% _5 kContract Work8 G: C1 }6 X$ C# r+ D6 j2 B4 B Breakdown) b s# y, {2 d, Y `$ c d: p6 U* g Structure. y9 G! I& ]' j$ N$ j The complete WBS for a contract developed and used by a contractor within the9 _) J/ `5 [& {. |" Z$ a( O$ j5 I guidelines of MIL-STD 881A, and in accordance with the contract statement of+ y3 `6 z7 \* u7 l( u1 p( g work.: l8 {4 }* z! ?8 i Contracting 6 o1 [6 ]' L4 xOfficer (CO)6 I' W! f8 N: w4 o# G A person with the authority to enter into, administer, or terminate contracts and : v% |1 ]7 ]& y4 {make related determinations and findings. The term includes any authorized " @. b# K3 {8 ^/ srepresentatives of the CO acting within the limits of their authority. A CO whose + }+ i3 Q1 ~% J3 F' {7 qprimary responsibility is to administer contracts is an Administrative Contracting # L- \+ ]; O9 H; UOfficer. One whose primary responsibility is to terminate contracts and/or settle8 m8 g" P4 ^2 m' p' T terminated contracts is a Termination Contracting Officer. A single contracting4 W! S; a: i% L8 A1 d officer may be responsible for duties in any or all of these areas.; s, y/ m, O/ c' I0 _# a4 M0 ] Control Authority that may be less than full command exercised by a commander over $ o' @% r! c1 d; x9 o5 lpart of the activities of subordinate or other organizations. 9 v9 b- z" u P( \; g9 hControl0 Q5 O& z( \6 O Abstraction ( ~9 e% a% A, `: m: D(Software) The process of extracting the essential characteristics of control by ; f% x+ c$ j3 k0 n' p M$ ldefining abstract mechanisms and their associated characteristics while; q' `, g& w1 u! G disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C 6 j" R: T7 u* T5 n; o1 r& Q! w616 s$ K9 T5 j5 K1 ?1 n) T/ G V+ w Control and " X% K, k( N( @; U& R& yReporting Center2 j5 C7 C K" p2 {3 S4 L+ f An element of the US Air Force tactical air control system, subordinate to the . ~2 u& {- [+ h" j% xtactical air control center, from which radar control and warning operations are8 a% d5 k* ?1 T8 x# h conducted within its area of responsibility.! v B- M6 W+ ]4 Z$ Y* a% i Control and- y- v+ E: T7 u Reporting Post ! F$ M e9 K- p7 M" P6 ^An element of the US Air Force tactical air control system, subordinate to the: o) n+ {1 r- R& I+ Z) r% E; ] control and reporting center, that provides radar control and surveillance within; Y9 f6 \6 @, y: r; {1 H its area of responsibility.# f3 ^( k X g. r7 B Control Area A controlled airspace extending upwards from a specified limit above the Earth.* @" x+ q& G" y3 q' t% \. k" ]/ I Controlled* z0 p" F, r& w& G8 @7 K* w- g W0 [ Environment 8 b' q* f9 g3 cArea where entry into the radiation hazard area is controlled.6 S- L9 D9 o0 S( j" h; r1 M Control ! V/ K9 w1 @' s% t3 d: Y# `$ `Procedure 8 I. I1 C% Y) j# CThe means used to control the orderly communication of information between ' l! V4 j+ _0 T7 Estations on a data link. Also called line discipline. # y q0 k! x$ Y( p1 lControl Station The station on a network, which supervises the network control procedures such4 P$ a+ D4 Z8 E as polling, selecting, and recovery. It also is responsible for establishing order2 t; a9 k" E4 h' [, u on the line in the event of contention, or any other abnormal situation, arising ( o$ y n4 w8 q) K Y4 K* b7 I/ Obetween any stations on the network. 7 a3 M( G0 T$ |Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to 5 ?2 _3 w6 d+ O& @# J7 Xprocess sensitive defense information and that is under sufficient physical and 1 o) Z2 P$ W- e1 Xtechnical control to preclude an unauthorized entry or compromise. ( Q0 a- B j% L/ hCONUS Continental United States. . c* h+ I& y xConventional Co-% d! A/ G3 p8 a# `5 Q( v Production 6 b; z8 Y( Q. L4 Z! Z8 R1 Q: ~An effort between governments to produce the same end item, or components # V5 b9 L3 t- e2 [& X- yof the same end item, in concert. 9 N, C5 o- T. ZConventional) X% W) [2 U- j/ ^% G! y { Weapon 2 M+ {+ T1 d0 R) q$ H; J8 qA weapon that is neither nuclear, biological, nor chemical. 7 k0 M# R- {9 l \6 b+ ?Coop Cooperative$ r, _0 W% _2 g( q7 v; R Coordinated2 r, N2 H: R; ^( n" o Engagement! j7 b: ?; I% b2 U( _ Planning/Actions / z% E* S. Y# m9 X4 k) `" jNecessary coordination among engagement components to ensure maximum , ^; s# p# x) { }1 teffectiveness of the SDS and resources are not wasted on targets already 8 }5 r6 }8 ~! Z2 }' ptargeted.4 O6 n2 X" {' Q8 X7 L7 q! E Coordinating9 z# z- L b6 d2 P8 Z: h P Authority u1 O& [% |/ }7 K/ j/ f# }5 lA commander or individual assigned responsibility for coordinating specific! e7 @7 @" g7 F8 K functions of activities involving forces of two or more Services or two or more7 Z6 R# p2 ^* H. W forces of the same Service. The commander or individual has the authority to 2 ~ i# e$ A1 o$ E, Q9 Qrequire consultation between the agencies involved, but does not have the) Q- s3 d2 ]; A' p# ~# k0 D authority to compel agreement. In the event that essential agreement cannot be 1 g+ Y9 N' x, Y; k5 kreached, the matter shall be referred to the appointing authority. * \: Q+ ]" z* KCOP Committee of Principals, Z4 Q4 F, |0 [: z2 @9 q4 @ COR Contracting Officer’s Representative. Contracting Officer. Y, L3 n+ a% y8 N( |; Y6 @& r# N6 W CORBA Common Object Request Broker Architecture.$ E. ?& Z4 }3 D) S3 C3 q CORM Commission on Roles and Missions./ E9 Q! d: w, v2 | MDA GLOSSARY, VER. 4.0 C5 G- J' n9 N( ?/ ? 62( W& o, c# x z7 n; B) T1 E Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens. \6 x/ j r9 O4 M$ g1 O8 z0 v perpendicular to one another, designed to act as a radar target or* R# F7 N! ] ]; n marker.& Y2 l6 t y9 U6 g: v (2) In radar interpretation, an object that, by means of multiple reflections L: p0 [# H) t. V7 A% pfrom smooth surfaces, produces a radar return of greater magnitude than7 Q- \6 Y3 v' j' {, ^ might be expected from the physical size of the object. 5 e0 E' m9 G' E8 VCorps SAM OBSOLETE. See Medium Extended Air Defense System. ) \- e3 @. |) F8 L& q* qCorrelation (1) The process of relating observations or tracks from one set of data to$ B N4 ~) C3 N: W/ o: c observations or tracks from another set of data, i.e., collecting data from% c7 C, Z2 W: g2 u0 }/ T8 B- l, I different frames or sensors that presumably relate to the same target. (2)1 O( s- }, R. Z( D6 B4 N; [ In air defense, the determination that an aircraft appearing on a( K$ p/ Q& M2 Y- U& _ radarscope, on a plotting board, or visual is the same as that on which) D8 |$ H9 p" I information is being received form another source. (3) In intelligence , E( k# g' E3 C8 y, }6 Y) Susage, the process which associates and combines data on a single' j. z/ y" s: Y4 \ entity or subject from independent observations, in order to improve the * v1 k+ f' ]/ d# V; I: ~/ [reliability or credibility or the information.- ~! ^* n+ ~1 |5 [ COSEMS Evolving architecture operations support tool. q& q: l$ E+ k- _ T3 N g3 _ COSM Computer System Operator’s Manual % x* D M7 b- e+ r7 RCOSMIC NATO security category. ) A3 y a0 W2 G$ B4 J, w, CCost Analysis4 E/ \) G+ d3 d Improvement+ o0 G% m; L( o, l$ V e- u4 s Group (CAIG): y! C% y1 Q O/ R) @) T An organization within the office of OSD Director, PA&E which advises the DAB . T C; e: f$ w1 ^2 ~on all matters concerning the estimation, review, and presentation of cost 0 d1 x I8 n! \" f7 h2 n. m1 ~analysis of future weapon systems. The CAIG also develops common cost & }" V0 g9 A4 A& E1 I' W& s, E0 Qestimating procedures for DoD.( I. E" N2 C. a7 ^- | Cost Analysis/ c0 [& h, v: n1 @ Requirements/ p0 e6 ?0 r2 a- b( @% h Document 0 |* ^2 @- Y' n% f, G0 n- O, Z(CARD) ; R1 \ z/ h9 R+ r: P/ X1 M! yThe document describing the technical baseline, which is a subset of current) w F6 `8 d3 \9 V P system technical data and is used to generate the baseline cost estimate for an; `0 `& C4 r* x SDS element. It includes, but is not limited to, the element description, 1 _9 J/ e+ ~' p* i% Q+ D1 V ainterfaces, operational concept quantity requirements, manpower requirements,; K) a- F" y5 q5 h activity rates, schedules, research and development-phasing plan, and facilities . m* O6 N$ N% grequirements.: F" h" j5 U* d2 l( } Cost and : |9 V3 Q% @; }6 R% e# T k! l1 G. WOperational6 M3 A' ?5 m9 U s$ x" d4 x Effectiveness2 M" W* M% G$ d# A% X+ A, G3 }2 g Analysis (COEA) 2 j6 [9 R" n2 {6 n$ V: X* y/ IAn analysis of the estimated costs and operational effectiveness of alternative 2 I& x9 {! h: Q% pmateriel systems to meet a mission need, and the associated program for 5 ]& x8 |4 M1 D4 n$ Eacquiring each alternative.+ Q S- s% B& S' p) N Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk1 q0 N) j0 i' K& b9 z+ a% W0 e+ ~ due to cost estimating errors and the statistical uncertainty in the estimate. % y8 a: j+ m6 c e$ M9 gSchedule/technical risk is risk due to inability to conquer the problems posed by5 |% S. P1 Z, H6 H+ S the intended design 2 z( I5 ?( f$ x! m* z! lCOTR Contracting Officer’s Technical Representative. See Contracting Officer.9 s1 Y6 S: X9 S6 B, E COTS Commercial Off-The-Shelf.; _" v! W! B$ N% t' B( i Q Counterair A US Air Force term for air operations conducted to attain and maintain a desired- R9 }" X% P# ^ degree of air superiority by the destruction or neutralization or enemy forces.* t6 D3 n/ b! y$ l4 P5 n4 s Both air offensive and air defensive actions are involved. The former range % k6 B( {# Q" athroughout enemy territory and are generally conducted at the initiative of. a0 g# A6 q% V5 \4 R friendly forces. The latter are conducted near or over friendly territory and are: U2 l; [: F2 {3 Q, N2 h% { generally reactive to the initiative of the enemy air forces.1 o1 B4 b( v1 z' t: Z# ?, F4 j9 P MDA GLOSSARY, VER. 4.0 C 6 |+ A* m) L7 F! G63 # S: h- W6 o5 b1 Y* B4 GCountercountermeasures! Q" f4 [, Z" \0 L+ x# |) ^6 g (CCM)) _4 Z" T1 G7 h3 G0 P/ y( t7 x Measures taken by the defense to defeat offensive countermeasures.' m9 ^7 d, w" r9 f" \7 g Counterforce The employment of strategic air and missile forces in an effort to destroy, or) p _7 N: R/ N# l render impotent, selected military capabilities of an enemy force under any of the " J) g, ^# [. h! M" U; U$ tcircumstances by which hostilities may be initiated. ' C0 K( J$ Z! n% O" Y7 b+ B# ACountermeasure A design or procedural measure taken against covert or overt attacks.) @4 f4 S0 _8 i& | Countermeasure % M; Z% R2 E; [% ?( K' ?. G$ o$ Ps (CM)! ~- g P. h# {! U: d; A+ _9 ^ That form of military science that by the employment of devices and/or 2 K/ A+ b; w" utechniques has as its objective the impairment of the operational effectiveness of% S- O1 t' }- T enemy activity. # C+ Z( P/ P4 @) T' H! M4 l0 F4 DCountermeasure ! }" S) L& V+ Q6 p7 s5 Cs Rejection6 [6 q" G9 ~$ C (Surveillance) $ D) @$ s8 l' p! }' y |8 QImprovement or rejection of an object signal in the presence of L9 h( F8 F( P& X4 U- \countermeasures.2 |6 l1 H4 b$ f+ w0 V( D Course of Action 5 C- A" A; I1 i; ?(COA) . Z( G, t1 _1 _(1) Any sequence of acts that an individual or unit may follow. (2) A possible / v v3 q+ M! K; G: Uplan open to an individual or command that would accomplish or is3 R7 H; b- G5 y5 ^1 F9 \ related to the accomplishment of his mission. (3) The scheme adopted7 T# B4 z5 {1 h E: t; S# }5 P to accomplish a job or mission. (4) A line of conduct in an engagement. ; E' Y$ t) o8 g(5) A plan to accomplish a mission. It describes the execution concept ( _' P6 W% s- ]for BMD of North America. It will specify the engagement priorities, " C% U, {6 p. t7 c4 m9 E1 Oresource allocation and desired results by Area of Operation (AO)." q# F/ @2 B8 r G$ J9 v (USSPACECOM) (6) The scheme adopted to accomplish a task or % n% Q* ^1 o! Omission. It is a product of the Joint Operation Planning and Execution 3 e, B3 S! y. B: C4 A- l/ e+ O8 ISystem concept development phase. The supported commander will 4 G9 L+ Z2 @* q+ Ginclude a recommended course of action in the commander’s estimate. 4 i* |8 |- @1 d" C4 IThe recommended course of action will include the concept of ( N+ l; Z( r) {& ]. Yoperations, evaluation of supportability estimates of supporting 9 T! K" B5 Y7 }: T' r/ X$ R" J: \organizations, and an integrated time-phased data base of combat,, R& T% _# L: x, P& z3 F( R combat support, and combat service support forces and sustainment. * K# N% v# q' U* }, a, ^Refinement of this database will be contingent on the time available for; A9 F! _# C, U2 t% `2 a course of action development. When approved, the course of action6 q+ t$ x) |/ \# j! S becomes the basis for the development of an operation plan or6 Q; J' v0 N9 E operation order. t+ | f3 }" U3 ^3 j Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps,, X& }" s9 Q' L1 e% H! D6 v and other geographical presentation systems. (2) Cover or protection, as5 r) Q, q! c% s& p4 q/ x& U* X; X the coverage of troops by supporting fire. (3) The extent to which * a1 L8 ?, Y' ]( I. y# Q4 X$ W* w- j0 sintelligence information is available in respect to any specified area of2 K, S l* }7 m6 X. n interest. (4) The summation of the geographical areas and volumes of0 x$ T% I, n% [ aerospace under surveillance. ( \+ s/ C7 H' P' i: Z7 \- tCovert Timing 5 n* q7 y# E7 o& Y3 L1 ?Channel & |% m$ S( X+ g& RA covert channel in which one process signals information to another by . R5 V. `0 }- f: V6 K& M, kmodulating its own use of system resources in such a way that this manipulation& u. n$ g' t1 B* R affects the real response time observed by the second process.( }8 W9 w# p6 l6 o3 H CP Command Post. 7 x7 h7 B) S, r2 C, zCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. ! I$ R7 [& J' e+ L' M& X9 YCPAF Cost Plus Award Fee.7 M5 z1 Z" v) w- ] CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)! f' m: i* H) ]$ A- R MDA GLOSSARY, VER. 4.0 C / O5 [0 |/ _) I8 W. V2 i64 : v s) o- i' \4 d) U( S& zCPAR Cost Performance Assessment Report.; P2 r# j c0 @ CPAT Critical Process Assessment Tool Y& [: V! E' }1 r' iCPB Charged Particle Beam." D+ X. U& x. z! Y( ` CPEV Communications/Processor [Network] Experimental Version., p [& ?0 I. S: v- x# ?+ x CPFF Cost Plus Fixed Fee.! V5 t$ @! Y$ X* t$ e CPIF Cost Plus Incentive Fee. ! n& _* k3 M/ |( T! [1 KCPIPT Cost-Performance Integrated Product (Process) Team.$ E. a. U6 [1 q, @8 y& H! p* p1 M CPM (1) Critical Path Method. (2) Contractor Performance Measurement. # s3 R! D; A/ nCPP Critical Performance Parameter. / l$ c* y- f' yCPR Cost Performance Report.# t6 _. k j" ^5 ?0 `' B CPR/NC Cost Performance Report/No Criteria (Contract management term).6 Q# p; f; o6 N( ]+ }+ T O CPS (1) Consolidated Program Summary. / ?# D7 s4 P7 q9 |7 x2 {+ p1 \(2) Competitive Prototyping Strategy.7 @' O% n: ~9 H6 F! @0 m (3) Current Program Status.2 _" {) m3 q, [+ N CPU Central Processing Unit (TelComm/Computer term). 8 H) x7 U+ |2 ^& SCPX See Command Post Exercise.7 y6 x% P1 Z% Z; M1 T% `3 g' p CQAE Chief/Contract Quality Assurance Evaluator. , ]! o6 t- _* x9 W& A7 l+ @CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).$ T; X% r; P$ |5 W: h8 v9 D3 x CR-UAV Close Range Unmanned Aerial Vehicle. 3 X& L0 a5 V0 g {1 S, U3 kCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement/ p4 s' i' K. n( r3 R9 q8 L7 a- } CRADA Cooperative Research and Development Agreement.2 F% M: [! c! j) G3 A CRAM (1) Control Random Access Memory. / h0 c' q' X$ a# W1 r# D(2) Cross-tie Random Access Memory (Computer term). % ~! M ]& w$ G$ {CRB Configuration Review Board.% H1 b+ Q% f8 F CRC Control and Reporting Center. 8 o! ?2 M! ]6 JCRD (1) Capstone Requirements Document.$ Y' J* Y7 X" k! ^1 e (2) Component Requirements Document.7 X" ^: _- {+ d) s CRDA Cooperative Research and Development Agreement.. p1 e5 F2 S X6 J CRG Communications Relay Groups (PATRIOT). ) z% i/ F* r: m8 c# m8 B/ KCRI Classification, Recognition and Identification. 2 k4 Q6 y5 y4 ^" \8 rCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C / Q. h9 G2 f* j2 U, y2 p1 d9 H5 ~4 p650 k4 l" v; p8 S, E Critical Design2 F: S: H4 P) V$ E- f Review (CDR)/ Z ~) t. E- w9 m6 x7 D A review conducted to determine that the detailed design satisfies the, ?% M; X% l. k3 C) {7 S2 Y performance and engineering requirements of the development specification; to4 c, k. }' d. ^! T. }$ @9 A' W establish the detailed design compatibility between the item and other items of 8 n7 O; c, c5 m/ o. a: D7 r$ h1 `9 zequipment, facilities, computer programs, and personnel; to assess producibility ; z) y1 U0 Y- L/ Wand risk areas; and to review the preliminary product specifications. Conducted8 k8 w4 X Z( L$ X" m" G+ | J5 R during Phase I, Demonstration and Validation (for prototypes) and Phase II,* B& X1 j2 f- b" \+ { Engineering and Manufacturing Development.6 F/ p1 M! l3 e: f5 @3 d( g6 N Critical ; H4 }! ?& R5 v; @Information3 b5 L) ~) e% J. I% [ Specific facts about friendly intentions, capabilities, and activities vitally needed ! A- }' V; Q! I2 M5 `, f( A/ s/ Uby adversaries for them to plan and act effectively so as to guarantee failure or- G5 t) M0 J* o; a: j% k8 s) } unacceptable consequences for friendly mission accomplishment.$ I( B' ~$ V0 H* z& ]8 } Critical2 V, P5 p- |, R1 C Intelligence+ T4 k5 B) t6 O0 v3 v8 N7 H3 ] Parameter 7 J6 V8 f7 \, Q* N$ H2 k4 aA threat capability or threshold established by the program, changes to which & J+ H! l, J' C! \3 e; E- E, vcould critically impact on the effectiveness and survivability of the proposed4 c( v, W0 n+ Y# W! O: _ system. ) ?7 r. u" C9 r v: f, g5 TCritical Issues Those aspects of a system’s capability, either operational, technical, or other, 0 X. g. P" \) f; ~that must be questioned before a system’s overall suitability can be known, and, p0 X4 Z4 Y0 r2 m" h which are of primary importance to the decision authority in reaching a decision : \! r$ j8 f- A& `to allow the system to advance into the next phase of design, development,+ A( L* W1 C! X production, or post-production.5 F2 m5 c2 Z( C4 Z5 p$ u* i1 K, u Critical: O' r& C: v! t2 v9 M Operational $ d: z( E, S1 I6 j) NIssue 9 A# w# x4 v; ^0 f9 ZA key operational effectiveness or operational suitability issue that must be9 n) e. q4 y8 n$ `6 h3 y( O examined in operational test and evaluation to determine the system’s capability ( x" h! Y3 F2 d7 i/ wto perform its mission. A critical operational issue is normally phrased as a ) i( m- @ T& Y0 Q7 X# Equestion to be answered in evaluating a system’s operational effectiveness5 O$ ?4 |# S/ g and/or operational suitability.) O$ ]3 U% Z( O3 m Critical Path1 w, K% g( e& r0 }4 e- o Method9 W, O$ U! C0 k6 b) l1 T A technique that aids dependency of other activities and the time required to: v" A! j+ a8 f7 }, J$ Y complete. Activities, which when delayed have an impact on the total project ) J" g" [' U0 n: T& J. T- R2 \schedule, are critical and are said to be on the critical path. ' o, C/ j7 j/ a/ WCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to+ n K3 C3 R/ y' x% a `" ^ the viability or the operational effectiveness of the SDS. c- w; ~, F# l% [( jCritical Security2 m+ J2 A8 F! c7 Q* P, x' W Risk! Z: e# T. A0 k/ N$ B0 b* L# ^1 A The existence of a security vulnerability that, if exploited by an adversary, could 9 `$ u8 e7 m. Icause exceptionally grave damage to the viability of the BMD or the operational : b6 p7 D$ ~& M2 keffectiveness of the SDS. Critical risks assume an adversary’s capability to' s0 a" }% }7 v1 c7 _. Q cause major system disruption or degradation (e.g., single point failure),% c' `; c* F6 b; \' T- C destruction of mission-critical components, or usurpation of system functions. - J5 {" P2 q4 S- K; vCritical 9 |- F/ t9 m4 [; | rSupporting8 j; k: o. t0 Y0 v Technology- K! w, R6 E* b7 T1 g( m; g6 F/ l& s( R A technology that program management personnel consider a critical part of the ! ]- ~! Y) ]& I! Zprogram being described.6 Y3 c. E: c+ k' |) r* {! {* m- w j CRLCMP Computer Resources Life-Cycle Management Plan.! s! ]- l9 f: u/ y CRM Computer Resources Management.2 a! q2 ]% z1 R8 r& C- {+ Z# E" o2 u( K CRMP Computer Resources Management Plan. 4 b; T8 l V1 W* N- A* |1 zCRO Chemical Release Observation. 1 O* D" g+ R, }( E( |. HCRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC 2 F$ e0 `9 ~9 |: J$ [( cterm.) $ f( s" x J9 g1 S* GMDA GLOSSARY, VER. 4.0 C ; h5 D( _# v& e+ F9 G66( @2 b+ }; w4 s2 Q# @4 ?( A( C CRS (1) Computer Resources Support. (2) Congressional Research Service. (3) * Z7 d h& Q) [Contractor Reporting System. + q! ^% O8 a/ l# f' T# hCRT Cathode Ray Tube. 9 u# ?5 m5 c L5 u2 b$ QCRWG Computer Resource Working Group.: N% h) F# f* G# n+ h% [* E, p4 } Cryocoolers Cryogenic Coolers.- {- Z/ P R9 c7 d, L0 ^ Cryogenic Of or related to cryogens (substances which are used to obtain low 3 M) Z1 s! g5 W: a Itemperatures).. }- K5 c" l6 x7 E/ Q# U' A0 l Crypto A designation or marking which identifies classified operational keying material, / N: B4 J7 R3 T; n7 o7 Uand which indicates that this material requires special consideration with respect , ^- y7 c& S& v/ }* V k5 i" D1 H. [to access, storage and handling. % l1 ?0 R, [0 uCryptographic - ^' w# q; _ g' N# `. Z4 W) Z# G% QSystem) F: ~) l# w h! [ j1 G' w; L The documents, devices, equipment, and associated techniques that are used 9 I! ~* p1 {( _7 Q+ tas a unit to provide a single means of encryption (enciphering or encoding)./ s, g2 v1 v. P, |& ~ Cryptology The science that deals with hidden, disguised, or encrypted communications. It: I t0 c- P7 S& N) h2 K includes communications security and communications intelligence. 3 T/ Z# g/ t8 B$ Y! LCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.( C! F8 T9 w( j CS/CSS Combat Support and Combat Service Support (USAF budget term).: C1 J9 t3 ~6 ^1 J5 g% _1 h: F$ l CSA Chief of Staff of the Army. , ?) v6 S) O( YCSAF Chief of Staff of the Air Force.6 u. U0 S, r. ~: H2 a2 X) V CSC Computer Software Component. 2 o+ b3 L8 p1 H c! qCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)4 J( m, B' T( x, i/ T9 k; K, w6 f8 f CSCSC Cost/Schedule Control System Criteria.- G: \5 D6 {& l6 P$ m ^+ v CSD (1) Constant Speed Drive. (2) Critical System Demonstration. . M1 T, @! r+ C7 tCSE Center for Security Evaluations (DCI). 1 D5 S7 R- V6 _# D9 i) d6 wCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon + ~+ q3 b$ S/ J" z3 ]) mSystem, located in Cherry Hill, NJ. " n% I1 f* R7 n3 V$ yCSF Consolidated Support Facility, Arlington, VA.& Z! A9 {. R2 P8 S% q/ Q% {' B CSI (1) Critical Safety Item. (2) Critical Sustainability Item. Z4 j" d8 w# x" _CSIP Current Systems Improvement Program. 1 u' K) n% @3 w: O( iCSIZE Constellation Size.- I3 D: b6 Z* W4 Y CSL Computer Systems Laboratory. ' w5 b- |& C/ @, G' c9 ~3 ^CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.0 \6 f ~3 m i4 Q; B! i2 r CSNI Communications Shared Network Interface (NATO term). % p5 Y3 \+ ~# PMDA GLOSSARY, VER. 4.0 C * G. Q# T9 v7 ]6 T67/ r' m3 B; k4 d6 z- m( H( ^ CSO Closely Spaced Objects.: t" J2 {9 H, _* _( O CSOC See Consolidated Space Operations Center.* O0 S2 s9 Q/ Z CSOM Computer System Operator’s Manual. x$ G0 |( D+ p% n CSOSS Combat System Operational System Sequencing 1 p; b5 |$ |" d9 m4 [, KCSP Communications Support Processor (numerous locations, including USAF Air ' W+ d) K/ d7 v' T' L* n! V0 ODevelopment Center, Rome, NY term).9 z+ ~( i y4 K2 i& f* q CSRD Computer System Requirements Document.: d; c" k2 {! Q% D4 n CSS (1) Cooperating Space System. (2) Communications System Segment. (3) : W# d8 w! E JContractor Support Services. (4) Common Sharing System. (5) Communications" i( t& r! n0 p; k Support System (Navy term). (6) Common Support System. (7) Combat Service: F$ `& N! b p( P- Q2 J% L Support. 1 y; ` c; R* f/ ?CSSCS Combat Service Support Control System (USA term). 6 f+ _/ u- @) D- E7 X& \" C7 LCSSPAB Computer System Security and Privacy Advisory Board. k! X7 n4 P% H( D: e3 t# wCSSO Computer Systems Security Officer. 5 J3 A) P. ~. k5 f% vCSSTSS Combat Service Support Training Simulation System (US Army term). 4 z- N0 K/ ]. ^/ t% h! {CSTC Consolidated Space Test Center. 9 ^2 |$ }( P' pCSTI Civil Space Technology Initiative. / J5 v+ W4 T0 c9 ?9 r' f5 ]' O% {CSU (1) Computer Software Unit. (2) Communications System Utilization. / J% w5 F* x- j+ FCSUR Communications System Utilization Report. , T3 p1 M0 D( L% v% f7 GCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.0 F& i/ @2 {/ u4 W. z. P+ O& n (4) Cryptologic Technician (Navy occupation specialty). % q2 A9 B y* J( V& p3 m6 z4 k; ]) aCTACS Contingency Theater Air Control System (JFACC term).3 O3 R# d4 u6 ?/ P CTAPS Contingency Theater Automated Planning System (USAF).& O. c+ v0 \) F: f CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. . K* |7 S& g' r" x2 CCTBM Conventionally-0armed TBM.) M7 F) v) d- z& p CTC Combat Training Center, Ft. Leavenworth, KS. 1 i0 S. _+ ?; C6 b- BCTCC Critical Technology Coordinating Committee. * T( F* U; l* K# s- J3 u) z7 {CTD Communications Test Driver. / ]3 v+ y/ W- P0 ?1 v; c3 pCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. 8 Q2 }8 e8 i$ c; iCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally ) c+ U; q' O/ T& B6 kfunding selected test investments proposed by the Services and Defense 9 N# y6 m) l( |' y# R* L7 j/ ZAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C) }* I% c! Z( s& T$ K7 s" k* S9 f 68 ( L0 x6 v" B0 r0 }CTF Controlled Test Flights./ A8 I1 u5 P/ J0 u, Y9 l2 m CTI Concept Technology Insertion. * ?) l$ l) ?9 ^CTN CALS Test Network.8 k- {3 O# v$ {$ i) P' I3 ]3 y CTOC Corps Tactical Operations Center. 3 L! R' B) u7 ?CTOL Conventional Takeoff/Landing aircraft.1 z) @' j/ p( Z+ J; b1 P$ K$ v+ S7 \ CTP (1) Critical Technical Parameters. - g; H" n, I8 ]/ C(2) Communication Tasking Plan. 0 H6 I* O& v) ?, c( q& L(3) Consolidated Targets Program.4 v0 J3 V/ V/ o' ^ R) g) B CTPE Central Tactical Processing Element. * A. I& F! g( H9 d+ ACTPP Consolidated Targets Program Plan. $ c; I6 m' ? [" zCTR Cooperative Threat Reduction (Treaty negotiation term). 9 u. ?4 z2 L7 ]6 h' F1 MCTRS Centers ; N4 X4 P0 |9 }3 l/ d7 vCTS (1) Clear To Send (TelComm/Computer term). 0 [! ]. Y o" v! f( A* h& D4 x+ ?. ^(2) Contact Test Set (USA IFTE term). " A" I* G X8 O5 {1 V: ACTSS Computer and Telecommunications Staff. - C9 z/ g* v# s/ ?) x+ \% w9 h {CTT Commander’s Tactical Terminal (US Army). " W% K/ E$ j! I5 J* F! CCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).+ ~ m6 o( ?+ X% s/ k/ Z CTV Control Test Vehicle(s).& y- k* ]- i# l" I, |0 V% C CUDIXS Common User Digital Information Exchange System. # C$ W H0 S; eCued Operation The directing of one sensor based upon the data received from another sensor. 9 B& E' k' ]3 g5 I8 _Cueing Command The command within a tactic, which specifies the sensor element’s coverage% L% V+ p% J. Z volume. ' W& t" h2 U7 h6 OCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage: f0 |: `6 C b% d& B$ y volume. - m5 h9 L# G, L2 gCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. + d" U L y# M3 u# R4 B. HCV/BM Carrier Vehicle/Battle Management. + v) H2 d, Y' \" D8 i9 u" DCVBG USN aircraft carrier battle group.! h! | a% T2 W! T: G3 {9 f$ c CVHG Carrier, Aircraft (V/STOL), Guided missile.7 A* J1 D9 s5 I CVISC Combat Visual Information Support Center.0 K* Q! ?8 I7 r+ y$ S8 U& D CVL Copper Vapor Lasers. ' W/ ~8 ~/ z* x9 `# _1 p) cCVN USN nuclear powered aircraft carrier.5 u5 j4 u8 l3 x, O MDA GLOSSARY, VER. 4.0 C 2 Q9 _' X1 H0 ^0 v69 ! m0 |9 g& k# l7 D1 L5 q* `! oCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.% S7 `+ p: G, V: h. i+ A9 n* e0 S CWAR Continuous Wave Acquisition Cycle (Hawk). ]+ G/ k7 I9 ]. T, F! C2 o CWBS Contract Work Breakdown Structure. 4 S" ~, V$ J, fCWDD Continuous Wave Deuterium Demonstrator.) i! f. Z( E! _2 U+ k4 }; Q( C6 Q CWIPT Cost Working group integrated Product Team. 7 K6 K8 x4 K. y" a" u$ }CY Calendar Year./ y/ t0 ~/ h% T& Y) |0 s9 u MDA GLOSSARY, VER. 4.0 D& l2 o) ?6 ?+ d 71 3 N# ~2 l2 J* N' gD Deuterium 8 f, `1 {3 |* M4 yD Spec Process specification. . Y' V2 c1 C2 ]/ ~5 XD Star Measure of infrared sensor sensitivity.$ f4 S8 [3 d7 A) e D&D Design and Development : |& e# ]& d: K/ k; X5 ?D&T Detection and Tracking. : k% z8 B% \1 R4 R9 t$ cD-IFOG Depolarized-Interferometric Fiber Optic Gyro. % u6 p- k2 z1 d$ S0 |" O, bD-Level Depot Level (ILS term). $ \$ W, o5 I1 L2 `* w& E' j MD/A Digital-to-Analog9 q+ ^+ j3 R! r8 |0 r! b D/V Demonstration and Validation. R3 A7 m6 A" `# Q5 K% ~ D2 Projective (interceptor) in the Hyper-Velocity Gun program." Z! `: K& g, W3 k: d DA (1) Department of the Army. J1 C4 i, {% p% q7 c, U1 ^, H5 J (2) Department of Administration.- P0 [0 w& e! Q0 O (3) Decision Analysis.. z9 W2 a2 ?. n9 L0 y! r+ o% B/ G (4) Developing Agency/Activity.- W9 ^2 h$ q* Z6 V/ K. F (5) Data Administrator. , M0 B: _: q9 F9 y(6) Direct Action. & o0 l5 I* }. q(7) Data Adapter.& u% o3 K& d! Y/ \# q7 C DAA Designated Approval Authority (DD 5000 term). . v. R( r3 l) z: s n' DDAASAT Direct Ascent Anti-Satellite. & n9 ~9 T* O- g+ U7 \DAB See Defense Acquisition Board.5 X0 F! C& W2 G; } DAC (1) Days After Contract [Award].( P/ T8 }2 i$ W2 W7 l! ^, g) i. V (2) Department of the Army Civilian. ( R9 v: p5 C" {6 E! E$ x& w4 I(3) Directed Attack Characterization. : \$ q% A9 \1 J. c) v(4) Deploy ACCS Component.0 J3 c7 a5 S1 ]* \2 o3 X) f (5) Digital-to-Analog Converter.. [7 J2 ?; z, g" m! v4 r DACS Divert and Attitude Control System.# e& _, Z% a# {5 t) a' X+ M DAD Defense Acquisition Deskbook." l0 L1 W. K6 c! w3 b" P DADS Distributed Air Defense Study (1993). : O. ^, {1 V* g: F6 m( O- ^DAE Defense Acquisition Executive.9 j$ H7 I8 |9 C$ }# A( k# s0 ~9 F DAES Defense Acquisition Executive Summary.* \8 s. J& M# K; @5 T6 \" g DAGGR Depressed Altitude Guided Gun Round.6 E, P. m# N/ X! B! C$ l- } DAHQ Department of the Army Headquarters. , e( Z$ [/ m! R5 }; kDAI Damage Assessment Indicator (targets). 1 n7 p9 W. ^+ k9 C- X; rDAL Defended Asset List. 1 n) d: I3 p+ mMDA GLOSSARY, VER. 4.0 D " b( U2 ]' ]6 ^72 & f2 j. Q4 C7 S( d% O5 r1 |# vDAMA Demand Assigned Multiple Access. 8 q- Q! }% w1 U' P; i3 `" X2 ?, d4 PDANASAT Direct Ascent Nuclear Anti-Satellite. * c& L8 ?! R0 f4 Q- @DAPR Director’s Annual Program Review (SDIO term)% h( y% t# E! Q DARO Defense Aeronautical Reconnaissance Office (OSD). ]# a+ j' |! v. w$ H. YDARP Defense Aeronautical Reconnaissance Program.3 X- o) c+ l) \' K DARPA Defense Advanced Research Projects Agency. See ARPA.5 s" r+ E0 T9 ~! Z+ j1 [ DART OBSOLETE. Defense Acquisition Review Team.2 U! M: [ j3 [ DASA German Aerospace. Member of the MEADS Program Team.. M F) E# B$ G7 r/ f9 V t DASC Deep Air Support Center (JFACC term). - q) J* v5 [/ j& S, Z8 LDASD OBSOLETE. Deputy Assistant Secretary of Defense.! X5 y# w( n5 O- _! ? DASD (C3) Deputy/Assistant Secretary of Defense (C3) & u7 E* W" L" z9 a9 s7 \8 xDASO Demonstration and Shakedown Operation. " X- }) @) A# j/ ~0 B5 Q/ L- ]: ZData Integrity The state that exists when computerized data is the same as that in the source 5 t1 \3 w5 t( xdocuments and has not been exposed to accidental or malicious alteration or7 `) A$ S, ^& g destruction.! ~: b) G; v2 U; r) b Datalink (1) The means of connecting one location to another for the purpose of 0 P. d* O* _& ~4 D2 W; y R) @transmitting and receiving data.4 q' N/ j/ {; c: v7 }2 _& V) x (2) A particular path between two nodes over which data is transmitted. It7 W6 T' A+ B+ W# b( n4 L1 b includes not only the transmission medium, but also digital to analog 2 Y8 U7 j! |8 t# {# j0 |converters, modems, transmission equipment, antennas, etc., associated4 a: M4 p& m+ F# b: D with this path. In the SDS backbone network, it was a path between two 0 H+ R7 o% G' X2 RSDS elements. In space these datalinks were microwave or laser. On , V1 k9 H8 n+ _* u- Fthe ground, they could have been wire line, microwave, or optical fiber. 9 K1 z1 C8 ?0 T! b9 s" U6 H7 BDAU Defense Acquisition University, Ft. Belvoir, VA.. w% o. D6 I1 M0 R& y* I DAVID Development of Advanced Very long wavelength Infrared Detector (USAF0 Q2 n9 G1 o9 m, U6 Y Phillips Lab term). 4 F' m. i; B+ n. v! Y' XDAWS Defense Automated Warning System. 6 N2 {& o7 [* F- G+ y. VDazzling The temporary blinding of a sensor by overloading it with an intense signal of . q- w! p3 h- O' r8 E& Relectromagnetic radiation (e.g., from a laser or a nuclear explosion).. d: n$ W- Q. Q0 @# | DB Bata Base! z4 F, c' L. d* h" r( | DBME Database Management Environment (Computer term).0 }& k) i3 q e t( s. d, M7 r DBMS Database Management System.+ Y2 \6 n9 W5 a; ~2 h2 i DBOF Defense Business Operations Fund./ Q) X8 M6 x& ` DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D ) K' O, b( @0 K: N6 n2 o5 j) |, C73# w2 M) D1 U9 A7 W" A7 ? Dbsm Decibels per square meter. ' ]( ~' x$ F/ YDBSM Database System Management. 2 _$ Z7 }: ]* f8 o( N. b& |DC (1) Disarmament Commission. (2) Direct Current. * A7 `; U ~9 SDC-X Delta Clipper Experiment. # F$ [) i+ G& ~& lDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications 8 a5 Y/ Y8 a: s! OAgency. (Now known as Defense Information Systems Agency (DISA)). 7 m2 k* n8 t2 J" G& UDCAA Defense Contract Audit Agency.6 S# j. L( ?; e& ?" F- C DCAS Defense Contract Administrative Services.+ d( P6 r" S" s8 K) o' u7 K" G DCCO Defense Commercial Communications Office (of DISA). & S& c2 Z) K* A/ R/ R) N9 XDCDS Distributed Computer Design/Development System. * l: v) h H. ?* j( rDCE (1) Data Communications Equipment (TelComm/Computer term). , H' q* u# }( q% v9 ?(2) Distributed Computer Environment. o0 m/ V& Z- {" h+ eDCEC Defense Communications Electronics Command. - H: [1 A! J% v6 O1 l, }( ~DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. $ m& E: J m1 R3 n7 mDCINC Deputy Commander-in-Chief.9 s- Q8 U4 e- s" x" R% h, m! [ DCM Defensive Counter Measures.) W" |+ j" y. @2 C DCMC Defense Contract Management Command ) L. b) I0 ]3 t/ C! gDCN Document Change Notice.* R: R. E6 q8 [1 a8 X* |3 e DCO Director of Combat Operations (JFACC term). . v7 X8 D$ N/ y1 cDCP (1) Decision Coordination Paper (see ADM). & ? G0 H+ L. V \; E(2) Director of Combat Plans (JFACC term).4 Z/ @! N& e) l% @4 f DCPG Digital Clock Pulse Generator.) ^$ R( [- B" G3 c& w) Q, n7 Q DCS Deputy Chief of Staff. : P3 X1 G0 C. O; _DCSOPS Deputy Chief of Staff for Operations and Plans (Army). & ^2 J- @8 ?: d' M2 G( t1 P( ?DCT Digital Communications Terminal # t! q' {2 m, k; b- X. R ?DCTN Defense Commercial Telecommunications Network.& ?, W: f0 S6 s8 Z+ p7 A# n DD Variation of DoD.* y w6 I" H2 Q3 `) L z( A DDCI Deputy Director of Central Intelligence. 7 r5 _( v1 _! P/ R; xDDEL Dwight David Eisenhower Library, Abilene, KN (army term). ; W* ~' d9 U. u3 @- i3 zDDG USN guided missile destroyer. 5 H j* ~% r' y) b9 cMDA GLOSSARY, VER. 4.0 D; V* z7 w2 e# b$ Q 746 H( @4 y M0 F" D. H* @ DDL Disclosure authority letter." _' ]( ]$ j' d0 M4 ^6 O4 l DDN Defense Data Network. 2 w$ [5 A0 e" r2 [2 e' ?DDR&E Director, Defense Research and Engineering. 1 i2 x# \" p% D4 K+ P" PDDDR&E Deputy Director, Defense Research and Engineering.5 \! @/ d' O7 s2 }( s DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). 1 L' v( F: U9 d0 ^. u6 |# f* uDE (1) See Directed Energy. (2) Delay Equalizer.) B9 x* P. L' q# V9 a DEBRA Debris, Radiance Model. 7 r9 A- r) K+ [- bDecentralized $ x4 c0 ^2 h2 R: d7 F5 q- bControl ; z( U; n$ ]" C$ mIn air defense, the normal mode whereby a higher echelon monitors unit actions,& T6 @0 D" P. _7 n4 U making direct target assignments to units only when necessary to ensure proper: I! ^9 M, W M: W4 i fire distribution or to prevent engagement of friendly aircraft., ^) q- b8 M, { Decentralized 2 q" q( b7 I5 H( gExecution; n# @" V7 a: e' d The distributed and integrated implementation of USCINCSPACE direction by1 H$ T* s; y& q# q- G7 w) F the BMD forces. (AFSPACECOM) $ l( {; Y6 X7 j8 v# Q+ oDecommissionin 3 \( T$ @' o U; ]/ \! V9 fg* Z1 R R4 w% q: c' d The removal or the rendering useless of obsolete or no longer needed! D- P! w8 g& p# a7 u0 k) l d" | components of the BMD system from service. " p- u: Y* Z! w5 _Decrement A directed funding level reduction for an acquisition program.& b7 n; [2 Z' o0 N$ f DED Data Element Definition (Computer term). ' Q3 }& t2 h( A4 aDedicated Mode 2 n! N+ n' k, v: G Vof Operation& ^7 L s. ]& G) F; @* A (ADP Security): N- ?. A9 i0 Q0 l6 {! o0 z, W A mode of operation where all users of the AIS possess the required personnel% t0 ^3 m! n5 `8 M' u' A5 j1 } security clearance or authorization, formal access approval (if required), and a; G* c$ B3 _0 z! p Need-to-Know for all data included in the AIS. " B6 _, ^2 F1 m) m6 Y5 w/ eDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about ! P6 }* C8 O# c3 e/ M+ T5,600 kilometers) above the earth’s surface.. t: R& z" x7 x. {8 M) h Def Definition. . o, L3 M: \2 T: pDEF (1) Defense. (2) Demilitarization Enterprise Fund. ) D4 v% q" x6 I" zDEFCON Defense Readiness Conditions. # W7 U. \9 T! h" n7 v' F$ WDefended area+ L" n: Y0 u' M% c; [/ P coverage * v. ^* n5 L" C: G, P |, t3 `Defended Asset / Z' j' @; {! |6 T% G$ z. T! \List (DAL)1 Z3 q# D. Z3 K% c# l& B6 I* C The geographical region that the BMDS can protect from ballistic missile attacks) D8 u; Y7 W* `+ B3 T1 w with a specified level of probability of negation. May be specified for a particular! m% s m" H$ c$ ?+ n4 `4 w threat type, launch point(s), launch regions, raid size, etc.' @* I; E* X9 C1 m A ranked listing of facilities, forces, and national political items that require4 U: R ~( v# u( K protection from attack or hostile surveillance. The list is compiled from Federal0 D+ Y9 {. S: }2 N! l- ^$ P, z departments and agencies, Unified and Specified Commands, and the Armed # T3 W! k ~2 q* `' w8 g" c6 c5 cServices to ensure National Security Emergency Preparedness functions. $ w3 N1 t. D- q: O8 ]& Y* _3 l7 i' O5 vMDA GLOSSARY, VER. 4.0 D / L( ]* }! B: o3 L4 i8 l% R. g3 S752 U) D9 Y8 y3 j. d0 w Defense/ X* |1 ]% r- w" M! U0 O. e4 J Acquisition % c" B. f- G5 Z: w6 N9 s4 I8 jBoard (DAB)! m, _. j, |9 `! I, m1 s/ T$ x7 F The senior DoD acquisition review board chaired by the Under Secretary of 7 Q' |1 E( s4 j( i; QDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the1 p3 R2 z; o8 o' b6 B- ~ Vice-Chair. Other members of the Board are the Deputy Under Secretary of! J3 f* M5 u2 b( |/ c/ L, ^ Defense for Acquisition and Technology, Service Acquisition Executives of the / c! }; [6 U5 j8 S/ FArmy, Navy, and Air Force; the Director of Defense Research and Engineering;2 t+ Q$ T# y# y) L9 L the Assistant Secretary of Defense for Program Analysis and Evaluation; the' p6 Y# J* Y* ~/ { u& X Comptroller of the Department of Defense; the Director of Operational Test and & X9 W( T; k+ h% nEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the3 ]! `& E$ C, z) I/ Q: R, p Defense Acquisition Board Executive Secretary. Other persons may attend at( o- Q+ B$ S* F& J' Q the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition % ^9 U5 C4 F8 z1 SBoard.”)2 y9 k: v& Y. S$ u Defense $ W3 Y. m/ h/ z7 KAcquisition& F$ X2 u" [, D6 Y4 k7 ^8 N Board Committee / w# m# ]% P1 Q# P+ a% J, m+ xAdvisory review groups subordinate to the Defense Acquisition Board. The1 ]* S. A0 Z; B# ?: G3 i Under Secretary of Defense for Acquisition determines the number of- N9 n% @) m, M Committees. The purpose of the Committee is to review DoD Component # d$ G1 O0 y' F) \: l! mprograms prior to a Defense Acquisition Board review in order to make an: b" l3 G. \% a; n) G independent assessment and recommendation to the Board regarding the, P, w7 O( n+ a$ {$ K# t program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense$ D) {1 \, _; F, q' L' z0 S Acquisition- x) n, ?! `7 a8 j Executive (DAE)/ X* q: [8 s' F. y7 r# W- ]# J The principal advisor to the Secretary of Defense on all matters pertaining to the2 Q# O# f1 B& Z8 [ x- c- b$ T Department of Defense Acquisition System. The USD (A) is the DAE and the/ \$ ]" z4 h, B3 O Defense Procurement Executive (DoD Directive 5134.1). , r) h* o7 W/ [5 {* @: o5 sDefense 4 I$ l; s1 c- I" m- Z% `Acquisition; }- t$ t( @/ C: |% Y' d+ ~ Executive , W6 A5 T/ a) A, H, R; H( N0 o0 H/ J! nSummary (DAES) n, Y3 D# u5 o4 w8 H* b* E The DAE’s principal mechanism for tracking programs between milestone2 H1 W9 c; I. J4 `0 q reviews. Includes programs subject to the Selected Acquisition Report (SAR),, m8 o8 m$ t2 L, I5 L and any non-SAR programs subject to review by the Defense Acquisition Board.( g1 X- G- k; H4 H; Y Defense 1 T+ ^# ^; _) @2 k: }& |Employment% h7 B# \/ e8 ]: j; I5 t3 s1 ]. X Option (DEO)# J6 S5 e- C0 m4 V. g Engagement strategy provided to USSPACECOM component forces to achieve 5 Y. `$ a; m' \) q5 |& E. fspecific military objectives against a ballistic missile attack. It defines hostile; R# d4 I. G% d- A1 P target priorities, provides assets to defend, and allocates SDS resources to be 2 k! y/ @4 e5 d/ x8 x: L$ u1 X! ? Qemployed. A number of DEOs may reside in a particular Preplanned Response* q& X0 n# s& C3 J1 g+ `% R Option (PRO). However, default DEOs (those believed to be best suited to, g- Z. w. Y) Y3 t counter the threat initially) will be automatically processed and executed when1 L/ L- h8 x0 J$ y! Y Defense Activation Authority (DAA) is given by USCINCSPACE. , Y* G9 v- l# p7 c. f) @$ N3 oDefense 9 v& G* s4 d+ {, M: AEnterprise g6 }7 f9 U( q6 ~9 V Program (DEP) - I3 `5 n$ J, x0 sAn Acquisition program designed to streamline the acquisition process by waiver , ~# u* ?9 p9 x& J9 p" G& Q2 Yof selected regulatory requirements." i6 h, z- s/ H4 F. M+ T Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb / l3 \* r6 a5 C/ s+ mand progressively weaken an attack, prevent initial observations of the entire ! v: [8 R4 T) @3 p! \position by the enemy, and allow the commander to maneuver his reserve. 6 Y. C9 Z: M8 zDefense 5 {( x$ B+ ~5 O" W* ~' KMeteorological+ \2 {$ g4 t# i, A+ m5 C6 @ Satellite Program 0 l+ H# r' A; d5 S; C(DMSP)4 s8 U2 g0 p5 \5 X Satellites designed to meet unique military requirements for weather information. ) ]3 w9 A7 _# sUsed to detect and observe developing cloud patterns and follow existing % r) B: V- S4 I2 r( B3 bweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. n3 a5 O* r9 J6 v Defense Planning, M6 {2 i6 c( ?/ `5 ?9 { ^: l and Resources / c6 i* q9 O$ r3 s3 q0 kBoard (DPRB)( j( S' y/ w6 R* d! h. Y* U A board, chaired by the Deputy Secretary of Defense, established to facilitate4 j) U/ }( J* b0 B decision making during all phases of the planning, programming, and budgeting $ m6 A' F! p5 ^1 M# Q7 ~system process. Board members include the Secretaries of the Military/ O: J+ E; T2 P* ?$ } Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of % F( D# m* n, l# v! A$ |" A2 ?1 DDefense for Acquisition and Technology, and Policy, the Assistant Secretary of ' _6 _/ |& D1 i0 T3 Y6 cDefense for Program Analysis and Evaluation, and the Comptroller of the ; X- y6 Z' j4 R6 |- \: x2 p0 {Department of Defense. % h5 J( y' j! m0 P8 oMDA GLOSSARY, VER. 4.0 D1 e9 p7 A1 n# F7 k+ F 760 A6 A& b1 Z% B* }5 N" i: @8 p) O Defense Planning 7 a) G" U3 V5 T2 w/ @- _" b6 G7 QGuidance (DPG)! P9 ?; a8 V6 \- v( R, p" E Document issued by SECDEF to DoD components providing strategic framework " K) B* e4 q; _4 N, p+ Qfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, + I* S; d9 }! kand Services. In connection with two-year budget process, DPG is issued every % C6 Z; W+ r1 l& ~" xother (even) year. Q& Y. R6 \, X: u- O; V4 A, f8 I" x8 V Defense Priority ; ?' I; x6 w( } G6 _6 Rand Allocation & G( Q5 b2 Z& z7 I2 J/ ]4 S% `/ cSystem (DPAS). e9 `( k0 {1 ]( ^ The implementation of a statutory requirement where contracts in support of ! W. q E- E% y( Q- Nnational defense must be accepted and performed on a priority basis over all' J7 D' _$ [2 S other contracts, and which requires the allocation of materials and facilities in 4 U% x& C9 Y3 l. X; `such a manner as to promote the national defense. See “DO” and “DX.”' k# Y5 @2 S3 K6 r2 c, ~ Defense2 X, E4 @( _6 _2 U) v* p8 F Readiness/ [- |+ n5 ?. ~1 f# a Conditions 8 |0 U" `* {/ {4 Y(DEFCON) ?: o; K( x0 l0 C/ r5 n A uniform system of progressive alert postures for use between the Chairman of . `- b) |9 l/ P8 ~4 ]the Joint Chiefs of Staff and the commanders of unified and specified commands* P1 ^$ t* |+ J) Z+ C and for use by the Services. Defense readiness conditions are graduated to: E# j! I. f; _+ Z match situations of varying military severity (status of alert). Defense Readiness 6 v, m1 y& a- S7 n- nConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as V6 A4 G0 l7 ^ appropriate.( E: p0 H9 r! `4 I; t9 S Defense Satellite . }( c% T8 E' y& z8 z2 |8 HCommunications( }0 K1 r+ a6 y: G; b Systems (DSCS) * D! @0 d" a! p+ L# Q( EAdvanced communications satellites in synchronous orbit around the earth. : p$ t- M5 a) _" _Provides high-capacity, super high-frequency (SHF) secure voice and data links5 f r# S$ {; N/ e for the Worldwide Military Command and Control System (WWMCCS). They0 u2 c* z, c& c4 F) g( Y1 { support terminal deployments for contingencies; restoration of disrupted service) E5 K3 z4 F2 y7 q1 i9 F, t$ i overseas; presidential travel; global connectivity for the Diplomatic - I) Y% Z3 U/ E* PTelecommunications Services; and transmission to the continental United States 9 I5 f3 i/ k3 Rof some surveillance, intelligence, and early warning data.1 V' G1 d+ ]# P5 @8 d+ h& y0 T6 z: I Defense Satellite2 l" q; D8 v2 U# X, z6 Q1 D (DSAT) Weapon ! z! V1 X5 a6 R. o6 VA device that is intended to defend satellites by destroying attacking ASAT5 N4 d/ i5 Q2 ?4 y weapons.) {) ~0 X" y+ _ Defense Support 6 A6 h4 G% @) `2 a' X& V0 DProgram (DSP) 6 P( t, ]+ Q2 G/ XA system of satellites in geo-stationary orbits, fixed and mobile ground ) S5 u0 S/ ?2 g8 I) |processing stations, one multi-purpose facility, and a ground communications % U2 v9 j" B$ j% [5 anetwork (GCN). DSP’s primary mission is to provide tactical warning and limited 1 R+ T' r: I9 s) Qattack assessment of a ballistic missile attack. . a$ N6 x/ s4 y/ p$ K! R3 eDefense ' H; s$ o y6 l* A2 u# l0 v) r6 rSuppression 9 n: a5 ?! [8 L& Y f$ p: s% u o% _Temporary or transient degradation of the performance of a defensive system + B; ^, k/ }. {4 H$ I" Ubelow the level needed to fulfill its mission objectives, by an opposing force. * |( K3 P- M6 Z' @ n& D' r( e) m5 \(USSPACECOM); X) g% s. ~9 O. c Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic , V7 Q7 A9 m1 q9 r0 H- C6 M( amissile trajectory; i.e., boost, post-boost, midcourse, and terminal. / `# P# Y' j/ I! @2 jDefensive 9 h6 J: N: g* Y4 m, cCounter * u. _7 m/ }- L6 i) o& I) y( lMeasures (DCM); Z6 e( S8 |( M) w w9 X Actions taken to eliminate an ASAT attack. " u, E* g9 ?$ K% U0 [Defensive9 W# M. j0 Y R! c' W- N7 I Technologies6 |. N0 W4 \4 }, h Study Team$ f: [0 Q0 Q2 W Y: p% R4 R. l (DTST) 4 h' Y$ U" V+ i+ }A committee, generally known as the “Fletcher Panel” after its Chairman,. `. l! k* v7 ~3 s appointed by (former) President Reagan to investigate the technologies of$ ?2 n) U1 L& v8 f/ h potential BMD systems.. y5 |$ n1 A8 y; N! S7 V: H DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. ) Q3 c" \. N7 N. xDEIS Defense Enterprise Integration Services (ex-DTIS).4 F5 G- @6 E& h" Q DEL Delivery.' g" u$ z* n& R& H# N Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion% N: U* p% y* ^: e: ~+ s of shots about the aiming point. See also Circular Error Probable. 4 r: F& d) V; g8 jMDA GLOSSARY, VER. 4.0 D * P T8 D1 @4 O" }, ^77% e( Z. n8 J% M9 h Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the 8 p3 e% _% I( a: i7 Gmaximum change in velocity, which a spacecraft could achieve in the absence of . |" {. t5 p y4 i/ V2 O& P. ja gravitational field.( S1 {+ N1 C+ q" A; T5 w Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). # J: O$ O) y+ M- U' [9 Q! DDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its: z! T8 M1 F s$ ~/ l6 r' A2 v desired function (matching RV characteristics, screening RV, etc.)- L4 |& V6 t2 j8 G0 Y: \. L DEMO Demonstration. + Y; m0 s( ?9 `9 H% q& t) C eDemonstration5 {6 u/ b- t2 N& _( K5 F5 u* e1 n and Validation : L3 y/ ~; o% `& M(Dem/Val)2 T3 V' }4 y, @6 t0 U: S The acquisition phase when major program characteristics and product designs # U- C2 j& Q6 P4 s$ e, c+ y3 t0 |3 Gare refined through extensive study and analysis, hardware development, test,& y1 t5 @; e. H; O4 [ and evaluations. The objective is to validate the choice of alternatives and to 8 v. l$ P% x- g" n8 \, Lprovide the basis for determining whether or not to proceed into Engineering and % G6 I3 \+ o* Q* i! gManufacturing Development (EMD). : C! r8 B( {% [, }) p* ?) SDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities./ Y2 N, ?. S* b5 ]; ^$ j T It may include destruction, removal, contamination, or erection of obstructions. ; }- p: A+ K# {# q- e0 w9 ZDEO Defense Employment Option. ) a# Y. t- C# N+ MDepartment of # w8 E; k3 I2 u; t! }% |Defense7 B9 @2 r$ p! u- T/ ^ Acquisition 6 E3 _' r5 U( l5 A# aSystem 9 N- G% e2 y2 C$ g# UA single uniform system whereby all equipment, facilities, and services are: N; Z9 o$ p. U( c: `" J; i planned, designed, developed, acquired, maintained, and disposed of within the ! R: u$ U$ |/ a! @; T# `Department of Defense. The system encompasses establishing and enforcing 9 L8 V4 _; \! Q. z7 K( \2 E+ R; e1 Hpolicies and practices that govern acquisitions, to include documenting mission# v$ F c& X6 ~( [ needs and establishing performance goals and baselines; determining and# H6 E- d8 N, j$ Y7 F! e3 e- |; w3 y prioritizing resource requirements for acquisition programs; planning and , x' |' P0 s6 pexecuting acquisition programs; directing and controlling the acquisition review! i8 U# U' ?3 i/ u7 w process; developing and assessing logistics implications; contracting; monitoring 8 k3 E! P. t/ c0 ? T3 _the execution status of approved programs; and reporting to Congress. (See 5 Y. F9 V! R; R7 n% X& x `2 aDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)1 T% o& G2 e# t( q# d7 K( [* F+ M Deployment (1) The placement of force elements in battle positions to obtain a higher. B$ ?: v$ J( c: T$ f) O$ v) V state of readiness.! _8 l% _/ G' Z1 p6 i+ F- | (2) The movement required to place force elements in battle positions. + H& C$ p3 U- w! b; ^* u6 B(3) Fielding the weapons system by placing it into operational use with units3 U; g) a# G0 r2 Q) `* c$ C' F in the field/fleet. 9 x- c# J/ q6 t- N0 w(4) To arrange, place, or move strategically. ) T. ]9 \! Y# e9 {Deployment 1 V/ @0 Y, N$ N9 P0 zPlanning" S( L0 b# Z1 E8 V9 q (1) The development and maintenance of plans required to initially deploy,8 @ {, ^$ ^" ~: z3 g6 Y1 ^ maintain, and evolve the operational system in accordance with# k; N* ]! |0 N" n$ d# M8 a- B0 Z schedules and priorities. It includes factors such as launch facility' \; F6 o5 g+ S availability and planning for the availability of other required elements & i0 c+ m# _0 E7 z8 Rsuch as trained personnel or units. In addition, it identifies the impact of : [7 q1 z1 M+ ideployment on operational readiness and any testing constraints - t, `& q4 L7 d+ massociated with deployment. }9 C. t0 D% Z (2) Encompasses all activities from origin or home station through* r7 [0 g1 { H% L: B: o) c destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding % l1 }( O' A7 Tareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment, G/ r- j6 Z: s* ^8 W+ W$ X5 A Testing% s! C' y- [) i# s; A4 E The testing and/or simulation of system assets in the physical and operational2 X/ F* O6 u' x) @8 f8 a environment in which they are expected to perform.# P+ k% L4 P7 @: E: i DepOpsDep Service Deputy Operations Deputies. n8 v% [2 W3 D. H$ b MDA GLOSSARY, VER. 4.0 D, R$ b1 d- m9 c. } 78; e- J% R- u* c- F3 W2 N( F- Y3 [( J Depressed3 ?- `8 \2 i% e6 \: l' }, C Trajectory9 u0 B7 a0 I. _# F1 c$ M t Trajectory with an apogee below that of the minimum-energy trajectory. 8 `! {& w: x* n/ o3 NDEPSCoR Defense Experimental Program to Stimulate Competitive Research. $ f1 q" A6 j+ D) s: qDEPSECDEF Deputy Secretary of Defense. / y# s( r0 R! x4 F5 n7 y0 WDeSecState Deputy Secretary of State. , }9 R/ o" v, ]; a0 f* |7 g4 uDERA Defense Evaluation and Research Agency. Consolidated research and( I8 u3 j" e$ O. N* e% [0 } development resources of the U.K. Ministry Defence. Headquartered in6 A: `/ t! T2 G, _, @/ d Farnborough, England.# t4 z7 C. B R/ a2 D6 w- z b Derivative ( J3 a0 d9 B9 c0 I, a2 s7 JClassification 0 y. \3 a w' V \% B# zA determination that information is in substance the same as information1 z6 L6 }3 U7 e0 h" g0 B9 m- y currently classified and the application of the same classification marking. ( J& n3 a6 ^- W/ a. Q1 C7 y$ zDES Data Encryption Standard. 3 l$ P: |8 ?: W: a+ c3 z% ODESC Defense Electronics Supply Center (DLA term). 4 }* o: J$ W- g& U- D GDesign ) Y& @6 f- p! G, g) W9 IConstraints + f9 z$ D3 d% ?Boundary conditions within which the developer must remain while allocating 2 T1 k# v0 u$ e! g fperformance requirements and/or synthesizing system elements. ) l) Z: u6 H2 v6 UDesign 2 Y5 @# G. o! R4 @# E U. y oParameters 4 g" d3 k: s/ G6 Q! o7 cQualitative, quantitative, physical, and functional value characteristics that are+ N. v; G- I3 C1 `- u0 ? inputs to the design process, for use in design tradeoffs, risk analyses, and# X6 r; I- _, K. Q t7 z/ J, o development of a system that is responsive to system requirements.& M4 v- u% l# [' P' \- ~5 y Design Phase A period of time in the software life cycle during which the designs for 9 H7 l- W9 a' L; Sarchitecture, software components, interfaces, and data are created,$ }0 r/ v# D0 U6 a documented, and verified to satisfy requirements.9 @% g: S/ F/ K5 G4 M% F Design-to-Cost 7 ?/ H4 A" F" s(DTC) Goal + V/ v1 l5 h$ ]7 ?" S2 UManagement concept wherein rigorous cost goals are established during* j) A" v) [" f! ~5 E( O development, and the control of systems costs (acquisition, operating, and 7 D6 u; G, W2 U7 G) V0 fsupport) to these goals is achieved by practical tradeoffs between operational P& i r% M& Xcapability, performance, costs, and schedule. Cost, as a key design parameter, 8 o# G5 {9 t& [4 J* cis addressed on a continuing basis and as an inherent part of the development 5 }( k$ j( a, vand production process. A DTC goal should be in the form of average unit0 k5 l$ Y8 }+ w! X# H% Y, P! V( z. n flyaway cost. Also, DTC parameters for operation and support will be 9 g; R5 G3 V' C. \selected—parameters that are design-controllable, significantly affect O&S costs,$ o) T9 J/ \" a4 U+ \ and can be measured during test and evaluation. Parameters may be0 n, Z% V: T% m6 v: v8 w expressed in dollars or by other measurable factors, e.g., manpower, reliability, or 1 U% ]9 D3 [; b+ H: b5 w0 A& _maintainability. Firm goals and thresholds will be established no later than entry; O7 E9 ]6 r' ~9 T7 z4 W3 L7 q into EMD (Milestone II). This is an in-house goal, almost contractual in nature,) e5 s8 Y# J8 o" t1 G6 @9 p1 r between the PM (Service) and the SECDEF. Allocations from this goal will5 j/ [5 u4 ^4 ]' z% l3 [ become the contractual DTC goals for contractors supporting the program./ j" n# F+ c: ?# C Det Detachment.; ?% C- @* b( {1 b) ] DETEC Defense Technology Evaluation Code.4 a* q/ l; b2 a) G2 W; p, w& k M Detector A passive IR, visible, UV detector turns photons into an electrical signal. The2 e2 X# f8 ?' U8 I8 R- `; t IFOV of the detector is its solid angular sub-tense. There is sometimes/ p; C! s8 S+ J' k confusion between the detector sub-tense (size) and the pixel (picture element $ a1 P; S. R. }# L" l! C2 tsize). They are the same for a staring sensor, but in a scanner it depends on9 l( t5 W+ L: ]+ v2 V- q% O! O the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.. |8 b& ~, o( ]* x MDA GLOSSARY, VER. 4.0 D \) ^- I! y' p; ~( R' e1 H 79 * J0 g: b7 k. x5 DDEV ENV Development Environment.1 N% K5 m% U! e/ g4 ?7 R: r7 a Development8 p8 k/ V( L6 v) E0 w% s Test (DT): Q* A- K( D* m9 ^5 m V C Test conducted by the development test organization to achieve specified test$ B) U5 @" w; Y) q! c5 G objectives. It may be a complete test, a subtest, or a phase of a test. ' B7 B8 r4 b" z+ aDevelopment 6 K2 H' G9 m2 U- F, _Test I (DT I)# R- L5 X( e# `6 Y: j' `* ^ A series of tests conducted during the demonstration and validation phase.: u( A9 M1 e3 C+ f+ [/ Z Components, subsystems, or the total (or full) system are examined to determine + U( @2 u* b7 e% P% @5 r! Pwhether the system is ready for EMD. State-of-the-art technology is addressed - y4 X. G1 q; x- H; win DT I.7 ~" A0 C8 ^- U: x Development & m. V- ?, t6 M7 `Test II (DT II) * d3 b1 c% ]4 \4 a9 @ cA series of tests, normally during EMD, which provide the technical data( @) s3 I5 Z+ D necessary to assess whether the system is ready for low-rate initial or full ) x+ H: H/ w/ ^ Y; l3 C* z# iproduction. It measures the technical performance and safety characteristics of+ x# O) [9 M1 [* k# p( b& t. A$ M the item and evaluates its associated tools, test equipment, training package, 3 _% i. ~( H/ U5 s& q, Dand maintenance test package as described in the development plan. DT II 6 R- u- {% u( J$ g: i8 T4 W, g6 C5 C) |1 Qaddresses accomplishment of engineering design goals and the fulfillment of& |# S2 | k6 X contract specifications.6 W" I# d* t1 h$ P0 A7 ^- { Development$ t% H; w: x3 h Test III (DT III), S6 V3 {' o& h Tests conducted during production.1 x/ J9 P4 j7 L7 W/ q/ n4 n Development " F5 ^# V# C+ d3 iTest and4 v% ~6 f" N7 ^ J Evaluation " L% Q! l0 ?3 E) _(DT&E)! S- _( d* M; z& q& P0 |+ U+ E Test and evaluation conducted to measure progress, usually of ; O$ g! ?1 `/ @% ?) l0 Pcomponent/subsystems, and the proofing of manufacturing processes and 3 R! b# x) y. v: p6 Rcontrols and to assist the engineering design and development process and) _6 c2 F% g9 N, a' X& g verify attainment of technical performance specifications and objectives. Usually ; a1 ~& N" ^, ?& econducted under controlled or laboratory conditions. Can be conducted before * {. L A" |9 c$ d' ]8 N2 S2 b, \3 C6 Oor after production begins. 5 Y( t8 {: r1 E% T& I2 _Development/ R; @; q5 e: s! y6 ^: T Test (DT)2 x7 u2 `) N6 ~ Test conducted by the development test organization to achieve specified test$ b4 p- x) ?' @) A+ p! w objectives. It may be a complete test, a subtest, or a phase of a test." V, s2 J! P: S! W+ U3 B' I Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,0 h/ n- P2 X' v7 j5 I9 f3 c/ }8 s5 X schedule, or performance without authorization from the milestone decision $ m6 c/ e0 N) mauthority. Acquisition Program Baseline (APB) thresholds represent these " }4 e+ |5 H2 s/ R* u! r0 mparameters.; N6 ]5 p3 E! i; ?+ l9 d: F Devolution of ! x p8 l* Z. r1 y3 j) L. _Command0 B$ k/ p; ~: S2 P% _1 \/ P Minimal essential operational capability to perform C2 provided in an orderly and5 q* P. o9 W$ U timely fashion to a duly authorized successor.+ x2 p$ j R0 H8 r# f- |4 ~ DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.$ j$ R$ d2 J+ V' Q- O DEW/D Directed Energy Weapon/Discrimination.( }: |6 `2 R H( T b DEWG, O Directed Energy Weapon Ground, Orbital , i, E( E: v b" j0 w5 f% pDEWL Directed Energy Weapon, Laser (thermal or impulse).' W3 T; ]& v. E- [ DEWP Directed Energy Weapon, Particle Beam (neutral or charged). 8 d" v5 u8 s8 T hDF-KBS Data Fusion Knowledge Based System. $ y' b! I( g6 M; v8 H+ JDF2 Deuterium Fluoride. 8 ]$ j) K r; U8 z7 g; VDFAR Defense Federal Acquisition Regulation/ t* c- L: g/ @1 X/ p+ g DFARS Defense Federal Acquisition Regulation Supplement. 5 X: c2 s6 ^3 X0 k' L3 jMDA GLOSSARY, VER. 4.0 D : z. V3 i3 S F; m: w80 2 k( A( l. x: a; q6 N0 N* l- bDFAS Defense Financing and Accounting Service.; U6 J& Q: P- m DG OBSOLETE. Defense Guidance. See Defense Planning Guidance./ d* b" M& E7 h1 R DGA Director General of Armaments (France). , B" _) G3 x' UDGP Defense Group on Proliferation.9 y z. Y6 Y7 l. `$ j$ i DI (1) Data Item. (2) Developmental Item.3 i1 r/ F4 K: l D! r$ I DIA Defense Intelligence Agency.- Q6 I% o$ K: {8 }/ n, o$ ^ DIAC Defense Intelligence Analysis Center. % X# Z: m& V& S0 kDIAM Defense Intelligence Agency Manual/ ]- ] P' o' b& c Diameter (Optics) The unit of measure of the light gathering power of a lens.- ~; E' E: j, `4 @ DICE Digital Integrated Combat Evaluator.* Y$ o6 Z4 t; E DID Data Item Description.5 l: D F/ L) ^/ F Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The2 j* v; `5 o$ m angle of spread, which cannot be eliminated by focusing, is proportional to the ( y9 c& {0 j8 zratio of the wavelength of radiation to the diameter of the aperture. W& A' T6 R$ ^2 s: F6 x Digital& @" k$ P- ]0 ?; S; F Processing/ q: H: W* b' d6 o4 A; z2 ] The most familiar type of computing, in which problems are solved through the : p- G$ }& F" N e$ U& u4 Ymathematical manipulation of streams of bits. ! t0 [ T$ \( c1 S4 UDII Defense Information Infrastructure8 m D$ `* V0 p/ \ Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to ) ]- ], D3 c7 Y1 @% L/ F! W. w12 km) between wake termination and de-sheathing. & d! A5 u# b8 r0 a: o, `6 U6 ]DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).6 q" { W8 ~6 [) R2 @% b' W; D% v DIR Director. & x& `& Q; v. @6 fDirect Air * q! H3 r' E8 K7 CSupport Center& m7 w3 n( w, J8 ? A subordinate operational component of a tactical air control system designed ! o' v: I5 J5 _for control and direction of close air support and other tactical air support , @+ F; }: X5 Noperations, and normally collocated with fire support coordination elements.' w) w! D' r( `. ~3 S: A% i- P8 D Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not/ W0 ~, x- u+ Z) Q necessarily limited to items that are incorporated into the end product as labor or' ]& m" ~$ E5 T% P material. ?* V- F0 G7 z" h; KDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing0 T! R$ F$ J& }/ ` direct labor includes fabrication, assembly, inspection and test for constructing 7 ?+ q+ `9 z- B3 Q' ]' Othe end product. Engineering direct labor consists of engineering labor such as! p; T3 ^ ]0 z- o5 q! { reliability, quality assurance, test, design, etc., that is readily identified with the $ P* c4 C4 E" A* G0 _5 Jend product.6 q0 ~; n. |& t! D) }* \' n Directed Energy. I' v; X7 A- X- a0 ^' V8 l- F& k (DE)/ B, {0 I; a; [1 `+ J6 V 1. Energy in the form of atomic particles, pellets, or focused electromagnetic : a9 x* m# m+ g9 G# [beams that can be sent long distances at, or nearly at, the speed of% }, P' G* F. h( @; V light. 4 G5 c& T3 i3 u2. An umbrella term covering technologies that relate to the production of a 8 N2 E o! k8 Rbeam of concentrated electromagnetic energy or atomic or subatomic particles.# f% d# ?$ O5 V! K8 O MDA GLOSSARY, VER. 4.0 D : E6 C k: M, [$ y5 h$ |! g81 6 e8 D. V" j! I3 K4 g( [0 QDirected Energy+ g( `* W/ r3 n Device 6 b, ]( Y3 k0 J6 h& X# }# VA system using directed energy primarily for a purpose other than as a weapon.7 A6 |; \/ m$ m w7 k: _& y' Z Directed energy devices may produce effects that could allow the device to be * k- N. M$ r" y6 Q jused as a weapon against certain threats, for example, laser rangefinders.1 _ |) o* W6 g6 v. S. u Directed Energy . l9 s' ]: U+ F( i6 M/ [0 ]Weapon (DEW) # ~ ~/ v( ^& w! LA system using directed energy primarily as a direct means to damage or destroy2 A( X: \1 y h* ?+ K3 i' F- ? enemy equipment, facilities, and personnel.1 e c3 m6 f0 {, t& h+ ]# a3 @; B3 z DIRLAUTH Direct Liaison Authorized./ b1 I/ T g! h5 k( K6 n8 P' g7 X DIRNSA Director, National Security Agency.2 j! f; n2 i5 Q& k4 j DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. @1 r, ?5 Z/ n4 Q: ?+ l" xDISA Defense Information Systems Agency, Washington, DC. (Formerly known as6 B- G. k. K) h! { Defense Communications Agency).2 C1 a O3 ]* ]7 z: J# C DISCO Defense Industrial Security Clearance Office ( v% y. u6 p' \/ c$ p) hDISCOM Division Support Command (US Army term). : i% T' }/ j6 l7 a3 @6 KDiscretionary) S7 R$ V/ |+ p* B3 Z& G Judgment 0 N& A; y( a1 iThe authority given USCINCSPACE or his duly authorized representative to 3 ^4 W% H$ [4 Kperform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination , g6 N' y5 V1 @3 b e( [DISN Defense Information System Network (DISA term). Z9 S; f: |8 y2 N! j9 ~ DISSP Defense-wide Information Systems Security Program. 0 M r$ [, Z' o4 s+ K, Z- zDISUM Daily Intelligence Summary (JFACC term). 1 a; r/ A5 V5 K" [/ lDITDS Defense Intelligence Threat Data System.- T3 n4 [$ v& L! Q DITP Discriminating Interceptor Technology Program. The objective of DITP is the 5 {8 ?8 T u, }9 v2 o+ L% Qdevelopment of advanced interceptor seekers to counter advanced threats. % N' Z/ R& d' K5 R, rDITP will integrate passive and active sensors into an interceptor seeker that/ i( ^1 L, R! [# Q& ` integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP3 @! u4 [1 O4 l4 T& ~- u0 t2 n flight demonstrations will involve the tracking and interceptor on-board6 E" N* K ]& X1 j5 {0 X discrimination of targets of opportunity while providing fusion processor data b7 d8 F9 g% ?# M! y ] telemetry. (See also ASTP). ; I, Y. G1 K4 G: K' c! \) ADIVARTY Division Artillery (US Army term). ) l k, `; s- M9 g& `7 kDIW Defensive Information Warfare. $ j( |. W# [6 p) p: ^DLA Defense Logistics Agency, Alexandria, VA. ) K& l+ t; d' t5 }DLSC Defense Logistics Services Center (Battle Creek, MI). 0 ~* f+ S3 }+ o8 Y! tDM Data Management 0 D8 { G& k" R. z! D/ y3 [! F3 ]DMA Defense Mapping Agency, Fairfax, VA.; v! Q9 b) c' c' s9 ]- x6 G DME Distributed Management Environment. & n @) t/ f: b' O4 b# NDMI Dual-Mode Interceptor. 3 i4 N/ z* J* A8 cMDA GLOSSARY, VER. 4.0 D: I; j5 ?6 A" ~ 82 N) p0 }5 x3 z+ h8 \+ Q& H" UDMRD Defense Management Review Decision." x- P& u+ T7 N7 P* N0 ~ DMS (1) Defense Message System. ' `- U4 r A+ w% U6 ~: f(2) Dissimilar Mission Simulator.. {; s: l3 r7 S& E DMSO Defense Modeling and Simulation Office (OSD).9 e5 @+ [3 Q0 x. [0 J DMSP Defense Meteorological Satellite Program.* \; k7 |6 z& N& _. f" ^/ @ DMU Disk Memory Unit.1 W' p+ w0 F! L2 `& o DNA Defense Nuclear Agency, Alexandria, VA.% D3 v2 p+ g- c- t8 {$ T" D$ C DNMS Distributed Network Management System. 5 ~: [- O% |$ S3 T) b9 |% fDNSIX DoDIIS Network Security Information Exchange1 [* ^( r# J" ]9 R/ k+ I( ? DNSO Defense Network Systems Organization., _. N ^( D4 i1 I: r& e DO The lowest rating under the DPAS. All “DO” orders take preference over unrated) m x: ~8 |3 i) M# M p7 m orders to meet a required delivery date.% e5 _0 _( y( ~! m3 ]! b% x* y Doc Document9 f& k- r3 O T, b( N, m7 ?: t7 V DOCPREP Documentation Preparation. - l0 u* @4 G) x" WDoctrine Fundamental principles by which the military forces or elements thereof guide ) m+ i5 d D# i& S2 s8 B' Ytheir actions in support of national objectives. It is authoritative but requires % _0 g& S! G$ |5 _5 @judgment in the application. See also Combined Doctrine. , W4 s1 d0 w/ }3 I0 M8 u6 dDoD Department of Defense5 [+ e0 O; e" @ T7 ] DoD Component * f6 ~$ ^- |; k. lAcquisition ( T, N/ b! ?* s8 W. n$ V! [: _. TExecutive + {% g! h3 ?) z2 g$ d3 ^& Q: _+ UA single official within a DoD Component who is responsible for all acquisition - p: k" c7 W: @/ D" `( Gfunctions within that Component. This includes Service Acquisition Executives % @% R7 B- G' O; X! Q3 P2 u! _for the Military Departments and Acquisition Executives in other DoD4 [- }2 | e. P- [ Components who have acquisition management responsibilities.6 l6 K3 e" `% I/ F" J* c DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, 7 _0 H% D' x1 d! H3 E7 LJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the+ E1 X, A2 N' x7 |/ ?" ] Defense Agencies; and DoD Field Activities.3 A* `6 g. b6 R5 T) _; i9 y) g+ M DoDD DoD Directive. 3 o6 }' ]3 J/ @ j8 d" LDoD Directive: H$ x& M& |# N1 ~8 p 5000.1 ; J* }1 i# S/ V4 T2 ]$ ^) {- H“Defense Acquisition.” The principal DoD directive on acquisition. It establishes9 q0 \) ]3 z2 M: ~2 S1 y policies, practices and procedures of governing the acquisition of defense ; B2 j5 V( j: K/ C0 r, s& `# r- Zacquisition programs. 9 [& J& ~% [6 M3 vDoDI DoD Instruction. U) L P; k/ T: MDoD Instruction & C5 H; r; p4 @, F) o9 M5000.2 9 ^ T5 b! S: z3 o0 i4 l: H: K- @“Defense Acquisition Management Policies and Procedures.” Implements DODD# u" {. o# m2 a4 n 5000.1. . @0 ]! Z+ U8 @DoDIIS DoD Intelligence Information System.5 `1 n/ B5 i, K+ p. O1 Y* Q1 J DoDISS DoD Index of Specifications and Standards. + f) n, }8 h2 v1 k$ bDoD-M DoD Manual. + O: b5 j4 j" KMDA GLOSSARY, VER. 4.0 D7 L" |. K! b1 A/ B3 }* R6 ` 837 q/ n2 C2 }/ D$ t- I DoDR Department of Defense Regulation." V7 D' O/ i" m4 \0 ^ DOD-STD Department of Defense Standard. + D$ R0 c$ T5 O, a' ]4 C& [DoE Department of Energy.' C) Y, N0 c+ B* P DOF Degrees of Freedom. 5 Z d; ~6 S% L5 oDog House Large Soviet A-frame radar used as a component of the Moscow ABM system/ E" J" Z- ]* K- d4 H having a detection range of approximately 3000 km. It is believed to provide ! ~' K6 i/ F; H |& gbattle management for the totality of Moscow defenses. 8 r* `7 R; A0 J5 E9 Z3 WDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).( N2 O* K1 y) V& q" a) ] DOPAA Description of Proposed Actions and Alternative (environmental term). 5 d" F% r* \4 O% J9 [. Z5 wDoppler Effect The phenomenon evidenced by the change in the observed frequency of a. h4 e4 W3 s, y sound or radio wave caused by a time rate of change in the effective length of 6 w0 s1 K& E9 V9 t. |% Gthe path of travel between the source and the point of observation.; Q5 V" C- d/ r2 F DoS Department of State (US). ; r9 W# a0 W& U3 S y w3 @9 C* \DOS Disk Operating System (TelComm/Computer term). 5 E* R/ n$ M3 z O2 U+ z; sDoT Department of Transportation [US].) f! w1 W2 G. p. ]5 _4 t6 ]# e: r DOT Designated Optical Tracker.6 L5 h+ {' Q; I j DOT&E Director, Operational Test & Evaluation. & ]- L. j6 u* wDOTH Defense of the Homeland., A3 A& k) J4 [ Down Select To reduce the number of contractors working on a program by eliminating one or# D8 G7 N* Z/ ^6 E( J! V& A( t& o/ O more for the next phase.# }/ F4 I" ^. M DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. , v! F6 N( v! |, H) KDPA Defense Production Act. + }( D& S- h; {8 _) [DPA&E Director, Program Analysis and Evaluation. * E! w% ]( }* F: h* e5 zDPAS Defense Priority and Allocation System. & M5 t8 |4 d: C0 m Y, @+ h7 QDPAT Dynamic Program Analysis Tool./ A8 [- j, |! `8 [! |7 q C DPB Defense Policy Board. 2 F! s9 J" Y% Q- e- x( Q O( vDPG Defense Planning Guidance.* p: N6 G1 ?6 U; j DPM Deputy Program Manager. ( y& z8 D& f# Z( {/ uDPML Deputy Program Manager for Logistics2 p2 Y, V$ e/ ~1 b0 d" L DPP Distributed and Parallel Processing (Computer term)./ M4 L8 C5 }2 l: {4 | DPR Defense Performance Review. 2 }% a- y/ Y: | ?+ xMDA GLOSSARY, VER. 4.0 D5 K/ U4 c) U' O0 E 84 # I- X W3 {2 XDPRB See Defense Planning and Resources Board. & c7 l0 {$ [5 vDPRK Democratic People’s Republic of Korea (North Korea).2 B9 _* h# i' L1 e DPRO Defense Plant Representatives Office.+ T8 l x: a1 S, U: O: H; F DPSSL Diode-Pumped Solid State Laser. 8 \0 U n$ P# y1 a( z6 v; xDR Deployment Review. + J F2 z: {2 x8 \( Y; tDRAM Dynamic Random Access Memory. 4 P. r3 B W& ]8 R6 X* S( [Draw-down Curve A method used to encapsulate the overall performance of a BMD system that t- }8 u- W) @2 F, j plots the probability of survival on the vertical axis versus the number of attacking 9 ]3 V! V( n0 y3 q, oRVs on the horizontal axis. Used in conjunction with attack price, they are the W+ [ \$ e! J5 P most important expressions of a BMD capability. : W1 L1 \3 h+ \& E' XDRB Defense Resources Board. 0 }/ K% K' f& A+ qDREN Defense Research and Engineering Network./ ]/ r' q0 R/ A3 R, w3 p! e DRFP Draft Request for Proposal. . {- n3 V$ y! F H; vDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from0 j* q) L' D/ h* z' W( H! ^ gravitational and atmospherically induced torques on the spinning projectile. * X z i: n4 N$ t( {. yDRM DAB Readiness Meeting (DD 5000.2 term).# ]$ h! D+ o& Q- r0 U7 g7 o4 ?' D Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also 1 i/ X5 D* N ORemotely Piloted Vehicle. 7 \! `' Q6 ]) Y" W' E- iDRP (1) Deployment Readiness Plan (US Army term)." a* L( B/ e; U5 v (2) Deployment Readiness Program. H! {/ m4 c$ @$ RDRR Digital Receiver Replacement (USN term). & [2 A) N" S' U( j3 Q1 j$ g/ ]DS Deep Space. , i v' r4 T2 v2 fDS-1 Category of telecommunications circuit capability. 6 E8 r1 d! d2 R; w0 V; y! Y, LDS-3 LAN Category of telecommunications circuit for a Local Area Network. A4 a. A$ O3 h! l( LDSAA Defense Security Assistance Agency (OSD). 1 K. |8 _$ D& w! E( qDSAT Defense Satellite Weapon.& w/ c" p$ M& r. B6 j( N. F/ R% c DSB Defense Science Board. ' Z1 v' r0 E: H% nDSCS Defense Satellite Communications Systems." E' \: m' g# }8 V3 c DSCS-3 Defense Satellite Communications System Three.6 \0 L% {$ R/ `: Y2 S7 G& s/ y, U* Y DSCSOC Defense Satellite Communications System Ops Center.& F4 k z; j, S( R3 W/ p DSI Defense Simulation Internet+ Z H& `8 }" ^* @+ ^: U$ N MDA GLOSSARY, VER. 4.0 D 6 S- y( y$ ~ t85 ; |/ J5 P* W+ ^& _" V, ]DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet ) |. [$ x, Y* P, kSystem.9 p" ?4 f6 c6 l2 l6 e9 y% g DSM Decision Support Matrix! N/ ]% E3 L+ u DSMAC Digital Scene-Matching Area Correlation.7 X5 f$ `" H5 p( S8 I DSMC Defense Systems Management College.* N# v% v: Y& R7 C0 {. e DSN (1) Defense Switched Network (formerly AUTOVON). . ^2 i! i0 X$ y$ P; h2 s O(2) Deep Space Network (NASA term).7 L. K' [! A1 u! v: h DSP (1) Defense Support Program. (2) Defense Standardization Program. w; P2 V7 Z L1 x- V5 }: Q DSPRTM Defense Support Program Real-Time Model. . X" P, r. ?+ b7 Q0 f; g N( qDSR Data Set Ready (TelComm/Computer term).' ~0 }8 f2 S( l DSRCE Down Scooped Radio Control Equipment (TelComms term).% I( R! G2 F3 w# {# K3 ^, y DSS (1) Defense Supply Service. (2) Digital Signature Standard.2 B+ h; e) n, r( t8 m+ u+ M) q/ } DST Defense Suppression Threat. ( ?6 e3 e: x) i i4 Q+ @- _DSTAR Defense Strategic and Tactical Array Reproducibility. ! Y7 {5 h& A$ y b yDSTO Defence Science Technology Organization (Australia). + n3 M; I; L! ~( R- hDSU Digital Service Unit (Telecomm/Computer term). ( V9 a, z4 D+ s& W9 |; pDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to & s7 D1 T- i. `1 f- C- k Qthe DNA. . }2 e! R0 N# U7 S' ZDT (1) Discrimination Technique. 1 a: ?) v0 H& R" v( P(2) Development Testing.# }) K! m4 y) z5 f1 k% S2 ?- c (3) See Development Test I, II, III. - J8 o, C0 U# f& w1 x(4) Down Time (ILS term). , a( p2 m* K9 \' G(5) Depressed Trajectory.2 k# L" u. k( o( V0 j6 b" j* q (6) Dedicated Target.* k5 p% w0 ~6 K DT&E Development Test and Evaluation.; Y0 p& {* X* k' c DT/OA Development Test/Operational Assessment.) B. i9 H3 u3 B6 G9 T5 g DT/OT Developmental Test/Operational Test. $ t% D& E7 y1 t& s4 u* eDTAP Defense Technology Area Plan. $ ~; r" h' h* V1 D8 Z9 z+ ~0 \DTC Design-to-Cost. ) T$ x" U; ]# S L' IDTD Digital Transfer Device (TelComm/Computer term). ! g! r) Z: C0 h. sDTE Data Terminal Equipment (TelComm/Computer term).$ i+ |7 ]+ a: R DTED Digital Terrain Elevation Data. 4 W9 ^3 N( M, }DTIC Defense Technical Information Center, Alexandria, VA. 1 {' X0 s G9 |MDA GLOSSARY, VER. 4.0 D 6 @/ u8 h# V3 k( d8 P0 e0 T0 U( b0 S86 0 u" D4 c6 \% t* R! f" I( T9 XDTIS Defense Technical Information Services (now DEIS). 2 _" W4 r0 v( t& q' T: Y7 BDTLCC Design to Life-Cycle Cost.2 o4 n s8 `. ^/ S DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL* t2 Q8 D# L6 Z7 m term). 4 S* o7 u5 v7 aDTLS Descriptive Top-Level Specification. 7 V( T( \4 I$ RDTMF Data Tone Multiple Frequency (TelComm/Computer term). }. |$ q2 E7 N, O9 { DTO Defense Technology Objectives.5 I" v5 y: C8 ~2 \7 |# [0 O DTOC Division Tactical Operations Center. 4 f2 W7 n5 g; F7 V7 i) L7 P; vDTR (1) Demonstration Test Round. (2) Development Test Round. 0 G) C2 \9 l# ?9 G- VDTRM Dual Thrust Rocket Motor.. v; |4 X7 K4 t+ F! `$ i DTSA Defense Technology Security Administration. 0 s c( [4 z' [DTSE&E Director, Test Systems Engineering and Evaluation. 6 I: d* O U, M: T# J. i* `DTST Defensive Technologies Study Team.* H% c: F8 h* }7 r4 V, H/ j DTT Design-To Threat - ?) V4 J! H$ o4 }0 CDTWT Dual Traveling Wave Tube (Electronics Engineering term).4 A' h* d$ ]$ p$ } DU Depleted Uranium.7 y& Q0 y! h! g+ p/ k; X( Y DUA Design Upgrade Assessment.! O# \$ h, E& z* w- g. U$ z) u Dual Source Two contractors producing the same components or end items for the same 0 R8 k) g4 U8 T( H# H2 Z+ iprogram. $ D) S0 _+ U2 {DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). . v) R: N- ?- Z$ S" ^( N4 [9 IDURIP Defense University Research Instrumentation Program. 4 a1 H6 _ n$ W1 b! G8 a$ GDUSD Deputy Under Secretary of Defense.! i- ?9 R3 s& r9 a# l" b! N DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). " C& _7 X; n& t h& S! EDVAL Demonstration Validation. ~# P: M& J- F DX The highest rating under the DPAS. It takes preference over all other rated and: l. I) P& V7 F, X3 Y6 _ not rated orders on a contractor’s production line. The BMD program carries a$ C2 n, s' S5 A& Z3 M# ]* t “DX” rating. + K0 L* y% _ @6 D) X0 r" W" fMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87: z Y! F8 e. \ E East 9 a% q$ Q0 Z- p3 _E2 I See Endo-Exoatmospheric Interceptor.) a: o; H! S! q! ~4 n; j$ H E2SRD Effectively Two-System Requirement Document. & ^. Y" {+ ~3 @% hE3 (1) Electromagnetic Environmental Effects. ( @# R( P, B+ Z3 u(2) Electrical, Electronic, and Electromechanical. $ O1 e) Z" Y) E" g( V' K' R, sE Spec Materiel Specification. * ~5 g9 o# }5 n0 n* NEA (1) Environmental Assessment.' e" e& L' t8 a( X (2) Engagement Authorization. . \# P1 o7 q6 [6 C" ](3) Executing Agent.( m5 C$ A" M9 \! k/ ]7 S0 \ (4) Evolutionary Acquisition.7 ^6 i% s( r$ {3 z (5) Environmental Analysis (environmental term).& v7 s" Q% K# i% A (6) Executive Agent.2 U% c3 M9 H3 K+ P" _0 z( P& p" y- ]. S EAC Estimated Cost at Completion.1 H0 J/ n. v9 k r" c8 f EAD (1) Engineering Analysis and Design. (2) Extended air defense.9 ?6 e& t" t; p EAD/D Engineering, Analysis, Design and Development. % \& }* @( l2 A7 L) UEADSIM Extended Air Defense Simulation. B* a' [( _& W# gEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing$ x6 M( D6 N' S; \3 p users to model military response to airborne and ballistic missile threats. : a% f. p8 p+ E( |, SEADTBP Extended Air Defense Test Bed Program. 8 d5 e" z" f% J; g9 ?) rEAGLE Extended Airborne Global Launch Evaluator. , ^1 ?# Q) X) E: A) B. @5 w; F0 r5 yEAM Emergency Action Message. ' E! g& u) U/ ?; k6 d0 r# jEAR Export Administration Regulations. ( C7 _- E$ \) j( J0 N8 oEarly Operational 0 \6 i& @7 _0 B$ S9 SAssessment * ?5 z l) H) }* t8 YAn operational assessment conducted prior to, or in support of, Milestone II.7 Z: Z" @8 Z) M# g Early User Test 3 t3 L @+ P/ l3 y% Y(EUT)$ e( b. N& h' g: p: a: G A test employing representative users to examine materiel concepts, training or, I' h l3 W6 b logistics planning, or inter-operability issues. EUT can be accomplished during2 ?' |: V. c+ K- K# J DEM/VAL on brassboard configurations, experimental prototypes, or surrogates3 ?, {% t0 s5 W4 p7 k8 V to provide data leading to the decision to enter full-scale development. 2 I% i: X8 h4 qEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of$ V6 T+ u( i% j+ [0 u$ w surveillance satellites and long range radar.7 |- v/ ]9 a! F+ J- @5 h x (2) Early notification of the launch or approach of unknown weapons or* J9 C, U' |* B, E5 Z weapon carriers. . u: k X5 w- |8 qEarth Limb The apparent outer edge of the earth as viewed from space. , [( f4 z1 m- W( j" z" O8 N H; FEastern Test5 b6 g6 |3 m5 `1 r Range (ETR)" P4 m* c7 x# s( j2 u Beginning at Patrick AFB, FL, this range stretches halfway around the globe " X5 e3 G o8 H, @where it meets the Western Test Range. An array of launch complexes, sensors,5 A: c! K1 u! G6 u" V/ t and tracking sites make up the Eastern Test Range. The ETR is now operated8 c, p7 k( P0 V! C; ]( Y% W) e by AFSPACECOM as shown in WTR definition.: r" q8 f8 i' Z7 \ MDA GLOSSARY, VER. 4.0 E$ W6 U( X8 A( ]# A 888 u& E) R6 T1 q$ ~ EB (1) Electron Beam. (2) Enhanced Blast.7 H( k8 B" N6 ?2 v" F EBB Electronic Bulletin Board.8 h* p Q# W2 A- e EBCDIC Extended Binary Code Decimal Interchange Code. $ ]* R3 f% K, Q6 R% \+ J% EEBW Electron Beam Welding.+ ^- o7 Y3 B9 ]4 e EC (1) Electronic Combat. 0 ]: f$ h4 Q2 e k; W& L" n& o(2) Error Control.9 v8 I: N1 A) L: Y3 D$ i, _+ W (3) OBSOLETE. European Community. Now known as the European Union7 M; W; P9 T$ {. V5 D1 f, r4 E; e (EU). ' f e2 r: F6 G8 L2 p# dEC/EDI Electronic Commerce/Electronic Data Interchange# \0 D4 Q' @3 t, ^ ECAC Electromagnetic Compatibility Analysis Center. 8 j- K3 R" r5 q. W/ x' ~ JECB Engineering Change Board. ! q% J$ S: u/ |ECC (1) Equipment Control Center. (2) Element Control Center (USAF term).% p, }# }6 \) s# F8 p. S% T5 t ECCM Electronic Counter-Countermeasures., d: e- ]1 K2 Z: I ECDs Element Control Directives. % O) T& A# S+ S8 q9 ?9 w d1 sECLS ERINT Command and Launch System.1 z A8 |1 y$ B9 A7 t) ] O ECM Electronic Countermeasures. ( {% M! j: O# k9 J' Z. xECN Engineering Change Notice. V" n9 [& T$ {% y6 C6 ^2 f5 Z+ aECO Engagement Control Orders. 8 z8 N; d% q1 d# j9 g4 \9 [ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. 7 F% @3 Q7 I1 \0 vECPMO Electronic Commerce Program Management Office.0 \3 G! t* a$ `2 G- `4 ^ ECS Engagement Control Station (PATRIOT).% }, L3 `# r) N, D; m ECU Environmental Control Unit. . k7 f/ z" S4 hEDAC Error Detection and Correction0 f9 ~ j8 B. L, ~: r! l- X EDGES Electronic Data/Guidelines for Element Survivability. ( l2 u8 m0 u! R: i* y5 H# \4 R9 fEDL Electrical Discharge Laser 4 B: ?# J. o. y. _EDM Engineering Development Model. ! C' ]0 b+ d9 o' T! m& PEDP Engineering Development Process * B1 r/ M+ B" c' K- E6 HEDR Embedded Data Recorder (PATRIOT).& S& v$ }; k0 i3 i4 O EDS Electronic Data Systems Corporation" o9 W$ t1 G! j: m r' G, \. J EDWA Engagement Determination and Weapons Assignment (PATRIOT). |, j, U/ Q& |2 fMDA GLOSSARY, VER. 4.0 E % I4 r# b& r% |1 t5 b! [" t* Q0 g89 2 W0 n. ?' b! F7 O9 Z7 }EDX Exoatmospheric Discrimination Experiment% B- O- l0 ^& y$ p; M C EE (1) Electrical Engineering. (2) Engineering Estimate. 9 ~5 a/ J5 D( R9 g) B* j6 c- ~. qEED Electro-Explosive Device.5 F5 [6 D7 G$ [) I EEEV End-to-End Experimental Version., n9 A+ q$ B* q# {! l' Z7 L EEFI Essential Elements of Friendly Information. / i7 @0 y3 _' ?1 R# {" FEEI Essential Elements of Information. [1 J6 _) T+ S& x EEIC Element of Expense Investment Code.! B7 D3 x' E( J1 W7 X8 r' ^ EELV Evolved Expendable Launch Vehicle (USAF term) ! R4 D7 d- P3 ~/ v; N1 E: W4 \EEU Electronic Equipment Unit. t5 H" \7 i% g& h. kEFEX Endo-Aeromechanics Flight Experiment. / u0 |( d9 R* H! Z# A8 }( p0 |EFF Electronic Frontier Foundation. ) M) l/ f# F- B1 \ yEffectivity A designation given to the BMDS configuration and demonstrated capability at. d' m& \3 ]. U3 q" i/ i4 m a point in time, becoming effective at each increment when an element or! S! B! _# O- w# ?- j component is inserted into a particular Block. 4 A4 a# W0 n( ]' k8 B- p. l7 T9 eEffective Damage That damage necessary to render a target element inoperative, unserviceable,5 S `4 W) b3 Q$ ?. e) w; C2 O6 w nonproductive, or uninhabitable.7 V2 a7 j9 H, l2 p# }6 Y0 n Effluent Plume The pathway of movement of effluents through surface water or air.$ m! c, _+ |& f9 w% S' L EFP Explosively Formed Projectile.; W( Q$ p( u) r, g2 a7 C0 T6 ^# e3 w EGP End Game Processor. : y8 W: Z0 G) @* DEGTR Eglin [AFB] Gulf Test Range.2 {7 \% V" M* p% ~# w; @ EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). - F, N' Q$ {# u- F) rEHF Extremely High Frequency.1 \3 S* N8 \. G% x6 S ehp Equivalent Horsepower.+ o$ P. X4 s! b1 o1 d+ c# h: c3 O EIA (1) Environmental Impact Assessment.9 U! I9 M; G9 z' U! q4 w8 P (2) Electronic Industries Association.) m3 L5 [2 G7 o; g EIAP Environmental Impact Analysis Process. 5 N S) |: l1 t6 v: Q6 b8 rEIP Exoatmospheric Interceptor Propulsion. 0 s1 b1 ?4 e8 H, EEIPC Electronic Information Privacy Center. # J' F+ }' b5 S! ^$ d6 f: OEIPT (1) Element IPT. (2) Engineering IPT.. x) _8 j( ~' d0 Y9 ~7 @ EIS (1) Environmental Impact Statement. (2) Explosive Initiation System., u- b7 U( X7 R8 y EISA Extended Industry Standard Architecture (Telecomm/Computer term). . F7 M( ~3 O+ Q; gMDA GLOSSARY, VER. 4.0 E * o5 K0 ?' e5 w9 [* G- d90! e8 T6 y4 O: f( K$ x) C0 y EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.% F& \/ O$ x$ r: E _* C/ v1 B V Elastic Range The stress range in which a material will recover its original form when the force0 F) [) p$ E7 q0 W% S: O (or loading) is removed. Elastic deformation refers to dimensional changes 4 q! J3 B! I# R& ~* v) Z0 p9 b2 Hoccurring within the elastic range.) X+ N! R% D+ u: p1 U, u: e Electro-Optics ; `, t" R( Y1 ^+ R; eInfrared (EO/IR) ! _+ }" {) `9 e2 RTechnologies/techniques employed by optical sensors in the wavelength: i P9 m+ \9 _/ j" A spectrum slightly longer than visible but shorter than radio. ( N; ~0 a. j5 a, w- A1 z0 SElectromagnetic) S& n8 k8 p" Y# I9 Y j Compatibility# N& n3 } O: l3 K (EMC)' Z! Q5 s: Z# \- a A condition when all electromagnetic emissions from electronic, electro-magnetic,1 N" L7 F: G' s* a and electro-optical components of a system interact without interfering with one [) \* P- `- b# h% ?5 }/ G' L* b another./ x$ \/ S: K* Q( e+ p1 x7 y9 n+ M Electromagnetic' o/ c5 S" c9 Y3 H+ V3 r Emanations - ]5 {) x3 p$ u" X! L1 K7 T( ^Signals transmitted as radiation through the air, through a vacuum, or through 3 H* u! x T. ~5 S1 Q ~8 _! hconductors. # t' s8 L3 f9 AElectromagnetic% S; N9 G( X2 E1 g3 b) J Field (EMF)9 e" E- Y5 T# s An electric or magnetic field or combination of the two, as in an electromagnetic : C1 l4 E6 M: Q* Z3 S4 }$ P2 T, Kwave. Created by electric charges in motion, having both electric and magnetic O, e7 \9 k( l0 c2 X% } u components oriented at right angles to one another and containing a definite ' `6 e0 F4 K8 ?) x" J. aamount of energy.0 M- G; U) |& c ? Electromagnetic8 L. [) X- q3 ? Gun (EMG)3 u1 z8 A2 ]1 ]" j- [* {: p A gun in which the projectile is accelerated by electromagnetic forces rather than* b8 j2 H3 ~$ R) q4 s( a2 m; w by an explosion, as in a conventional gun. 6 |1 L; M4 a; H5 i+ X2 Y1 CElectromagnetic " w0 _1 v- g" `5 G, w+ n' ^/ D3 wInterference (EMI)% f1 s+ ]2 a: a1 t! \) ] Any electromagnetic disturbance that interrupts, obstructs, or otherwise- s/ A' m R) `5 ` degrades or limits the effective performance of electronics/electrical equipment. ' G- L4 c4 V) p; z1 B' gIt can be induced intentionally, as in some forms of electronic warfare, or$ F% R; l4 b5 b! f- F( K unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.9 }6 I. w# a$ X. F Electromagnetic 3 h* R9 U" \( V0 O2 YPulse (EMP)' s5 k$ ~ _: ?" n8 L7 t The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of 2 a) A* Y4 q* }5 ithe nuclear device or in a surrounding medium. The resulting electric and( x# W5 M: L/ `7 Y2 D5 D) T1 _0 r" W magnetic fields may couple with electrical/electronic systems to produce ! N0 }# ], n; Q0 i1 ^. Xdamaging current and voltage surges. May also be caused by non-nuclear5 {; C7 ]+ t) O, I0 }4 Z means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic. L& N" V$ Y# n, ?" x Radiation (EMR) : [0 F0 y2 v- W/ @) L( p: C( {' g! w$ x# F(1) A form of propagated energy, arising from electric charges in motion that5 c# M' r; C2 r- `8 } produces a simultaneous wavelike variation of electric and magnetic3 T5 o2 T- c: r8 U& W fields in space. The highest frequencies (or shortest wavelengths) of' E, m( V" G6 {, Z% I# R( E$ G5 K H such radiation are possessed by gamma rays, which originate from9 h: o# B" e1 ]2 z; f9 ^0 K$ n( c processes within atomic nuclei. As one goes to lower frequencies, the( z& P0 N, {' l; |# v electromagnetic spectrum includes x-rays, ultraviolet light, visible light,+ t, @$ a2 ?- i0 X1 d infrared light, microwaves, and radio waves. 3 t7 z: ?7 `7 `* M2 i' N' `(2) Radiation made up of oscillating electric and magnetic fields and $ { D$ n( T$ ]propagated with the speed of light. Includes gamma radiation, X-rays,- x* }# m7 B$ O3 t ultraviolet, visible, and infrared radiation, and radar and radio waves., {* t" K. m( Y H Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices ( @/ U- F/ l G7 B7 Z/ s- ^used in system/subsystem design, excluding employment in the RF spectrum. 9 V9 B, Q1 x& d8 V. @8 CElectromagnetic' Y* g2 ]: s, Y! p# ?! y0 c9 q2 d Spectrum7 j1 b0 p5 E6 ^0 c The range of frequencies of electromagnetic radiation from zero to infinity. It is 5 N7 a. h2 C5 O4 b6 ]: D( v$ qdivided into 26 alphabetically designated bands.: R+ Z% }3 w4 L, r: T. Q' c MDA GLOSSARY, VER. 4.0 E ( n5 c+ |" [) | ?: b5 i, Y91- }3 g; s" a( f Electronic I1 A* }5 I! O, J+ a- h( D- X' ECounter- 7 `9 L0 o7 u% o! c5 U! ~* WCountermeasure/ e/ N1 V. r6 U s (ECCM) % s% n" `" t+ _' k. }That division of electronic warfare involving actions taken to insure friendly 3 h- c+ i# M7 m/ j* Oeffective use of the electromagnetic, optical, and acoustic spectra despite the! L/ M& T1 J- {7 ?0 @ enemy’s use of electronic warfare to include high power microwave techniques. & Y" N5 } f" w& u) Q( jElectronic , i; l& G$ ^$ X4 S9 R# i0 bCountermeasure ?6 Q1 `6 U0 H3 v. J/ R3 n" N& t (ECM) j/ _% x# T7 G0 m+ F That division of electronic warfare involving actions taken to prevent or reduce an 5 C( _1 C W& ?1 Cenemy’s effective use of the electromagnetic spectrum. % F0 k# B' g1 k7 v' g5 Z/ VElectronic 0 O [1 s: Q# p J: s7 cIndustries. k* z5 q, Q% o8 R Association (EIA) - l' J( @: r' S2 CA standards organization specializing in the electrical and functional ; g8 u" f" |/ R9 h5 v/ C0 Wcharacteristics of interface equipment.5 Q# M, ^% L7 A7 ` Electronic # Q d/ y5 r7 i4 N4 g# u9 M3 YWarfare (EW). L# q- k$ D( T* x& e$ u: F Any military activity involving the use of electromagnetic and directed energy to3 ^0 p$ d2 ]% Y5 Y control the electromagnetic spectrum or to attack the enemy. The three major0 {$ C6 s j. ]0 @7 x% m. X; a subdivisions are:. E/ B5 R, w" B9 w •Electronic attack – Involves the use of electromagnetic or directed energy to % w- |1 J- W' f6 W! p$ l/ Uattack personnel, facilities, or equipment with the intent of degrading,' K8 @1 u0 w) C1 U neutralizing, or destroying enemy combat capability. Also known as EA.6 q G) o$ ~8 }4 I& N8 K Includes: 1) actions taken to prevent or reduce an enemy’s effective use of & b+ h, |% m1 Z* b& Tthe electromagnetic spectrum, such as jamming and electromagnetic& @) G4 V& g3 C deception, and 2) employment of weapons that use either electromagnetic or # `& Z+ v& r. G( b- _directed energy as their primary destructive mechanism (lasers, radio : M% l- k1 _" j0 g( }6 Jfrequency weapons, particle beams).) y* D1 Z+ Q: Q, K •Electronic protection -- Involves actions taken to protect personnel, facilities,6 |1 _0 t C9 G8 H and equipment from any effects of friendly or enemy employment of 3 L; {) Z: o* u: e# Z7 pelectronic warfare that degrade, neutralize, or destroy friendly combat ; U: J H2 ^5 A$ y/ Icapability. Also called EP. 3 M# j& T! G k+ {0 \$ E a. @•Electronic warfare support – Involves actions tasked by, or under direct / y. _! T: q: k/ X6 B4 Vcontrol of, an operational commander to search for, intercept, identify, and& b+ w, H& L0 } locate sources of intentional and unintentional radiated electromagnetic / P8 n7 N' n% b7 J" u2 u6 y* Eenergy for the purpose of immediate threat recognition. Thus, electronic / k8 R. j! U9 D8 Iwarfare support provides information required for immediate decisions- H2 X/ x( \# l2 Q involving electronic warfare operations and other tactical actions such as/ A* R3 M- {! s8 h threat avoidance, targeting, and homing. Also called ES. - I }2 ^' P7 I- _Electronic* ~6 N8 y, X1 i) D# P Warfare (EW) + d/ U. T3 x& L8 Z% gEnvironments 5 ` x! u7 T1 @; YElectronic warfare environments result from radar and communications jamming ) A8 m1 Q: Q5 @) r Tand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD4 u) q5 v% a( u+ j' y system.6 m0 A8 X) N0 M7 q3 u5 i Electronics % b+ g! n8 \! b4 AIntelligence! ~' A6 v, a9 }; o (ELINT) - a& Y- C1 \. \Technical and geo-location intelligence derived from foreign non-communications2 O: |& f& e5 C# C electromagnetic radiations emanating from other than nuclear detonations or1 E6 I# C; k5 D; d1 T X0 S# Y) L radioactive sources. : |/ A/ M* j9 E8 C3 c' ]Electronics - Z! b! Q | D5 [& uSecurity (ELSEC)$ V* h9 Y3 S5 O( | The protection resulting from all measures designed to deny unauthorized 3 d( ]% ?9 }( V6 _2 ~8 f1 Tpersons information of value that might be derived from their interception and 3 N, Y F: L2 n* [2 q8 P3 p8 @* Xstudy of non-communications electromagnetic radiations, e.g. radar. : w* D; Y c: n. PElectro-Optics 4 t/ e* c3 X. e# x2 q8 FInfrared (EO/IR)* Y& i+ g' g: c7 a# t Technologies/techniques employed by optical sensors in the wavelength - V1 t0 L3 X; Pspectrum slightly longer than visible but shorter than radio.8 \/ q$ m& e9 T7 U# P4 ^5 F MDA GLOSSARY, VER. 4.0 E $ ^) n# w2 L" l) C929 b5 D. d8 ?7 _9 k) F Element A complete, integrated set of components capable of autonomously providing . [; M' [ v3 n1 ~$ e% \BMDS capability.$ k- N- a m$ P: X% T2 C& } Element3 o! \% F& W: A$ B5 X Capability; [# n$ f, q! P2 M5 N0 T Specification; h/ ^' a, T8 P! @1 i) j, p! {7 Y (ECS); O! w8 B5 d7 v$ m* g- \5 V! Z; N A document that identifies the element-level BMDS capabilities and $ m/ @9 K: [# w; P0 G8 k" i$ h. C7 y( mspecifications necessary to achieve the system capabilities identified in the SCS. 8 [; W3 H" X$ g$ U- q3 K( iThe ECS further defines the SCS-apportioned mission/technical performance. f5 j9 Y1 x. w: r1 p7 b2 | capabilities and allocates these capabilities to the element’s components.0 R5 N S$ n1 R% _; {7 S% u Element Control 7 u3 p+ H. M; g5 K5 i* Y1 E! j" E* sDirectives (ECDs)% k* G2 t- d) A9 E& q The command and control data instructions to control the conduct of the % Z0 W( U% r) D4 M- C( S# fengagement. ECDs are developed by command and control software based 4 H0 f3 p: d$ c/ A ~! Y% J& Pupon variable parameter input by the operators (both pre-planned and real time), ; W$ I# {' y- o7 Fand operator defined rule sets embedded in the software. The individual battle3 v5 y! Y7 S* k+ ]) V k$ r9 n management processors use these instructions to accomplish the assigned tasks h! D9 a% }3 m: V from the operations order. ECDs are contained within a Task and represent the : M2 d! f. p+ M( y5 |* Y) g7 lform of parameter values that influence the resource management processes of # d& Z: J3 F% t' J! x5 W) n/ E6 LWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and : j) R. j- C: H, x% M: yCommunications Management (CM). There will be numerous ECDs per Task.. z3 l( U2 D. m9 A+ Y Element , c3 x+ z. p( H5 v! TOperations ' @2 ~( H8 ?- G6 S4 iCenter (EOC) - k, U, I4 g* xAn Air Force operations center, which operates and maintains a BMD weapon or* j& K8 d- i$ h* c: J5 m+ s( S& v$ z sensor suite. (USSPACECOM) $ ]( s. g0 P+ U8 ?6 I. V2 _ELF Extremely Low Frequency.8 X) g& G- Y$ o( W& { ELIAS Earth Limb Infrared Atomic Structure.& u3 v% f( m4 [9 Q) E& H ELINFOSEC Electronic Information Security. 6 c8 x+ P I* c( F; n5 `9 z& qELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-4-26 17:18 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部