航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation/ } B+ A3 j! ?0 f) V1 a* K# Y: Q COMSEC Communications Security.4 s6 |1 G7 R9 C0 w! p Concept7 {/ q) z- D h" | Exploration &' c- R! |1 T4 t8 m( E$ u. \- { Definition* O( ~7 d) q* A2 G3 t9 M The initial phase (Phase 0) of the system acquisition process, beginning at# L x" o) E! Z Mission Need Determination. During this phase, the acquisition strategy is 1 c7 |: b* @/ a0 z4 Edeveloped, system alternatives are proposed and examined, and the system) W: K" E. ~3 @1 C program requirements document is expanded to support subsequent phases. ( Z$ ^, c3 ?0 v) C2 bConcept of" ]; o0 Y2 p3 s6 U Operations- B$ ~, p7 _5 Y6 ~$ W, [9 ?0 V (CONOPS)5 Q# k+ @4 V N0 ? H# f5 t (1) A statement, in broad outline, of a commander’s outline or intent in regard to1 V' H3 I* c9 y, \( T |+ h an operation or series of operations. The concept is designed to give an overall, L$ o4 L6 P: L. L- Y picture of the operation. (MDA Lexicon) 9 @1 f1 ^+ r9 U1 i' T0 b(2) A verbal or graphic statement, in broad outline, of a commander’s 2 I7 ?) J# e" {8 f/ [; Q9 gassumptions or intent in regard to an operation or series of operations. The 8 {. ^& o" T7 D6 e* }- vconcept of operations frequently is embodied in campaign plans and operation7 Y$ x* R! K$ S9 k( Q" n: h" B plans; in the later case, particularly when the plans cover a series of connected& e, U/ A9 z) g1 p( @4 N8 U operations to be carried out simultaneously or in succession. The concept is 3 ^- |/ i# V* udesigned to give an overall picture of the operation. It is included primarily for * p# D& N2 V4 p/ c1 e) xadditional clarity of purpose.8 n9 p& S+ G) k, B" w& P9 d Concept Plan An operation plan in concept format. Also called CONPLAN.8 X3 |* ~& s# g, ?/ E& Y/ F Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of+ d1 c& u- F/ A7 r5 S8 y Q( U2 @3 O: U the acquisition process, or combines development T&E with operational T&E. ! c- \: V- M7 ]' ^) T( t( q6 zConcurrent, d0 u4 }% [3 _6 t8 ]9 R Engineering N( a( u4 \" F7 u* b$ VA systematic approach to the integrated, simultaneous design of products and % h1 K/ T: T" C! u Vtheir related processes, including manufacture and support. This approach is; D3 J( D0 f5 t9 h; q intended to cause developers, from the beginning, to consider all elements of9 y1 F- O" Y1 U. r1 D: [ d the system life cycle from requirements development through dispersal, including + D& G1 j: Z$ tcost, schedule, and performance.7 D' ~1 Q: `9 M5 ^+ c CONEX CONOPS Exerciser.1 H- G# Y& K5 V Configuration A collection of an item’s descriptive and governing characteristics, which can be7 S, ^9 y: a: C0 ]1 m* i0 w& G n5 U U expressed in functional terms (i.e., what performance the item is expected to; R) e: m5 _, C- X0 ` achieve); and in physical terms (i.e., what the item should look like and consist of 2 {* O9 P: d6 M3 B$ l; n, G9 y- b7 m: zwhen it is built). 4 W* |# N& D' m* r' PMDA GLOSSARY, VER. 4.0 C " Y' b# x4 I/ w2 Q59/ k. j8 M# e, v8 ]6 c Configuration! K# A3 Z$ I2 R Y% x Audit5 L4 e) O" ?; U i1 n6 I& H( S8 W: z) M One of the Configuration Management tasks which includes a functional " s+ J) S) G% f' a5 Y) kconfiguration audit (FCA) to validate that the development of a configuration item ~5 p% @. j9 D; Y9 W/ W% ?4 thas been completed satisfactorily and that the configuration item has achieved. X/ s I4 t; U6 j! i to specified performance and functional characteristics, and also includes a$ x. `( |1 U, S+ o. Y1 w& M3 s physical configuration audit (PCA) to verify that the configuration item “As Built” % |! ?/ @/ j' J! m+ `conforms to the technical documentation which defines the configuration item.- r: m2 t2 D' d. P' Y) }: f$ Y; [# f Configuration ( H8 l5 _0 W' c0 o y7 L1 XBaseline ; M! E/ D' K& d9 D8 IThe configuration documentation formally designated by the Government at a # x7 b$ n$ C8 m8 L$ nspecific time during a system’s or configuration item’s life cycle. Configuration 7 j/ Z( @! D' C8 r) [4 X; G3 kbaselines, plus approved changes from those baselines, constitute the current . [7 I/ \4 l3 J$ b, dconfiguration baselines, namely the functional, allocated, and product baselines. + {3 g" T* B) I- r3 E, v0 G; \, R# V; RConfiguration% X# `& o. T; }9 H3 ^ Control ; `) X7 `" r- X# K5 y2 h1 S1 s0 z/ n& u; ^One of the Configuration Management tasks that involves the systematic ( Z4 Q! D( `( I# s4 x0 K( |evaluation, coordination, approval, or disapproval of proposed changes to the $ ]7 z* e" T% wdesign and construction of a configuration item whose configuration has been- J6 D( J i& j* R5 B7 u! t! t formally approved.% x, O) g5 D# g# p3 C/ X Configuration 3 _* v* J( c4 h ~( J4 p5 K- mIdentification$ K7 r9 u/ W/ U% E/ M0 n One of the Configuration Management tasks, which require that for every ! r" s0 B: D$ q( C; ~change that is made to an Automated Data processing (ADP) system, the design! ]% q# C2 t% P( P and requirements of the changed version of the system should be identified.9 e! S7 i$ g. }4 ^* g Configuration : M+ b4 Z6 e# V2 S! O TItem (CI) ! m2 o: b' l5 W: O/ ^, k8 z0 ]An aggregation of system elements that satisfies an end use function and is 1 I& J5 B+ ~) T' \designated by the Government for separate configuration management./ | z- j2 v( v2 a/ `( F Configuration items vary widely in complexity, size, and type. Any item required 0 I) X' w- f' e: V4 efor logistic support and designated for separate procurement is a configuration: F- |$ F$ C/ L1 _7 |; w( i' `( l item. Configuration items are traceable to the work breakdown structure (WBS). g n4 M9 n& K& o# e4 ~ Configuration ( G& l7 k* b) e3 VManagement6 L1 a1 p1 Z" P* B- }- A/ i& i (CM) # w* R$ G! l; F- n, k; XIn computer modeling and simulation, a discipline applying technical and % U, v) G8 u: r4 W1 U/ G. J9 Yadministrative oversight and control to identify and document the functional : u' o$ g) ~4 K1 lrequirements and capabilities of a model or simulation and its supporting [3 ?- Q- K7 H/ j3 ~6 Z* |6 k1 |databases, control changes to those capabilities, and document and report the + Z' U1 v$ A/ H/ tchanges. See also Accreditation.1 U( u/ _9 q3 W7 `! W7 B CONOPS Concept of Operations. * Q' h' |3 n, o5 A3 I& kCONPLAN Concept Plan; [1 J8 b- S: C; I! o5 ~* a CONS Contracting Squadron. 3 J2 j% [4 Y+ @7 F$ O! I6 Q. L: _Consolidated; H) z8 F; B' T l. G9 |+ t9 j4 f Command Center4 O; p* k6 d, e6 r (CCC) $ h9 }1 P/ H% ]- f' E0 G- z% C$ {% aA single command center from which USCINCSPACE/CINCNORAD can direct all+ Q8 m+ D2 h; d his assigned missions, to include BMD. (USSPACECOM) Located in Colorado ) |7 t* N+ \, {' r7 g# ^+ p: ~Springs, CO.% O0 X# M* p. e! U4 z0 q$ U Consolidated ; K" X; ^- C: D- M" j0 @: i& ?2 |Intelligence' H6 W' y7 Z3 t- c Watch (CIW) u2 n Y5 Y: t. a2 F' _& L6 v4 t( |- f A consolidation of intelligence watch functions within the Intelligence Operations 2 N2 B. D9 A/ A% L8 n) BCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD' B7 q ?1 E. c5 w Aerospace Defense Intelligence Center (ADIC), and the Air Force Space / u0 e& v% g& e% G$ DCommand Space Intelligence Element (SIE). , B# r0 C4 P' [4 fConsolidated 8 O* \. ~, n! R8 eSpace + c0 N# w/ T: R) E, a* cOperations5 Q# x( \& x! o" P. Z0 { Center (CSOC) - K1 n5 p. E0 j% q& q7 y$ ^Series of centers at Falcon AFB, CO, which operationally control and maintain" `& H+ t# T! @4 Y5 y assigned DoD satellites. & u) t* ?& d8 N0 e) c$ j5 b n6 nConsolidated' w' i1 X: m3 b+ C% I Space Test& z' Y$ G S2 C( ^9 l9 X; O Center (CSTC) ( K1 M! |4 [% mSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and , I7 c! M$ [$ Q" zinitial on-orbit checkout of operational satellites, operate R&D satellites, and : ?: W6 j6 A" q: u- ~/ u0 Vserves as a backup to CSOC for operational DoD satellites.. m/ Q+ Y1 ?/ A+ y/ q. v1 K MDA GLOSSARY, VER. 4.0 C ( G0 n, |; d5 a" d% A# s9 F, F60 4 x# V$ m3 _3 V2 N8 QConstellation( a2 N) j$ O" ~) O. I/ n( _& U Size (CSIZE) 2 [ [# J: t( A K1 l, s/ b: vThe number of satellites of a particular system placed in orbit about the earth. # P9 I0 K& T: E2 \" P0 Y& Z. eContact Fuse Device used to detonate warhead on physical contact with another object.) @9 h: k+ l7 s9 E Contingency ' r8 p4 e! {) o4 R" o, NDeployment Plan" |- G! d0 N6 H$ V (CDP): N2 ^8 |+ `# |0 r An executable plan designed to deploy an early missile defense capability and # x( Z% j2 t: h$ H/ creduce deployment time. The plan provides specific executable deployment5 j% [; l: m0 |* X3 F2 b9 t f4 W options and describes activities required before and after a deployment decision.+ f# ^+ j- x; K( g The plan also allows decision makers to have oversight on technical progress," | X% W5 m9 d- b$ x4 H cost, schedule, and risks associated with a deployment system. " R5 V, \/ ~8 P& e$ vContinuity of/ ~8 _1 P( f8 F5 T Command & v! f! w4 j% Y9 JThe degree or state of being continuous in the exercise of the authority vested r* A1 E+ ?7 x8 h- qin an individual of the armed forces for the direction, coordination, and control of6 ?: [1 A( O2 [" R/ P military forces.' U2 _, z) s$ A/ D7 r Continuity of. |9 |, L( K7 f/ u, X Operations% X! ]0 K+ c0 H8 h The degree or state of being continuous in the conduct of functions, tasks, or 0 _ \9 u F1 S* K9 ~ o) @ A4 rduties necessary to accomplish a military action or mission in carrying out the4 Q+ k# x% o' |5 }- V. R5 B national military strategy. It includes the functions and duties of the commander, 8 N6 }5 ?& T5 G0 K! ?: `as well as the supporting functions and duties performed by the staff and others * B& ~4 |! _ d/ K" n/ yacting under the authority and direction of the commander. % R& w/ q. \ n" IContract . x! d h( u, ~) uAdministration % g. }# w- l7 p3 c6 w4 UOffice (CAO) 7 Q+ r" w$ e0 R1 c/ K# g8 KThe activity identified in the DoD Directory of Contract Administration Services! ]' g; O7 B& s z* t) d* y Components assigned to perform contract administration responsibilities. It is a* H1 N( B1 ~6 C1 U8 y% | general term and includes Defense Contract Management Regions (DCMRs),+ f9 u- B e; o9 s: ^ Defense Contract Management Area Operations (DCMAOs), and Defense Plant : {) _/ z) l3 t2 e/ ?Representative Offices (DPROs). (Defense Systems Management College9 b$ `9 |5 Q' I% Q2 a8 c Glossary) 5 s, Y' r* h% ^3 x' \8 X4 V: m( DContract Data! h0 _% |6 x3 H Requirements7 W( @2 T. q4 c0 ~0 x% u6 W List (CDRL) 5 t v4 M1 y6 g6 c$ X VDocument used to order (“buy”) and require delivery of data. Tells contractor ( s0 P3 q4 r4 z/ R. z" Rwhat data to deliver, when and how it will be accepted, where to look for & N( k: M( z/ U& ~3 ]instructions, etc. 6 S; x- z0 t/ CContract 9 i" A# ]6 A: ]7 eDefinition & g6 o Z: W$ jA funded effort, normally by two or more competing contractors, to establish - b5 F& \; i/ M$ v J. ospecifications, to select technical approaches, to identify high-risk areas, and to0 N0 i) N! V4 U; v3 r4 v make cost and production time estimates for developing large weapons systems.: D8 Z* ^, A/ j9 U7 m2 m Contract Work $ N5 u" C, h, tBreakdown 7 A) G8 [4 v7 e& g- OStructure0 n) ^$ }; Z/ ~& t0 l3 ] The complete WBS for a contract developed and used by a contractor within the , S/ \, S% W9 \$ [guidelines of MIL-STD 881A, and in accordance with the contract statement of. v2 Y/ z; [6 h* D* }+ L; A3 a work.0 p3 }, }% ]$ S# q& V" i Contracting" f$ l1 r* K# I7 P Officer (CO)% z- _2 K ^: S6 M. @% ^8 O" E A person with the authority to enter into, administer, or terminate contracts and" P# S9 N- ?0 z$ @ make related determinations and findings. The term includes any authorized1 ~. \3 D+ x: E: W) O representatives of the CO acting within the limits of their authority. A CO whose( Z5 {( h( o* n0 L primary responsibility is to administer contracts is an Administrative Contracting2 v3 O4 c8 ?/ D- R7 Q, x2 r Officer. One whose primary responsibility is to terminate contracts and/or settle% {% b, {7 T. D) S! a- V terminated contracts is a Termination Contracting Officer. A single contracting + s) u: L" c7 R' }: L6 I; e6 [8 q1 Uofficer may be responsible for duties in any or all of these areas.- W) V. w, k. w/ y; | Control Authority that may be less than full command exercised by a commander over7 i1 X, K( y0 M* T part of the activities of subordinate or other organizations.. \. _( P, |. i Control }' C' b/ y9 y$ u/ g" J# B% ]Abstraction+ j& f5 H4 V1 q (Software) The process of extracting the essential characteristics of control by7 c3 f% L+ Q! W9 D- Y defining abstract mechanisms and their associated characteristics while( _) K4 G2 [2 z( v% F) @ disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C+ ~3 z% _* R$ o) P* ]7 } 61* ?; M8 Y% I% f5 B1 ?- O Control and / y2 J8 x+ [8 F# N; ~' v8 W+ zReporting Center; ]9 @+ E7 a/ M6 f. i* \5 W An element of the US Air Force tactical air control system, subordinate to the ; t7 R9 K+ B7 Y7 Ktactical air control center, from which radar control and warning operations are) [3 ]5 ?% }3 Q0 I4 `! t9 w$ G( f4 ~ B conducted within its area of responsibility. & k6 z% f3 Y+ L) u+ r! aControl and k6 n4 Y3 q, l8 A4 ?9 |* o Y8 cReporting Post1 M! Y/ G% ^6 ]. B% Q3 S$ J An element of the US Air Force tactical air control system, subordinate to the9 T- j6 b) F k; r3 s8 [9 U7 ?4 p control and reporting center, that provides radar control and surveillance within3 W6 ]9 f8 m; u, \; { its area of responsibility. : i# @# C; i# B0 b V+ TControl Area A controlled airspace extending upwards from a specified limit above the Earth. ) E" ^$ t. T8 a+ p1 bControlled % {5 d' X8 x# Q0 t7 h9 O9 lEnvironment ( I8 o+ Z) `. O5 ^7 HArea where entry into the radiation hazard area is controlled.* l5 k7 C% n& z5 @, y) z Control8 D7 S6 b0 F( k Z Procedure# r' A {8 B& S( u6 W! B The means used to control the orderly communication of information between + }5 \* {0 r/ tstations on a data link. Also called line discipline. % ^( t+ z7 [' T' d T4 f2 _& {, ZControl Station The station on a network, which supervises the network control procedures such ! s- U; J! L& S8 K* L$ f: uas polling, selecting, and recovery. It also is responsible for establishing order 1 P$ d2 n- ~3 V7 s* uon the line in the event of contention, or any other abnormal situation, arising 8 J7 j' n. L6 {between any stations on the network. A3 |( r. Z7 O7 _' c( n/ ~0 z) k6 y Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to 0 z, i# O, L/ ~4 W9 xprocess sensitive defense information and that is under sufficient physical and ( ^& c: h/ x# w0 ttechnical control to preclude an unauthorized entry or compromise.2 o1 ?) M/ Q. I5 b CONUS Continental United States.+ c5 D7 k" F( w# g* T# e# r; a Conventional Co-7 X1 ~" {' X0 u, z Production) P; Q# s; Q# L4 I- n2 s; j An effort between governments to produce the same end item, or components+ w9 j, w) n+ B+ }% ? of the same end item, in concert.0 O0 m+ O% _3 X, T# _8 l7 f Conventional ) t( Z2 S1 N( H% N& b% R5 p/ zWeapon 9 Z) B% u" |! }% A, S" sA weapon that is neither nuclear, biological, nor chemical. ( A# L3 p1 U% b! K# C1 i) vCoop Cooperative 3 |/ G/ E8 C" y) r, `! tCoordinated - ]& O6 k) G6 |$ w" R$ A8 BEngagement9 W, W% @ O" V Planning/Actions, b: `/ g f! ?+ x% @' D Necessary coordination among engagement components to ensure maximum , K1 |" I- M& C. a0 Ceffectiveness of the SDS and resources are not wasted on targets already6 R6 V+ }. L& R) N% h$ S6 Z targeted.6 O, N+ {) o! }$ @ Coordinating 7 }1 {. b9 `' B9 k. {7 nAuthority1 H+ ?) \4 `3 w+ m! k5 \4 r* x8 h A commander or individual assigned responsibility for coordinating specific V6 F' \5 j+ O3 G, C0 |6 W functions of activities involving forces of two or more Services or two or more% k" h q; j( h. _3 J t& [ forces of the same Service. The commander or individual has the authority to9 x% k+ ^& ?5 n+ V/ H require consultation between the agencies involved, but does not have the $ d0 c; `: `5 Cauthority to compel agreement. In the event that essential agreement cannot be : T- E& b4 U* ?, ^reached, the matter shall be referred to the appointing authority. b% b) E" C8 y- P3 O/ B- d8 h5 r COP Committee of Principals1 `+ D9 {- \( R E J9 R2 J COR Contracting Officer’s Representative. Contracting Officer. & T* T: D _( s" A! T- m0 \CORBA Common Object Request Broker Architecture.+ u! H) O6 P# m: I9 ^ CORM Commission on Roles and Missions.) f1 n. V% o8 B r1 I3 J# i2 T0 | MDA GLOSSARY, VER. 4.0 C+ F8 f. B$ j2 N2 i$ y, o$ l6 l5 Q% z 62; L/ i7 h$ y# u/ N3 c! u% @ Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens8 Y R: Z- y; O perpendicular to one another, designed to act as a radar target or' I5 W U6 X3 _8 K5 @ marker. ( n" z$ W, B9 D' C(2) In radar interpretation, an object that, by means of multiple reflections 4 d) x" \( u# I s! b xfrom smooth surfaces, produces a radar return of greater magnitude than 1 Q# E, K- s4 _might be expected from the physical size of the object.. M ~6 @. [7 c& @: S I% K0 `2 e1 _ Corps SAM OBSOLETE. See Medium Extended Air Defense System. 3 R. F/ v5 N1 }5 T. {Correlation (1) The process of relating observations or tracks from one set of data to ; K- E! f5 P: E% |8 v. n- wobservations or tracks from another set of data, i.e., collecting data from 0 ~& W1 P# X3 K# Cdifferent frames or sensors that presumably relate to the same target. (2) * d- G8 e/ p) p) s E, ^In air defense, the determination that an aircraft appearing on a ) H: l9 Q- R; ^$ B; eradarscope, on a plotting board, or visual is the same as that on which 9 K) [0 x$ F) i, b- Dinformation is being received form another source. (3) In intelligence# d m7 @. e9 t: F {6 [2 K) r; Z usage, the process which associates and combines data on a single / n. {& c; M8 ~ v3 wentity or subject from independent observations, in order to improve the; Z: b( ], T& G. Y3 N2 m reliability or credibility or the information.6 @7 K: Q8 w. H& o) G COSEMS Evolving architecture operations support tool. % I: f' o0 s. a4 ECOSM Computer System Operator’s Manual' j v- O: V' ~( ~; f$ O! G. |& A3 G COSMIC NATO security category. ) _1 @% W- U0 j& b; k0 zCost Analysis 7 Z8 }6 Y9 Q# v0 E) MImprovement 9 ^2 B9 J. j$ N0 x/ U8 G4 ?6 \. iGroup (CAIG) " o. ~0 ]4 _" R+ ^! cAn organization within the office of OSD Director, PA&E which advises the DAB 1 \# l& |4 L$ ^6 S) B% zon all matters concerning the estimation, review, and presentation of cost9 ?9 X2 o/ P; k' G1 l" ` analysis of future weapon systems. The CAIG also develops common cost 4 ~& j7 y$ {) [; Gestimating procedures for DoD.. [& | @9 c4 j9 H X& `: E9 S Cost Analysis $ k. d o7 \5 O/ _) C, HRequirements; ?( o( V; S) a- ? Document , X1 p7 m5 g b* y* S: c5 O+ f( o(CARD) `" I: V3 a) F0 V The document describing the technical baseline, which is a subset of current 9 B D! r P- A% _& U' E4 hsystem technical data and is used to generate the baseline cost estimate for an " _" `' i2 Q. S( MSDS element. It includes, but is not limited to, the element description, 2 k- X( ~3 B! vinterfaces, operational concept quantity requirements, manpower requirements, 6 q/ }6 R) W* w8 x+ P+ h; K$ zactivity rates, schedules, research and development-phasing plan, and facilities y5 b. m2 I4 c5 t0 @/ H requirements. * _, q2 ^; e* w5 cCost and / J& J; F- x$ t) u8 w8 y' x$ _Operational 7 P5 f% l9 P' J- Z+ ]. {# @Effectiveness3 Z, a) h' E* f. X Analysis (COEA)6 m# b. ~) r! M( k( e+ {1 G; m* g An analysis of the estimated costs and operational effectiveness of alternative 6 Z1 Y- M- n3 e2 T0 K9 ^7 O5 Z, Umateriel systems to meet a mission need, and the associated program for # r: i; j& I4 S0 t. Z0 ^acquiring each alternative.7 t" f/ o6 ]$ V. i+ R8 E4 I$ W3 i Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk$ ~6 [, h" x- ~0 W due to cost estimating errors and the statistical uncertainty in the estimate.# r& I( I! J' T+ h4 J Schedule/technical risk is risk due to inability to conquer the problems posed by - Q% J' k5 Q2 }3 y7 U4 ^& ^the intended design * H4 T: ^4 B$ X5 P& l( x& P. a$ jCOTR Contracting Officer’s Technical Representative. See Contracting Officer. i: S9 U. m6 q4 T! x# C2 s2 cCOTS Commercial Off-The-Shelf. " G. m( V- x8 v zCounterair A US Air Force term for air operations conducted to attain and maintain a desired! ^3 v$ U; }3 M% `' N0 C4 h2 Q' o degree of air superiority by the destruction or neutralization or enemy forces.! N7 w/ r7 L, B' @! x5 {$ Y+ O Both air offensive and air defensive actions are involved. The former range+ {/ u3 Y* |: E9 I3 [ throughout enemy territory and are generally conducted at the initiative of + f! T; Q q7 q- Pfriendly forces. The latter are conducted near or over friendly territory and are 1 l2 I4 W/ q; }, J! o$ ygenerally reactive to the initiative of the enemy air forces. 5 ^$ c& y5 J# [9 M3 V' nMDA GLOSSARY, VER. 4.0 C / n; |; j' H" B& w M63 1 ^" @+ Z$ l7 \* S( ~, ^5 LCountercountermeasures' Y, ?- w6 y ?& v (CCM)- ~8 t2 q, C0 T# g* @) { Measures taken by the defense to defeat offensive countermeasures. " Q4 v- `- D2 g! ]' r4 a- o$ o! o9 ^Counterforce The employment of strategic air and missile forces in an effort to destroy, or 2 ~' h0 T2 g) E) v9 U! p2 brender impotent, selected military capabilities of an enemy force under any of the* D V2 t4 ^' ?6 A6 J3 s; A+ Z2 ? circumstances by which hostilities may be initiated.1 ~; n; S9 f" a/ P/ A { Countermeasure A design or procedural measure taken against covert or overt attacks. / Y7 v! H# J4 R) M x" U4 UCountermeasure4 I8 t f# X# g* p8 T: C5 s- | s (CM)8 i, e/ t, b: w+ E+ q4 x* p That form of military science that by the employment of devices and/or6 b+ z, H$ ? H& x* a! D techniques has as its objective the impairment of the operational effectiveness of0 O! J) R, \8 _, f4 X4 C enemy activity.. @ @7 q, c9 l/ b7 f* D Countermeasure+ Q$ C# W2 B9 ?- s9 t s Rejection! h$ j* \* S" g. v (Surveillance) 4 F; V( D- o. D" YImprovement or rejection of an object signal in the presence of $ u, W, z8 c" h( j1 \9 b" acountermeasures.6 L8 ?# r# H2 |# B' a5 I Course of Action* `; [: M8 m4 _( ?+ P# Y( Q! _1 m (COA) # R) M# k W1 E! A* K$ k(1) Any sequence of acts that an individual or unit may follow. (2) A possible , M2 U" y7 }8 m3 i b( Rplan open to an individual or command that would accomplish or is6 _) ~: \+ l4 K) c& U3 | related to the accomplishment of his mission. (3) The scheme adopted * E' ~/ G% ~7 u# B; ]. hto accomplish a job or mission. (4) A line of conduct in an engagement.) z" [/ Q" y; S1 W (5) A plan to accomplish a mission. It describes the execution concept / Y4 a0 ?8 o8 E# d3 B p" lfor BMD of North America. It will specify the engagement priorities,' Q+ `: d! P8 a6 V. l/ b resource allocation and desired results by Area of Operation (AO)./ n, R3 L. a% c7 I (USSPACECOM) (6) The scheme adopted to accomplish a task or 6 d5 z+ W( Z8 g, |8 tmission. It is a product of the Joint Operation Planning and Execution! E9 M, [( _! H- U) ]. s( U( q System concept development phase. The supported commander will9 e7 \* V/ j+ C include a recommended course of action in the commander’s estimate.& }1 [7 Z: H% r6 L5 K" D The recommended course of action will include the concept of- S; j3 B9 v' [ operations, evaluation of supportability estimates of supporting+ Q# A4 ~: u, U! t organizations, and an integrated time-phased data base of combat,: r2 f$ n1 O9 g combat support, and combat service support forces and sustainment.6 N, d2 B; m5 S* Q0 u+ z3 b Refinement of this database will be contingent on the time available for% Q6 l$ e' W5 u' o' m% u course of action development. When approved, the course of action # h/ E2 b! E) I. T* lbecomes the basis for the development of an operation plan or/ H8 z2 E, i. m$ n operation order.( F- n% [) N0 D: S0 Y. ^$ k, g Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, - M3 W3 i) v% `5 Sand other geographical presentation systems. (2) Cover or protection, as% X, H: c6 G, z/ u! k+ [' { the coverage of troops by supporting fire. (3) The extent to which . M. {9 K+ }7 cintelligence information is available in respect to any specified area of 1 l' ^: s: i6 q' |2 tinterest. (4) The summation of the geographical areas and volumes of ' t) F. \3 E! Z+ o8 R: {8 Zaerospace under surveillance. # p. y0 N/ P! f: B! C: Q/ xCovert Timing ) T4 U: ]- L' I. C% ^9 SChannel 9 F5 ?* \5 g1 \% Q( z) TA covert channel in which one process signals information to another by0 R6 X( y- h) Y% }1 n0 x modulating its own use of system resources in such a way that this manipulation; G5 R3 |/ n# w( J" V( [ affects the real response time observed by the second process. * G0 b' i. i( OCP Command Post. 9 r% Q# T' a7 [) HCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. & G+ [2 k( W& bCPAF Cost Plus Award Fee.+ J0 q6 D* b# o3 C! f/ G% [ CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)- W3 [$ g" u. A* D1 Z3 Q MDA GLOSSARY, VER. 4.0 C 0 P( l2 I$ G( h: z. p6 ?64 . Y/ `. j* v4 W( M* ?! w% c8 ECPAR Cost Performance Assessment Report.5 n M+ | B) s' l CPAT Critical Process Assessment Tool 3 v/ F8 C$ W( J# e. e$ \* ]$ FCPB Charged Particle Beam. " d, U, Q) K* ]# |! rCPEV Communications/Processor [Network] Experimental Version.- `" K$ Y# o) m. w3 T7 T CPFF Cost Plus Fixed Fee. 6 O# h( R3 \9 N& H) CCPIF Cost Plus Incentive Fee.8 E# x3 ]2 ~5 x+ P( F3 g8 K CPIPT Cost-Performance Integrated Product (Process) Team. . X' W f' j; F. {& ]/ BCPM (1) Critical Path Method. (2) Contractor Performance Measurement. 1 W) R/ N2 {6 \( ^2 {& R$ B$ P0 FCPP Critical Performance Parameter.- h* J. K/ \) T. S7 l CPR Cost Performance Report.5 i' S* s" x) z( w2 [ CPR/NC Cost Performance Report/No Criteria (Contract management term).7 c/ b, ~9 M3 ]. Y9 O* D# z1 p! J- | CPS (1) Consolidated Program Summary.- q0 {' [$ F7 I1 D; x (2) Competitive Prototyping Strategy.# b7 @. k" h& d! z P (3) Current Program Status.2 {8 \* t: I7 f8 ] CPU Central Processing Unit (TelComm/Computer term).! w+ s, V- n2 X4 |6 D0 V CPX See Command Post Exercise./ ~7 q! I5 O5 e7 x2 l0 J( V CQAE Chief/Contract Quality Assurance Evaluator.8 u" i: ]( j: @: Z CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).+ [' Z8 }' h2 U% |0 d7 H5 w CR-UAV Close Range Unmanned Aerial Vehicle. % q( B) ], @/ z7 BCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement& }5 N3 v7 i7 m- i. R CRADA Cooperative Research and Development Agreement.; P: `' e, a) i: D8 |5 _ CRAM (1) Control Random Access Memory. + \) G& O7 i9 ^6 i$ v7 }$ J N(2) Cross-tie Random Access Memory (Computer term). ) {! @0 `" e: ?9 Q, XCRB Configuration Review Board. / U$ T* C7 I* U9 P; H' H6 }CRC Control and Reporting Center.( H' p& w( L; u4 w* w7 z7 ]3 e& v CRD (1) Capstone Requirements Document. 8 N" D; P/ }# N$ s9 B8 v(2) Component Requirements Document. ) u3 V6 ^) X# Y8 @7 [1 r' ACRDA Cooperative Research and Development Agreement. 6 D6 j( r$ l4 {& j3 |CRG Communications Relay Groups (PATRIOT). : \* @2 H) s, j* E* j, _* l8 BCRI Classification, Recognition and Identification.5 P! J! a- g5 ~ CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C " w& B( J7 ?* Y1 g7 F) i! N65 : w( ?. M6 X, y+ vCritical Design 5 a! r0 R+ f _Review (CDR)8 S w! J9 Q; d A review conducted to determine that the detailed design satisfies the # m0 j& v; B! r" }% X) i* ?performance and engineering requirements of the development specification; to( X. t/ l/ q4 k1 E, U3 v8 n establish the detailed design compatibility between the item and other items of * o: ]3 |# v2 |equipment, facilities, computer programs, and personnel; to assess producibility " {7 }* N! D" Y+ }% i- r: Fand risk areas; and to review the preliminary product specifications. Conducted' c0 Q- g' P3 L( ^9 t7 n* k during Phase I, Demonstration and Validation (for prototypes) and Phase II,* g* i7 |( l3 ?9 d4 f; M6 I; r Engineering and Manufacturing Development.9 J L: u% I+ r+ {, g, [/ d( h Critical : W& Z! c& y5 L) x# NInformation ) x/ O, ~4 G; @9 `Specific facts about friendly intentions, capabilities, and activities vitally needed 0 a: K( ^5 y# Jby adversaries for them to plan and act effectively so as to guarantee failure or( w8 U. W( ?' y! e; o- @ unacceptable consequences for friendly mission accomplishment. b) h" n2 F Z8 }Critical 2 Z$ I) g9 c O8 n- ?4 d4 GIntelligence/ c; {( I! F, P6 Y$ n ] Parameter: Q5 b! z. r& W0 ^' a! n' M: ] A threat capability or threshold established by the program, changes to which 4 P$ e, K$ \$ Q h6 f1 @. e' f4 G9 |could critically impact on the effectiveness and survivability of the proposed- n2 B" I+ u3 \$ T system.0 D, w0 I- [) U Critical Issues Those aspects of a system’s capability, either operational, technical, or other, . v+ g3 m. I0 Mthat must be questioned before a system’s overall suitability can be known, and, v$ f$ N6 S2 [) z. d which are of primary importance to the decision authority in reaching a decision( l9 R/ ?1 p8 ~8 A7 w1 F to allow the system to advance into the next phase of design, development, 9 t8 K* c3 W2 k$ ?6 wproduction, or post-production. a% [ {3 \' k' r5 v lCritical , w# z+ N5 l. h+ G$ W( J, E: POperational, u7 d. i x5 e4 j/ c Issue ) u: K- w% B* NA key operational effectiveness or operational suitability issue that must be+ _9 m$ O+ N1 w8 i0 I( L examined in operational test and evaluation to determine the system’s capability 9 \' n& [* I9 [* K T Q1 h# F8 Ito perform its mission. A critical operational issue is normally phrased as a ) c+ B6 n+ d, `; q: T& t2 P( t0 Jquestion to be answered in evaluating a system’s operational effectiveness 6 Y5 _( P7 P6 H7 F! i8 `! ^* H; r" uand/or operational suitability./ B3 _. r" f H; O, H9 [ Critical Path 1 |8 ]% V8 t T- ]% }Method9 p9 x" @$ T+ S W A technique that aids dependency of other activities and the time required to & `8 ^& Q5 V) V% y+ m! Wcomplete. Activities, which when delayed have an impact on the total project, a$ C0 ?/ K( b5 M; j" |( u5 b schedule, are critical and are said to be on the critical path.+ @% V$ a4 Q( ]# S- O Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to, S9 ]* V {- _! G3 `$ B the viability or the operational effectiveness of the SDS. ( I7 a0 w5 R% ^2 \4 a" }Critical Security% n) s1 O0 M9 X3 r8 u4 h( [ ] Risk) Y! g: t/ } j The existence of a security vulnerability that, if exploited by an adversary, could + O [1 d" v- M+ Y8 ecause exceptionally grave damage to the viability of the BMD or the operational / S( n" @( C% Y. e7 D& Jeffectiveness of the SDS. Critical risks assume an adversary’s capability to / B [( b9 X7 |- j6 X" `* Jcause major system disruption or degradation (e.g., single point failure),% d7 [2 E! j! v' [8 \) B6 L; T0 ^ destruction of mission-critical components, or usurpation of system functions. " i9 P$ P; [5 e( q. o) y0 `$ sCritical q# P7 T E! p* E. PSupporting ' s: x/ E/ P# J( o3 _4 vTechnology 1 C2 t) {. @, W, [- ~. Q3 wA technology that program management personnel consider a critical part of the 1 ^- W- }$ [) Y, E/ bprogram being described. [+ G% r* b2 V# W; p* Y, [CRLCMP Computer Resources Life-Cycle Management Plan. : |8 A) q; j- f+ }/ mCRM Computer Resources Management. 8 e# N# `: O+ r/ DCRMP Computer Resources Management Plan. 6 a% D. W' a( X1 `CRO Chemical Release Observation.9 t7 A2 \* L6 N* B( n3 C1 E CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC% G; o& |8 M( A. b* F+ H& C term.) 7 O, X3 p. N# P- I9 z$ G: ^0 ]2 `! VMDA GLOSSARY, VER. 4.0 C7 M( Z) p7 e; Y7 x& y9 c1 k# v/ ] 66 |7 X* o. s9 J% a1 _. ICRS (1) Computer Resources Support. (2) Congressional Research Service. (3) " k7 E1 n* {9 [8 Y5 dContractor Reporting System. $ k" B. v1 B* c/ mCRT Cathode Ray Tube.& H: z4 O- Q' @+ }4 ^2 P- }9 u CRWG Computer Resource Working Group. 9 N2 D1 _7 C7 o+ ~Cryocoolers Cryogenic Coolers.- F7 A0 O0 t }; s' n8 y Cryogenic Of or related to cryogens (substances which are used to obtain low 3 s2 Y3 M& ~9 P u2 e3 T1 s! ztemperatures). ! H; z1 [6 d/ O" NCrypto A designation or marking which identifies classified operational keying material, 5 [( {1 F5 [. {+ Aand which indicates that this material requires special consideration with respect 8 R- n: a- a7 h/ x. Ito access, storage and handling. 4 }9 k( \" u( N2 v" tCryptographic 9 p+ y0 ~+ f. d- f: V3 WSystem2 f$ i7 i$ g: Q& Y, d The documents, devices, equipment, and associated techniques that are used! r: Q( N. B, X' V; l2 `. ~ as a unit to provide a single means of encryption (enciphering or encoding). + [3 Z5 |% m k; b& _Cryptology The science that deals with hidden, disguised, or encrypted communications. It- X/ G" e8 B- [3 ] includes communications security and communications intelligence. + P$ W) G& M D, sCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.2 w" X# x) g7 ~ CS/CSS Combat Support and Combat Service Support (USAF budget term). ; o* t* Y7 z/ _" o; O# lCSA Chief of Staff of the Army.7 O6 i% G; ^3 g; S- C& J0 E ? CSAF Chief of Staff of the Air Force. ' d. f% Y8 L& _+ K" wCSC Computer Software Component.) E; o: Z2 g$ x; T1 V { CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)7 q1 @3 j- M' Q* U: A1 a3 S CSCSC Cost/Schedule Control System Criteria. % s2 h8 A$ p+ g$ \& m1 uCSD (1) Constant Speed Drive. (2) Critical System Demonstration. ' `& l. `9 T3 u8 n( yCSE Center for Security Evaluations (DCI).3 ] q0 f! `/ ^ n. O CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon) Q" G; X! N, E3 K, P$ S2 q' v0 X System, located in Cherry Hill, NJ.& M" k$ ~. i' Q5 G B( p5 u8 F7 } CSF Consolidated Support Facility, Arlington, VA.% K B! N! v8 F) w, ~) N* p CSI (1) Critical Safety Item. (2) Critical Sustainability Item. ' g+ w7 O* G4 |6 m& O5 k; `6 R- NCSIP Current Systems Improvement Program.% }, o+ _9 l6 M4 W: W8 g CSIZE Constellation Size.% w0 c! X' H r( [ CSL Computer Systems Laboratory. ' F' q; n4 a3 J. V+ Q2 nCSM (1) Core Support Module (*C2E term). (2) Communications Support Model.# h: e& L! s8 R- v( _: I9 e( ] CSNI Communications Shared Network Interface (NATO term). 1 X2 \# v9 x. W2 P% z9 `, J. s7 HMDA GLOSSARY, VER. 4.0 C9 w% N/ I( E4 ?) P8 F. a 67 ) X7 k; Q( v$ g9 s" M; q, W; ZCSO Closely Spaced Objects. ; W4 _5 m" o* I9 ACSOC See Consolidated Space Operations Center.2 N `4 k' n4 p- l- K7 P7 y CSOM Computer System Operator’s Manual # E9 a/ v2 h& ]0 X" J% P, @CSOSS Combat System Operational System Sequencing / @' N2 W1 x# \* w& L' \CSP Communications Support Processor (numerous locations, including USAF Air2 r) V4 ?- j& W" S* [ Development Center, Rome, NY term). % h' ~& @3 ]1 u7 K! B6 jCSRD Computer System Requirements Document.( W e2 p7 ~" [) V( ^: t& V CSS (1) Cooperating Space System. (2) Communications System Segment. (3) 1 \5 x* [1 F# j# GContractor Support Services. (4) Common Sharing System. (5) Communications. t, [4 C$ q5 l |( d2 a) T' N Support System (Navy term). (6) Common Support System. (7) Combat Service " ?/ F9 {+ ~& L% z: sSupport. , b& n1 l& {3 L e S# g2 Q1 GCSSCS Combat Service Support Control System (USA term). , L7 x* E3 `' VCSSPAB Computer System Security and Privacy Advisory Board. 8 k9 N& W, d. q, P+ ~* @CSSO Computer Systems Security Officer. 0 p9 | Z: f& l% q( o G. \CSSTSS Combat Service Support Training Simulation System (US Army term). + Y3 j, B2 [+ Z% ]9 ECSTC Consolidated Space Test Center., `' V- w T2 ]' G7 w) R) ~ CSTI Civil Space Technology Initiative.$ F, N) l8 X8 w: M$ V* B4 w CSU (1) Computer Software Unit. (2) Communications System Utilization. - f$ ^% T; y; r$ CCSUR Communications System Utilization Report.) ^) T4 [! y" j& b' [& X CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.( a; ]1 ~6 W) B$ u* Z" [4 K3 b* u8 G (4) Cryptologic Technician (Navy occupation specialty). 0 w; \2 u4 e1 v& a$ t! N3 ACTACS Contingency Theater Air Control System (JFACC term).8 _$ m5 c3 E& j- W( B% `# Q CTAPS Contingency Theater Automated Planning System (USAF).! \. S3 F9 |$ f( }6 s- Y CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ( {6 t) P6 j {$ fCTBM Conventionally-0armed TBM.' J6 j- j- P* N+ g CTC Combat Training Center, Ft. Leavenworth, KS. ; Y/ h" A' z5 y [, }: wCTCC Critical Technology Coordinating Committee.# d& d8 f3 k, v( K( O v CTD Communications Test Driver.1 |( l, q! ]; D: G; G CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. 5 T! u/ k8 ?' YCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally ; x x* p0 A8 [funding selected test investments proposed by the Services and Defense * {: O, n# C/ S$ t9 Y% A- OAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C" M7 P. w g1 [. m! l 68$ l% F1 P5 ?0 \1 y) \# a F CTF Controlled Test Flights. - g! ~, @! N4 U" C# P u( A' n) vCTI Concept Technology Insertion. 7 ]) |/ I0 O7 b& rCTN CALS Test Network.+ K2 E" C0 a9 m/ r: T5 Y6 ^ d CTOC Corps Tactical Operations Center.% t* c. G# j5 G CTOL Conventional Takeoff/Landing aircraft. & ]3 m) \8 M4 k) q1 }( ~CTP (1) Critical Technical Parameters. * ]2 g8 \/ u& L( D, Q- u5 _(2) Communication Tasking Plan. * S+ M, v7 e- J! E# ^: S1 L7 `(3) Consolidated Targets Program. ) n, j0 k% Z& l! N8 RCTPE Central Tactical Processing Element. ' _# R1 U% ^/ q, b$ x) c7 L* N5 N, nCTPP Consolidated Targets Program Plan.( _. \- x5 H* O" Q4 V" g0 Z CTR Cooperative Threat Reduction (Treaty negotiation term).$ o [# z% R7 q" r5 {& m CTRS Centers % c" I6 A5 D) ^1 H' FCTS (1) Clear To Send (TelComm/Computer term).; |/ u; U! g+ Z' U$ p5 w0 } (2) Contact Test Set (USA IFTE term). . @9 G6 [, m' x+ l( y' sCTSS Computer and Telecommunications Staff. 5 ?, z! ~) w+ [9 V+ V pCTT Commander’s Tactical Terminal (US Army). + P: i' C6 P! YCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). 9 @; U- ]5 m3 M: E8 sCTV Control Test Vehicle(s).4 H8 z4 g. z5 s+ R CUDIXS Common User Digital Information Exchange System.7 L$ H5 M. y2 w* Y5 j1 U L% G Cued Operation The directing of one sensor based upon the data received from another sensor. * u7 s' P- O) d, ] Y6 t$ G; _. rCueing Command The command within a tactic, which specifies the sensor element’s coverage / {8 m& D& V" z8 Jvolume.( m/ z. j1 u' Q* E- c3 K3 P Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage# t$ M* x/ r5 s Y. j0 k% ? volume. * C* h2 m- ]1 `5 Q0 YCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. ) I' R( K+ B# C' xCV/BM Carrier Vehicle/Battle Management.7 _7 w( V6 Y+ p- s1 L/ R1 @5 @4 G CVBG USN aircraft carrier battle group. 6 T7 T; f4 Z' t. e& X; w; [+ qCVHG Carrier, Aircraft (V/STOL), Guided missile.! [: \3 u9 _) S% Y' n# b4 ]& p2 g; d CVISC Combat Visual Information Support Center.- h2 X2 ?0 [+ v. H H3 O CVL Copper Vapor Lasers., a# N5 W; i# R$ R8 f CVN USN nuclear powered aircraft carrier. ( } \! U2 c0 X: P$ Q/ q! GMDA GLOSSARY, VER. 4.0 C6 Z" r4 x G: Q/ z4 z+ S( R 69 . D( {! W3 w8 S! QCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.& y$ s- `! O4 f4 i1 o- K7 Y% k CWAR Continuous Wave Acquisition Cycle (Hawk).+ A2 i+ t& w; E9 b% N CWBS Contract Work Breakdown Structure. ( r) v. O5 n. R8 UCWDD Continuous Wave Deuterium Demonstrator.1 J: d6 q9 m) {% P CWIPT Cost Working group integrated Product Team.% ~% R9 j. e; T$ t$ I; E CY Calendar Year.) A. h; }5 s3 b7 ? MDA GLOSSARY, VER. 4.0 D : Z' e0 _( } q* g% h710 e# h6 ^ F0 I0 d: h6 | D Deuterium + {0 M9 k, \7 N9 S6 UD Spec Process specification. , W! Q- D' U, l* }' _D Star Measure of infrared sensor sensitivity. 0 p$ _% Z9 ^6 oD&D Design and Development9 W0 q8 i8 ^% ?8 O; h% O& m( w: h4 b D&T Detection and Tracking. 9 T3 C# V8 l6 x, F$ d9 jD-IFOG Depolarized-Interferometric Fiber Optic Gyro. W- C- P& m1 }4 Y* h' P/ oD-Level Depot Level (ILS term).' h5 Z o! k6 K j5 `4 _' j( j D/A Digital-to-Analog. _. Q" w+ r s( n' r# Q" o5 A: O D/V Demonstration and Validation. # p0 L- K) [$ T& qD2 Projective (interceptor) in the Hyper-Velocity Gun program. / A! {: N7 p7 Y5 K! { ?DA (1) Department of the Army.( W% K& T+ `: o F" m' l4 A2 ~ (2) Department of Administration. / B' h% w9 H5 w0 O }' }9 t(3) Decision Analysis.9 u7 O. Q/ t# N% U6 c6 N ] (4) Developing Agency/Activity. # x2 X7 ~! L8 s" u, H$ L# _(5) Data Administrator. ( U5 _ y( c# m8 C(6) Direct Action. # h# g6 |/ _( ?* I6 }, u* j(7) Data Adapter.6 ?7 R+ J! J- |" B) ~ DAA Designated Approval Authority (DD 5000 term).# m+ j z) W' @ DAASAT Direct Ascent Anti-Satellite.2 K* d" h# `* i* X$ O# | DAB See Defense Acquisition Board.# q1 c7 ]2 K4 P$ c DAC (1) Days After Contract [Award].$ M% d3 j" m% q. d9 n (2) Department of the Army Civilian. $ s8 U: r' \% H' C(3) Directed Attack Characterization.5 }; a: _3 w Q# | (4) Deploy ACCS Component.) X% b% t/ o4 X4 r) \# I) e (5) Digital-to-Analog Converter.$ k/ @- o9 w+ d* P$ f, {: C$ N DACS Divert and Attitude Control System." u$ j' x4 }% Z6 n0 L5 s3 Z% e DAD Defense Acquisition Deskbook. 5 Q3 D. q- v/ _0 ^1 ^DADS Distributed Air Defense Study (1993). . k, \) u% ?8 I, |* WDAE Defense Acquisition Executive. 2 R* T, G- K5 r( R1 S' TDAES Defense Acquisition Executive Summary.: z' u& v: z2 G% y7 {7 Y q& [ DAGGR Depressed Altitude Guided Gun Round.. M; k, M1 {+ C$ h* Q4 l4 F# @ DAHQ Department of the Army Headquarters.0 ~2 W0 c* m( {' _: Z6 ^3 _ DAI Damage Assessment Indicator (targets). ' ^1 l: c- l7 T# Q1 Y: yDAL Defended Asset List. . r: a* X7 ~5 fMDA GLOSSARY, VER. 4.0 D0 n7 \# E6 i# {9 _3 M) n! [. l2 \ 72, P* E- G. F4 @6 l1 R- \( i3 V- V DAMA Demand Assigned Multiple Access.6 l: m4 ^1 J$ i2 X' N6 p* T6 a DANASAT Direct Ascent Nuclear Anti-Satellite. / N# n/ j; Q6 H- uDAPR Director’s Annual Program Review (SDIO term) 1 V- b0 `" T- _; e! UDARO Defense Aeronautical Reconnaissance Office (OSD)./ q, Y8 P- C7 I0 i- m- ]- W- j- F! x( x' R DARP Defense Aeronautical Reconnaissance Program. " T1 H& ]" ~3 N0 qDARPA Defense Advanced Research Projects Agency. See ARPA.' v( c# n$ o S8 q* E, i DART OBSOLETE. Defense Acquisition Review Team. / l! M- Q' x% S5 D- R. `+ n! W. TDASA German Aerospace. Member of the MEADS Program Team. * ]! ^7 z0 g7 eDASC Deep Air Support Center (JFACC term). ' a* I* O; h8 R0 d; M6 ODASD OBSOLETE. Deputy Assistant Secretary of Defense.9 T1 r; ]% k1 j: }1 R0 F DASD (C3) Deputy/Assistant Secretary of Defense (C3) + y2 u9 J* i W6 n: S. RDASO Demonstration and Shakedown Operation. ; s. Z' @6 R$ Y; q) }7 |- PData Integrity The state that exists when computerized data is the same as that in the source 4 C3 r. y) }0 E$ C+ p/ V2 k$ c, }documents and has not been exposed to accidental or malicious alteration or & d) t0 h9 G9 l n+ Z; {destruction. 1 U2 x& a S# b) b0 ?- O7 aDatalink (1) The means of connecting one location to another for the purpose of1 j- E' e' F& {2 p$ w1 }# E. B transmitting and receiving data. m. `4 x, o3 C- k8 G(2) A particular path between two nodes over which data is transmitted. It " M/ @/ T' Z1 e5 O3 ?includes not only the transmission medium, but also digital to analog 1 D# ^# K! I" X+ Jconverters, modems, transmission equipment, antennas, etc., associated2 G" m3 c. U" {( A& a8 j: N6 m# l with this path. In the SDS backbone network, it was a path between two# W# ^( R8 {; v" e+ G) p SDS elements. In space these datalinks were microwave or laser. On& V2 A" H! x/ J6 l the ground, they could have been wire line, microwave, or optical fiber., H: d- [/ w9 H DAU Defense Acquisition University, Ft. Belvoir, VA.- M9 u) n) y9 b% E DAVID Development of Advanced Very long wavelength Infrared Detector (USAF , e) }" }, ~$ f3 S2 g! APhillips Lab term).' _( v, h1 R; [$ I- D DAWS Defense Automated Warning System. , b( L ^1 g$ X3 U: t0 h- gDazzling The temporary blinding of a sensor by overloading it with an intense signal of1 J, f' t' j/ \/ Y" M6 @ Q. {3 B electromagnetic radiation (e.g., from a laser or a nuclear explosion).3 r& \+ \. y* m' N1 j# k8 Y5 ~ DB Bata Base( o' e* Q& e5 T! D& z1 m; B DBME Database Management Environment (Computer term). : Y+ h3 T& x+ I. fDBMS Database Management System. 4 B7 G3 g5 n0 X# S- pDBOF Defense Business Operations Fund. " |* T* t( P6 X+ h4 }1 hDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D 2 s/ i z0 W8 r$ d8 m4 ]4 o73 " I( {4 m2 B! L+ R# R. X1 BDbsm Decibels per square meter. & W3 P, g7 e0 K! gDBSM Database System Management. * v7 }( I1 g7 ~DC (1) Disarmament Commission. (2) Direct Current. & r1 b4 @2 i) x, Z0 JDC-X Delta Clipper Experiment. 7 H- u" _( W+ m! {6 |7 yDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications 7 y# j/ n! o: n& z: p$ eAgency. (Now known as Defense Information Systems Agency (DISA)).% d1 H$ s0 b, u8 z0 F DCAA Defense Contract Audit Agency.. x, x4 R" {8 G$ l$ N6 H DCAS Defense Contract Administrative Services.7 P! f, K9 C! L# S, X: }; ^( Z, h DCCO Defense Commercial Communications Office (of DISA). 9 P T( H6 s2 V* }1 v6 S( XDCDS Distributed Computer Design/Development System./ [/ }/ i/ r# X+ U, [6 W DCE (1) Data Communications Equipment (TelComm/Computer term). 9 v$ w% X! D' y1 a" ^(2) Distributed Computer Environment.' h+ ?9 K( H) d" t( z DCEC Defense Communications Electronics Command.3 A" A- f) i. m/ x( u+ J DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.3 o" x4 f! o& k( m, R5 n, e DCINC Deputy Commander-in-Chief.8 u8 C2 }" ?& o% n( ~ DCM Defensive Counter Measures.7 ~* P1 ?0 h7 n1 A/ P: Z DCMC Defense Contract Management Command ; x ^# Q7 x* j/ j5 WDCN Document Change Notice. + Y% b3 L4 k- n1 o" g$ aDCO Director of Combat Operations (JFACC term). 8 r6 G; T' ?* g3 dDCP (1) Decision Coordination Paper (see ADM).; a% r" {* [9 E2 Z. m+ W& V (2) Director of Combat Plans (JFACC term).3 k1 }- x( X# R: o5 _ DCPG Digital Clock Pulse Generator. 2 z4 D' b0 g# G" p0 ZDCS Deputy Chief of Staff. 5 g; m* w& B6 I; Z H2 @; pDCSOPS Deputy Chief of Staff for Operations and Plans (Army). 2 U: F2 F$ N; g9 Q# NDCT Digital Communications Terminal + Z! b" @/ _( R8 `0 N; t2 k2 ]DCTN Defense Commercial Telecommunications Network. % |4 u: I% f1 G3 \; r) TDD Variation of DoD. 4 `7 o' v4 J0 n3 Z( j5 ADDCI Deputy Director of Central Intelligence. 5 N6 c* [6 E* O6 N1 M) I: q7 mDDEL Dwight David Eisenhower Library, Abilene, KN (army term). 3 O1 ^8 X1 Y+ u. `" xDDG USN guided missile destroyer.5 O1 Z( Y( D8 M; ], G1 e% g/ e7 H MDA GLOSSARY, VER. 4.0 D4 J& x& ?; O: _- T: k8 F( { 74 - x4 P9 P) ]& L3 ?- @# R4 E0 qDDL Disclosure authority letter.% U h: r& T2 P/ u' N DDN Defense Data Network. & ~2 ]! o' h8 g$ s& lDDR&E Director, Defense Research and Engineering. + B+ L. l. T3 w2 {0 yDDDR&E Deputy Director, Defense Research and Engineering. : m* M8 [& z5 H" O" jDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).9 c, l1 A0 @, W7 i7 l# U DE (1) See Directed Energy. (2) Delay Equalizer. ! k( P. B5 y# R0 n) Y E: oDEBRA Debris, Radiance Model.: A ]$ t6 L% W4 h- U Decentralized0 n' y: B1 ?3 S2 ~0 w1 X Control # `3 y& i/ ^% s8 B4 a5 NIn air defense, the normal mode whereby a higher echelon monitors unit actions, 9 ^1 t- c% J2 Q9 K: v6 F6 @" Wmaking direct target assignments to units only when necessary to ensure proper + q8 N; T: v( X- Pfire distribution or to prevent engagement of friendly aircraft.* `! y* i* I& G7 T Decentralized7 S$ v9 h' ~0 k/ U1 K5 A3 C Execution + g- K) }( G4 i8 j: XThe distributed and integrated implementation of USCINCSPACE direction by6 N; ?+ K" m/ l/ } the BMD forces. (AFSPACECOM) 0 ^* t' R o) |- ?Decommissionin 1 X& A! u- U# y0 b5 U2 fg! H/ k5 F2 O% s The removal or the rendering useless of obsolete or no longer needed 5 [' `, V9 H4 C$ y) X% acomponents of the BMD system from service.* [" r _* I) I+ ^& W- p1 r Decrement A directed funding level reduction for an acquisition program.. J+ _7 G7 c* q) A7 k' b DED Data Element Definition (Computer term). ' H- |, b) \. g& sDedicated Mode# j' \& |& Q' w: @ of Operation & r: I$ M. w ~* h- |8 X! F8 |$ n3 G9 [(ADP Security)$ x) p/ R! X1 h- _- w- S A mode of operation where all users of the AIS possess the required personnel , ^* {& m0 V( k/ m' ^3 ~' _security clearance or authorization, formal access approval (if required), and a . m: ?! n9 N) S$ }8 INeed-to-Know for all data included in the AIS. B3 S7 o) p: q. G0 N7 |. ] Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about 5 [" L0 W: B0 f' `6 z% |5,600 kilometers) above the earth’s surface. V4 J/ g! m+ wDef Definition. ( K! ~# Z' _* {5 k' T4 LDEF (1) Defense. (2) Demilitarization Enterprise Fund. 4 r: L& k9 d- Y' \7 r9 B* n3 LDEFCON Defense Readiness Conditions. 0 y+ e; y( S7 q9 FDefended area2 F5 I0 {6 S$ O& G$ L/ c) G coverage Q# m$ B* O# H& Z' T: d9 SDefended Asset* M- X6 H( u/ [; Z' h List (DAL)7 D) w8 P0 D' y& M The geographical region that the BMDS can protect from ballistic missile attacks , c+ ?3 W% q" \7 G/ {7 x8 `) r1 iwith a specified level of probability of negation. May be specified for a particular " N, s6 ^9 E9 R9 Pthreat type, launch point(s), launch regions, raid size, etc., U2 a' |8 b, p! U' J! N2 b A ranked listing of facilities, forces, and national political items that require4 J$ H! o# x% G. Z* S; K4 P protection from attack or hostile surveillance. The list is compiled from Federal 3 d8 u4 X3 ?- e# l @3 cdepartments and agencies, Unified and Specified Commands, and the Armed2 B0 i3 F4 t/ s Services to ensure National Security Emergency Preparedness functions.$ I8 G* U! F2 d4 M1 f6 | MDA GLOSSARY, VER. 4.0 D: T) }9 h' K. j7 E 75 - q5 b* e1 n" t1 O' R# [2 a3 w5 aDefense & q9 j. W$ a9 q1 ]6 O/ `+ oAcquisition* \! P* _. @3 ]0 j5 c& A Board (DAB) 2 n5 d4 K" @: Y# F- E# yThe senior DoD acquisition review board chaired by the Under Secretary of2 _! W. {/ Q1 W0 W" ? Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the2 F' P3 m. v/ x, @- A+ X! x Vice-Chair. Other members of the Board are the Deputy Under Secretary of + h2 o5 s! j: \0 v% T0 kDefense for Acquisition and Technology, Service Acquisition Executives of the0 ]% Y3 ~8 p. D6 F9 \) l# o- E3 t Army, Navy, and Air Force; the Director of Defense Research and Engineering; c4 c5 `6 U& Z2 g1 i the Assistant Secretary of Defense for Program Analysis and Evaluation; the6 k1 y1 }3 H4 x& d0 Z3 ?/ } Comptroller of the Department of Defense; the Director of Operational Test and$ q' ]" `4 C& Z% @, O& T, j Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the" G! x) |* o9 J! R Defense Acquisition Board Executive Secretary. Other persons may attend at 6 b$ Z) }5 I5 E) b/ ]. c: w% G' O/ Lthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition 3 e# o, l* j- V) p& jBoard.”)' l' F5 m6 b: n2 H1 E' ?* F' I Defense & L0 V: o+ {5 Z6 xAcquisition. @" u* S+ o" D/ q1 U Board Committee , {$ g# e8 V' f5 {" \* ?9 S6 zAdvisory review groups subordinate to the Defense Acquisition Board. The' _5 s2 l/ s* l6 J8 X Under Secretary of Defense for Acquisition determines the number of 1 ^$ O8 J& {8 Z* d$ a# xCommittees. The purpose of the Committee is to review DoD Component & Z) z$ D3 a+ Y7 E7 F3 M. d, u% R3 wprograms prior to a Defense Acquisition Board review in order to make an 6 j5 M9 t9 w' q' w) M( Yindependent assessment and recommendation to the Board regarding the8 o7 w8 [, ~( h ~) N program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense ; B- e6 F9 [% S% g" q5 I0 N9 T2 RAcquisition ; i1 T [- \/ l2 cExecutive (DAE)4 m) j- P0 V3 Q The principal advisor to the Secretary of Defense on all matters pertaining to the . k+ ]! i+ M* n, D7 [Department of Defense Acquisition System. The USD (A) is the DAE and the & B, J9 O& K8 b$ LDefense Procurement Executive (DoD Directive 5134.1). - q% [0 L, L% G# Y( {" ADefense1 d; h3 R# T$ T/ h* T' S9 K' P2 t Acquisition3 Q/ r" X( u( x9 b Executive" X* [( N% a- `: w y9 h Summary (DAES) - p) x% c% S' @9 UThe DAE’s principal mechanism for tracking programs between milestone 2 A7 w6 ?/ o a! k; F# r# f' @reviews. Includes programs subject to the Selected Acquisition Report (SAR), 1 s. o0 c( Y' r n# a! J( qand any non-SAR programs subject to review by the Defense Acquisition Board. ]( h" S* }+ ]" p) [6 S Defense! J3 k8 a- n/ O$ }8 `- @ ` Employment8 `+ L5 v2 w! Y( C Option (DEO) 1 K, z# F7 B! LEngagement strategy provided to USSPACECOM component forces to achieve9 f) _6 H/ L, d6 w+ R specific military objectives against a ballistic missile attack. It defines hostile + K. i! m7 f2 f2 W8 ytarget priorities, provides assets to defend, and allocates SDS resources to be - D1 L$ c' M1 H8 C/ Semployed. A number of DEOs may reside in a particular Preplanned Response" U3 ?- v: Q% E3 t8 ^. B Option (PRO). However, default DEOs (those believed to be best suited to3 E* e" e! R" S# w3 I counter the threat initially) will be automatically processed and executed when 3 {# a# t1 W9 m7 x" _1 r; E d8 NDefense Activation Authority (DAA) is given by USCINCSPACE.3 [8 v0 s' o4 {8 d Defense0 @( L* g4 N% S Enterprise 7 L- R/ }: Y. a: e& _ KProgram (DEP) ! T1 I( X( m8 r. [+ t1 ^An Acquisition program designed to streamline the acquisition process by waiver! a7 z( O% K$ D. n, C: O4 N+ w of selected regulatory requirements. , X) _: h9 ?9 v; I6 FDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb ' _: {& {& d! f" n5 band progressively weaken an attack, prevent initial observations of the entire5 l$ p2 k1 l; Z# ~+ J position by the enemy, and allow the commander to maneuver his reserve./ c) |( e9 @# T, f1 M$ t Defense % y4 m. H5 b5 l- IMeteorological 0 e3 j. F. |/ K0 T1 n4 }+ a$ {Satellite Program6 a9 G6 U# c! ]5 M- X% W3 H (DMSP)8 E* {1 u! ?- |( b6 v* H Satellites designed to meet unique military requirements for weather information. + }3 v& E4 ^# J, L1 J: OUsed to detect and observe developing cloud patterns and follow existing # B7 l3 [/ ^& t' Iweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. 6 c2 M# U2 h9 h6 FDefense Planning8 n) r. Z0 t8 h# @9 D1 Z( {1 S and Resources# r: i$ e) z. @+ D* ^9 C! Y/ a) X Board (DPRB)! g. `' R b: J9 K A board, chaired by the Deputy Secretary of Defense, established to facilitate 2 G/ ^/ }! G; Q7 L: ~decision making during all phases of the planning, programming, and budgeting ; s4 p+ [/ g6 a p4 }( [3 x9 g8 b: [system process. Board members include the Secretaries of the Military 4 [7 V, |- e( U/ IDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of0 j9 t; ]$ _% a2 I0 h# y. G Defense for Acquisition and Technology, and Policy, the Assistant Secretary of& p% K5 F8 `, } Defense for Program Analysis and Evaluation, and the Comptroller of the- y& V. V# K' b7 x6 F. |3 ?& M: A Department of Defense. + P- v, V3 Y1 @% L: ZMDA GLOSSARY, VER. 4.0 D ' @7 G+ H$ F9 q% p76 . H* E4 _1 Q) Y K5 O1 ?# IDefense Planning , u7 ?& s a' A9 x8 {4 sGuidance (DPG)! h9 `5 i& e; E: `2 {& f Document issued by SECDEF to DoD components providing strategic framework4 _, |+ k, m/ d; W. ?! h for developing the Service POMs. Result of planning effort by Joint Staff, OSD,- s! r& V" b8 k* f* \2 _' N and Services. In connection with two-year budget process, DPG is issued every, Q: ^6 \$ i) X1 w- u$ { other (even) year. 5 b6 g& b& H2 N/ L/ V8 l- f" r. BDefense Priority ! _) F1 B( k. s0 |, t5 land Allocation 2 _$ c0 _3 i* R$ V0 tSystem (DPAS)- k* Y2 ^7 C9 t; ` The implementation of a statutory requirement where contracts in support of / {( p. R6 H% Knational defense must be accepted and performed on a priority basis over all ! z$ Q+ l( o" T- k+ Y/ ^( Xother contracts, and which requires the allocation of materials and facilities in4 ]" H1 `' F' `3 t* X' o such a manner as to promote the national defense. See “DO” and “DX.” 6 D( O, B, G$ R: T) I: VDefense, E5 ^6 s3 G) f; V; c Readiness 4 _( M$ f, V9 o6 FConditions & Y+ V: ]. c" X! i(DEFCON) 0 C; C5 L3 d `% ]8 W! N2 x+ g: k5 TA uniform system of progressive alert postures for use between the Chairman of9 ~2 g6 n' | E; S$ {1 _ the Joint Chiefs of Staff and the commanders of unified and specified commands; ]4 W# R; _; e6 I5 p( R1 Q and for use by the Services. Defense readiness conditions are graduated to ( a7 ]' ?& i) e; T& rmatch situations of varying military severity (status of alert). Defense Readiness 6 ^ x; S% b0 B: \5 b* P: |Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as 4 ] o) R4 E" l, m* m4 n8 bappropriate.' i( Z! B( @& I; B W4 Y3 }0 J9 l Defense Satellite 8 V* `5 W( j% ?: T \, VCommunications ; m9 K$ W5 ]8 y5 HSystems (DSCS): i; B: }+ H( M* }& o Advanced communications satellites in synchronous orbit around the earth. . W- d1 Q* |% [0 b1 r2 @Provides high-capacity, super high-frequency (SHF) secure voice and data links 9 Z7 q3 V c) {9 ]for the Worldwide Military Command and Control System (WWMCCS). They 7 K0 P7 |% ?+ w( D- e* u+ [7 ysupport terminal deployments for contingencies; restoration of disrupted service: m* `- q( B0 d% R overseas; presidential travel; global connectivity for the Diplomatic6 l3 E# ~% i4 G2 {% w Telecommunications Services; and transmission to the continental United States ' t8 {# E/ B( l1 \/ k/ Bof some surveillance, intelligence, and early warning data.; z2 h6 C6 Q* x! q Defense Satellite% o" I/ B" T- F. z (DSAT) Weapon 6 L" t; l' k4 h) g9 v* k" xA device that is intended to defend satellites by destroying attacking ASAT6 ?, H; V$ G1 A$ | weapons./ P2 n c& H0 h# O4 J1 ^) l* K Defense Support2 j: R3 m% R& ^5 ]6 O Program (DSP)" j; j0 i; Z1 n O) t; Y A system of satellites in geo-stationary orbits, fixed and mobile ground' _6 D5 k0 X* K7 T S processing stations, one multi-purpose facility, and a ground communications , H' L+ T' R P/ b% cnetwork (GCN). DSP’s primary mission is to provide tactical warning and limited) _" q9 d# j m ~3 B6 o attack assessment of a ballistic missile attack.8 v8 i1 A4 u( Z9 h Defense( ~4 A3 i8 c% m4 W Suppression+ j/ F# b- M: U) [; @2 ^6 s0 w3 U Temporary or transient degradation of the performance of a defensive system " s, W/ X: K8 @' hbelow the level needed to fulfill its mission objectives, by an opposing force. " H, y- y1 d- v/ p$ H(USSPACECOM)6 e* ]9 A# |6 c, E+ |% R Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic; v3 v2 k8 p7 y8 ~- S: \& [ missile trajectory; i.e., boost, post-boost, midcourse, and terminal.3 T- v; x( K) O6 z, ?* K" z, T Defensive : T7 W( s( n" \1 q$ vCounter 8 ]" _. A. \8 y* ]Measures (DCM) % N t+ t3 y: Q, U3 w/ |" A& ?% M, k& ~Actions taken to eliminate an ASAT attack. ) m0 E8 |9 W# z) m+ dDefensive - g0 ?0 F r3 P$ dTechnologies " j; G1 R$ E. T5 v$ rStudy Team # l" s0 T4 e( s# ?( }(DTST)( |' k, [" d5 x A committee, generally known as the “Fletcher Panel” after its Chairman," b( w7 H# S9 a& } c appointed by (former) President Reagan to investigate the technologies of r8 Q; P1 Z- V; D1 K. _- V potential BMD systems. 2 h/ w4 A5 L( U5 KDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.4 } o& |* K* w; w- n! R DEIS Defense Enterprise Integration Services (ex-DTIS).3 _: n( n1 r! p- |7 g DEL Delivery. & L! e$ s; C% S) g% y3 D3 vDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion 3 u2 l# V+ b3 ~* W/ hof shots about the aiming point. See also Circular Error Probable.. j6 I+ F, v2 X MDA GLOSSARY, VER. 4.0 D 7 z3 r, O: X# S P8 j5 H77' E3 C! w! k# m/ P Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the * B; A9 K- M' ^. c# l! Dmaximum change in velocity, which a spacecraft could achieve in the absence of * @! P% Q1 w* wa gravitational field.) Q# j$ @& r; a0 n4 Z9 ] H Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). ^6 F; K" B* f* z7 G. BDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its/ N/ |9 Q1 w3 y/ U3 ^ desired function (matching RV characteristics, screening RV, etc.) . p8 p2 x6 r {; pDEMO Demonstration. 7 H/ s( j! n) G- @$ SDemonstration( e0 _2 ^* i3 _" b$ R: G and Validation # w+ b% p4 o9 D5 n(Dem/Val) " i v# ]2 e Q! jThe acquisition phase when major program characteristics and product designs+ ^8 O3 a0 K, O R' q! L, Z: m are refined through extensive study and analysis, hardware development, test,. y$ }* a; Q4 o) \ and evaluations. The objective is to validate the choice of alternatives and to# U5 g3 {" H; }" K3 Y2 c provide the basis for determining whether or not to proceed into Engineering and! y$ c" h; Z6 p4 r% i& F* y' C' @" E8 T Manufacturing Development (EMD).+ R6 R3 e8 P: p/ W$ g& d+ @ Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.6 @( Y0 o3 Y8 Q( N; t" b) F It may include destruction, removal, contamination, or erection of obstructions.) z/ g' F0 d9 r% w: t DEO Defense Employment Option.( [; d' }$ \& j0 k5 k$ Y% c3 w# \ Department of. [9 D* i/ o6 a+ Q% Z Defense& H; G- [) L7 y4 P+ G4 @" N Acquisition" K8 s0 M5 b! S& n( ^& F System. D" @- N& E0 r0 U! [2 K A single uniform system whereby all equipment, facilities, and services are : O4 v5 k9 @* \! L) G( vplanned, designed, developed, acquired, maintained, and disposed of within the ' d& u8 [$ ]4 C. x& e ?6 s4 s4 w4 bDepartment of Defense. The system encompasses establishing and enforcing 4 F2 _# Y/ \, X( tpolicies and practices that govern acquisitions, to include documenting mission+ c4 Z/ [0 E K% H* f2 V. }9 ] needs and establishing performance goals and baselines; determining and8 v1 v" P; q( \) n0 F6 z. _2 \ prioritizing resource requirements for acquisition programs; planning and & M& H( x; | X: H- H: D: z6 bexecuting acquisition programs; directing and controlling the acquisition review1 R" C6 G; v P+ ^ process; developing and assessing logistics implications; contracting; monitoring ' x7 R1 i" y7 L" {) ^: rthe execution status of approved programs; and reporting to Congress. (See 3 z; z3 d: N) w# d: G6 T( ^7 q. Q5 ZDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)$ [3 P2 `5 G( J' k# k8 w$ ~2 l Deployment (1) The placement of force elements in battle positions to obtain a higher$ h, U+ z9 y h1 k, V state of readiness. q( { j( P4 i2 p0 |) n' g" q(2) The movement required to place force elements in battle positions.0 D' c; W/ U/ [, _1 M$ M (3) Fielding the weapons system by placing it into operational use with units3 V K; f' P( f; M in the field/fleet. - F. `) y& J2 K(4) To arrange, place, or move strategically.5 Z3 u+ d' j' Q# ~ Deployment8 R/ P, o/ I9 I2 |* m Planning. Q8 }, `6 t0 S" p C! U7 s9 ~ (1) The development and maintenance of plans required to initially deploy,$ R e* r& g P0 |7 l! ~) c2 n maintain, and evolve the operational system in accordance with & Z/ [, [0 E- Lschedules and priorities. It includes factors such as launch facility& n3 q: H, x8 O6 a) o# R availability and planning for the availability of other required elements. h X* L% Z' }" n2 E such as trained personnel or units. In addition, it identifies the impact of' l* G: x6 Z# ^" E/ y( G. }, c deployment on operational readiness and any testing constraints 8 Z8 X7 ~% N. c3 Dassociated with deployment.2 y. r5 v8 ?7 R5 M9 c2 a, [ (2) Encompasses all activities from origin or home station through) Y @0 m) `$ P$ Z/ b destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding$ a/ I1 f4 W6 n% h' b areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment v9 L$ B* o c8 J4 T4 _Testing6 `9 Z9 I* f" E2 K$ Z3 U% ]0 f The testing and/or simulation of system assets in the physical and operational 7 t" @6 s8 z! _8 X5 A$ _environment in which they are expected to perform. . s9 p: I- R s/ O% R( `' aDepOpsDep Service Deputy Operations Deputies.9 v, H$ j! r2 d! c" N) V& Y' i MDA GLOSSARY, VER. 4.0 D : ^; n) t- j W0 f5 N78 . C. @: l/ c- t" f t6 V/ fDepressed 1 E" i' U* W0 c4 rTrajectory + u. t( C' T0 @- q- ^Trajectory with an apogee below that of the minimum-energy trajectory. " B. c) j( o3 gDEPSCoR Defense Experimental Program to Stimulate Competitive Research. * ~! l, N7 l2 x0 A: i5 ADEPSECDEF Deputy Secretary of Defense. ) p5 ^7 b% Z& wDeSecState Deputy Secretary of State. ( ?/ G4 g8 r; m0 xDERA Defense Evaluation and Research Agency. Consolidated research and ) H! W/ @3 H$ W% H9 Edevelopment resources of the U.K. Ministry Defence. Headquartered in1 Q- l3 ], {4 x6 r: G4 p Farnborough, England. - @3 d; H) y |6 @+ @8 NDerivative % j6 u/ o$ _9 B) `: hClassification ?1 t9 }- l! V ?& s/ [A determination that information is in substance the same as information ; L- ?/ P# H4 S( \0 gcurrently classified and the application of the same classification marking./ M, @5 N- m) S) a% z DES Data Encryption Standard.- Z& M6 A- r) w% M) J( Q DESC Defense Electronics Supply Center (DLA term).7 ~3 ^: |- x+ Q9 O# c) v4 B Design ! j* U: s5 Y+ y* l' ~2 f# Y2 iConstraints( S% z% W/ b, Q3 U+ N! ] Boundary conditions within which the developer must remain while allocating 6 @: b/ R U1 Z/ s. |, mperformance requirements and/or synthesizing system elements.: m, e. V- ^3 R7 G0 g Design7 v1 \- A( p, M, A; Z. Z( ^- Q Parameters 2 j: |5 i0 _2 t" z5 r0 l6 @Qualitative, quantitative, physical, and functional value characteristics that are - ?3 t# V- B) S7 l: T2 J. @inputs to the design process, for use in design tradeoffs, risk analyses, and 6 F6 n* p6 | E& idevelopment of a system that is responsive to system requirements.9 ?9 V& t d' y- } Design Phase A period of time in the software life cycle during which the designs for - U, [& ?. K& P/ F( k7 a5 J9 i8 Rarchitecture, software components, interfaces, and data are created,# N* e" P+ r, i V4 V2 [7 K) ~! d documented, and verified to satisfy requirements. 8 m( D# N! K! ?: ]; O1 b* \( {8 I4 EDesign-to-Cost 8 H; \) f! j5 M3 C(DTC) Goal + b2 y+ F7 \0 n# r: k8 PManagement concept wherein rigorous cost goals are established during" H5 I5 k; i4 w( Q5 B! u development, and the control of systems costs (acquisition, operating, and 6 i8 P) f# ?- d0 {% o% ksupport) to these goals is achieved by practical tradeoffs between operational : t% C ^: B8 b# ^& h9 J0 h- d6 ecapability, performance, costs, and schedule. Cost, as a key design parameter, 8 x$ m$ v) M: `2 i t- Fis addressed on a continuing basis and as an inherent part of the development ) g8 G5 w+ x; w. X9 s3 t6 ^( U4 o! Hand production process. A DTC goal should be in the form of average unit " W$ p- @5 X' Z6 V# Cflyaway cost. Also, DTC parameters for operation and support will be ( C3 N$ W# d! k cselected—parameters that are design-controllable, significantly affect O&S costs, 2 x" F8 g2 V' [! }8 U: \and can be measured during test and evaluation. Parameters may be & c. Q& x4 G& N6 P; \; _expressed in dollars or by other measurable factors, e.g., manpower, reliability, or 8 N2 ^$ ~) S+ g) F% cmaintainability. Firm goals and thresholds will be established no later than entry $ Y8 T( \# H* z1 X) `+ n! cinto EMD (Milestone II). This is an in-house goal, almost contractual in nature,( N6 V3 d/ ^& s4 x5 M' l7 N( A between the PM (Service) and the SECDEF. Allocations from this goal will 2 ^3 J" A0 N8 r+ kbecome the contractual DTC goals for contractors supporting the program.3 q; }5 t. L8 o/ n/ i) ~' c+ b# B Det Detachment.$ b) A) P9 o: ]8 j8 R! N W* {% g, E DETEC Defense Technology Evaluation Code.+ `# ?; K; ^0 g( @) ` Detector A passive IR, visible, UV detector turns photons into an electrical signal. The ! c5 j3 n# n$ n% L1 {0 H+ t% hIFOV of the detector is its solid angular sub-tense. There is sometimes ! j3 T) C M& A( }4 J5 Vconfusion between the detector sub-tense (size) and the pixel (picture element F v5 I7 e0 M( @* w4 Qsize). They are the same for a staring sensor, but in a scanner it depends on . a* B# D3 C/ \the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.9 S, x, {! l7 j; Y9 n+ j7 P/ _ MDA GLOSSARY, VER. 4.0 D( g& r/ N* r7 J( y$ G @3 }" w 79 " L; w! Z' X0 E$ IDEV ENV Development Environment.# r2 e% Y+ L: ?, _9 P6 V Development + M" X7 v. Y0 F8 ETest (DT) 5 V# e5 E/ t% s% P8 b1 x* UTest conducted by the development test organization to achieve specified test- [4 J8 w" k1 c7 p1 q) _ q objectives. It may be a complete test, a subtest, or a phase of a test.6 o, S8 L9 O" t( s% | Development . @' B8 _! c3 M8 P* X3 A! U3 ]Test I (DT I): C5 Q7 ^+ [: u4 P6 t7 X0 D5 O A series of tests conducted during the demonstration and validation phase. 7 L+ b2 N# d* e# ]! H+ C: EComponents, subsystems, or the total (or full) system are examined to determine: G2 y2 z1 S& F4 o$ ]0 e4 F whether the system is ready for EMD. State-of-the-art technology is addressed 0 v% q5 D& u' U6 D7 `in DT I.% Z) |% h5 c3 _& \" G+ x8 t Development 8 M& h1 m$ N# T: |. Q, |3 u% _) UTest II (DT II)7 a# J+ c3 J, e A series of tests, normally during EMD, which provide the technical data' | s+ Q& X& C necessary to assess whether the system is ready for low-rate initial or full% C% y9 P2 i% V4 p. D& Y8 e production. It measures the technical performance and safety characteristics of9 P- Y$ Y7 S! q, M" X/ S/ D$ B* r the item and evaluates its associated tools, test equipment, training package,, [$ m5 m8 H9 K ?% \& E ] and maintenance test package as described in the development plan. DT II( c8 _ U; f8 x0 H addresses accomplishment of engineering design goals and the fulfillment of6 P' V, w6 c5 h contract specifications.5 l* x& F) o m3 B# L8 X! O5 m Development* u: X) `: t) \; _ q4 I Test III (DT III)" j) Q) y7 L/ [ Tests conducted during production. 7 w* v' v6 e; M/ b2 B- iDevelopment - |( A$ r5 g- [$ N" e7 z' iTest and) D' y) \6 O( M5 ]/ f Evaluation * C6 c+ m: C+ F5 i(DT&E)2 V n! w6 t. A Test and evaluation conducted to measure progress, usually of % B' D* e5 Y- H4 ?6 `5 r0 l, Zcomponent/subsystems, and the proofing of manufacturing processes and 2 V! D4 I& `2 s0 w+ Y6 icontrols and to assist the engineering design and development process and 4 O$ q4 a2 T+ F d4 D4 H5 P/ g9 d" ~verify attainment of technical performance specifications and objectives. Usually 2 ~8 c. T5 f7 S8 j6 ~; c' Q/ Econducted under controlled or laboratory conditions. Can be conducted before 5 K: U7 ?: U7 {; A kor after production begins.% P# i" d- O6 I2 u Development # e/ I' a/ E' b4 C6 R# CTest (DT)* J, p( J6 @0 X! Z/ P# Y1 y. h' ]+ ^ Test conducted by the development test organization to achieve specified test2 k: A4 M# X; R* i' y" d objectives. It may be a complete test, a subtest, or a phase of a test. 7 k* X7 r2 f( ?$ W* CDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost,( e/ j% B6 S. G$ @8 l1 _ H6 ^) [ schedule, or performance without authorization from the milestone decision ! F1 `4 D1 S+ K# _authority. Acquisition Program Baseline (APB) thresholds represent these 7 \. m5 i: h1 D% W; A+ dparameters.2 A3 U; e8 J2 v9 a2 r/ d, e. b Devolution of8 {2 ?* A2 i1 Q k1 g" s* j Command3 e. z( E( \0 |0 i# l Minimal essential operational capability to perform C2 provided in an orderly and ' D1 y( g, ]( U2 Stimely fashion to a duly authorized successor. 0 }- d- r4 K* ?* ODEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.$ o, Y% L" i9 J3 v1 m! ^0 }* F DEW/D Directed Energy Weapon/Discrimination.+ Q1 S% c5 b5 O! p, |# h DEWG, O Directed Energy Weapon Ground, Orbital/ b5 Z, ^* r! W6 L/ g: \" A DEWL Directed Energy Weapon, Laser (thermal or impulse).1 \1 ^9 V8 N+ v. c DEWP Directed Energy Weapon, Particle Beam (neutral or charged).+ p$ E \3 g( u+ | DF-KBS Data Fusion Knowledge Based System.* H4 Z- p. [- E9 ~* N DF2 Deuterium Fluoride.6 |/ E2 m2 K& h( j# i+ R DFAR Defense Federal Acquisition Regulation : Q" E1 ^: I+ C2 A. NDFARS Defense Federal Acquisition Regulation Supplement.: J- a0 M: M0 @ MDA GLOSSARY, VER. 4.0 D + d# e9 d7 Z; |: z) m80* u: L8 A3 f: `9 C DFAS Defense Financing and Accounting Service. ' g. [, j8 Z1 R+ pDG OBSOLETE. Defense Guidance. See Defense Planning Guidance. b2 v( o% r7 \& J& v" q q5 j* U9 LDGA Director General of Armaments (France).0 q: t$ y7 W# M- K4 F& z' L DGP Defense Group on Proliferation. . v4 f) v s& v9 B/ c9 w* WDI (1) Data Item. (2) Developmental Item.! ?; D9 M5 Q/ R( Z J6 f' n' g DIA Defense Intelligence Agency.' W6 f/ S+ d1 M DIAC Defense Intelligence Analysis Center.* K( f' |9 u4 }7 L1 b DIAM Defense Intelligence Agency Manual* O. O* `4 s* K Diameter (Optics) The unit of measure of the light gathering power of a lens.7 W6 A% Z2 W: ] G3 a6 N# r DICE Digital Integrated Combat Evaluator. ! e/ r1 B) g/ d# n: E: d, tDID Data Item Description. 6 h9 F5 }/ @" E1 G) |Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The% Q2 N5 Y* S; q2 V angle of spread, which cannot be eliminated by focusing, is proportional to the5 P9 X/ B% E5 p. O/ W ratio of the wavelength of radiation to the diameter of the aperture. + o" A3 b9 v4 d+ sDigital; v- ^ H+ N& U r; S- Z Processing% X+ \# h# `# ~( r The most familiar type of computing, in which problems are solved through the* G0 I H3 D# F. W mathematical manipulation of streams of bits." ^# H" H/ o: k) H DII Defense Information Infrastructure : E, v5 t; R$ b8 TDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to ; h7 E! V! o& y3 D% v12 km) between wake termination and de-sheathing.% u- j, [; L0 @& r8 f- d DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).; a: j: r$ @, m: a& @; p, |' j5 Z1 r DIR Director. / ~, U1 O' _0 q6 L9 mDirect Air/ e0 |* H, D; ? Support Center% Q( @9 ~4 @! o0 y+ a: a/ X A subordinate operational component of a tactical air control system designed 7 [/ W5 h1 A4 X: w! }, Q3 \- V* Z9 G0 {for control and direction of close air support and other tactical air support . k+ U1 G) X% p' N; |operations, and normally collocated with fire support coordination elements. 6 s' g6 A8 N0 W. mDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not - r: P3 X$ a2 N% {3 Wnecessarily limited to items that are incorporated into the end product as labor or8 S4 P4 C# D+ Q material. 7 d: ]% m8 K8 E/ S+ G7 l8 G8 b HDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing ' b& G) W6 |$ I; f$ r) g$ Odirect labor includes fabrication, assembly, inspection and test for constructing% c0 P Z, e: d. B4 R# l the end product. Engineering direct labor consists of engineering labor such as0 P- ?$ E5 o* j8 c/ Q5 E) h( O8 I3 } reliability, quality assurance, test, design, etc., that is readily identified with the7 i5 {% A- n4 ~3 s end product. 9 P N" I& }8 p; K9 o; S" ZDirected Energy" A8 Z' w6 ~8 Q r Y. t: S, }. F (DE)8 S. Z3 g. _: C. _+ W 1. Energy in the form of atomic particles, pellets, or focused electromagnetic4 l, Z- {( p8 s* e! \' `. n beams that can be sent long distances at, or nearly at, the speed of1 b- |9 I6 C! ]: \/ j: i7 V5 a H& \ light.' C- F7 |* ?( p9 e3 r- r 2. An umbrella term covering technologies that relate to the production of a * e4 f d( M+ \7 x! [beam of concentrated electromagnetic energy or atomic or subatomic particles." c' [2 M% P8 X2 l. K/ c" x MDA GLOSSARY, VER. 4.0 D & n$ O( N! \9 N81! i: r2 h" z6 A0 n# i! _ Directed Energy; N) y4 q' k- v9 I9 l Device 1 R P5 k2 t% {/ d1 r+ ~4 r: E7 TA system using directed energy primarily for a purpose other than as a weapon. " m6 o. @+ V& c2 J6 @5 i& A) z: P& c1 ODirected energy devices may produce effects that could allow the device to be # c% r- ?. ~# lused as a weapon against certain threats, for example, laser rangefinders. 4 a( T6 v; S; J& X0 e4 Q" LDirected Energy& _) m4 U* q4 H, c: Y- D Weapon (DEW)+ q. C2 m5 g. V$ \, u- M3 i A system using directed energy primarily as a direct means to damage or destroy 0 t9 k# k5 Y% p* _/ yenemy equipment, facilities, and personnel. 7 \. J! K' m7 c- J1 d( Q: U; QDIRLAUTH Direct Liaison Authorized. % f c: _5 d: uDIRNSA Director, National Security Agency. 6 B3 B# K7 i" r2 q/ I8 m* rDIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. 2 a6 u3 q& ?4 N( {) r7 T5 ADISA Defense Information Systems Agency, Washington, DC. (Formerly known as* |0 a5 F3 F1 D" A; y; S Defense Communications Agency). 2 E M' T' X8 t1 x- F$ CDISCO Defense Industrial Security Clearance Office $ ?5 h, E6 Z5 W/ p: J- c" BDISCOM Division Support Command (US Army term). : Y6 y, s0 J! `9 s. M; DDiscretionary % H2 ]: }7 B* o- zJudgment6 I) [8 ~/ ?$ g( V# l- X c The authority given USCINCSPACE or his duly authorized representative to 5 m# p6 H$ Q0 W, ^0 ^2 W0 eperform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination8 J5 {( T) F) D$ [% G( `# r DISN Defense Information System Network (DISA term). * `+ L/ T0 Y& R- n) |1 a* j. g% [9 F8 \DISSP Defense-wide Information Systems Security Program.% j2 T7 N4 G& A6 \. B; R DISUM Daily Intelligence Summary (JFACC term).+ s4 |* f6 k: s& e& Q6 I DITDS Defense Intelligence Threat Data System.$ g: e- H0 G3 P4 F9 n1 K DITP Discriminating Interceptor Technology Program. The objective of DITP is the1 ~6 B. B, `8 X development of advanced interceptor seekers to counter advanced threats. R4 Y/ J6 y9 _; {: S+ cDITP will integrate passive and active sensors into an interceptor seeker that7 u+ _- S1 {; @ integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP + ~0 B* H @8 I% D+ g( Fflight demonstrations will involve the tracking and interceptor on-board3 e% Y' D4 t) F discrimination of targets of opportunity while providing fusion processor data # q9 L: r* K3 {) p: Y) ^6 ftelemetry. (See also ASTP). 8 d, d, Q( l( q) \DIVARTY Division Artillery (US Army term).* `3 f( z% S7 p' x DIW Defensive Information Warfare.3 f0 v2 r3 f) M$ d# f& m. [5 s" j DLA Defense Logistics Agency, Alexandria, VA.0 j& g' Q' T( k DLSC Defense Logistics Services Center (Battle Creek, MI). . K1 p$ Y5 l/ h, J9 C! qDM Data Management & N' ^2 w0 \$ ?DMA Defense Mapping Agency, Fairfax, VA. + ^- l( p8 J. B/ MDME Distributed Management Environment.; H# [( |2 s$ [. h3 b( g! h+ h# Y5 I DMI Dual-Mode Interceptor. + P/ @" H1 w5 q) z4 UMDA GLOSSARY, VER. 4.0 D 1 v# T% n$ G( }& L82# K0 R$ G# \8 o# j7 a4 W* u1 j5 a DMRD Defense Management Review Decision.: \0 V9 x, P) p3 z g0 s! b DMS (1) Defense Message System.. v2 q' k3 |3 A7 h8 w6 ` (2) Dissimilar Mission Simulator. " g' o! k1 O; l4 F& _' WDMSO Defense Modeling and Simulation Office (OSD).+ `& A1 f6 C7 \) o- x+ Z DMSP Defense Meteorological Satellite Program.4 \6 g, G" T, f$ |2 I+ O6 R DMU Disk Memory Unit. & c, P! z: b) F" TDNA Defense Nuclear Agency, Alexandria, VA. 2 f0 M" U& N% B; E& WDNMS Distributed Network Management System., P+ \: j' g( w9 O) s/ | DNSIX DoDIIS Network Security Information Exchange0 i( F9 A+ X% B6 z: g5 X9 G3 ? DNSO Defense Network Systems Organization. % A, I9 n: A ODO The lowest rating under the DPAS. All “DO” orders take preference over unrated& I3 k' s: o/ I orders to meet a required delivery date.7 f/ R& l9 ^+ K. S1 @ Doc Document . H# P* z& R( _5 N5 F6 A0 }- d) D7 rDOCPREP Documentation Preparation. , z/ T+ H9 x( \Doctrine Fundamental principles by which the military forces or elements thereof guide$ V0 n7 R4 @, K k their actions in support of national objectives. It is authoritative but requires 3 i9 M7 C. a" r3 o. `5 D1 Njudgment in the application. See also Combined Doctrine. N; @' V4 K5 r: n! h' r* qDoD Department of Defense! s7 M( p) q: Z5 x& V1 P DoD Component* u9 A# U5 ?9 U# p. H' `4 Z4 Z2 e Acquisition9 v9 V1 o. Y+ x* \ Executive 5 ?& \6 X" H4 n+ ~7 zA single official within a DoD Component who is responsible for all acquisition 8 t* ~+ T% Y7 h: w! mfunctions within that Component. This includes Service Acquisition Executives: @5 B* U. l" g. i6 W for the Military Departments and Acquisition Executives in other DoD % I, @5 w/ f' K# b3 j7 C9 |Components who have acquisition management responsibilities.1 C: k i( a9 c& l DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,- u6 I4 N8 q- K& \: z/ E7 V Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the * d4 P+ b2 ?- P% g: R1 C A, {Defense Agencies; and DoD Field Activities.3 d0 O, E, h. L# [5 m% T( I DoDD DoD Directive. 7 r8 n9 N m" H9 s y6 J$ Y' }DoD Directive 9 W- e, K4 B- @4 R: L) ?/ A5000.1 & [; I% Y) A/ o- w8 h- U& t“Defense Acquisition.” The principal DoD directive on acquisition. It establishes' p* P3 R$ V5 R2 a6 ]* H policies, practices and procedures of governing the acquisition of defense0 P" A) L! c) W+ {* E8 ?2 Y acquisition programs.0 \+ w- f+ }) g# k$ B+ ? DoDI DoD Instruction. ! Z3 b& O" _. @# WDoD Instruction9 g( F9 S9 s! x3 N1 G: c 5000.2 ; A, a9 c v) s! M“Defense Acquisition Management Policies and Procedures.” Implements DODD1 V3 `+ M+ A" G- V8 }# \$ C 5000.1.* f: w; Z4 t& {9 P/ z3 M5 ?! ] DoDIIS DoD Intelligence Information System.& H5 J: `# z. h2 i, c# }2 d DoDISS DoD Index of Specifications and Standards.. e0 t, r3 G5 }3 @3 u4 m DoD-M DoD Manual. 2 |' o e5 n" u( {9 Y6 YMDA GLOSSARY, VER. 4.0 D ( O6 n5 D4 R* a83 8 w" [# t9 E( j" M: ~8 {9 {DoDR Department of Defense Regulation. # N! D* {. |4 b. u* G2 u$ G7 ]6 ODOD-STD Department of Defense Standard.& }$ z5 j6 P1 a. U DoE Department of Energy.( E6 N) ~" \6 G5 G DOF Degrees of Freedom. 6 P( v6 P3 d) D0 k' }" DDog House Large Soviet A-frame radar used as a component of the Moscow ABM system; ?+ l, f2 T2 Q, \; B$ W' I having a detection range of approximately 3000 km. It is believed to provide7 f& F) Y8 U' Y, V( h battle management for the totality of Moscow defenses. ( ]& f( @! ?& z3 fDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). 1 _4 L$ o' U3 B; o& f1 `DOPAA Description of Proposed Actions and Alternative (environmental term).# L8 G) ]9 k$ n, H& t( o Doppler Effect The phenomenon evidenced by the change in the observed frequency of a 8 A0 x/ x0 d, F' V9 Isound or radio wave caused by a time rate of change in the effective length of' W% M# m+ g( r9 Y: s the path of travel between the source and the point of observation. ; r K0 V7 j: \' m7 N: m rDoS Department of State (US). i- F+ n+ N8 j DOS Disk Operating System (TelComm/Computer term).% C7 r+ M+ ^7 {0 T9 r) q DoT Department of Transportation [US].4 M2 B+ }' n8 b) s/ J3 L DOT Designated Optical Tracker. : |- Z$ K2 p1 \9 t2 ADOT&E Director, Operational Test & Evaluation.4 u6 e6 g* `0 E1 F- O6 y DOTH Defense of the Homeland.' H; k! ^9 h4 w) s& H Down Select To reduce the number of contractors working on a program by eliminating one or! v6 A* S7 a7 K" v: F more for the next phase. ~" R4 ^9 S! wDP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. ) t X6 |9 F1 x# G$ V7 U! }6 \0 }2 _/ xDPA Defense Production Act. - a, ?' S5 `5 tDPA&E Director, Program Analysis and Evaluation.5 `: I/ a/ Z* u u& | DPAS Defense Priority and Allocation System.0 r1 K3 q3 n* {6 ?. Y DPAT Dynamic Program Analysis Tool. 1 Q5 p0 N+ e u8 G" S6 nDPB Defense Policy Board. - A) [( X/ y# e" X; ?" dDPG Defense Planning Guidance.+ V z9 x1 D( f, N% Q! W3 q DPM Deputy Program Manager. 9 p; S$ \# N( w/ X3 |+ K! aDPML Deputy Program Manager for Logistics 0 I: M# x; l& L8 o" x3 k. ^DPP Distributed and Parallel Processing (Computer term)./ j" E! g E1 b* i DPR Defense Performance Review.0 K0 ]2 k4 J, M* h8 z- K [8 U MDA GLOSSARY, VER. 4.0 D 8 o9 o9 L% [9 Q4 V) h84 " H- W3 P9 u8 Q9 GDPRB See Defense Planning and Resources Board. ' O" U( O5 P8 D3 i+ }3 BDPRK Democratic People’s Republic of Korea (North Korea).& Y0 Y; e7 X5 a/ X9 k' K O m- O DPRO Defense Plant Representatives Office.! ^. ^+ Z3 L* B) X+ t; \! X {& B DPSSL Diode-Pumped Solid State Laser. 6 T$ a: ~ T1 g: B PDR Deployment Review. : }3 z- M) }& R; P) Q8 |DRAM Dynamic Random Access Memory. 6 D, y* G I' K5 x- A- ?Draw-down Curve A method used to encapsulate the overall performance of a BMD system that6 \6 K6 r! Q1 e' d7 I2 p plots the probability of survival on the vertical axis versus the number of attacking % O! L* ~& L7 |- F) JRVs on the horizontal axis. Used in conjunction with attack price, they are the0 j% k& }4 @) ` most important expressions of a BMD capability. - i1 H+ i. V$ b( R! z! w VDRB Defense Resources Board.( {* y+ Y2 N5 x* e0 p$ T DREN Defense Research and Engineering Network.9 x- m# b2 \: h8 Y DRFP Draft Request for Proposal.- O9 O. u8 l9 d3 M$ g4 F/ i Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from& h: c1 o3 N3 ?8 T) G& W* O- S& ` gravitational and atmospherically induced torques on the spinning projectile.. @9 e$ G" j4 B2 V, a DRM DAB Readiness Meeting (DD 5000.2 term). , {: W3 L z- s5 ] lDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also& [ g/ p5 B+ L' O Remotely Piloted Vehicle.( Y, A4 ]1 z0 m DRP (1) Deployment Readiness Plan (US Army term).# z% h2 ~ q8 G# P) B2 t% S (2) Deployment Readiness Program./ o5 K* W: {( v7 _ DRR Digital Receiver Replacement (USN term). . Y& H% r m `# CDS Deep Space. 8 k0 E/ e( e2 L( i+ ]DS-1 Category of telecommunications circuit capability.9 @6 m2 V; j% c* c DS-3 LAN Category of telecommunications circuit for a Local Area Network. 9 h, V% C: @; v5 q* g0 `DSAA Defense Security Assistance Agency (OSD).4 ^2 k5 R/ R" e. m- P DSAT Defense Satellite Weapon. - z- _$ r4 {: aDSB Defense Science Board. _7 K( e0 q6 v2 |! c0 j+ V( E DSCS Defense Satellite Communications Systems. ' K. _$ R1 F( U: @DSCS-3 Defense Satellite Communications System Three.7 k5 C x) |, t% v: n5 |. Q DSCSOC Defense Satellite Communications System Ops Center. 1 p2 F, ?- z% J, M' ~( kDSI Defense Simulation Internet+ A0 T5 ^" v7 H; V" d3 f7 { MDA GLOSSARY, VER. 4.0 D% b9 F* i# y$ Q' _& Q6 B; V0 ] 85 5 |. h' ~% r8 r$ {DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet ) |: p- t5 V9 B+ `8 PSystem. 5 N; A, M0 f; q% j0 E' W+ ~DSM Decision Support Matrix1 H2 R4 B: O+ d4 c7 a& l DSMAC Digital Scene-Matching Area Correlation.& |+ s5 x3 ~" ?1 b9 |" d6 A% O1 w DSMC Defense Systems Management College.! s" K( z8 X% a+ Y DSN (1) Defense Switched Network (formerly AUTOVON). 1 B9 X! S9 G0 N7 J2 D u( G# R(2) Deep Space Network (NASA term). ( u. i7 X7 c' J2 h+ n- V8 R8 I2 ]" BDSP (1) Defense Support Program. (2) Defense Standardization Program.( }& i$ o+ V) G! l DSPRTM Defense Support Program Real-Time Model.3 S. t; Z" |5 k4 z5 [! i DSR Data Set Ready (TelComm/Computer term). / P5 x- W6 \ d" ]& }DSRCE Down Scooped Radio Control Equipment (TelComms term). w- b+ p/ i. M6 `( lDSS (1) Defense Supply Service. (2) Digital Signature Standard. 0 |4 a6 ^, S ]3 b8 S. p" c2 LDST Defense Suppression Threat.* R5 ^2 F7 z9 H* B5 f" @( [; } DSTAR Defense Strategic and Tactical Array Reproducibility. M2 R0 z8 y/ a" F) a8 V x; JDSTO Defence Science Technology Organization (Australia). - L' b% w& z% y+ m% ]1 H3 D4 i$ WDSU Digital Service Unit (Telecomm/Computer term). " ]9 s8 h; E! bDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to 8 v; N- F4 r# P% U& vthe DNA. : F8 I+ W! a W7 z7 SDT (1) Discrimination Technique.7 }5 s! g+ ~; |6 R (2) Development Testing.! U8 D; }* @5 y* J (3) See Development Test I, II, III. X8 _% ]2 ]. B9 X (4) Down Time (ILS term).$ x& p) l* w6 o9 i' J! G+ @ (5) Depressed Trajectory./ f' T6 F$ S0 o0 g2 r- d3 `/ B/ U7 U& T (6) Dedicated Target. / _1 g/ F) d7 c! z. X5 a) i7 VDT&E Development Test and Evaluation.& [+ m6 Z, {, ^4 c4 e DT/OA Development Test/Operational Assessment.+ x9 A7 t' U9 ` DT/OT Developmental Test/Operational Test. ( G. r$ k! o- j3 GDTAP Defense Technology Area Plan. 6 l0 h/ f0 E4 E6 H2 v0 ^DTC Design-to-Cost.% U' Y: I& @! j- Z* W1 E9 [5 C DTD Digital Transfer Device (TelComm/Computer term)." |/ z! b4 d. _1 {1 L DTE Data Terminal Equipment (TelComm/Computer term). 7 @- n, r- C+ ~+ H) |* a7 D7 K* E0 MDTED Digital Terrain Elevation Data.# u4 L, [ W6 a5 O& Z* e0 E DTIC Defense Technical Information Center, Alexandria, VA. 2 n$ p& C8 U+ j! `4 n- s/ NMDA GLOSSARY, VER. 4.0 D3 z. f+ l# C( V! S 86 ( k0 `/ e% g& A4 V7 u3 S2 P& E5 mDTIS Defense Technical Information Services (now DEIS).: q0 R" s8 v& G$ `0 @ DTLCC Design to Life-Cycle Cost. ' X; Y2 F1 {8 E% _DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL i8 \9 ]/ H/ W0 V+ a; R( k term).% ?& ]4 m- h, H$ Y6 ^7 D3 W DTLS Descriptive Top-Level Specification. & h* c0 [) S- T( Q& m# r( gDTMF Data Tone Multiple Frequency (TelComm/Computer term).9 T# ~& ]3 d5 G% Z DTO Defense Technology Objectives. . `9 y! h. t% i8 x0 oDTOC Division Tactical Operations Center.+ a5 k, A, b7 Q! c6 o( ? DTR (1) Demonstration Test Round. (2) Development Test Round. 1 b) M1 W! ]0 v: N! C: ^0 s) BDTRM Dual Thrust Rocket Motor.9 y" A5 w8 f% b/ Z5 H f; g3 l DTSA Defense Technology Security Administration. ( }6 Y6 w7 q: sDTSE&E Director, Test Systems Engineering and Evaluation. 8 q' D; f3 d7 z0 Z( f8 g S. k2 MDTST Defensive Technologies Study Team.' m5 r8 o' L! t1 B) O6 O! F DTT Design-To Threat5 A8 B9 {/ i9 l' f, V; o DTWT Dual Traveling Wave Tube (Electronics Engineering term).4 ?! Q9 h% u& A* t( [ DU Depleted Uranium. 1 {1 j+ D% @+ d7 B1 [4 u2 ~' jDUA Design Upgrade Assessment. 4 w: k2 C8 C' p/ q! \Dual Source Two contractors producing the same components or end items for the same 5 J% ]; ~6 k3 Iprogram.) v7 H5 [3 V6 H, [6 Y& @9 V6 V6 m DUNDEE Down Under Early Warning Experiment (MDA/DSTO term).. H8 D7 ?* { S4 z6 r3 t DURIP Defense University Research Instrumentation Program. . B; I1 C) j& N" t+ a0 |4 IDUSD Deputy Under Secretary of Defense. 8 w" I1 o) ]% \$ {DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).& p! X' n+ g- @# n8 N6 g* w" N J DVAL Demonstration Validation. ) |+ e* f, p! G( ~) v/ A. S2 ^DX The highest rating under the DPAS. It takes preference over all other rated and1 ~% b( b' e$ [$ _1 B& S: | not rated orders on a contractor’s production line. The BMD program carries a 4 G& r. _% |# ]3 ? @: g5 B“DX” rating.0 y8 x) V# I+ d4 f4 u5 ~' b MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87! Z% w F: u7 O E East9 q* f9 j- {0 G+ _- r E2 I See Endo-Exoatmospheric Interceptor. e. K5 f) R) ?1 i% J7 v VE2SRD Effectively Two-System Requirement Document. z$ q0 n4 t' M# W6 N- Y& O6 u$ A- j E3 (1) Electromagnetic Environmental Effects.! }. ]3 p' s9 Y# j! ]6 G6 V* K (2) Electrical, Electronic, and Electromechanical. 8 S" e/ B. q' B# v0 i* D% ]% [, OE Spec Materiel Specification. % P& |6 ~( a I/ Y0 cEA (1) Environmental Assessment.+ p0 m( R3 ^- j( j (2) Engagement Authorization.! o% B7 i9 w- o3 [4 i- O (3) Executing Agent. . P. V: J# g0 k' A(4) Evolutionary Acquisition.$ U" ~7 @- b- j; F (5) Environmental Analysis (environmental term).8 _4 V& i4 `! c& Y% l (6) Executive Agent. ) j7 c3 `# e- pEAC Estimated Cost at Completion. 3 O# j6 f* N$ b6 _* d& NEAD (1) Engineering Analysis and Design. (2) Extended air defense. : R7 K! n5 ?! S! A* S% M; UEAD/D Engineering, Analysis, Design and Development. * R8 J& i+ a7 o7 V' dEADSIM Extended Air Defense Simulation. 7 T9 x/ x8 Q0 J6 S9 Y5 R( k5 m! DEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing4 ^, C: g& ^ O users to model military response to airborne and ballistic missile threats. 7 ]/ }& J9 Z/ E; ~EADTBP Extended Air Defense Test Bed Program.5 p3 P2 z) S. h5 X5 ], Z EAGLE Extended Airborne Global Launch Evaluator.' v0 ]) _9 R3 J$ M& }/ t EAM Emergency Action Message. & @! ^& b8 p+ d* |EAR Export Administration Regulations. ) _8 S% g" K+ ~" P* i7 jEarly Operational % p+ j x, D9 K6 R3 S' y0 H/ ?Assessment b( \, {9 h6 ~7 bAn operational assessment conducted prior to, or in support of, Milestone II. 7 S9 [1 z3 Y+ s3 A/ eEarly User Test/ ~. r# R" M' H! t L9 \, H (EUT) 0 P9 }' F. M; C0 K1 dA test employing representative users to examine materiel concepts, training or# F q; A8 f) o+ W logistics planning, or inter-operability issues. EUT can be accomplished during6 R5 F6 A- ~& k% j2 [1 s* E4 n DEM/VAL on brassboard configurations, experimental prototypes, or surrogates Y. r. J: g" V" y* r! ^ to provide data leading to the decision to enter full-scale development., L( s' E$ Z% \$ I* W. F Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of3 |1 e8 S4 V% ^8 I5 x6 F' I surveillance satellites and long range radar. 7 m$ T. _( a' y& U, \4 H& L4 r; A(2) Early notification of the launch or approach of unknown weapons or) O7 y H o9 _) p l, q, X weapon carriers. & M- M+ K4 v3 h3 P6 @' {Earth Limb The apparent outer edge of the earth as viewed from space. . a7 x/ D X' F6 qEastern Test * l5 I6 x- T. @Range (ETR): T8 t A+ B- c' r1 s, ]3 e: \9 H/ P: B6 g Beginning at Patrick AFB, FL, this range stretches halfway around the globe8 }4 o% a, X7 O2 J0 E0 D# t) [- x. h, f where it meets the Western Test Range. An array of launch complexes, sensors,0 {' y3 S9 t0 F/ _! j+ \( w and tracking sites make up the Eastern Test Range. The ETR is now operated 6 O' O# f7 G) a+ A" x; hby AFSPACECOM as shown in WTR definition. " q/ |! E0 t" hMDA GLOSSARY, VER. 4.0 E& o- m2 W ?) b: N 88" ] S) u" R! ]: ^) Q EB (1) Electron Beam. (2) Enhanced Blast. ) l$ ^& B/ W- Q- lEBB Electronic Bulletin Board. $ f# h- X7 _$ p$ [; S+ w) }EBCDIC Extended Binary Code Decimal Interchange Code.* K% q5 Q1 \& ^% _- U7 Y EBW Electron Beam Welding. T7 [& E% C$ i% V: y1 w EC (1) Electronic Combat.. z0 e! M8 T# }! B3 C+ a( Z; { (2) Error Control. + V6 ~$ t) B2 r) |(3) OBSOLETE. European Community. Now known as the European Union/ Y! s( y& G1 b: H3 X7 f5 B# Y- | (EU).4 X, k# X0 l$ i: J7 [! C4 l3 } EC/EDI Electronic Commerce/Electronic Data Interchange 8 Y) j) W8 S/ ~0 v: aECAC Electromagnetic Compatibility Analysis Center.( ?, t/ P6 t+ M8 W' g0 V0 F ECB Engineering Change Board. 1 ^5 S" d! d. zECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 0 A H7 [* L2 U7 q2 qECCM Electronic Counter-Countermeasures./ c7 N$ g; f2 r7 V* h& o+ `9 c: r ECDs Element Control Directives. E+ P+ S# o; ^+ |4 UECLS ERINT Command and Launch System.8 B' H0 M) C/ h( x ECM Electronic Countermeasures.( o# o4 N4 Z- w( G$ f ECN Engineering Change Notice. / ^+ `4 i6 m( o; J* ]/ t) R7 NECO Engagement Control Orders. R: N1 p) P8 r2 I tECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. 9 I& E( V' T$ \" e2 V. U+ lECPMO Electronic Commerce Program Management Office. / z; H; A" n' Z- ? dECS Engagement Control Station (PATRIOT).3 p0 F& U3 ]/ G% w% n ECU Environmental Control Unit.2 e# P t# z' N$ ~. p/ N EDAC Error Detection and Correction' O. b+ e! h0 P% `2 E- x EDGES Electronic Data/Guidelines for Element Survivability.% k/ h3 q6 v; ]5 ]8 v, ? EDL Electrical Discharge Laser' |3 i5 @: g3 ~! ~ EDM Engineering Development Model. - N6 F3 W, i& a' @6 ^EDP Engineering Development Process+ @5 x" U' ?! y. j( ]* h. a( P EDR Embedded Data Recorder (PATRIOT). 6 }+ t, s' G$ {0 K% I1 B9 @' EEDS Electronic Data Systems Corporation * F7 n/ d1 i9 s/ GEDWA Engagement Determination and Weapons Assignment (PATRIOT).# K7 K6 w8 m/ ~* `( q; ` MDA GLOSSARY, VER. 4.0 E* W+ w! g9 C! U7 M8 [ 89 8 [9 W4 @* F% C4 f% D5 f0 j3 o% }EDX Exoatmospheric Discrimination Experiment & P9 W, I5 k3 _2 n; U3 U* iEE (1) Electrical Engineering. (2) Engineering Estimate. + W$ B. P$ h' b$ lEED Electro-Explosive Device.9 O4 C0 U$ w" ]$ h0 I EEEV End-to-End Experimental Version." Y. _! I- ~6 o- D1 x) s; `7 M EEFI Essential Elements of Friendly Information. * [ `! j4 D# R" F9 u: {( qEEI Essential Elements of Information. 1 \9 c7 P3 z, T4 ?EEIC Element of Expense Investment Code.1 `+ }% C: W: M! a9 Q& E. U8 B EELV Evolved Expendable Launch Vehicle (USAF term)3 @9 v1 j% F( e# ] EEU Electronic Equipment Unit. 2 h7 q9 H1 z9 X/ O {% f" rEFEX Endo-Aeromechanics Flight Experiment. 0 ~3 B7 W" P/ m5 g7 K mEFF Electronic Frontier Foundation. + ]- c; m; ? A$ @5 j" OEffectivity A designation given to the BMDS configuration and demonstrated capability at $ F) i/ b/ r: l6 z# A5 | \a point in time, becoming effective at each increment when an element or6 L/ d& l# @5 w( m2 [: f component is inserted into a particular Block.+ l0 p4 q. z5 j! k0 t# h Effective Damage That damage necessary to render a target element inoperative, unserviceable, $ f# y+ s7 @ V% n* L; Tnonproductive, or uninhabitable. 4 A* [( r2 E- p: t" [% XEffluent Plume The pathway of movement of effluents through surface water or air. . ~/ ^# l' c4 V& N* ^8 AEFP Explosively Formed Projectile. - E2 K1 W" \8 s6 {# I" J% ~EGP End Game Processor. $ R. c- ?* d+ Z5 n5 i- r. R0 YEGTR Eglin [AFB] Gulf Test Range. * W8 p( W4 B# n. c8 zEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). : u X. q/ m: v! u7 cEHF Extremely High Frequency. / u/ d7 M! p% B( m+ Oehp Equivalent Horsepower. : z; ]6 r7 p7 U! y0 P9 oEIA (1) Environmental Impact Assessment. 0 z. [+ u( X- t I J' |% I(2) Electronic Industries Association.7 N' H1 c+ I7 T7 M7 r EIAP Environmental Impact Analysis Process./ S; w6 d. Q) v4 G% D) N+ t EIP Exoatmospheric Interceptor Propulsion. , \- p1 {, M$ I, T. j/ MEIPC Electronic Information Privacy Center.( A% c+ M9 D: K% ^- P$ R EIPT (1) Element IPT. (2) Engineering IPT. 3 f/ @/ X' s0 r. r7 o; s) n8 v! aEIS (1) Environmental Impact Statement. (2) Explosive Initiation System.6 @. |& M% l7 ] EISA Extended Industry Standard Architecture (Telecomm/Computer term).' L$ @1 i+ h2 v3 D/ I/ c- j2 T MDA GLOSSARY, VER. 4.0 E ' l, w' l7 X$ y6 C0 `' n1 y5 p90# u) I1 u0 h, G0 I; W! T EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. 9 I5 `1 ?2 _- |Elastic Range The stress range in which a material will recover its original form when the force 4 V5 g' o: V6 o: N0 h(or loading) is removed. Elastic deformation refers to dimensional changes 7 ~5 |) F# E* G' }5 Q! y5 Eoccurring within the elastic range.2 N( n; j. w$ e$ y Electro-Optics ( E Y$ I2 @. v4 h# W) [Infrared (EO/IR) ) u' h$ y, t# K' K) `5 E2 p! N- eTechnologies/techniques employed by optical sensors in the wavelength1 Q6 Y* V, z* ~' v, K+ F spectrum slightly longer than visible but shorter than radio.. D4 j9 B6 D2 r; p' ~/ K+ H1 o Electromagnetic7 Q; }7 _& p' K: b Compatibility" [" f: T& ^: V! _ (EMC)8 C1 M: L1 r9 A A condition when all electromagnetic emissions from electronic, electro-magnetic,4 u7 X$ T( O5 z+ @' a' i/ F' k+ s- C and electro-optical components of a system interact without interfering with one 7 U; k9 U% @' Nanother. 3 A7 s1 [3 P; h3 ^# z7 j' x# ZElectromagnetic0 i) {7 V7 |# Z Emanations , O2 R7 T4 e" _5 Y2 aSignals transmitted as radiation through the air, through a vacuum, or through& |7 Y' ^$ K, p q$ Y# F) p conductors.& p2 U2 N/ q8 E& T Electromagnetic; f8 k M! O( U Field (EMF) " v& M' }7 I, l4 b. @, P' oAn electric or magnetic field or combination of the two, as in an electromagnetic 8 g7 n2 Q/ |' j8 iwave. Created by electric charges in motion, having both electric and magnetic, q+ G9 X+ h! C$ G c& O3 U8 e components oriented at right angles to one another and containing a definite L$ x# E" B! u! R7 {- m1 h- _ amount of energy.# S! ]+ [5 J3 d4 w) W/ r Electromagnetic( \2 p" a) G3 `) ]/ B Gun (EMG)9 p9 o5 b; r2 D/ @* | A gun in which the projectile is accelerated by electromagnetic forces rather than ; n: Q3 F9 @# J& Yby an explosion, as in a conventional gun.9 X9 E3 F+ Q+ N3 B3 I3 A7 { Electromagnetic 9 m4 [) P3 H+ D# ]9 W1 l/ z' @. }Interference (EMI) 7 V1 {/ X8 @: o2 u1 NAny electromagnetic disturbance that interrupts, obstructs, or otherwise 5 g6 N( i8 `* N/ a! W* [degrades or limits the effective performance of electronics/electrical equipment. - e' \. D; C1 v7 _: IIt can be induced intentionally, as in some forms of electronic warfare, or8 | D; I! E* E unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.. O: Q) p0 ^. V- D. }8 o) r0 @$ V Electromagnetic , L) [ Y$ E8 t5 B) P' `Pulse (EMP) % ~. m- @ }: |* x$ e- Z( \The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of ! ~* T+ v* ?# I" @) G! qthe nuclear device or in a surrounding medium. The resulting electric and" A+ O* K1 ~/ k* K6 Y( I8 W magnetic fields may couple with electrical/electronic systems to produce# }- a5 d& m1 Q- N1 R" m damaging current and voltage surges. May also be caused by non-nuclear p& O1 l' Q4 }# P6 W/ v2 x: r/ J means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic % ~8 N- g" `3 |& Q0 x! G- BRadiation (EMR)8 F- a9 f* D7 ^( u (1) A form of propagated energy, arising from electric charges in motion that# `7 X- O0 m. g# n, h produces a simultaneous wavelike variation of electric and magnetic4 \2 v7 N: ~; x- y* {# z( l, r fields in space. The highest frequencies (or shortest wavelengths) of # c$ ^" _. V. X' i/ ysuch radiation are possessed by gamma rays, which originate from9 t$ @8 k' @5 Z( b/ e% d; w7 Q processes within atomic nuclei. As one goes to lower frequencies, the 8 ^! f1 X7 X1 `; r0 w7 k6 K3 Pelectromagnetic spectrum includes x-rays, ultraviolet light, visible light, b# v1 K0 ?" r3 d0 Q infrared light, microwaves, and radio waves.; ^/ ]2 l" s. J T" e (2) Radiation made up of oscillating electric and magnetic fields and 9 q |* S: t. E, hpropagated with the speed of light. Includes gamma radiation, X-rays, ; V; Q2 c* Y( c1 M" k1 T/ q! X, ~& Oultraviolet, visible, and infrared radiation, and radar and radio waves.' K7 w8 ~6 e0 ] Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices 6 S: K+ k D+ y0 j, q1 Nused in system/subsystem design, excluding employment in the RF spectrum. $ y6 ?7 Q: x# D, b M* wElectromagnetic R2 p! h p5 O6 w! c* WSpectrum1 c- ?0 @' ^/ W8 j2 j/ F' j The range of frequencies of electromagnetic radiation from zero to infinity. It is. |$ j; [& d4 L( c divided into 26 alphabetically designated bands. + ?1 }' W! n. xMDA GLOSSARY, VER. 4.0 E5 K- u/ q# D2 C/ E# u 91& ~' f: S5 T0 s Electronic # W' W- d V$ HCounter-: Y5 u! F4 H5 I8 D4 a Countermeasure 6 S3 c+ F5 V* m2 ]& ?9 Is (ECCM) , k4 I* b& Z, J' \0 `# r' X) vThat division of electronic warfare involving actions taken to insure friendly , W2 w0 ~7 ~) weffective use of the electromagnetic, optical, and acoustic spectra despite the: T- {/ t0 |+ t B$ U G enemy’s use of electronic warfare to include high power microwave techniques.7 t" s* t; L8 [5 s! q4 d Electronic 2 Z0 O' a9 O, I5 m" p0 qCountermeasure) L7 Z0 I7 I7 { r# i% a2 J' h (ECM) - T$ |3 O7 Q" ^ d% ~) F6 CThat division of electronic warfare involving actions taken to prevent or reduce an ' R' @9 D7 v7 t/ {9 S# R1 Q3 renemy’s effective use of the electromagnetic spectrum. " [! A( ~, N6 {+ X' |" A) m: EElectronic* ^6 Z x2 |1 z Industries+ O# B4 b0 W$ m' p8 s+ I0 \5 { Association (EIA) : x" Z9 L. M# Q2 K9 a: T5 yA standards organization specializing in the electrical and functional 8 w$ e" Y7 v5 S+ a- Jcharacteristics of interface equipment.% Z1 E$ G! t" N# |2 d9 q Electronic / t! v( Z" j4 V8 _Warfare (EW) 4 |: i4 B' A' lAny military activity involving the use of electromagnetic and directed energy to ; W H) S' I- ]" x' o) [5 y8 hcontrol the electromagnetic spectrum or to attack the enemy. The three major2 {9 _; d# n6 K% ~+ }. j subdivisions are:+ D4 ?4 L' v+ i* K' S •Electronic attack – Involves the use of electromagnetic or directed energy to ) k6 p, P7 N# g: D. eattack personnel, facilities, or equipment with the intent of degrading, ! S$ a# }$ r. V' S$ l4 _" Q7 x' Dneutralizing, or destroying enemy combat capability. Also known as EA. # O2 O! b) m5 J; A kIncludes: 1) actions taken to prevent or reduce an enemy’s effective use of 9 ~4 Q" Y( j" x4 e$ ythe electromagnetic spectrum, such as jamming and electromagnetic$ X) R% ~, Y1 C+ O5 I; |5 r3 h0 k: } deception, and 2) employment of weapons that use either electromagnetic or 8 \ j U6 E+ j4 l" `directed energy as their primary destructive mechanism (lasers, radio " s* |4 k% o4 H0 h5 ofrequency weapons, particle beams). ) m5 Y8 P# k H* S+ T2 p/ R, g•Electronic protection -- Involves actions taken to protect personnel, facilities, $ U& Z3 D: P' R' M" O( a2 `* hand equipment from any effects of friendly or enemy employment of5 ]" @# p4 }# K* v: F electronic warfare that degrade, neutralize, or destroy friendly combat8 c% w- k/ Q c capability. Also called EP.# K0 p( g5 [# Z: h2 m •Electronic warfare support – Involves actions tasked by, or under direct" Z- i3 W0 `/ H# r* H% V" }. Z( X control of, an operational commander to search for, intercept, identify, and 3 P" h7 r( v9 V5 \/ rlocate sources of intentional and unintentional radiated electromagnetic2 b/ t. g: F0 o. [6 Q3 Y energy for the purpose of immediate threat recognition. Thus, electronic + o5 }+ p/ P& ~+ xwarfare support provides information required for immediate decisions# N q5 E8 V7 S. ?( n$ c involving electronic warfare operations and other tactical actions such as 3 [1 k# Y7 e V' x/ H# i3 |threat avoidance, targeting, and homing. Also called ES.3 ~( i7 G% t! V6 ?1 I) Z6 y Electronic ! L; f# ]$ D; j% q( U3 dWarfare (EW) 9 G3 V8 b1 s& ^3 r# j" Y/ WEnvironments) ]0 H& X# x# p& j$ w4 a" n/ i Electronic warfare environments result from radar and communications jamming " F2 N0 F* C" ]" r2 ~4 Land other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD) j9 Y- Q0 q7 r8 d, O# P( C/ d- s system., T8 X# H+ Q+ A1 w3 y2 n) J; f Electronics 3 t+ p2 M) ^0 d6 d- b! _1 D# a$ FIntelligence 3 G& S+ d; W* u2 g/ Y(ELINT). n9 d+ t* d& a! N! a7 ~" }# ^ Technical and geo-location intelligence derived from foreign non-communications 2 F! @$ x! r, f; m( t* s: s0 Xelectromagnetic radiations emanating from other than nuclear detonations or! q/ B( j7 V3 ^7 T [' M# B radioactive sources. # ]3 ^! N' V) P: PElectronics7 B2 u1 ], _. G% p# `: |5 y Security (ELSEC)# n! E7 K+ y% R, \& q" w The protection resulting from all measures designed to deny unauthorized . w1 O0 A7 Y; m" k4 S; \persons information of value that might be derived from their interception and, B" u" D" R6 b3 N% y) T5 d study of non-communications electromagnetic radiations, e.g. radar.$ k3 F" S2 {3 `& d$ H" Y& g Electro-Optics 7 K0 e+ W9 T) t6 w2 i& Z8 bInfrared (EO/IR) 9 l8 F' i4 `) c* l, N# e% b# ]Technologies/techniques employed by optical sensors in the wavelength , H' K4 g9 F) [9 Qspectrum slightly longer than visible but shorter than radio.9 {6 s/ j% Y- P! F, n5 [ MDA GLOSSARY, VER. 4.0 E; ~, Q6 E5 J7 k7 B# R 92: Q6 z5 ], D/ C# N7 j Element A complete, integrated set of components capable of autonomously providing - @% g' g/ V# I2 {! t n: J3 CBMDS capability.5 R" t" h5 @; k) C2 U Element ! C! u. Z6 E% p% SCapability. a1 o; F/ U3 l6 I5 B; X Specification, n, E: `8 @" ]; B# |# i (ECS)4 ` z& t, {5 p: ]0 O5 s9 l/ V5 } A document that identifies the element-level BMDS capabilities and : T: b, X/ e, e0 O0 hspecifications necessary to achieve the system capabilities identified in the SCS.; R N7 Z& U9 m$ S3 r* v The ECS further defines the SCS-apportioned mission/technical performance3 h8 H$ o. K0 x X/ }- R3 n capabilities and allocates these capabilities to the element’s components. 4 m! G: ^6 {3 P/ n( @Element Control3 E* y$ i$ |" U5 D; m0 F Directives (ECDs) " r, |+ { [3 w+ ]The command and control data instructions to control the conduct of the # m) n: h; t& v) Z, qengagement. ECDs are developed by command and control software based6 S+ C2 f4 ~! ?5 D) E' s2 p upon variable parameter input by the operators (both pre-planned and real time),% B1 }/ ^/ s( X# K2 _4 R8 F& ]0 u and operator defined rule sets embedded in the software. The individual battle% ?# c& v3 U! o management processors use these instructions to accomplish the assigned tasks * ?5 I7 `2 W; ]/ O( V/ Afrom the operations order. ECDs are contained within a Task and represent the ' a/ C9 p( {0 @& k! ^7 F5 _9 w' t: Eform of parameter values that influence the resource management processes of k' |/ j t& ^' F% n" y' R4 CWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and , H) E5 l) i4 yCommunications Management (CM). There will be numerous ECDs per Task. ' v- x4 u; _2 E) JElement # R( u( @2 Q% y# p" @- N. s4 z8 HOperations : `& {4 t F+ Z; B* g. I4 YCenter (EOC); k8 V5 C% L* f An Air Force operations center, which operates and maintains a BMD weapon or3 j# U, h8 B/ m% B% m _, x sensor suite. (USSPACECOM) 7 q z3 {7 J$ @, K3 @ELF Extremely Low Frequency. ' J; E$ e# y: f1 B0 f' J8 ^) TELIAS Earth Limb Infrared Atomic Structure. 9 R; e2 f3 P' |& M- `ELINFOSEC Electronic Information Security.8 V: T2 L( R- |. } ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-8-2 07:40 , Processed in 0.050003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部