航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ) H9 e# h2 E4 nCOMSEC Communications Security. + ?& I* g' I% G& ~& N: zConcept1 |( I1 p" v6 X Z! T. m* A Exploration & ! U) X5 V, ?9 f9 L+ g( a7 }+ V2 YDefinition: [- _: @5 o1 O* J8 w* q The initial phase (Phase 0) of the system acquisition process, beginning at8 X; y/ K$ l) m, D* U+ O8 s/ S% O; K Mission Need Determination. During this phase, the acquisition strategy is 9 d0 ?5 M! l3 v: y6 }) @developed, system alternatives are proposed and examined, and the system' m5 @) u2 K* Z- _5 F9 N program requirements document is expanded to support subsequent phases. & G# ~4 Z, R# ~- Q* iConcept of ( u& U. X8 v( Z, h" ^& D' DOperations6 C' ~- {7 S6 J+ O (CONOPS) B) W- h' U! S" R# M$ Y$ e(1) A statement, in broad outline, of a commander’s outline or intent in regard to8 @8 k4 D5 Z' @' }- [ an operation or series of operations. The concept is designed to give an overall$ L) L1 R& W4 n. G: ?) u picture of the operation. (MDA Lexicon) 0 O3 ^+ b# k7 W$ d9 \(2) A verbal or graphic statement, in broad outline, of a commander’s 7 ?9 C" Z' q2 y* Zassumptions or intent in regard to an operation or series of operations. The 0 E# c. ~1 P4 q, }! j' P0 y" gconcept of operations frequently is embodied in campaign plans and operation1 M! z2 E1 N k' c% K: ~4 h plans; in the later case, particularly when the plans cover a series of connected 9 g, e5 _5 _$ g# Q. @) Boperations to be carried out simultaneously or in succession. The concept is I& k0 o4 I, L3 Y7 Q) y" j* mdesigned to give an overall picture of the operation. It is included primarily for 4 [" q! N) }! y, n% S* i; madditional clarity of purpose.3 X+ S4 V: F8 I( O; [ Concept Plan An operation plan in concept format. Also called CONPLAN.2 j$ A- A5 L: j z1 {1 n Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of 1 t1 @, l' L9 Y8 c$ ]0 sthe acquisition process, or combines development T&E with operational T&E. 6 o: k; a) l: H* g* ^" D. B7 TConcurrent! q) S- Q& S; G4 t7 j" G Engineering5 {3 M2 L* M2 {, N' R# }( e9 p A systematic approach to the integrated, simultaneous design of products and : ?) p$ d/ q7 T5 h. E7 \their related processes, including manufacture and support. This approach is 6 |- s0 z, f) Uintended to cause developers, from the beginning, to consider all elements of 5 ^+ ?: f; w; ?1 p4 X7 [the system life cycle from requirements development through dispersal, including 3 t+ ?$ z1 e4 V2 X3 qcost, schedule, and performance. ; R {$ d; }6 m' O/ }. _CONEX CONOPS Exerciser.5 F' u' J: d) M( X! u$ f Configuration A collection of an item’s descriptive and governing characteristics, which can be Q3 C7 q) G$ @$ n' \) cexpressed in functional terms (i.e., what performance the item is expected to" m* x0 p' O" ]8 S achieve); and in physical terms (i.e., what the item should look like and consist of& y$ {$ l5 {. R( \0 F when it is built). ' h0 E; l8 c% \5 kMDA GLOSSARY, VER. 4.0 C 3 k6 u: \) i, K7 R2 p* E59 % v4 G9 V& F. F! S( aConfiguration( ]; n2 d6 H2 s) ~: l8 p Audit , ^ H% l& X, D- N* JOne of the Configuration Management tasks which includes a functional 9 l7 R/ G0 c* Y9 A7 Lconfiguration audit (FCA) to validate that the development of a configuration item9 i" u y2 T2 r2 ^* ~ c has been completed satisfactorily and that the configuration item has achieved9 J( c. y6 q' Y to specified performance and functional characteristics, and also includes a. \" k2 \+ V0 ^: x; `: t. | physical configuration audit (PCA) to verify that the configuration item “As Built” * m$ q9 ]) s3 z; W0 U7 ]conforms to the technical documentation which defines the configuration item. 1 c( s$ P% f* r8 ]5 NConfiguration ' T& B& b; W7 eBaseline ) J: @: ~# D& A P* UThe configuration documentation formally designated by the Government at a + R" ^( [% k O R# Qspecific time during a system’s or configuration item’s life cycle. Configuration " g: u) `) C l+ \3 Obaselines, plus approved changes from those baselines, constitute the current 6 V) m5 m1 [. k9 Oconfiguration baselines, namely the functional, allocated, and product baselines.. v0 F- Y: v a2 h/ {! S Configuration 0 Q! r0 N: v7 E7 T* j* L/ WControl ; ?. W: G) b2 j, ?* z# wOne of the Configuration Management tasks that involves the systematic. d3 ^4 i# N. u# U/ o* G evaluation, coordination, approval, or disapproval of proposed changes to the 6 u: L. F6 `/ D5 `design and construction of a configuration item whose configuration has been K4 }7 f" [3 a% z formally approved.# T. j: X" M: g Configuration / }3 L# r3 a, O4 _) QIdentification W% K1 t* C) c! p3 R One of the Configuration Management tasks, which require that for every % }5 F! r% H) v0 D/ N3 [$ Hchange that is made to an Automated Data processing (ADP) system, the design" B& _; f* c5 y {/ D" i2 A and requirements of the changed version of the system should be identified.. f% c' J$ M; y% H Configuration ) Q- p; H+ |5 o0 x6 }+ ]9 G1 XItem (CI)6 Y7 T2 Y8 w- `3 g4 a0 M An aggregation of system elements that satisfies an end use function and is5 K0 N" G6 T6 l4 e1 B% f designated by the Government for separate configuration management. 8 u) k1 V/ P7 e# k0 s% Z# KConfiguration items vary widely in complexity, size, and type. Any item required / }# t( r0 G0 H Ofor logistic support and designated for separate procurement is a configuration 4 c8 I0 B f. ]8 e; f, Vitem. Configuration items are traceable to the work breakdown structure (WBS). - T; R) v X; bConfiguration , ~5 j) d3 W% C$ D7 v$ l, ^Management' b# p% K+ x! G, ^7 t (CM) . }' f) v1 M L* _- g0 Z0 pIn computer modeling and simulation, a discipline applying technical and 4 k. d% }8 B- B' ?' y$ d7 ~administrative oversight and control to identify and document the functional ! R5 c$ g$ g$ ~requirements and capabilities of a model or simulation and its supporting; F7 M+ Y, z3 S( f databases, control changes to those capabilities, and document and report the 0 J+ X8 b5 @" _& {4 @" @+ gchanges. See also Accreditation.3 m ^* f- O: h- v! j2 N CONOPS Concept of Operations. 5 E8 H" U0 | T9 E( j/ [" PCONPLAN Concept Plan3 l3 e! |% ]) Y6 s; ~& J- U/ Q) v CONS Contracting Squadron. 4 Y+ q' L& \+ e& v3 M" SConsolidated3 S7 G) ?7 R! Z. i: r2 Q Command Center1 g7 G! m; [9 h# a9 v (CCC); a" y# Q" B$ e9 m- X: z; K P. g A single command center from which USCINCSPACE/CINCNORAD can direct all& S% h. T8 N3 d. w3 @1 P7 k ] his assigned missions, to include BMD. (USSPACECOM) Located in Colorado + w4 [$ [( ^+ ?; PSprings, CO.- d1 n. q( M: U/ u5 _( S' I+ a1 ] Consolidated ) D' X% W% J7 b( h1 QIntelligence7 ]' }+ f+ q: ] l. v5 c, K8 \ Watch (CIW) 8 t) m5 V9 I& `' }; [8 f; L) c: Z8 ZA consolidation of intelligence watch functions within the Intelligence Operations# y, @4 j) h. c( X Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD ' x) |" I2 n+ fAerospace Defense Intelligence Center (ADIC), and the Air Force Space$ b) c' ?- {2 u; B* j( k Command Space Intelligence Element (SIE). 3 v9 O0 \' y) ]+ d+ J. a( lConsolidated3 O K' Z, L% y( M Space J& c7 G# S- X( uOperations# I( b2 }7 Z. {% t, X: G& {6 w Center (CSOC) ! {8 |# o3 l" s& b+ X$ gSeries of centers at Falcon AFB, CO, which operationally control and maintain. x2 i7 |/ Y7 g* U/ } assigned DoD satellites. : {# K; R. J) D6 H7 eConsolidated2 N0 x6 w' M& ^6 Y3 E Space Test, H/ o% W8 m3 N: g7 w9 { Center (CSTC). x' _! w4 l& K c# `, Z Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and, R3 ]( r# z( v7 f initial on-orbit checkout of operational satellites, operate R&D satellites, and u# Z4 ~2 \4 M- c1 pserves as a backup to CSOC for operational DoD satellites. 3 X; y9 ]) X! m2 U( _' L& QMDA GLOSSARY, VER. 4.0 C2 H) v. {& R& [ Q 608 S. y) X( |" \% G2 @ Constellation 2 v2 M$ ?$ H& L; y% j$ p! ^7 l s8 USize (CSIZE): i/ o, B! x5 \( ?# ?6 e" b The number of satellites of a particular system placed in orbit about the earth.5 B( F. x$ w! X Contact Fuse Device used to detonate warhead on physical contact with another object.& G) c! x" t3 Y5 r @' I Contingency. c$ [6 X! V; t! q+ A. K# f$ V7 A Deployment Plan 4 U/ n+ l% j, C3 v6 m7 j(CDP)& j6 E! ]: J' M/ L# o An executable plan designed to deploy an early missile defense capability and# `7 u2 z2 f2 f4 r reduce deployment time. The plan provides specific executable deployment2 r5 i8 p! t7 q2 @+ W. Y options and describes activities required before and after a deployment decision. / N& j# h X. A5 t) U9 O# ZThe plan also allows decision makers to have oversight on technical progress,5 B# o3 j/ m* }3 K# m* f cost, schedule, and risks associated with a deployment system. # m- y' p+ {% Z8 oContinuity of % |2 ]8 c, Y: }7 UCommand, v5 ? c5 b$ q$ ]3 d, ^8 V4 ?& { The degree or state of being continuous in the exercise of the authority vested ! S# I* C9 r4 |in an individual of the armed forces for the direction, coordination, and control of % R4 N" Q/ d7 h* z- z! F2 d& C# kmilitary forces. A; d. e5 t8 u A- e6 h$ L1 s Continuity of 3 L. p3 U! r/ w M2 K2 P: wOperations/ B" @$ P' j& w) [; r( L7 I% Y The degree or state of being continuous in the conduct of functions, tasks, or$ I2 Z9 Y! w1 y% E, o9 l duties necessary to accomplish a military action or mission in carrying out the " k2 |" ]) p" O# Y) v6 h ~national military strategy. It includes the functions and duties of the commander, 3 g* Y& T9 ^% Ras well as the supporting functions and duties performed by the staff and others# `! e: c( ^1 x. g8 u acting under the authority and direction of the commander. , f" ?' T. K( E, o( C7 t/ `, @Contract9 M+ r0 U; k7 p& w( A1 x) ~ Administration. h5 w; A8 R! ?8 P; O: _ Office (CAO) ~- W0 e) H9 g, d. F/ s/ z The activity identified in the DoD Directory of Contract Administration Services% I3 O/ i' _" I1 H. f/ `0 s( F* W Components assigned to perform contract administration responsibilities. It is a 6 E5 |7 z3 X( {9 Ngeneral term and includes Defense Contract Management Regions (DCMRs), 6 @' x* C( r" Y R% ^: eDefense Contract Management Area Operations (DCMAOs), and Defense Plant 7 J) p7 X! r* d. y& SRepresentative Offices (DPROs). (Defense Systems Management College1 ?% D: M, n6 B- b0 [+ a& Y4 k Glossary) ]4 v0 Q9 H3 A. @4 a Contract Data8 ]& v; m0 W) j6 d Requirements' [( D* {/ F# E List (CDRL) # [& n6 A) D4 g$ a* Y1 hDocument used to order (“buy”) and require delivery of data. Tells contractor 9 u, ^0 Z5 ?7 A8 Ewhat data to deliver, when and how it will be accepted, where to look for5 p6 \7 V4 v- x! Q4 Y instructions, etc.# U$ A! m& p; p) }- h8 m: k7 C Contract5 t6 h p+ Q# ^1 i Definition" c f8 }9 g/ i A funded effort, normally by two or more competing contractors, to establish 6 c9 u3 k: D$ ?specifications, to select technical approaches, to identify high-risk areas, and to * r( d5 G) P6 `- imake cost and production time estimates for developing large weapons systems. , u% a2 u! O+ ]3 s/ J) eContract Work5 z5 o2 p. O) G( H1 b" S' u Breakdown- j1 T1 G6 d/ `2 X- @ Structure2 f! N$ |2 }4 ]# s' D* L The complete WBS for a contract developed and used by a contractor within the 0 B' X8 ?# L: t. o4 sguidelines of MIL-STD 881A, and in accordance with the contract statement of ' K8 t3 t3 G! \7 e) f+ owork./ _8 `0 |* [6 O' b Contracting( K& v" i. Q9 W6 c4 O6 r Officer (CO): n+ a' X" x7 M, L- u& E A person with the authority to enter into, administer, or terminate contracts and$ j; x/ w2 e6 a make related determinations and findings. The term includes any authorized ; }2 K6 N5 M" d8 J2 @2 frepresentatives of the CO acting within the limits of their authority. A CO whose ' q( z5 `5 @/ ~1 j. Cprimary responsibility is to administer contracts is an Administrative Contracting+ n. m6 J" e$ i, g6 d. D- V5 k Officer. One whose primary responsibility is to terminate contracts and/or settle ' {0 u& q+ o8 I9 F7 |terminated contracts is a Termination Contracting Officer. A single contracting / L* Q- X7 B6 f9 sofficer may be responsible for duties in any or all of these areas. d5 h. b* l# a% b% e0 K9 W- X Control Authority that may be less than full command exercised by a commander over 9 c, _. b. S7 epart of the activities of subordinate or other organizations.: @0 ^& ?9 }4 c7 V6 ? Control : q: f! N! p# I4 sAbstraction; L0 K& N+ `& Y; _; k: k (Software) The process of extracting the essential characteristics of control by # \9 @3 B9 N. d5 \1 F! tdefining abstract mechanisms and their associated characteristics while : L3 n5 E/ C$ B' |disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C + _# I6 F/ \6 U0 G6 T; } D" ]" Y61 ( j" B n- \1 l5 e9 L) [Control and- m+ u, v% Q( Y7 F2 d Reporting Center : x2 A5 S7 J6 {/ B( xAn element of the US Air Force tactical air control system, subordinate to the 6 {; Q3 ^7 c% m" J/ W( c- ltactical air control center, from which radar control and warning operations are1 h$ o. z/ ~# T/ N) }* x; i, N: H conducted within its area of responsibility. 1 ^, h1 {/ r7 LControl and 4 e/ Q! J" U; M9 q3 A6 u4 AReporting Post" f' f4 g9 i4 z- q8 ~ An element of the US Air Force tactical air control system, subordinate to the3 b5 h9 ~" [, S) Y5 I1 l control and reporting center, that provides radar control and surveillance within; ]# B6 i# N! ]% o7 _ its area of responsibility.& R" r& K2 _% { Control Area A controlled airspace extending upwards from a specified limit above the Earth. " E+ b9 h/ j9 ]/ Y& `* yControlled , Z! B5 r0 _3 W' tEnvironment0 u3 D# z- C2 s" n0 p. o \; u Area where entry into the radiation hazard area is controlled. # h; L* y! u9 j5 l& C' ]Control/ {& V7 V ~' t' W2 e3 I Procedure5 y- D- i; w5 {) B2 O, ?0 F The means used to control the orderly communication of information between( ?. N- ?. b2 h stations on a data link. Also called line discipline. Q1 Y) ]6 y2 A! r5 w* J) j Control Station The station on a network, which supervises the network control procedures such 9 @; M. c% G1 U( Y% ~- U) z7 m' c) g4 |as polling, selecting, and recovery. It also is responsible for establishing order ' Q: y$ \8 ~% Q- N) ~7 e7 Eon the line in the event of contention, or any other abnormal situation, arising % @: x5 S/ x1 dbetween any stations on the network.8 ~# E0 l; }! K( V4 e v Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to5 I. F" T! t8 a K6 O process sensitive defense information and that is under sufficient physical and 5 W1 C/ ^1 `0 l) E/ f' Rtechnical control to preclude an unauthorized entry or compromise.0 u. q3 x7 \9 n+ l2 J. h+ X5 c; Z CONUS Continental United States.5 z$ s! P4 S. L8 h2 O" d7 L Conventional Co- ! A5 K/ X4 W" o1 u4 m* b* A, fProduction8 o2 E5 c% n2 ?& O% O7 X$ x4 e An effort between governments to produce the same end item, or components3 E! e1 s; H! U) b: |( H! g of the same end item, in concert. ]6 \0 X% z# |+ a& K$ J- B Conventional. Q, C S1 v9 `3 f! c# }) |# y- a5 j Weapon( U: m/ b. i& e6 j, o1 a: o& Z A weapon that is neither nuclear, biological, nor chemical." }) R/ w8 O8 t0 G Y2 X( w Coop Cooperative 2 T" p2 H! y7 o; }Coordinated 4 K' B1 r1 g1 Z5 P @' K& D2 yEngagement( K! [+ p; W1 L' ^* d/ M Planning/Actions : C" @' s {; H! u7 VNecessary coordination among engagement components to ensure maximum 6 ]) |- X5 U" @effectiveness of the SDS and resources are not wasted on targets already b2 V4 M# {5 Y- _% |# utargeted. & X: Q; A1 [ |4 xCoordinating- g' I$ [7 W: F o" p) l5 D: g Authority; M, M# I9 c9 t6 v7 }' \ A commander or individual assigned responsibility for coordinating specific/ \" H* T8 I3 s+ O functions of activities involving forces of two or more Services or two or more6 ^& k% H1 E8 m* h& U# S" L forces of the same Service. The commander or individual has the authority to $ Y" d' k& ~8 u. D# Frequire consultation between the agencies involved, but does not have the ' H; n$ t+ B+ A. g$ Z8 X b/ Jauthority to compel agreement. In the event that essential agreement cannot be ( @! q7 s! p: @/ greached, the matter shall be referred to the appointing authority.( W+ u( j/ U- A# t# k! s COP Committee of Principals% _$ ]+ K6 E4 z( T* l+ h9 F7 o) ?5 [ COR Contracting Officer’s Representative. Contracting Officer. 7 s8 P8 N( ^$ L0 jCORBA Common Object Request Broker Architecture. : j* s) w- f7 ACORM Commission on Roles and Missions. 2 N5 Z0 M$ B8 v6 K6 A0 B) @MDA GLOSSARY, VER. 4.0 C # P+ a2 B6 ]! w2 n( ^62$ n( |! V) c- S7 J5 | Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens ! E2 d0 z; E. I3 x8 l2 L4 p$ Uperpendicular to one another, designed to act as a radar target or9 s* d: k. F* ?5 C2 u+ ?' k& N marker.8 p7 C1 m S9 b- i" m( c (2) In radar interpretation, an object that, by means of multiple reflections% c1 G1 J3 h$ B3 |( Q) \/ D; C from smooth surfaces, produces a radar return of greater magnitude than# i0 y' ~7 q L. y/ K0 E; M6 A0 `) S might be expected from the physical size of the object. 8 o$ K# U$ B' R0 oCorps SAM OBSOLETE. See Medium Extended Air Defense System. 5 z' N r8 ~; w, a& p, v$ a* R# RCorrelation (1) The process of relating observations or tracks from one set of data to & z x1 ?; A+ r; H9 E% x- Fobservations or tracks from another set of data, i.e., collecting data from2 V* b: |$ {- c5 e% n different frames or sensors that presumably relate to the same target. (2) + {: _# i. m0 o: B8 p& i3 }* \In air defense, the determination that an aircraft appearing on a; F4 \- x: q1 k radarscope, on a plotting board, or visual is the same as that on which, S7 M e1 Z: W# ^" q! c9 m information is being received form another source. (3) In intelligence w$ x, A! G5 f& F2 Iusage, the process which associates and combines data on a single / _) Z% _8 b3 H9 D+ {$ y5 Wentity or subject from independent observations, in order to improve the + {3 L, c$ \# V# q# `3 hreliability or credibility or the information./ Q* c9 b' g/ V' n COSEMS Evolving architecture operations support tool.* n3 |/ h* p, I* J" J( T8 p. A COSM Computer System Operator’s Manual 2 X5 p: v1 `" l+ X& k/ CCOSMIC NATO security category. ' x& q/ k, U" T. k* p# p* HCost Analysis ' k3 {/ }' a1 m: e! l HImprovement) h. Y; U& w5 v6 ], L Group (CAIG) 0 p, e9 {0 ~" ?) L: o1 r8 e) k; iAn organization within the office of OSD Director, PA&E which advises the DAB/ m% J" }; N4 }& y on all matters concerning the estimation, review, and presentation of cost4 A& W; a% l' P" {3 s Y analysis of future weapon systems. The CAIG also develops common cost 6 L" s0 H( C5 G) t+ ^0 eestimating procedures for DoD. ( F+ G6 s& ~+ r6 W6 MCost Analysis+ ~' K0 Y: e5 U# S+ z* ^ Requirements ' T4 Q# j! k, h0 d, b- H8 b% C, DDocument , c8 X) t/ x1 B& b(CARD)+ m2 ], ?# o; ^+ K+ ~3 W* U2 U The document describing the technical baseline, which is a subset of current # y+ j8 v' F* ~2 B9 Xsystem technical data and is used to generate the baseline cost estimate for an & b+ E% m+ Z3 w# @( [SDS element. It includes, but is not limited to, the element description, B% ~4 l1 _) {interfaces, operational concept quantity requirements, manpower requirements, # j" i4 w' c" i) a8 e4 `& ~activity rates, schedules, research and development-phasing plan, and facilities 5 R8 I Y4 {: T+ j4 Drequirements.8 e' [# l1 c/ a& A, _$ `; | Cost and - W8 Q6 \( ~& D, [/ U6 Q7 Q% UOperational ( g+ v! K" F o$ H: I- X! r1 }: [/ aEffectiveness # a" M, X& {; w2 EAnalysis (COEA)2 b# D0 s* A9 ~; f4 M An analysis of the estimated costs and operational effectiveness of alternative6 `4 y* L% T9 L( h materiel systems to meet a mission need, and the associated program for 4 t' S; S' i4 W- F/ F% f4 kacquiring each alternative. $ Q( [/ Z0 h3 J1 yCost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk & w, ?& C( l( E: D e. kdue to cost estimating errors and the statistical uncertainty in the estimate.' \. A7 V, H8 Y- b8 G: l Schedule/technical risk is risk due to inability to conquer the problems posed by6 a! U2 t; m: p% z+ n3 T; }4 V: n the intended design7 q4 ?9 m9 p1 v L& B2 ~, B COTR Contracting Officer’s Technical Representative. See Contracting Officer. ) a9 j8 d. z, NCOTS Commercial Off-The-Shelf. 8 ~1 D( _9 ^. B _8 ~1 u- S) `Counterair A US Air Force term for air operations conducted to attain and maintain a desired' n$ |; s7 r: J6 {) G+ M9 Y degree of air superiority by the destruction or neutralization or enemy forces. ) z! C1 o$ K8 j) l# \9 eBoth air offensive and air defensive actions are involved. The former range $ k+ _, r6 Y' \/ Tthroughout enemy territory and are generally conducted at the initiative of 0 f/ \4 p) @. ?- K7 Q4 ufriendly forces. The latter are conducted near or over friendly territory and are9 Z0 W6 L( `" Z6 M2 k* y: r7 R generally reactive to the initiative of the enemy air forces.' Q; U7 [# h. J* s y4 F MDA GLOSSARY, VER. 4.0 C9 { X+ F+ [1 n) r3 i4 Q: A 63: v( k) y- e3 V' [, ]. b Countercountermeasures " `* K; c7 ~- A. g9 H8 v) ~(CCM) & m+ g+ l; |- M/ V6 lMeasures taken by the defense to defeat offensive countermeasures. k; t0 A6 x! V! Y. @+ ?Counterforce The employment of strategic air and missile forces in an effort to destroy, or" C/ X' f/ y: W$ O# M& A/ m render impotent, selected military capabilities of an enemy force under any of the & @! P3 ]- ?# vcircumstances by which hostilities may be initiated. $ ~' f% V, m- [$ r( `Countermeasure A design or procedural measure taken against covert or overt attacks. # D* q, `% f: j4 V/ f) ~) O) } j) tCountermeasure , Q6 a2 [- J0 \9 M, P i( j0 `& Hs (CM) # A7 T& @+ d" QThat form of military science that by the employment of devices and/or % t4 ?1 \4 I- P, Q# ^# ctechniques has as its objective the impairment of the operational effectiveness of* b' N- J# g4 W8 U8 |5 j enemy activity.2 r6 t0 A) k. q. u/ A Countermeasure 0 u/ o, v- j0 @s Rejection$ d" X7 N( p3 `! O: [, _ (Surveillance)1 b# C) V, ?! h! o; C' V Improvement or rejection of an object signal in the presence of' f" J0 Y& U+ ?; V countermeasures., F) w% C" |- I/ c2 d. j Course of Action. Y9 b8 U* C1 W& {/ J2 r% s. { (COA). k0 ]& l( H, X" U ~' @+ X (1) Any sequence of acts that an individual or unit may follow. (2) A possible 3 g4 O! m, E/ N9 ?8 ^& ]0 Dplan open to an individual or command that would accomplish or is ; W& i9 N# P$ D% k1 q6 |5 Srelated to the accomplishment of his mission. (3) The scheme adopted! t, H0 T& a, }" J3 U to accomplish a job or mission. (4) A line of conduct in an engagement., ~9 G- B. L$ [5 _* L- y (5) A plan to accomplish a mission. It describes the execution concept, M0 Y: N2 S" t* c1 T r2 z& O. | for BMD of North America. It will specify the engagement priorities, % [# H9 {+ ~2 j; A6 O9 }4 Kresource allocation and desired results by Area of Operation (AO). , g) P& }. o# O; Y0 M; y(USSPACECOM) (6) The scheme adopted to accomplish a task or' M% l- d" k( G* Q& d2 ~2 }6 m, G mission. It is a product of the Joint Operation Planning and Execution 9 Z! ]: w0 P) ^; O. P9 hSystem concept development phase. The supported commander will . p+ _# X- O) Y* v9 p r; Ainclude a recommended course of action in the commander’s estimate. 9 N; H) O. S0 Z& |" t9 y# rThe recommended course of action will include the concept of 6 t* V: |+ b/ F5 w6 @operations, evaluation of supportability estimates of supporting . G/ O+ J( x7 b, A+ _organizations, and an integrated time-phased data base of combat, 3 k+ @: i7 K$ acombat support, and combat service support forces and sustainment.$ L& U$ I( Q5 q2 \( a# Z: F Refinement of this database will be contingent on the time available for ( F; S; r: S9 Rcourse of action development. When approved, the course of action / ~8 ?. v* v/ Hbecomes the basis for the development of an operation plan or5 s- f d* K( a% ^5 I8 S) V operation order.) `6 ]/ @6 t) I: Y y- y Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps,; X) m" \3 B* M# V: { and other geographical presentation systems. (2) Cover or protection, as$ K' r+ }. I9 X9 O* L/ n the coverage of troops by supporting fire. (3) The extent to which 6 e& r1 p. u8 N/ p$ h3 S3 Pintelligence information is available in respect to any specified area of 4 w+ t9 O6 k$ \6 N( ointerest. (4) The summation of the geographical areas and volumes of4 R$ j8 q! w- z aerospace under surveillance.* l: U q$ r: {/ M Covert Timing 2 j! X$ @7 D* Y. e. d; i# f4 ?Channel5 l/ W! _/ a2 d' o' T9 V1 U A covert channel in which one process signals information to another by 8 p d; I g& ^% z1 w/ a+ |modulating its own use of system resources in such a way that this manipulation 9 X- J# H, g! c% Kaffects the real response time observed by the second process. & S& k" Q6 P. s- E! |# DCP Command Post.+ }2 i# ~- u* a* P6 g" s- X CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.& M; X+ M; n8 p c& r" ?4 a CPAF Cost Plus Award Fee. * r, G! c7 D) K5 h) G+ U9 L+ mCPAM Chief of Naval Operations Program Assessment Memorandum (Navy)7 ~# |' H5 ?' X% C MDA GLOSSARY, VER. 4.0 C 1 W: B* n3 r% S/ t, b5 [- x3 k2 d64 * D/ ~2 T x3 @3 X7 Y1 I# [: JCPAR Cost Performance Assessment Report.' k5 y" S* S' F& B CPAT Critical Process Assessment Tool7 |) M! P ]1 w) \7 Q5 m) | CPB Charged Particle Beam. 1 s1 t ]0 ^" {CPEV Communications/Processor [Network] Experimental Version. ( C$ ]3 d, N5 r0 L1 @/ A2 F# BCPFF Cost Plus Fixed Fee." E0 z6 g$ a) J6 Z/ E* \ t CPIF Cost Plus Incentive Fee. 8 U" f# x% F# r$ W, Z! dCPIPT Cost-Performance Integrated Product (Process) Team. " q M* K- c2 [; B4 N' \' f/ ^" _CPM (1) Critical Path Method. (2) Contractor Performance Measurement. # c" E3 p8 t& ~! ~" I6 cCPP Critical Performance Parameter.+ R; W, c0 `) o6 }! ~$ \ CPR Cost Performance Report. 4 h5 X. O; F0 H- u+ u/ h* RCPR/NC Cost Performance Report/No Criteria (Contract management term).- i1 h2 \ f$ D4 }( e. F5 v% n' Q! M CPS (1) Consolidated Program Summary.8 X0 A. T5 T5 H: a/ x6 ]$ Y (2) Competitive Prototyping Strategy. 2 D2 v2 X. M. x6 I2 t8 t2 o(3) Current Program Status.6 h/ P/ i% d, Y/ m CPU Central Processing Unit (TelComm/Computer term).0 U, z; n' i1 c. ~6 \( ?7 J5 n CPX See Command Post Exercise. , w; d, U( m3 l& }- ]# j% |CQAE Chief/Contract Quality Assurance Evaluator. $ j" P$ Z S, r% U- ~2 O; uCR (1) Computer Resources. (2) Continuing Resolution (US Congress term).% k$ S0 i. j( _( Z0 v6 u8 f7 r CR-UAV Close Range Unmanned Aerial Vehicle." K/ C) W; \4 i+ C G CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement ( X9 D: d+ \9 ]: i8 \; n/ B, Y( zCRADA Cooperative Research and Development Agreement.3 G1 l1 A0 _0 J+ d8 U" Q CRAM (1) Control Random Access Memory.$ f" E0 I7 H4 p9 u (2) Cross-tie Random Access Memory (Computer term). / X$ _8 ^- R- O# s3 {, n6 x3 aCRB Configuration Review Board.& n X5 L: e4 R$ H8 E' [ CRC Control and Reporting Center.. K! X/ x O1 T+ o4 p: C CRD (1) Capstone Requirements Document.' P2 s' { ~8 u# h% T, z (2) Component Requirements Document.% |1 [' s% v8 N" ?0 i) C" T CRDA Cooperative Research and Development Agreement. * \% r* ]8 g( m9 T' _CRG Communications Relay Groups (PATRIOT). / i% F2 @/ p$ p3 W, P' iCRI Classification, Recognition and Identification.8 \0 Y0 u' H) } CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 2 M5 w8 z* ~ {. G$ M- t+ f652 M/ u! V- r5 y$ T# b$ e2 b Critical Design ' C7 V4 Y }' ZReview (CDR) - R4 p I3 q' QA review conducted to determine that the detailed design satisfies the( i( u% q* |7 U% f0 i* K f" n4 N performance and engineering requirements of the development specification; to, X8 m* Y" m3 _) @" D: f establish the detailed design compatibility between the item and other items of! f: P+ [& L$ [8 O* T) I& q equipment, facilities, computer programs, and personnel; to assess producibility: K' H$ {% o/ f( I8 t( m" } and risk areas; and to review the preliminary product specifications. Conducted 8 O6 T! A9 L6 P1 L- B# W& Aduring Phase I, Demonstration and Validation (for prototypes) and Phase II, 9 x0 K: n* w/ o- L% V1 |Engineering and Manufacturing Development. ' _& V. E5 O6 _0 \" P4 X0 Y6 s" H- YCritical + t: B( e3 F9 @+ RInformation( ]6 J' r; K7 j! ]: y/ T% Z; q Specific facts about friendly intentions, capabilities, and activities vitally needed 8 I5 C3 Z( d9 f; A1 Bby adversaries for them to plan and act effectively so as to guarantee failure or0 J3 \; U/ o5 m$ q unacceptable consequences for friendly mission accomplishment. 8 |' }; C$ h7 y, }7 ^( zCritical: g) n6 R" C1 P- M Intelligence+ H5 e$ G+ j% W3 @6 H* H Parameter* B1 t7 J- p3 {' j! m. L+ K A threat capability or threshold established by the program, changes to which X( I1 Q9 k6 i% T) U could critically impact on the effectiveness and survivability of the proposed ' a4 c7 k. h6 [! Y- n& Z4 h5 |system. , d) \# C0 m/ N/ e" |! QCritical Issues Those aspects of a system’s capability, either operational, technical, or other, ; J/ w. P7 L2 D, [! lthat must be questioned before a system’s overall suitability can be known, and s5 A# |! W% N! B! ^% R% Ywhich are of primary importance to the decision authority in reaching a decision5 Z- X9 f8 k4 u; Z; q" R to allow the system to advance into the next phase of design, development, ( Z; ]1 [8 Q+ Q# tproduction, or post-production. . M" s7 n2 s, w! K ]Critical: N7 J( H) p4 @/ l7 ~, L8 J Operational o) {5 a5 K% N3 K; Z& v Issue0 h( ]5 a& g2 N: j A key operational effectiveness or operational suitability issue that must be 5 r/ O. g- P& b! Qexamined in operational test and evaluation to determine the system’s capability / c" J- ?7 p+ a+ ]7 o, c; rto perform its mission. A critical operational issue is normally phrased as a 3 N/ ~) f6 I+ S! p- a& @question to be answered in evaluating a system’s operational effectiveness+ F5 f4 o, ~: v9 P and/or operational suitability. 6 l6 {* z- W" `. F2 P: yCritical Path U5 y" |# t9 L' _Method 0 B0 _5 w8 A4 m4 v3 u( T6 |A technique that aids dependency of other activities and the time required to ' v: k- m, u" rcomplete. Activities, which when delayed have an impact on the total project / C) ]+ a5 U" F& [; mschedule, are critical and are said to be on the critical path. 7 k- b- e: {" C) DCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to ) l) ?) H7 V2 u T, Othe viability or the operational effectiveness of the SDS. m! s0 b% \) ^/ P Critical Security # | v5 ?$ h8 N. g4 e( `Risk( d4 L/ Z. e2 L- z D2 |+ H The existence of a security vulnerability that, if exploited by an adversary, could - b$ @$ p: w6 A0 A9 U* u; acause exceptionally grave damage to the viability of the BMD or the operational1 t" L6 H+ B6 ^" L H0 O6 {' _- f, a effectiveness of the SDS. Critical risks assume an adversary’s capability to; \. x- ?# I: u. m cause major system disruption or degradation (e.g., single point failure),1 i9 D4 |5 ?) H9 V- f5 V destruction of mission-critical components, or usurpation of system functions. , Y0 q! U" V; W" G# X6 S3 w" \Critical. u. q' K; x0 Q0 ^ Supporting 1 Y4 ~0 d$ e1 v/ g9 C, uTechnology ' J2 M1 R5 z) `) C0 x6 PA technology that program management personnel consider a critical part of the W! P# h) R/ U- c; p" Nprogram being described.* }$ Y# q6 i( ?7 i* A3 S5 i7 q CRLCMP Computer Resources Life-Cycle Management Plan. B6 s" F7 I, I CRM Computer Resources Management. 9 h6 \) g1 X- Y( a+ P3 CCRMP Computer Resources Management Plan. ' G( }% O) e9 Y- x6 xCRO Chemical Release Observation.- }% h, |1 `# F CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC! M: L( q) ?$ o+ w$ j* c" ? term.) 7 w" l- M9 J2 i! P$ P: |MDA GLOSSARY, VER. 4.0 C) |* g9 p* L( @# C1 k) j0 S$ V 66& S y6 P5 d) o, x% D CRS (1) Computer Resources Support. (2) Congressional Research Service. (3)9 y& J4 n: M# g1 R) K Contractor Reporting System.3 J" k5 d2 F- Z8 s CRT Cathode Ray Tube. 9 ~+ d" U7 h. ]% D8 |* }$ JCRWG Computer Resource Working Group. N0 ]5 y' M; Q1 b. u, {3 I) ]5 ~ Cryocoolers Cryogenic Coolers. * C: H" S+ U/ R" q# mCryogenic Of or related to cryogens (substances which are used to obtain low # `) e/ s" A* b/ @& B3 T, ktemperatures). 5 ^' N& D& b' q' _, R1 |Crypto A designation or marking which identifies classified operational keying material, 6 X/ p/ Y1 F A8 M' pand which indicates that this material requires special consideration with respect 3 v% T6 A" n# Jto access, storage and handling. $ K3 w; F5 O% P! q0 m6 V/ cCryptographic7 H5 ~! ?0 ?& U4 j' v System* V2 J! ^6 _9 y" v+ | The documents, devices, equipment, and associated techniques that are used2 {* e$ o, B V. m as a unit to provide a single means of encryption (enciphering or encoding)." R- j& h: {& T& C Cryptology The science that deals with hidden, disguised, or encrypted communications. It& |. ]1 q$ l* E/ J6 y6 f includes communications security and communications intelligence.# v- g# W0 G$ v' @6 d0 K( P CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.+ i* g& ?- I) | CS/CSS Combat Support and Combat Service Support (USAF budget term).1 K( }* L( A# |5 m CSA Chief of Staff of the Army.4 C, v6 W- O; ~- W c4 F: k- q CSAF Chief of Staff of the Air Force. 8 }) Q+ k% e% [. D G8 K6 wCSC Computer Software Component.# z- J' `" V) {5 B7 M CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE), k7 X1 c" ~ I! I! N+ z CSCSC Cost/Schedule Control System Criteria. + F6 h5 i. w8 B+ ?. n: bCSD (1) Constant Speed Drive. (2) Critical System Demonstration. ( c0 @& ?6 J- g8 S3 a! ?CSE Center for Security Evaluations (DCI).( L& y( d" _, h/ s1 m CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon5 u: w0 e* [% }2 s System, located in Cherry Hill, NJ. $ l+ g* f C$ yCSF Consolidated Support Facility, Arlington, VA. + N: y. [2 }+ A/ Q, WCSI (1) Critical Safety Item. (2) Critical Sustainability Item." o+ w8 i. U# l! ^# u& S CSIP Current Systems Improvement Program.: |+ H1 X5 J+ G( B CSIZE Constellation Size. * C) X( V$ E; t3 W5 r# y; |; wCSL Computer Systems Laboratory.# L y) f7 I3 F CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.7 ~4 p0 O3 g O CSNI Communications Shared Network Interface (NATO term). 5 w1 g6 v* W! IMDA GLOSSARY, VER. 4.0 C- q4 Q( X( P! ^* N ?# y6 r4 j0 D 67$ a3 f1 w" B1 U( L CSO Closely Spaced Objects.+ q$ Y& _* _" W. k! `) w. p; c0 s) k1 W CSOC See Consolidated Space Operations Center.% c3 _" O( H9 s; y$ Q( v CSOM Computer System Operator’s Manual; R6 o2 G; _5 U+ |, b: G CSOSS Combat System Operational System Sequencing1 V# P* o5 g0 z5 ^9 Y# E6 x$ J CSP Communications Support Processor (numerous locations, including USAF Air4 ~2 w0 c* ]* P( n5 i5 D: }7 E0 v Development Center, Rome, NY term).6 j- x: n3 x) ]8 D CSRD Computer System Requirements Document. ( w" Y& C2 o* ICSS (1) Cooperating Space System. (2) Communications System Segment. (3) " Z! s$ P$ Y6 s1 z- k; W0 a8 VContractor Support Services. (4) Common Sharing System. (5) Communications s, y& Q, ?* P: S5 h6 q) FSupport System (Navy term). (6) Common Support System. (7) Combat Service * _3 g/ p* s, a: ]1 oSupport.6 t/ ]* j& R9 m! `' ~. _ CSSCS Combat Service Support Control System (USA term).5 [ v$ {2 \1 U: G6 N+ X: z+ I CSSPAB Computer System Security and Privacy Advisory Board. . ^% Y c8 @& V0 b' aCSSO Computer Systems Security Officer. * O, F8 W' h# JCSSTSS Combat Service Support Training Simulation System (US Army term). ! Z$ n* Y) r. GCSTC Consolidated Space Test Center.7 Q& h' @" U/ I/ K: [8 w: `) M CSTI Civil Space Technology Initiative. 2 w0 g, z; u: yCSU (1) Computer Software Unit. (2) Communications System Utilization. 8 O; _3 r1 n c' \CSUR Communications System Utilization Report.2 R7 }; w' j. V5 T3 W4 R: F CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.: a& @3 E3 q3 _4 A7 c (4) Cryptologic Technician (Navy occupation specialty). / k+ p- U# _6 N2 `" xCTACS Contingency Theater Air Control System (JFACC term).2 z( @7 t6 Z" ?% M ^: U CTAPS Contingency Theater Automated Planning System (USAF). 8 I, ?$ C) t: g3 h* G: B- x2 T5 oCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term].' A! D$ }( A9 Z4 K2 k( r# k8 X CTBM Conventionally-0armed TBM.2 F7 V/ V0 a! V& U CTC Combat Training Center, Ft. Leavenworth, KS. : ^+ p+ M' w% `' lCTCC Critical Technology Coordinating Committee.$ M0 v0 Q" Y m; z0 ] CTD Communications Test Driver.# V! P- O2 f$ |. N! Y1 m7 X g, g CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. $ |5 ? m* p$ ], w; ECTEIP Central Test and Evaluation Investment Program. A DoD program for centrally / T; z. v& p# Y" @% l* ], Sfunding selected test investments proposed by the Services and Defense ; k" x* X$ F" N. ]' wAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C- W6 Q# [% }5 D* U4 p' S 68 2 z/ @8 a+ d/ @: Q+ f8 D* ECTF Controlled Test Flights.9 ]$ o0 X! Z; q CTI Concept Technology Insertion. z/ b: j( l; o" Y! w0 Z CTN CALS Test Network. v4 [( W _# Y5 B CTOC Corps Tactical Operations Center." S1 @# t/ A3 m7 Y1 L: d CTOL Conventional Takeoff/Landing aircraft. - v. Y' o! r) T% o5 f0 P6 WCTP (1) Critical Technical Parameters. ; _: N: S7 h6 ?! m! q3 x+ m" W& i(2) Communication Tasking Plan. 9 _/ [/ k! W/ \& l8 U0 [(3) Consolidated Targets Program. 2 n! v9 }: Z1 j9 P( {, R& H1 bCTPE Central Tactical Processing Element.( e: G& A' `, Q- l+ I CTPP Consolidated Targets Program Plan.( `5 ?1 n9 C9 m) p" B CTR Cooperative Threat Reduction (Treaty negotiation term)., P7 ~0 F' w1 }% ~7 O CTRS Centers/ e: A" I* g w CTS (1) Clear To Send (TelComm/Computer term).6 S+ a* d3 r- N D. ]9 d (2) Contact Test Set (USA IFTE term).1 y: v3 a: i7 c* T7 M CTSS Computer and Telecommunications Staff.& A" L7 h+ c0 `0 \ CTT Commander’s Tactical Terminal (US Army). 5 t; [; |, y; D, D4 zCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).7 o" f9 B( L2 {- @# m( p$ i CTV Control Test Vehicle(s).; E5 i6 F1 v$ ?) ~5 B5 t5 C CUDIXS Common User Digital Information Exchange System. ! X5 g/ {* Y" y6 H0 K/ [9 f7 w) uCued Operation The directing of one sensor based upon the data received from another sensor. 5 J9 g8 W6 [1 a3 O4 [Cueing Command The command within a tactic, which specifies the sensor element’s coverage& ?# e3 z' a, Q# f& c6 w- } volume.. b Y" s+ e, j# Z& v7 q Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage% w7 M+ b+ ?& ^4 l V volume.( J$ }/ U8 X- r/ B3 i2 E CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.3 e6 o2 T: r& m' |/ } CV/BM Carrier Vehicle/Battle Management.* g9 f& C% a) F0 j CVBG USN aircraft carrier battle group. ! }# ?* `0 \# Z9 [* o/ RCVHG Carrier, Aircraft (V/STOL), Guided missile.4 r, Y* O; |) x+ v" V CVISC Combat Visual Information Support Center. & Q! J1 T/ r9 `5 mCVL Copper Vapor Lasers.1 t4 L( e/ A2 u$ ~; I/ t4 O CVN USN nuclear powered aircraft carrier. P2 w1 x' k. w' x3 sMDA GLOSSARY, VER. 4.0 C5 y) R4 q/ Y: p& G- b. e 69 _4 o+ e0 T" D# E8 u$ r CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.; [( h% U% w' @' q, _* n- P2 h% M CWAR Continuous Wave Acquisition Cycle (Hawk). . X6 U+ c- G: Q& L8 }: VCWBS Contract Work Breakdown Structure." [2 ~5 D9 f0 @, z. {+ g4 E1 M2 } CWDD Continuous Wave Deuterium Demonstrator.5 q" [1 }/ l# m! i: p/ r- Z8 _ CWIPT Cost Working group integrated Product Team.. q& b" w7 V Z K CY Calendar Year. : P7 V- L9 U, SMDA GLOSSARY, VER. 4.0 D 2 j y/ R) d7 h' s71 ! V- u% C* o6 L, {3 g0 CD Deuterium 8 k: i( F! p( WD Spec Process specification. 3 Y! f5 D% H; YD Star Measure of infrared sensor sensitivity.0 U8 d: X* }6 B+ e2 v8 U: d D&D Design and Development7 C6 [0 h1 {# E! E+ G% D D&T Detection and Tracking. 2 P8 S* ]# T% \3 Z5 P, x/ j, K9 C+ cD-IFOG Depolarized-Interferometric Fiber Optic Gyro. 2 l3 h' `/ h7 j7 G# |! r" { tD-Level Depot Level (ILS term).( g" p4 k* J/ x9 p D/A Digital-to-Analog " D7 A/ h4 O- O0 Y5 oD/V Demonstration and Validation.' `; `. j g8 @8 `9 s- y D2 Projective (interceptor) in the Hyper-Velocity Gun program. 3 W) f1 F8 ~, i7 k' Q/ ]% d8 x) b5 ]DA (1) Department of the Army. 9 {8 I1 D3 a$ \+ x- i(2) Department of Administration.( h; o' p- k I; f& R (3) Decision Analysis. * c0 _* z/ Y g' X% a2 g# [' G7 p(4) Developing Agency/Activity.' q# ]" ^$ I- r; o5 V (5) Data Administrator. F, i6 I* [ p; |4 D2 v$ x (6) Direct Action.5 z% V$ Y) z: G) N (7) Data Adapter. 7 L2 o4 q: T0 G- [2 ]) eDAA Designated Approval Authority (DD 5000 term). 8 r: D" _9 y( p8 S! F& `2 w. bDAASAT Direct Ascent Anti-Satellite., X+ h- M9 b7 H* ^5 S. d f DAB See Defense Acquisition Board. 3 u( O+ f2 L" gDAC (1) Days After Contract [Award]. : c0 r+ R% r ~5 j4 ?7 y# o(2) Department of the Army Civilian." u, k% r0 B! Z) F. A (3) Directed Attack Characterization.0 U! {; l7 \) ~$ n7 ~9 n3 _ (4) Deploy ACCS Component. `0 J9 i5 Y* O H3 f (5) Digital-to-Analog Converter. " _+ ~8 g4 X" SDACS Divert and Attitude Control System.2 |3 v5 x7 o- s6 h! H9 ^0 f/ [; I DAD Defense Acquisition Deskbook. ' ?3 E6 |5 h8 z( i" zDADS Distributed Air Defense Study (1993). + g. ]9 Z' H0 l3 C; p) }DAE Defense Acquisition Executive.4 B& _0 k/ X9 z" v" C+ e5 C DAES Defense Acquisition Executive Summary.; [, l' i5 R6 D9 i# V. h DAGGR Depressed Altitude Guided Gun Round.5 J, M+ H" H; t2 P DAHQ Department of the Army Headquarters. : L# x: H0 a' e8 VDAI Damage Assessment Indicator (targets).& ^/ ?1 z0 n1 H! M! y; X1 U DAL Defended Asset List. , o! O$ x7 d# C$ hMDA GLOSSARY, VER. 4.0 D* l' m* O* Z* I 72 3 \2 V. r# H' r7 G( F: t- vDAMA Demand Assigned Multiple Access. * d7 y5 ]( H7 w3 _% V* w' C5 I/ SDANASAT Direct Ascent Nuclear Anti-Satellite. 9 u, m. Q( O' \8 O# b0 J2 V- E7 vDAPR Director’s Annual Program Review (SDIO term) + b: O1 J/ y0 a1 uDARO Defense Aeronautical Reconnaissance Office (OSD).1 I8 |$ l+ G+ l4 K5 P7 D DARP Defense Aeronautical Reconnaissance Program." [( D. c+ ~4 U6 r DARPA Defense Advanced Research Projects Agency. See ARPA. % K! O; [' }9 v: z1 y% s4 RDART OBSOLETE. Defense Acquisition Review Team. 7 ~" a3 Z2 ^5 I- \DASA German Aerospace. Member of the MEADS Program Team. : [1 _: R, U9 c5 m( x5 c1 @* v4 N3 X& GDASC Deep Air Support Center (JFACC term). ! q/ \# v+ `3 P& r j* f' |& }9 XDASD OBSOLETE. Deputy Assistant Secretary of Defense.0 _* o; h. {+ s" @9 }7 [ DASD (C3) Deputy/Assistant Secretary of Defense (C3) ! \* k0 q0 c2 x* m7 ]DASO Demonstration and Shakedown Operation. 5 h% g# i: ]. u: CData Integrity The state that exists when computerized data is the same as that in the source# @2 ~! C' \! {9 ^ documents and has not been exposed to accidental or malicious alteration or , D6 |8 N3 E& Y) D9 E5 i( Z7 ?, `destruction. ( ?# [& A6 g3 V; p) B" x' r- ~Datalink (1) The means of connecting one location to another for the purpose of; R/ g9 E- q( k& ?6 i. r/ O transmitting and receiving data.6 `2 _9 C9 c" Z% G( j! S; w (2) A particular path between two nodes over which data is transmitted. It ! Z7 u5 p% H. B7 D& s# Jincludes not only the transmission medium, but also digital to analog1 z( l3 F3 A9 F" t converters, modems, transmission equipment, antennas, etc., associated ) S6 g1 W! m4 }2 nwith this path. In the SDS backbone network, it was a path between two; c }0 }6 T4 m, q SDS elements. In space these datalinks were microwave or laser. On! d0 ^/ A; `/ U8 @ the ground, they could have been wire line, microwave, or optical fiber.% J* u& I% n8 t, K+ N0 R DAU Defense Acquisition University, Ft. Belvoir, VA. + i1 d0 T" F+ {; R }DAVID Development of Advanced Very long wavelength Infrared Detector (USAF + }* F' U# e7 \/ b0 n! P) jPhillips Lab term).3 }$ s- S$ S S( `5 c- o, {$ r' s4 Q DAWS Defense Automated Warning System.+ S' _8 ~* I$ L) G3 p& \ Dazzling The temporary blinding of a sensor by overloading it with an intense signal of0 {( F+ `5 R% M& ]$ p( a ?: j electromagnetic radiation (e.g., from a laser or a nuclear explosion). 0 s* N$ E# ^$ x0 A h4 {6 n- W: mDB Bata Base# w4 g9 h% m; F$ g: G DBME Database Management Environment (Computer term). 7 C, Q( R( g# Y0 M2 g5 EDBMS Database Management System.+ i, O! W; P, m8 X$ h: D# k, p DBOF Defense Business Operations Fund./ N: o! q& \0 G( ^' O1 O# P) A+ x1 Y DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D. N4 V4 L/ }* y 73 # `7 J- K4 n9 l" s$ k* }/ oDbsm Decibels per square meter.) j# f7 V# t6 p DBSM Database System Management.$ C O Y; Q6 Q5 }3 X4 P) l* ]9 Y& C DC (1) Disarmament Commission. (2) Direct Current.( T1 W7 M7 }3 f* [5 | DC-X Delta Clipper Experiment. 1 H: Q r+ Y' vDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications1 e7 q' `! `9 _( V( ?4 F5 \ Agency. (Now known as Defense Information Systems Agency (DISA)). . v' y5 w1 N1 |$ VDCAA Defense Contract Audit Agency. ' D7 Z0 `/ d/ P7 _1 [ UDCAS Defense Contract Administrative Services. 0 U1 {) p- x6 @6 b2 y* NDCCO Defense Commercial Communications Office (of DISA)., G8 i6 V* i7 S. }0 \4 a3 b# R \ DCDS Distributed Computer Design/Development System. , @4 F f1 V' H; dDCE (1) Data Communications Equipment (TelComm/Computer term).' t# l- g2 F, p/ N' c (2) Distributed Computer Environment.8 t$ p# z) o" h$ q1 s- { DCEC Defense Communications Electronics Command. 9 M1 x/ N( A0 ^5 lDCI (1) Director of Central Intelligence. (2) Dual Channel Interchange." X9 U/ w! R) S DCINC Deputy Commander-in-Chief.1 y- K+ R1 v' s; [ DCM Defensive Counter Measures. 0 |' C4 D: b! m# XDCMC Defense Contract Management Command ) P8 c+ p4 j) E% u; {2 ODCN Document Change Notice.* w# h/ z3 n+ @: L* A8 d DCO Director of Combat Operations (JFACC term)./ v/ V8 w* @- `6 u6 p DCP (1) Decision Coordination Paper (see ADM).( j' L. a6 u7 e: c6 u& F (2) Director of Combat Plans (JFACC term).6 O7 A, S i' D% C" N/ B( { DCPG Digital Clock Pulse Generator. 5 M" D0 r& `7 T7 PDCS Deputy Chief of Staff.' j* }1 t& j5 D5 y; W; N7 H, U DCSOPS Deputy Chief of Staff for Operations and Plans (Army).0 U5 X$ L) m$ z4 A# F3 p, A! y DCT Digital Communications Terminal & a9 X6 M8 _; O9 t* tDCTN Defense Commercial Telecommunications Network. & x6 i! L- ]) n& s# ?DD Variation of DoD. 1 _; n4 a' ?! `DDCI Deputy Director of Central Intelligence. / y8 `& T' }. B/ ~DDEL Dwight David Eisenhower Library, Abilene, KN (army term).- [$ f1 e/ b. [% R DDG USN guided missile destroyer. ( G, R# F1 ?* _6 h9 }MDA GLOSSARY, VER. 4.0 D : b6 |* Q, F1 [: {! h0 l74: F4 Q& x2 I3 }0 H6 ~! g6 B- w. f DDL Disclosure authority letter. - S# A/ Z% S8 TDDN Defense Data Network.: C& Q& T% I3 D DDR&E Director, Defense Research and Engineering.2 n9 e6 P) z; m' u DDDR&E Deputy Director, Defense Research and Engineering. : P" ]# g4 i% ^) p5 n6 ]DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).( i! q" D& p: \/ j. g DE (1) See Directed Energy. (2) Delay Equalizer.$ D: F5 T6 x& I, ~1 u# F DEBRA Debris, Radiance Model. " l$ C% A% y/ R/ W: p) ZDecentralized & L- m# r. D: y" S2 `Control # o; B; {. G, A0 @4 OIn air defense, the normal mode whereby a higher echelon monitors unit actions, 0 f2 b4 H3 i, Y ]0 [ n- }making direct target assignments to units only when necessary to ensure proper 2 Q" B( k$ p. tfire distribution or to prevent engagement of friendly aircraft. : V7 o+ {0 G( ~* \! F+ C' {; g8 BDecentralized # j: w0 r+ D! _, l3 {! p& ~2 j; v! `Execution4 n$ \+ y/ Z2 F* ]9 _, u The distributed and integrated implementation of USCINCSPACE direction by* x6 T/ z1 i1 \6 n: C the BMD forces. (AFSPACECOM)7 A; n! w/ {+ E2 ]5 N3 F* B5 z# t Decommissionin# l" Z# v P1 H( O# |) F* z g& T2 W3 x* U4 T7 E) y) d& T The removal or the rendering useless of obsolete or no longer needed % {# d& [2 R: lcomponents of the BMD system from service.8 {1 P$ M( a) W Decrement A directed funding level reduction for an acquisition program. + w. W/ J% U/ ]- n8 f. }DED Data Element Definition (Computer term).5 b7 c: P8 Q! l4 f0 v$ B Dedicated Mode + Z8 F; t1 n0 Tof Operation* _( i+ T4 n+ A) A3 U5 O (ADP Security) 4 M. E; O* \4 ~3 F3 p tA mode of operation where all users of the AIS possess the required personnel, t, P' M6 w& o security clearance or authorization, formal access approval (if required), and a& r$ M9 Z. V' K& b- l Need-to-Know for all data included in the AIS.2 [; M$ l. p$ w6 y& e: f Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about2 R$ f" N% z7 U t- N 5,600 kilometers) above the earth’s surface. . F6 e' ?# w- P$ r4 A! L; p4 j$ XDef Definition. " W& S9 B5 E/ [' J3 ~$ B) cDEF (1) Defense. (2) Demilitarization Enterprise Fund.% E5 D& b+ X' ~5 Y9 o% j DEFCON Defense Readiness Conditions./ t" K' r: g. E/ }% } ]6 z( u8 L Defended area - m1 J6 z( S2 R I5 icoverage 4 L3 B3 |, n# J( t8 D' @Defended Asset& {( \ ^1 P l' \+ O, S! | List (DAL)( X+ x6 ^* t x/ |" M The geographical region that the BMDS can protect from ballistic missile attacks 2 t1 s& D9 ~/ W2 T; Mwith a specified level of probability of negation. May be specified for a particular( H3 D/ P0 _7 ]- D9 G0 ~ threat type, launch point(s), launch regions, raid size, etc., c ?0 q5 T4 S B* C$ l! f A ranked listing of facilities, forces, and national political items that require b( q2 z6 P, K" C! I: Z, \ protection from attack or hostile surveillance. The list is compiled from Federal 7 ]1 R+ e, W0 M: Q- d7 }+ c! Kdepartments and agencies, Unified and Specified Commands, and the Armed 9 x. M; i3 D, Z6 x" GServices to ensure National Security Emergency Preparedness functions.6 _8 S/ C& J2 M+ | MDA GLOSSARY, VER. 4.0 D 6 F% z: e: E' T7 W. @, Q75+ d* G G4 M |2 |5 G Defense6 ~! F! S0 Z# X: u Acquisition" `5 F4 Y$ O% j5 R k" P2 U* L Board (DAB)5 K- U7 v/ K1 M- M, d The senior DoD acquisition review board chaired by the Under Secretary of 9 w% p& ?, u1 P s4 m' }) c7 P$ H- BDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the7 [. H: d+ x3 j Vice-Chair. Other members of the Board are the Deputy Under Secretary of' f1 b% J+ W$ S$ ^5 u7 W Defense for Acquisition and Technology, Service Acquisition Executives of the- V! \& g) w$ `* ?# B/ F3 |) h* R- b( W Army, Navy, and Air Force; the Director of Defense Research and Engineering; 2 ~1 Y# c' Q4 d2 h% L5 k0 pthe Assistant Secretary of Defense for Program Analysis and Evaluation; the, a$ @6 B+ q4 I Comptroller of the Department of Defense; the Director of Operational Test and& m7 U' z% n, R# ?' M Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the" B* Y9 H: @. y3 ^! ~ Defense Acquisition Board Executive Secretary. Other persons may attend at 4 J, _6 o" t; U, Q9 G' h( pthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition ( q7 x; J k0 \ m, n0 Z5 ?Board.”) 7 _8 B: ^8 | @. u0 |- q! ODefense 0 z; C2 I+ P- i. dAcquisition: D' H$ c& H5 a& d- d Board Committee z. n J) v( H8 h6 z6 M) G% W1 m Advisory review groups subordinate to the Defense Acquisition Board. The 8 |# P3 T# j/ p, X' KUnder Secretary of Defense for Acquisition determines the number of4 l, j$ t3 } a6 i; c Committees. The purpose of the Committee is to review DoD Component9 U; V9 `6 C: L _# c9 V: [ programs prior to a Defense Acquisition Board review in order to make an / e, U( c; ~" i6 z# [independent assessment and recommendation to the Board regarding the1 t) ]: l1 e% q$ x program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense . t% D/ n; Y7 P8 lAcquisition 4 K; t+ a! `' I% o9 T' L8 vExecutive (DAE)4 y' ~3 {) n7 O! Y+ ~" h. s/ s The principal advisor to the Secretary of Defense on all matters pertaining to the 1 v, x% Q$ {2 r( D7 l& P+ kDepartment of Defense Acquisition System. The USD (A) is the DAE and the. M( h' `- F5 L! R Defense Procurement Executive (DoD Directive 5134.1).0 o; q# M7 d8 X1 @ Defense " ]) n4 N. `+ ?4 a0 bAcquisition 9 v1 _" y6 T3 |, [, g2 `Executive 0 I5 q/ f/ E( \$ m" Q9 BSummary (DAES)6 f6 E7 P3 r; A3 _* B. R' V6 S The DAE’s principal mechanism for tracking programs between milestone 4 \( |7 G2 e k+ b5 P: O. z: Dreviews. Includes programs subject to the Selected Acquisition Report (SAR), 0 ?' X& ^: D/ |. [3 W4 eand any non-SAR programs subject to review by the Defense Acquisition Board.; Q1 M; K4 S; z1 I0 J Defense 7 f3 Z% Q, n8 l7 c! @6 y$ ~0 wEmployment 5 J3 V6 o( B( j% j2 J6 p# f% `Option (DEO)/ y3 G& e$ F% s3 j Engagement strategy provided to USSPACECOM component forces to achieve $ w6 F% j" I Cspecific military objectives against a ballistic missile attack. It defines hostile# k5 i9 i4 q# s1 J# y, V: N target priorities, provides assets to defend, and allocates SDS resources to be " o4 A- ]4 o$ } hemployed. A number of DEOs may reside in a particular Preplanned Response, b `! ^6 E( b0 [1 r0 y Option (PRO). However, default DEOs (those believed to be best suited to- ~5 z4 ~- N! h, Y5 |0 f* x counter the threat initially) will be automatically processed and executed when$ R6 e1 F+ J' @: S( R5 J Defense Activation Authority (DAA) is given by USCINCSPACE. ; c$ Z# }. h- L0 K d5 X# FDefense r6 a3 m4 @% v8 y8 A Enterprise, k, [; S' @1 P# c9 a Program (DEP) 9 v. @- P) B. G4 |# k9 v0 [7 \2 qAn Acquisition program designed to streamline the acquisition process by waiver * z+ _- Q& w) R8 `) ^1 Cof selected regulatory requirements.$ `5 h- J7 k" n2 {: [: U }$ z7 k Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb: Q. w/ I7 W8 r4 z4 j and progressively weaken an attack, prevent initial observations of the entire - }5 Z) I; k% Zposition by the enemy, and allow the commander to maneuver his reserve. & v4 x0 ]7 k4 W- C/ b! EDefense9 X2 S$ c4 \# A7 r: E6 `0 k Meteorological/ n' V. @/ g' b7 c! f Satellite Program 4 s7 ]# M( J% |+ I. w(DMSP)! O5 Z: r% C+ e2 ?' Z2 _ Satellites designed to meet unique military requirements for weather information./ h3 K% p1 V5 @; g! R Used to detect and observe developing cloud patterns and follow existing& k+ F7 Q! _- _7 Y1 r. | weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions., W9 \' x- h( s Defense Planning9 s( r* B6 P2 E# p& z" X/ n and Resources2 r2 H( h2 @# N: P0 k Board (DPRB). v X% C5 j6 k7 X; F4 [, ?7 j A board, chaired by the Deputy Secretary of Defense, established to facilitate 1 D3 m, b/ Y3 Y6 |decision making during all phases of the planning, programming, and budgeting 6 Z$ ^% i1 u5 V; \% `3 c) ^, }/ `system process. Board members include the Secretaries of the Military 3 k0 m$ M- B" t! n2 kDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of 8 Y6 h# f% U NDefense for Acquisition and Technology, and Policy, the Assistant Secretary of # q2 A' |- F# i( u7 b' kDefense for Program Analysis and Evaluation, and the Comptroller of the & S/ s/ K3 w& j F+ ODepartment of Defense. / H: A( A: ~3 f. C6 L0 u- t8 nMDA GLOSSARY, VER. 4.0 D" m. s: W9 x; k* E" i: g' j: L s 76 3 c) u9 i; ~8 A8 \1 s9 o% pDefense Planning ' w* B! y6 K0 X) XGuidance (DPG) 9 a& h) m+ ]2 ^" z* LDocument issued by SECDEF to DoD components providing strategic framework* d) i+ w/ |/ ]3 _2 o for developing the Service POMs. Result of planning effort by Joint Staff, OSD, 1 m" ^, l' Y( x/ Q- |and Services. In connection with two-year budget process, DPG is issued every+ `2 M+ F5 w2 G0 y4 }# V# e1 q# m9 _9 R other (even) year.& j4 d3 b( s+ E; ~& W6 G+ h Defense Priority2 r) @9 I* e ]3 ^1 } and Allocation- }4 j, n) F: x# i& ] System (DPAS)5 [! j. Y+ _$ r i* L+ A The implementation of a statutory requirement where contracts in support of M5 _7 _- }) F# W! T8 B7 `4 N0 Cnational defense must be accepted and performed on a priority basis over all : ?3 `8 M- ]- s! p% z: |other contracts, and which requires the allocation of materials and facilities in 5 n6 O6 Q7 j9 `) q% X) lsuch a manner as to promote the national defense. See “DO” and “DX.” {/ q& i8 {" wDefense 3 U' a+ l h; z: VReadiness0 l6 \* C) A) a1 u Conditions: C, U! T. P0 i9 W0 m* w (DEFCON) / A# F x' H4 Z$ ]0 QA uniform system of progressive alert postures for use between the Chairman of 0 f7 D8 P8 L5 d2 ~" i! wthe Joint Chiefs of Staff and the commanders of unified and specified commands 6 E4 |$ f( Z2 u2 xand for use by the Services. Defense readiness conditions are graduated to6 M0 A& B& Z1 W1 U! v match situations of varying military severity (status of alert). Defense Readiness " c5 d& d) `" k9 _Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as1 P1 s4 S2 y) v9 e$ I5 d4 c appropriate.( r4 I" b' t3 @( ] Defense Satellite* C- W- l2 i( I/ ~+ E Communications % W7 V. _ j: b" t. WSystems (DSCS) 9 w- E2 y, z) V" J2 c! PAdvanced communications satellites in synchronous orbit around the earth. 1 Y6 a$ H; e. _Provides high-capacity, super high-frequency (SHF) secure voice and data links# z9 `3 z; ]0 I* q$ j for the Worldwide Military Command and Control System (WWMCCS). They- }: Z5 |0 R ~% ^% @0 r( ^, O$ A support terminal deployments for contingencies; restoration of disrupted service + T7 X9 F/ N: r9 ?9 C( E) z' Xoverseas; presidential travel; global connectivity for the Diplomatic 2 u7 T) u& n( n1 f2 F. PTelecommunications Services; and transmission to the continental United States$ i- D- I5 ?+ Z! c7 \! W+ G$ E: S of some surveillance, intelligence, and early warning data./ F: O8 ]0 G0 [8 Q3 ]7 c$ w Defense Satellite, q: A' h% \- O8 Q6 m- i3 b (DSAT) Weapon 5 b; x' D+ \+ L" ^A device that is intended to defend satellites by destroying attacking ASAT* d1 i% C, l/ W4 K Y( `- l4 Z weapons.1 G* ^. D1 Q! c( \ Defense Support) i: ]! L! q/ t+ a0 h Program (DSP) ; h5 z+ t% b0 RA system of satellites in geo-stationary orbits, fixed and mobile ground! ^7 Z- z! H# Q" k processing stations, one multi-purpose facility, and a ground communications 3 B' T2 J! H( z* o) z# unetwork (GCN). DSP’s primary mission is to provide tactical warning and limited 2 i! F( [# i- |( eattack assessment of a ballistic missile attack.! ^; Z" z# Z2 ` Defense - f# G5 g" r- t, c6 l. ?' C& iSuppression , F# i) r& Q: J6 U8 \; S3 L; ATemporary or transient degradation of the performance of a defensive system) S( ?- z! K& @ below the level needed to fulfill its mission objectives, by an opposing force. , }' c3 D9 F0 b(USSPACECOM). Y. p6 W+ K# Y Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic/ W4 F: }8 y' j( v' J/ g missile trajectory; i.e., boost, post-boost, midcourse, and terminal.+ G$ H7 r' } {$ Q1 _! u1 J Defensive $ x) l7 o; S' l1 z! xCounter ) h$ `) [: G/ ?/ m+ hMeasures (DCM) % a, s. i ?% n# KActions taken to eliminate an ASAT attack. 4 ^. h0 a7 F1 [' I( P# |Defensive + K: I$ Z0 w) WTechnologies9 S; S, ~6 f2 W; e+ _ Study Team0 u' X$ f; ]: i6 ^% \! Y (DTST)' _# _5 D/ {/ | T3 S A committee, generally known as the “Fletcher Panel” after its Chairman,/ X8 [8 ~% Y+ F8 t1 O% A, G appointed by (former) President Reagan to investigate the technologies of( z8 H3 E* ~. w) w$ \6 }* [6 e potential BMD systems.3 Z* H' O. z X& b7 Q* W( a DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. 4 I7 s3 x+ l, G# BDEIS Defense Enterprise Integration Services (ex-DTIS).; x6 {! u) P5 T1 g- M DEL Delivery. 2 O; U2 ]5 |+ O" \0 N6 g; { ]Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion/ o& ]( G7 U' y7 z- j of shots about the aiming point. See also Circular Error Probable.3 r% K- m) e- g MDA GLOSSARY, VER. 4.0 D 0 ?3 H1 B/ b6 C1 O" @2 M77& c" m* x- f% i8 D Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the& B* i6 U. v. Y% @/ U1 H maximum change in velocity, which a spacecraft could achieve in the absence of3 U6 g' a& C; r/ t) y a gravitational field. " _& ]5 b1 f7 [2 j) CDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). _9 z& W2 e0 i- g) z Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its 2 n1 r4 Q3 C9 ^9 f8 d2 xdesired function (matching RV characteristics, screening RV, etc.)8 q& q1 i' r. V* p+ z3 U: r DEMO Demonstration.* e5 }+ D. L: N2 M ~ Demonstration3 _9 Q" a- H5 i: s# x2 o and Validation t" N( I4 c/ f5 ]4 d(Dem/Val) C3 S7 m) O( @1 {/ X* J. r The acquisition phase when major program characteristics and product designs 7 j& O) _( X& qare refined through extensive study and analysis, hardware development, test, ) @7 Z8 v# a2 Y8 h8 N. @and evaluations. The objective is to validate the choice of alternatives and to 3 O4 e+ w z9 ]$ I7 d1 K" j1 dprovide the basis for determining whether or not to proceed into Engineering and; i$ `5 q, }& g/ j- s4 _; X$ c Manufacturing Development (EMD).; H' Q' w4 q2 Y- e7 P, m0 p Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities." y% W! Z. v6 i) ~: \. ?; x It may include destruction, removal, contamination, or erection of obstructions., u: ~4 S9 f# B( F DEO Defense Employment Option. 1 z1 |$ I* x+ R$ ?' Z9 JDepartment of4 a U; `# c' X; l$ E7 ^ Defense ! y0 E% }# E2 yAcquisition; E' Q8 S) F9 h0 v# s/ Q. n9 T System # e D. ^) _2 N& _1 m! a. M) a* W x* hA single uniform system whereby all equipment, facilities, and services are, d% q' c8 O4 M$ A& [% T- x planned, designed, developed, acquired, maintained, and disposed of within the 8 M- h; c% ~1 y* ~ f yDepartment of Defense. The system encompasses establishing and enforcing8 K: x3 _8 Q4 z8 ?! U" S policies and practices that govern acquisitions, to include documenting mission7 Z1 o/ r, {. Y) z& I1 n' Y needs and establishing performance goals and baselines; determining and + E! C$ X4 X. \* V1 G/ p6 p3 j, lprioritizing resource requirements for acquisition programs; planning and # {4 [- Y- X! }; @. m# K6 dexecuting acquisition programs; directing and controlling the acquisition review % X9 ~# F: N' H F M7 Cprocess; developing and assessing logistics implications; contracting; monitoring2 z- h& V& B# f" K) `: [; x the execution status of approved programs; and reporting to Congress. (See # u$ S. y: t- ~5 j: O5 IDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)- N) b+ V! f/ ^4 |9 K$ _' a2 U Deployment (1) The placement of force elements in battle positions to obtain a higher& G; d! U' d; T& s0 T3 |7 z# I1 r state of readiness. ! `0 [/ b# {2 g2 k0 n' w$ F/ g7 }(2) The movement required to place force elements in battle positions.: o& G% x8 X7 W8 l2 R/ j+ V O y (3) Fielding the weapons system by placing it into operational use with units6 K( [+ q; T. E2 X in the field/fleet. / Q% G9 C8 g# u/ \0 R7 v(4) To arrange, place, or move strategically.1 Z8 B9 ^( V: e Deployment. T: @. D* X; y& V Planning & B" ?1 n/ `( p$ Y; i9 V1 f7 @(1) The development and maintenance of plans required to initially deploy, % G% \$ V+ W1 o+ D" H% Vmaintain, and evolve the operational system in accordance with & m/ S$ F5 z1 v( B3 Rschedules and priorities. It includes factors such as launch facility ' k* U" f6 f+ l" F6 iavailability and planning for the availability of other required elements 3 Q# N" K. w/ B3 t1 Nsuch as trained personnel or units. In addition, it identifies the impact of [" ?9 G3 Z! C( {deployment on operational readiness and any testing constraints I) w" o- a; e gassociated with deployment. ) P, ^9 f2 O- D) x(2) Encompasses all activities from origin or home station through; ?! n6 u. m( b5 K destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding. H; D+ d6 t- e$ S" D, I areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment# M' q, |* w) `. n Testing 7 v( j, J/ j! R- HThe testing and/or simulation of system assets in the physical and operational $ Z5 X# }3 k8 K9 y1 C( }% M! penvironment in which they are expected to perform." y) ?& {7 `3 | o5 l DepOpsDep Service Deputy Operations Deputies., p5 P+ K# S7 Y, y; ~) w MDA GLOSSARY, VER. 4.0 D, [/ X8 ^: k8 I. @) e6 K# ~ 78$ d: b7 o# x% E) B3 w Depressed " o' ~& y5 O1 e( o0 ^: N; ^Trajectory ! b. v% Z; m! M; G: z% aTrajectory with an apogee below that of the minimum-energy trajectory. * ~6 I$ r0 k8 [2 O( LDEPSCoR Defense Experimental Program to Stimulate Competitive Research. ; n2 L- ~0 Z0 j; k# mDEPSECDEF Deputy Secretary of Defense. ) K3 @* B5 `8 s* h! {; t+ fDeSecState Deputy Secretary of State.; D* D8 c; P* w1 G; n2 J DERA Defense Evaluation and Research Agency. Consolidated research and; _3 ?- I+ M" t* {; r, n development resources of the U.K. Ministry Defence. Headquartered in : f2 J& K8 u. p( A8 ?Farnborough, England. / a( q* _+ J r& |/ d, uDerivative 0 n( Y; D" @9 t+ E# wClassification) f- z" i+ k7 K0 M A determination that information is in substance the same as information # N6 e+ l8 _, x$ I; e, Y3 `5 @currently classified and the application of the same classification marking.6 |0 R- q& s, {: G& J- [% | DES Data Encryption Standard.0 r+ a0 ] j/ A5 I: K% @ DESC Defense Electronics Supply Center (DLA term).# R! ]7 B3 G2 \% `( x" C, e, k Design 1 K6 N3 N% G1 H, `) ]! @ wConstraints / D! L4 i; l, @: T. W5 E0 _1 DBoundary conditions within which the developer must remain while allocating . |$ P7 E: ]" M: p6 S3 lperformance requirements and/or synthesizing system elements. - O9 `& z+ E- y; DDesign ; i- W! O1 S6 u" S* ~0 H3 sParameters ) G6 t9 @: v5 ZQualitative, quantitative, physical, and functional value characteristics that are . w5 E& v, C; _, }2 s* D6 minputs to the design process, for use in design tradeoffs, risk analyses, and 3 V0 Y9 e# U7 {# fdevelopment of a system that is responsive to system requirements. ' I' l5 q3 b5 b& |& g1 TDesign Phase A period of time in the software life cycle during which the designs for * ~% o9 v: d$ S# Y4 ^" qarchitecture, software components, interfaces, and data are created,8 u9 K+ P2 W; v! ^ documented, and verified to satisfy requirements.. N6 F* ^3 ~& X' q) m- n6 F, f Design-to-Cost 8 R7 L' e( A9 [ \$ p(DTC) Goal ' u2 A4 p9 b/ [/ w. v! E7 @Management concept wherein rigorous cost goals are established during " r* I; u0 O. g5 s2 x2 ^1 Wdevelopment, and the control of systems costs (acquisition, operating, and! m/ ^& }$ _2 ~% N; V+ ?% e support) to these goals is achieved by practical tradeoffs between operational7 q% d" Y; F% ~3 g9 x0 t9 z9 ~4 W capability, performance, costs, and schedule. Cost, as a key design parameter,! Q' Y/ t2 t5 T2 Y' J* \% G' w8 w; E is addressed on a continuing basis and as an inherent part of the development. M' s f& \( V+ _5 M" \4 ~" t; d2 i* k and production process. A DTC goal should be in the form of average unit # X) m3 d* Z$ E. A b* c' M8 Uflyaway cost. Also, DTC parameters for operation and support will be 4 Q h% b# ?+ ~% Qselected—parameters that are design-controllable, significantly affect O&S costs,, E& H% C6 R+ F( I% @+ p& h4 a and can be measured during test and evaluation. Parameters may be* Q$ x. C0 {( x5 H expressed in dollars or by other measurable factors, e.g., manpower, reliability, or! \( @* l5 Z+ k' \6 u; @/ o+ {) h8 e maintainability. Firm goals and thresholds will be established no later than entry1 G; S. L2 x+ b4 d2 g into EMD (Milestone II). This is an in-house goal, almost contractual in nature, 7 G5 e8 p& O( D% }: h, fbetween the PM (Service) and the SECDEF. Allocations from this goal will 7 {6 A' e2 e7 J5 |become the contractual DTC goals for contractors supporting the program.& [+ v/ k* n* V) L8 b6 E6 s Det Detachment.7 U p9 _! T% p DETEC Defense Technology Evaluation Code. ! o* @* [4 C; Q fDetector A passive IR, visible, UV detector turns photons into an electrical signal. The - p! @2 y: a; ~, C3 u5 S G$ QIFOV of the detector is its solid angular sub-tense. There is sometimes p) }" J, f* ^3 B1 C. y confusion between the detector sub-tense (size) and the pixel (picture element+ v1 c- t2 X# p2 H# p5 j5 l9 R size). They are the same for a staring sensor, but in a scanner it depends on1 A2 g9 |1 h. { C( i2 [ the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.$ m+ d- w" u6 M' ~" C' t MDA GLOSSARY, VER. 4.0 D( @1 s4 d+ j( Z; l 79 9 |8 M/ z4 f0 W- v, i3 LDEV ENV Development Environment. - H9 X& S. Z/ V1 n% F0 _ ^, RDevelopment8 K t8 d) a& w Test (DT)9 I6 l% F. \- t& g- ]( P Test conducted by the development test organization to achieve specified test 6 f& F' `+ i5 z+ N- h$ M) Uobjectives. It may be a complete test, a subtest, or a phase of a test. j: f. }2 {& c P* M+ aDevelopment" c1 t- Y1 Q- ?5 S0 k/ X Test I (DT I) C0 |3 W6 ?# B# S5 X/ q/ Y A series of tests conducted during the demonstration and validation phase.; x+ [ G: ~, m/ i1 E- i& D Components, subsystems, or the total (or full) system are examined to determine . t1 W9 i% u' x! S m+ @2 Z' qwhether the system is ready for EMD. State-of-the-art technology is addressed0 b9 O/ N% L9 h in DT I. 6 Q3 m! m4 b+ z: l6 c; \' Q* oDevelopment 3 w6 O7 E) n/ lTest II (DT II) c2 i$ x: M5 e# z) q$ Z A series of tests, normally during EMD, which provide the technical data 8 J( d- x% K, {* F. Tnecessary to assess whether the system is ready for low-rate initial or full , t6 R) Y4 ?/ U4 D y- c2 w) Pproduction. It measures the technical performance and safety characteristics of, _; }# }# b: S* m4 W( @ the item and evaluates its associated tools, test equipment, training package, 5 o0 s' [4 a0 v7 S9 Jand maintenance test package as described in the development plan. DT II5 H5 M2 |4 D7 F3 `" R addresses accomplishment of engineering design goals and the fulfillment of3 u4 S3 X/ U/ k3 k' E contract specifications.7 {6 W8 u! c7 v Development ) G# M/ g& K# P# ZTest III (DT III)7 S9 T5 i$ q2 ]7 ?% T. H. c Tests conducted during production. 9 C p: Q9 ~/ y) d1 ]Development 7 Z+ X* t0 n8 h Q/ W2 qTest and : W% R0 P. D% i% a6 e' NEvaluation. {8 X5 e5 J4 g5 [ (DT&E) 4 s4 m( \& n6 ?Test and evaluation conducted to measure progress, usually of5 v3 ]; x$ [. @6 u0 n' Q) j0 O component/subsystems, and the proofing of manufacturing processes and / |$ Y4 j8 x8 O4 H7 ocontrols and to assist the engineering design and development process and+ F7 ?4 O$ u/ g" k/ m; B& z$ S6 f6 e verify attainment of technical performance specifications and objectives. Usually 8 m! F: u8 C+ Pconducted under controlled or laboratory conditions. Can be conducted before+ o( v. H& m1 y+ Q or after production begins.$ S: }! d3 i% t Development2 p ^ v3 {0 A6 B! S/ L* m( U Test (DT) 6 ~6 e1 D6 L$ E6 \0 LTest conducted by the development test organization to achieve specified test / f2 I7 i! v4 C1 d5 ^1 m) I+ Dobjectives. It may be a complete test, a subtest, or a phase of a test. I$ y% i' ?3 c- U1 f7 |Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,8 h# c$ }" B) o4 V* T schedule, or performance without authorization from the milestone decision/ ^8 P F% z' q9 C) e- [ authority. Acquisition Program Baseline (APB) thresholds represent these! s. @* L: I" v( h5 s) O+ ]: c parameters.- j2 |: b5 y2 w7 g6 ` Devolution of! {/ U! f" \; @" ~" { Command # T' t* i# V$ L3 w3 T' zMinimal essential operational capability to perform C2 provided in an orderly and0 P0 d7 Z5 ? F0 d& d timely fashion to a duly authorized successor.7 q) k' y6 s7 ]# J& x! N. b; H DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. , i4 ?$ D3 h) Z* |DEW/D Directed Energy Weapon/Discrimination. / ?* h7 ^9 l3 c% z! P4 P& SDEWG, O Directed Energy Weapon Ground, Orbital ! V1 M) Y r. o2 ~DEWL Directed Energy Weapon, Laser (thermal or impulse). 7 \/ K+ ^0 J% n1 m6 @+ j* l# G% [DEWP Directed Energy Weapon, Particle Beam (neutral or charged). ) V$ r9 T4 p2 i8 c1 rDF-KBS Data Fusion Knowledge Based System. 5 R6 C5 `; e& O3 k2 oDF2 Deuterium Fluoride.3 n$ K9 t! o5 D6 o DFAR Defense Federal Acquisition Regulation 4 g3 A6 [6 g" z% u1 `7 p1 M/ {9 L4 v, FDFARS Defense Federal Acquisition Regulation Supplement. 8 x# y; z+ y; F' q* p. e( XMDA GLOSSARY, VER. 4.0 D/ b, Z s- l G, K I" k 80 ! q: ^$ O% ]- t+ KDFAS Defense Financing and Accounting Service.4 Y! _' [4 d$ P7 c( V DG OBSOLETE. Defense Guidance. See Defense Planning Guidance.% \* C8 a7 y7 M7 a6 i# }, X DGA Director General of Armaments (France). % G* p/ _: K H& d- f1 |# GDGP Defense Group on Proliferation. 2 j8 o) z/ ]- QDI (1) Data Item. (2) Developmental Item.5 l* f" ~: \7 s5 H& ] DIA Defense Intelligence Agency.' i' C2 A5 A1 m) F3 f; H+ e DIAC Defense Intelligence Analysis Center.: h: T4 d1 h# S6 b. Q0 S# G/ p, i DIAM Defense Intelligence Agency Manual1 J- V; E }0 H: @5 ~' `6 h5 A Diameter (Optics) The unit of measure of the light gathering power of a lens. ; C" E1 R# n7 _2 S* o- e$ }# jDICE Digital Integrated Combat Evaluator. 6 J2 \% [4 n, \' J# }DID Data Item Description. ; ?1 z0 v& K+ ?6 @4 k- b5 t* [& h1 GDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The ! @: L8 [( G2 k. Uangle of spread, which cannot be eliminated by focusing, is proportional to the$ U. I/ d. [; d% t. A! ^ ratio of the wavelength of radiation to the diameter of the aperture. ! C J' v$ @* [" |' m5 A+ h$ wDigital+ _4 k! ]) d2 a, P5 P Processing: ~7 r$ t+ H9 ~" l. B3 ^ The most familiar type of computing, in which problems are solved through the4 p# x' g. \" g7 J) ] mathematical manipulation of streams of bits. 3 h, p( a o b; a. k. kDII Defense Information Infrastructure 2 Z# Z4 Z: ]* R& LDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to. f! f; e: o% l! s ^% o6 A 12 km) between wake termination and de-sheathing.( w1 y$ @6 S7 G DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).+ p9 ?1 e! }4 g9 e9 x" W- K DIR Director.$ t- J1 ?- H3 d/ M* ] Direct Air0 r. e O4 | \; G3 X) O& n$ \- O- J Support Center " j6 J v$ G3 Z2 h: p( wA subordinate operational component of a tactical air control system designed ' Y8 I- B% W; k6 G7 nfor control and direction of close air support and other tactical air support 5 [( n; y P @# J' K! Aoperations, and normally collocated with fire support coordination elements. W4 V5 h- |$ w& @4 J8 GDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not 5 X( Q8 b( H) @3 i! Knecessarily limited to items that are incorporated into the end product as labor or, h! X3 |1 [& {# ^) M6 i material. 4 X% P( ^2 I X* |Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing ' k0 l4 m2 x. ~8 j g# adirect labor includes fabrication, assembly, inspection and test for constructing; S+ ~' r( G7 v0 l* W+ s the end product. Engineering direct labor consists of engineering labor such as& Y: k8 _; B( p6 s0 u reliability, quality assurance, test, design, etc., that is readily identified with the9 X8 R4 [; \$ Q/ _- P( C$ Q$ m+ K end product.; l, k; m8 \3 s% g6 g0 C( Q Directed Energy" i" z0 D- a- F3 V7 ] (DE) ! N( p5 y# |8 U1. Energy in the form of atomic particles, pellets, or focused electromagnetic 6 A4 t0 I# n2 Ybeams that can be sent long distances at, or nearly at, the speed of! [& Y: \& M4 y R, r light. 6 a8 V2 q* P% W+ D2. An umbrella term covering technologies that relate to the production of a* D- S f! u& c beam of concentrated electromagnetic energy or atomic or subatomic particles.* T5 k' e; B- w0 j/ I; M MDA GLOSSARY, VER. 4.0 D" O. E% k; V& I+ h8 i' h 81 , j8 ~( F2 ~' p1 z9 N# Z I& DDirected Energy : d5 S& j5 X ?' i/ G/ M, T, LDevice$ n. R- W' b4 G: @4 I A system using directed energy primarily for a purpose other than as a weapon.' B1 K% ~' U# e$ n p9 G Directed energy devices may produce effects that could allow the device to be 1 }" {5 @6 N1 Q" K, S& l+ Qused as a weapon against certain threats, for example, laser rangefinders. * \, ]! b! F' o5 PDirected Energy , u5 x; N. u; @2 p0 h9 aWeapon (DEW). G; `6 X6 B' u8 [( n% C( q A system using directed energy primarily as a direct means to damage or destroy0 _0 {4 ~" S$ m8 J k0 m3 v enemy equipment, facilities, and personnel. % ^$ X; v" `# R) v! {1 B( NDIRLAUTH Direct Liaison Authorized. + Z. P: }" i# s1 }0 h$ x5 |5 E" ODIRNSA Director, National Security Agency. . B/ D% L: @# g9 q/ PDIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.3 ]7 }- J7 }8 p( B DISA Defense Information Systems Agency, Washington, DC. (Formerly known as ' n" N9 J( U9 DDefense Communications Agency).! M2 _7 P( t) C Z% N DISCO Defense Industrial Security Clearance Office$ G3 P& z1 U' ~# W% m( s DISCOM Division Support Command (US Army term)./ y" e% P5 d6 e7 w2 `/ [; W! L2 q Discretionary 8 E: r% D' J; S0 d: CJudgment: O. U& u* ]6 n/ V0 g0 }& ?# V; T The authority given USCINCSPACE or his duly authorized representative to c/ a" E% P& H" X1 V8 E2 F perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination ! z3 Q- |8 _; R$ P: Q9 w+ JDISN Defense Information System Network (DISA term).2 ^2 \" Q- D+ A0 M DISSP Defense-wide Information Systems Security Program. ) d' ~2 i' E6 E: w& B( ]7 ?DISUM Daily Intelligence Summary (JFACC term). ( a# p7 a6 R0 ~! A; {+ q! xDITDS Defense Intelligence Threat Data System. ( D3 C b3 V0 r8 R; tDITP Discriminating Interceptor Technology Program. The objective of DITP is the& V) c, ]+ R+ t0 j# u development of advanced interceptor seekers to counter advanced threats.) g J% y( S. A0 e0 W DITP will integrate passive and active sensors into an interceptor seeker that( t K4 ~: d3 T: l; ?( J$ i; e integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP ; C) |1 i; y7 rflight demonstrations will involve the tracking and interceptor on-board+ q( H, R7 ]! F4 b4 h discrimination of targets of opportunity while providing fusion processor data 1 ` u, m! J( U7 c: Ytelemetry. (See also ASTP). 9 @; Y8 Y' B" g* K) l" pDIVARTY Division Artillery (US Army term).; K, Y+ q3 y& K0 a4 s7 o( f DIW Defensive Information Warfare. A+ p2 K+ ~8 I& z6 H DLA Defense Logistics Agency, Alexandria, VA. 6 A( }/ X8 M4 eDLSC Defense Logistics Services Center (Battle Creek, MI).' [% P; `% A# J0 G$ Z DM Data Management # |% w r9 f/ QDMA Defense Mapping Agency, Fairfax, VA. 6 w# k* l( o; d" H* N; `1 W3 F9 yDME Distributed Management Environment. 4 b3 M0 c) a' ZDMI Dual-Mode Interceptor.. j/ I6 c' Y7 {0 E3 ~8 f1 t0 x6 v6 m MDA GLOSSARY, VER. 4.0 D 6 {9 v* l K% W: d82# a" V/ G1 q" ] DMRD Defense Management Review Decision. % p: ?0 U9 I9 ]5 p! sDMS (1) Defense Message System. . R+ G8 E# z6 h(2) Dissimilar Mission Simulator./ b% r% t, Q- d8 u. } DMSO Defense Modeling and Simulation Office (OSD).) B( t( p8 F3 ~) l n DMSP Defense Meteorological Satellite Program. `. E+ C7 W0 dDMU Disk Memory Unit.2 E5 u8 I6 c" ], x; m0 |8 R& r DNA Defense Nuclear Agency, Alexandria, VA. 3 m! f4 @/ ~3 Q d7 VDNMS Distributed Network Management System.6 D3 E( _. S0 H5 ]8 p' v2 R DNSIX DoDIIS Network Security Information Exchange 4 r. k; F( a" S1 e. Y0 H" T0 fDNSO Defense Network Systems Organization. : M; r0 s9 J W3 r% c( h& KDO The lowest rating under the DPAS. All “DO” orders take preference over unrated # R; H% ?# K# D$ p( @2 Iorders to meet a required delivery date.# W5 e- e9 A( n+ R# R Doc Document( i+ O. @2 c& i; C DOCPREP Documentation Preparation. $ l! l: `2 W7 _$ T: n; @, RDoctrine Fundamental principles by which the military forces or elements thereof guide 3 x( ?7 H0 y2 H, [their actions in support of national objectives. It is authoritative but requires 3 K* ]& z3 f5 Z0 V, { P% y% xjudgment in the application. See also Combined Doctrine. 6 M& k* J Z+ M; z9 xDoD Department of Defense + f' @8 T3 C5 D7 g: p& JDoD Component. I% j( a+ }4 O4 e( V; b& } Acquisition5 A, c1 ^! M) r# [ Executive2 h: _$ ?. U; l9 Z4 o A single official within a DoD Component who is responsible for all acquisition) N5 h% W5 z) T: K% g$ E functions within that Component. This includes Service Acquisition Executives5 C1 \2 ~7 ]2 ^- c+ h8 v* B for the Military Departments and Acquisition Executives in other DoD 9 I* N( O# z! N; {Components who have acquisition management responsibilities.0 i' @, u$ A5 D+ t" u7 d DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, 0 ~0 k1 X% z/ z: n. B) M- a: A) lJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the ) @8 p0 G' z/ B* g w3 r3 [Defense Agencies; and DoD Field Activities.7 H1 h K9 M8 F- ` j DoDD DoD Directive. ! n8 c$ b. c$ N/ e' zDoD Directive3 B8 O& [1 K* K; H/ `% v1 g 5000.15 u2 I& X) i3 U' Y' q. E “Defense Acquisition.” The principal DoD directive on acquisition. It establishes! K* I8 p+ o) M8 z6 l, t policies, practices and procedures of governing the acquisition of defense/ j" c/ g3 h+ r1 ? f acquisition programs./ Z/ @1 @# z* B; g3 o DoDI DoD Instruction. 8 L# _2 I, C/ t7 n6 V* bDoD Instruction3 w# X6 ?4 d s 5000.2 0 o6 w5 y% w2 ^8 L3 I( G+ ^% b“Defense Acquisition Management Policies and Procedures.” Implements DODD ! d0 N9 A' g4 R5000.1.$ r% B ?& i) \9 G/ q! I2 E: F DoDIIS DoD Intelligence Information System. ) D9 d: ?( e4 a# j* rDoDISS DoD Index of Specifications and Standards. ( a0 F9 H$ Q( Q7 y% }DoD-M DoD Manual. , e% Q4 T. d- x2 M- q. _$ C+ SMDA GLOSSARY, VER. 4.0 D + ^+ s! D% V/ N, [83 ( V+ ]8 D2 Y0 J! oDoDR Department of Defense Regulation.2 ~" k/ h; _$ [3 h7 Q DOD-STD Department of Defense Standard. 6 G5 I* z- {' \3 R+ w( [* S* l) IDoE Department of Energy.. r# {! T$ h2 z7 J0 W DOF Degrees of Freedom.- t% ~9 z, ]( t Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system" z. w7 K6 M* c. Y having a detection range of approximately 3000 km. It is believed to provide / k s+ P8 V# ^9 I/ v$ k0 Ibattle management for the totality of Moscow defenses. $ d- s; ^4 E4 E( l+ R7 K8 DDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).; O. O7 q: e4 Q; t% R6 \% ] DOPAA Description of Proposed Actions and Alternative (environmental term).! [" p1 T) j' @& | Doppler Effect The phenomenon evidenced by the change in the observed frequency of a- |9 s( j1 @. ] sound or radio wave caused by a time rate of change in the effective length of $ t; E: P( U- w, N- c8 pthe path of travel between the source and the point of observation.- Y# S/ q1 k# P/ I0 @ DoS Department of State (US). 4 I+ E$ @, [& M$ d6 |DOS Disk Operating System (TelComm/Computer term).2 \0 ^5 n( G+ v0 w DoT Department of Transportation [US]. " u! A' R7 ? U) `+ }6 _DOT Designated Optical Tracker. 6 h% j1 T" K9 C) cDOT&E Director, Operational Test & Evaluation.6 \' E* k1 ^0 P N! N DOTH Defense of the Homeland.3 o( |* T! E9 f1 m- I: b/ i Down Select To reduce the number of contractors working on a program by eliminating one or7 b" }+ U7 f# l+ ]7 B' N more for the next phase. ) t6 h! K3 ^2 ~% K' M' |DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.' x) }1 C" g' A* k+ G- ~ DPA Defense Production Act.& U' M- k f! u6 z DPA&E Director, Program Analysis and Evaluation.( K" |1 E* A e3 H DPAS Defense Priority and Allocation System. d) e9 p& O6 z$ F& b! ADPAT Dynamic Program Analysis Tool. 1 ^8 G" r7 ]5 F) x9 u1 {; @DPB Defense Policy Board.% _# c+ @/ d- X2 D$ z6 T+ c DPG Defense Planning Guidance." H. f8 H6 W( D3 U DPM Deputy Program Manager.4 G4 s8 A% D$ g; n: u DPML Deputy Program Manager for Logistics3 n" w# `# x5 S( X; @0 e( ` DPP Distributed and Parallel Processing (Computer term). 6 t8 z/ m" h8 e4 Y: `, u# jDPR Defense Performance Review.% X4 l5 `* t2 b$ F2 l; r, ^ MDA GLOSSARY, VER. 4.0 D 9 D5 B7 `/ A$ I4 C ]4 `84 t# X# n# q1 I2 u DPRB See Defense Planning and Resources Board. 4 t. d& x0 A2 ]" c% `" IDPRK Democratic People’s Republic of Korea (North Korea). 1 X2 j! X2 U6 Q+ ADPRO Defense Plant Representatives Office.$ C2 F9 V0 {6 w% Y8 C% Z; l5 Y% Z DPSSL Diode-Pumped Solid State Laser.2 g8 C2 g, j5 g2 J2 ^ DR Deployment Review. ( f! Z; L/ e; v$ A# V0 m9 t% lDRAM Dynamic Random Access Memory.5 Y# U& K9 `+ C _2 Z Draw-down Curve A method used to encapsulate the overall performance of a BMD system that* ]+ H; L- ^5 e- L plots the probability of survival on the vertical axis versus the number of attacking8 F3 @" O* f1 z& U$ s RVs on the horizontal axis. Used in conjunction with attack price, they are the # i4 x' ~; G# |: n$ B1 K' P& {most important expressions of a BMD capability. 3 K9 c0 p' {1 pDRB Defense Resources Board.) ?, @: e) }/ f. }+ N DREN Defense Research and Engineering Network. 6 x* L L* [* B4 g$ Y1 lDRFP Draft Request for Proposal. o1 X- z& X' A Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from 6 L' _& p7 B, e: Rgravitational and atmospherically induced torques on the spinning projectile. \" W/ C: t! @: yDRM DAB Readiness Meeting (DD 5000.2 term).9 L0 Z. p9 O7 M1 U7 n2 C2 t Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also 1 t: n W/ V# K2 `: ^/ gRemotely Piloted Vehicle. , b% a9 _7 Y/ a. G) o$ p0 iDRP (1) Deployment Readiness Plan (US Army term). " L7 M$ n+ [; R7 d; b(2) Deployment Readiness Program. 1 F! q# E6 B5 P. rDRR Digital Receiver Replacement (USN term).6 E7 I; w1 b% m" Y DS Deep Space. ' q; z z* D6 F1 m5 J9 ~* b _ mDS-1 Category of telecommunications circuit capability. $ s/ c7 G% j+ r: U9 ADS-3 LAN Category of telecommunications circuit for a Local Area Network. ( B7 ?, ~9 h% u/ ^" X6 ~7 K, P5 eDSAA Defense Security Assistance Agency (OSD). ; O+ s J$ O% h' X% l7 @9 r( CDSAT Defense Satellite Weapon. 3 x: i% R+ q8 ^2 z% K3 ^3 T eDSB Defense Science Board. 6 P7 ~3 J: ~% x. jDSCS Defense Satellite Communications Systems. * o" D4 w/ O% L: \% I: N8 T* bDSCS-3 Defense Satellite Communications System Three. ; W, D7 u; e& CDSCSOC Defense Satellite Communications System Ops Center. 9 \2 o6 i+ f. v- g3 m4 Q2 @0 r5 UDSI Defense Simulation Internet5 {- L+ f& i, n9 r) G$ z. g MDA GLOSSARY, VER. 4.0 D$ K# a" ~ Z | 85 % C. P$ ?* [5 ?$ LDSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet 5 }2 g4 L0 P: J9 jSystem.. q& m6 ?' }/ z, ^ DSM Decision Support Matrix * w W O0 K/ y# i8 ]5 fDSMAC Digital Scene-Matching Area Correlation./ f1 Z- R8 n$ `- j1 m6 v3 V DSMC Defense Systems Management College.9 n, h( a; m! [7 j w DSN (1) Defense Switched Network (formerly AUTOVON). , Z, g2 X( o; i( {(2) Deep Space Network (NASA term)." ]% I# |+ Q8 ^7 J& x, \ DSP (1) Defense Support Program. (2) Defense Standardization Program. 7 C+ `' w0 c% o5 u _2 B( ODSPRTM Defense Support Program Real-Time Model. 5 r! L1 a; O; x z! fDSR Data Set Ready (TelComm/Computer term). - H9 u( m* ]5 W5 ]. ^& p L: dDSRCE Down Scooped Radio Control Equipment (TelComms term). 5 B- a7 Y0 N. ]. ?$ k( NDSS (1) Defense Supply Service. (2) Digital Signature Standard.5 v1 j) N3 S1 W$ L* O/ l1 z DST Defense Suppression Threat.7 h- h# l2 Y; Y( m6 _" p) t DSTAR Defense Strategic and Tactical Array Reproducibility. , g! Z) c. V0 C9 V% [DSTO Defence Science Technology Organization (Australia). @0 v1 I0 K/ ]! j ^DSU Digital Service Unit (Telecomm/Computer term). : ]0 o1 e2 Z+ K8 P4 _0 fDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to) ^" a' I9 h( ^- x1 f: P6 X the DNA.! |6 q' n! G' r$ x DT (1) Discrimination Technique. 7 _, l5 Z' V7 R( \ s3 T(2) Development Testing. ) C: g8 L- t! S+ d! U(3) See Development Test I, II, III.8 r0 q. w5 ~5 w6 b" z (4) Down Time (ILS term). : h G$ h, j$ j+ z(5) Depressed Trajectory.' n! ]6 h& x' G* B (6) Dedicated Target. ' b: Y4 Z+ R: j8 }/ z) B, iDT&E Development Test and Evaluation. * k, P5 W+ q1 Y# Q: {DT/OA Development Test/Operational Assessment. 1 ]* M6 j6 C1 }9 FDT/OT Developmental Test/Operational Test. q- Y% p+ i5 A0 o IDTAP Defense Technology Area Plan.5 X+ o6 `2 g. {% g; Z DTC Design-to-Cost. ' u' K# c! ]7 D: _DTD Digital Transfer Device (TelComm/Computer term). . Y; _( m5 [, p2 ]* NDTE Data Terminal Equipment (TelComm/Computer term). / M: x; P P$ D) q. wDTED Digital Terrain Elevation Data. / g: j' g% a2 I& N5 v, k& h& bDTIC Defense Technical Information Center, Alexandria, VA. 8 \% O7 ~1 g9 V' s% |; s6 {: c! }MDA GLOSSARY, VER. 4.0 D 2 b0 a$ @6 s) y6 ?1 Q( Z8 `2 A86 2 P6 k5 U7 H; BDTIS Defense Technical Information Services (now DEIS).: j( ?1 z" M6 F& P" l8 s7 d DTLCC Design to Life-Cycle Cost. ( v* k# D! p1 bDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL 6 D+ i5 b! u* `; z2 t5 h% f( gterm).% |5 \+ U6 N4 r! ]/ I# c2 D. O% E DTLS Descriptive Top-Level Specification. 9 \) f S7 Q' r" }, @7 D, KDTMF Data Tone Multiple Frequency (TelComm/Computer term). 7 |3 Q+ b; K6 [" x( I- l2 cDTO Defense Technology Objectives./ _8 ]- ?1 B: J DTOC Division Tactical Operations Center.3 D4 F; |1 C/ i! {" Q5 Q. w0 g/ f DTR (1) Demonstration Test Round. (2) Development Test Round. " n1 B8 Q, s7 X0 CDTRM Dual Thrust Rocket Motor. + |) o' ~( l6 S, j7 v# P/ hDTSA Defense Technology Security Administration.* g/ m+ ]8 I6 ~7 @5 I( o0 S DTSE&E Director, Test Systems Engineering and Evaluation. ' Q* O) i' X0 E6 c/ `# eDTST Defensive Technologies Study Team. d7 V5 L8 I# }& {& ` DTT Design-To Threat 9 J7 U1 S# g" DDTWT Dual Traveling Wave Tube (Electronics Engineering term). + \# A: s4 u- c1 ?. \9 r9 u# |) zDU Depleted Uranium.& X1 I$ [2 _4 d% j/ m- w+ Q DUA Design Upgrade Assessment." @! s9 I! Z( n; s Dual Source Two contractors producing the same components or end items for the same % V9 ]6 [# r2 hprogram. % H! K2 a3 f- c& d1 R3 R3 A1 i, nDUNDEE Down Under Early Warning Experiment (MDA/DSTO term).+ X+ ^. D% B" F5 ] DURIP Defense University Research Instrumentation Program.+ m& S: k5 ]* _% [ DUSD Deputy Under Secretary of Defense.$ B/ ^$ g4 n1 g0 q DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).; t9 ?- h& m& P6 F' P+ a# j2 V DVAL Demonstration Validation. 8 h" l: g! X+ M+ @8 E8 @DX The highest rating under the DPAS. It takes preference over all other rated and * [, w( ^9 F$ ~not rated orders on a contractor’s production line. The BMD program carries a : h, `2 ?; w1 v- d- n5 b9 e“DX” rating. H2 f$ E' U c7 T' mMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87/ O8 c2 S$ [4 w2 X E East, G% P+ N/ t3 ? E2 I See Endo-Exoatmospheric Interceptor.1 W' A2 O7 Z3 ^+ b) s3 L q3 M E2SRD Effectively Two-System Requirement Document. 1 t) q3 [1 e' H, |: P9 PE3 (1) Electromagnetic Environmental Effects. 5 Q6 q2 `+ A& B% \1 K4 l(2) Electrical, Electronic, and Electromechanical. k0 R4 o0 l! F4 G* } E Spec Materiel Specification.# k& U. @5 ` v. u1 T' G* v EA (1) Environmental Assessment. 5 K# b! Z$ O6 t. i: l(2) Engagement Authorization. , B% K9 B) P0 I* R; T& }, @ _3 N! t(3) Executing Agent.0 E" U5 S3 U ^& A h; K0 T4 w0 S8 T" b (4) Evolutionary Acquisition. 3 j$ ?( `( O% l3 D7 t(5) Environmental Analysis (environmental term). 8 `+ b; K" o$ e | W(6) Executive Agent. 3 f9 x: m5 u8 n% \2 BEAC Estimated Cost at Completion. 2 R, E% g! [1 v0 c! g* EEAD (1) Engineering Analysis and Design. (2) Extended air defense. ]& Z, H Z+ O. ?2 }$ M EAD/D Engineering, Analysis, Design and Development. ' z2 q$ f+ Z2 D0 M; zEADSIM Extended Air Defense Simulation. # _7 t$ l9 \" VEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing : o9 f, W+ h) fusers to model military response to airborne and ballistic missile threats.' l& K5 C+ t: S9 e( X2 T6 n- x3 p EADTBP Extended Air Defense Test Bed Program. . |% o2 a/ [ YEAGLE Extended Airborne Global Launch Evaluator. 1 [" D6 Q' @. eEAM Emergency Action Message." ^( P- C3 i, l! }2 m EAR Export Administration Regulations. 0 u) U9 b6 O) W2 }' a$ pEarly Operational0 r1 d. m# t6 w+ e' Z- V* D Assessment # z0 \! ?$ C. `5 R; O# gAn operational assessment conducted prior to, or in support of, Milestone II." ~7 D- z* g' ? y% M/ X4 z1 t) D4 ] Early User Test * T! w3 C$ n! N3 s(EUT)- d S* ]+ V. L$ ^- G A test employing representative users to examine materiel concepts, training or 5 W2 D P" z% h1 Q* i: Clogistics planning, or inter-operability issues. EUT can be accomplished during9 D7 Z% u5 c: R* x; ?$ E) j3 E DEM/VAL on brassboard configurations, experimental prototypes, or surrogates 4 j' Q( E) U* w. v. ]to provide data leading to the decision to enter full-scale development.' ]/ O6 G5 }0 ]2 @8 y5 S Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of 1 p# T# K5 Y Q/ i) C& Msurveillance satellites and long range radar. 7 r5 s# W2 W$ m, v$ k(2) Early notification of the launch or approach of unknown weapons or3 Z" [' R* B3 _; F) S( `. s9 O4 d% C8 @9 G weapon carriers.4 ~ l0 f% Y$ e* O0 T3 B! h+ C Earth Limb The apparent outer edge of the earth as viewed from space.1 w# M! G& M( m" m Eastern Test( `; J) w6 t1 D X! S+ ~: I% ? Range (ETR) 4 _& J) D" `1 n8 G8 a6 f! s7 KBeginning at Patrick AFB, FL, this range stretches halfway around the globe) c: W0 l1 z5 z8 D9 ^1 `3 L where it meets the Western Test Range. An array of launch complexes, sensors, + U# b- b) @9 _9 j- xand tracking sites make up the Eastern Test Range. The ETR is now operated# `% C7 E8 B3 ~ by AFSPACECOM as shown in WTR definition. ( x" u6 X+ M/ r) _; l, gMDA GLOSSARY, VER. 4.0 E0 }7 p- Q# {5 e, o- {% l0 q, \ 88 5 I; J X7 I9 R& ?$ m4 ?3 l/ H) P6 ?EB (1) Electron Beam. (2) Enhanced Blast. " |9 V# E$ ^& Z6 nEBB Electronic Bulletin Board. Q! q. b3 V4 k6 I. V o; [ EBCDIC Extended Binary Code Decimal Interchange Code. N1 g% ~9 U, a" D7 f) y0 V nEBW Electron Beam Welding. ( R. k3 x0 [% ]) S! \. yEC (1) Electronic Combat.7 _- T9 g5 g% j; f, a (2) Error Control.% F# A( w2 X& }& s; N3 r5 A( E (3) OBSOLETE. European Community. Now known as the European Union, {2 K6 M8 g' C5 B/ h3 I/ m! Y" ^ (EU).; u: X; @) M* u9 c" H EC/EDI Electronic Commerce/Electronic Data Interchange 9 l8 \; v$ B v! ?: B+ E+ O. yECAC Electromagnetic Compatibility Analysis Center.+ Y' N0 T% v) \& z ECB Engineering Change Board.1 p6 S" y/ M9 q2 h. J. N ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 6 r( F: [8 t* S( E/ z# xECCM Electronic Counter-Countermeasures. : k- x8 s$ p' m) O3 j! v2 [ECDs Element Control Directives. ; N5 Q% Q; }2 ]* F. [. f% LECLS ERINT Command and Launch System.- u7 w) v2 W( v7 d6 l" B* A( S2 b2 W9 u ECM Electronic Countermeasures. 0 S1 W: A( B: V: k+ vECN Engineering Change Notice.2 s: {( |/ Y6 u1 h9 L ECO Engagement Control Orders. ) t7 s7 Y! R1 c5 d5 ~ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. 8 C9 r5 F R' W. I. j! VECPMO Electronic Commerce Program Management Office." \5 Q6 x. I: X# t3 ~ S ECS Engagement Control Station (PATRIOT).- L* V3 g: W0 ?; Y0 n: c ECU Environmental Control Unit.1 b! Q, O2 t; i EDAC Error Detection and Correction) ^7 s" D) U0 R$ W: Q! H% A EDGES Electronic Data/Guidelines for Element Survivability.5 ^1 ]6 ?0 u7 t0 ^( w2 A EDL Electrical Discharge Laser) b) }5 L6 K6 }1 N% W: g EDM Engineering Development Model.8 L2 N3 _3 d. F9 U7 b! ?0 f3 e2 v EDP Engineering Development Process : m% J. c' v: P9 }EDR Embedded Data Recorder (PATRIOT). % T0 t C' W! X' |EDS Electronic Data Systems Corporation . p1 L' j! F9 _EDWA Engagement Determination and Weapons Assignment (PATRIOT). & ?6 x% W+ y& q$ {; `MDA GLOSSARY, VER. 4.0 E ; [! F1 w' J0 \. W9 D89, ]6 w) M! `0 j EDX Exoatmospheric Discrimination Experiment) Q! w: {4 F& D" D( K) v EE (1) Electrical Engineering. (2) Engineering Estimate.3 E! s6 j% F) }. U EED Electro-Explosive Device.9 V' \. e! L. g6 {" a: w EEEV End-to-End Experimental Version. 0 T0 Y' m _, P+ Y: zEEFI Essential Elements of Friendly Information.( @5 R; c' H. h' M7 @1 m, b EEI Essential Elements of Information. |* l8 a# y; G* [ EEIC Element of Expense Investment Code. 6 m5 k" ]7 T+ A. E4 a8 S" z0 pEELV Evolved Expendable Launch Vehicle (USAF term) 4 E4 p/ u1 h2 p8 {4 C" M* k8 EEEU Electronic Equipment Unit. # r4 t' [6 Q+ U4 N" TEFEX Endo-Aeromechanics Flight Experiment.0 f" r7 E9 c# u- }# x% B9 f( h: e EFF Electronic Frontier Foundation. 7 C; y# Q" q% C0 g) o# v+ g& `Effectivity A designation given to the BMDS configuration and demonstrated capability at P6 s7 }+ ^! P7 a; ^ a point in time, becoming effective at each increment when an element or 5 v$ W- y' X* G; P Acomponent is inserted into a particular Block. ! u; [4 ]1 L& UEffective Damage That damage necessary to render a target element inoperative, unserviceable,' H2 T$ C/ X" C& N2 C4 _5 } nonproductive, or uninhabitable. 8 }1 k- [: k+ }0 D/ Z& Y: ZEffluent Plume The pathway of movement of effluents through surface water or air. , ^# F/ L7 u; Q7 L8 REFP Explosively Formed Projectile. u% S: U" Q9 P7 I/ W |; _ EGP End Game Processor., q& Y" j J( J( n( M# ] EGTR Eglin [AFB] Gulf Test Range.. X4 e( I( R. k' l. J$ D4 Y EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). 8 s" S% w; Y& _EHF Extremely High Frequency. 4 w: }: q: T3 l' Aehp Equivalent Horsepower. ) o2 k- L: H5 Q. Z8 }; JEIA (1) Environmental Impact Assessment. ! D! M8 B/ K: R/ e4 R6 A(2) Electronic Industries Association.1 T! R/ ?: Z% H/ T& g9 A7 Y4 A EIAP Environmental Impact Analysis Process. 6 [+ x, T% M, ]# P5 D* GEIP Exoatmospheric Interceptor Propulsion. + ?1 W& _8 c; F% p, U: G5 LEIPC Electronic Information Privacy Center.5 l& [/ ^# K$ U( c% V EIPT (1) Element IPT. (2) Engineering IPT. % s5 @- x, b" }9 W" q% s- E, b7 f- O( UEIS (1) Environmental Impact Statement. (2) Explosive Initiation System.% \5 y& ?. j6 s2 K. | EISA Extended Industry Standard Architecture (Telecomm/Computer term).. P! U, f$ D" }9 G MDA GLOSSARY, VER. 4.0 E; t7 ~# D3 |1 t) K! r( }; Y* M, n 903 A }$ k2 P7 T/ I$ P/ V. s EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.) E* Z P6 k* ` _) V U6 W5 M% w: j Elastic Range The stress range in which a material will recover its original form when the force . o9 d! M0 i5 ]/ M) V, \4 A( A(or loading) is removed. Elastic deformation refers to dimensional changes/ T3 y" R% o- u9 m. d# K3 ` occurring within the elastic range. , }. F1 T" ^2 ?, K& P, DElectro-Optics & L% P& S' c* YInfrared (EO/IR)$ p# @ W9 f" O Technologies/techniques employed by optical sensors in the wavelength * z5 p+ R% X0 d) W# ` ?, Q3 K. A; Cspectrum slightly longer than visible but shorter than radio. : t9 l9 e+ c. q( ?' ^! ? zElectromagnetic% T' v7 d" r/ l( D2 P1 V Compatibility* D5 t" S9 w, j6 I, v6 y" J (EMC)) Y" M3 r* W) |/ y, Z$ o; E7 ?8 |4 J( ~ A condition when all electromagnetic emissions from electronic, electro-magnetic,- u% J2 s0 W' l! u3 N) z and electro-optical components of a system interact without interfering with one& B" b3 o, `. W6 S* v# B0 n another.9 t' ?/ q; t+ v" { Electromagnetic" c C' g* ^. T/ p: c' R }7 S' }- t9 x Emanations 8 |4 x" C2 N( E. D+ {Signals transmitted as radiation through the air, through a vacuum, or through 3 k$ Y2 x% z$ `1 p& I( ^conductors. - v% k; f" C z7 [) d" a% yElectromagnetic 1 B1 C- C8 y6 \. uField (EMF). O* m E. ~0 w8 i An electric or magnetic field or combination of the two, as in an electromagnetic' Q% G. _* R4 W l6 |3 Q. _" y; s wave. Created by electric charges in motion, having both electric and magnetic - a' _5 H3 F7 x* U: s/ g! Dcomponents oriented at right angles to one another and containing a definite! d& m. b; s) w/ R* V7 h q( } amount of energy." @$ I6 A9 R( Z) j N7 R Electromagnetic / N! V& ?& k* q# ]Gun (EMG) - X: e6 z M4 \# k5 f2 _A gun in which the projectile is accelerated by electromagnetic forces rather than + r! n& _5 s, T! tby an explosion, as in a conventional gun.( p/ p5 i; O7 p Electromagnetic ' t, |/ Y) H: L5 c0 y7 w, H4 wInterference (EMI)+ z! f) C, d o% L: [& u5 ? Any electromagnetic disturbance that interrupts, obstructs, or otherwise 8 L$ f$ [ H5 G6 kdegrades or limits the effective performance of electronics/electrical equipment./ [' J( k! h% C( J ? It can be induced intentionally, as in some forms of electronic warfare, or Z3 Q( |* _, ^ i) E1 W' k: Y unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. ; S2 u. n1 k9 g' tElectromagnetic ( d4 d1 E: {/ n5 o: N# }Pulse (EMP)- G8 j& b( t9 o! ] The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of3 L& J2 l6 S) |. ~. \3 A4 | the nuclear device or in a surrounding medium. The resulting electric and* ~5 \2 D5 u- g# u magnetic fields may couple with electrical/electronic systems to produce9 i$ i) i& {6 k% Y0 D damaging current and voltage surges. May also be caused by non-nuclear( M' T8 Z1 V# |% k" n/ g means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic, [& Z7 \! |. T, U1 J Radiation (EMR)6 h5 U9 G8 c1 V" R! J6 j# i" N (1) A form of propagated energy, arising from electric charges in motion that: a+ m7 Y/ U5 M9 B produces a simultaneous wavelike variation of electric and magnetic 7 F- s% M$ l, K) x7 u! t/ |fields in space. The highest frequencies (or shortest wavelengths) of. Q5 e/ X% D7 } u& s1 d- p such radiation are possessed by gamma rays, which originate from 9 I# V0 ^& C6 u/ Z" [processes within atomic nuclei. As one goes to lower frequencies, the ' I3 Y2 @8 O% A+ G* o7 P3 Helectromagnetic spectrum includes x-rays, ultraviolet light, visible light, ! x+ K1 Z& ~: Sinfrared light, microwaves, and radio waves. . c& B# b; I& b(2) Radiation made up of oscillating electric and magnetic fields and 2 ?* }# p8 i! F' _6 C: y; Kpropagated with the speed of light. Includes gamma radiation, X-rays, + D+ x* H9 X7 I/ J" z' Pultraviolet, visible, and infrared radiation, and radar and radio waves. * X: T/ D% C( w/ _. S0 sElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices% Y" ?: C/ H3 ]. V/ y0 M2 J used in system/subsystem design, excluding employment in the RF spectrum.$ b. ?* ?) L8 ^% X: U Electromagnetic 6 u+ h& T, I5 d" ISpectrum+ L: j: W1 g, G: [. F/ P The range of frequencies of electromagnetic radiation from zero to infinity. It is/ w T z! `* c divided into 26 alphabetically designated bands.8 d* |# L: g: r. ^ MDA GLOSSARY, VER. 4.0 E 9 x0 Y6 k% o. S' W# z- ^91! \/ ^/ |* G$ L F) L Electronic % a- V- I: H! q( d4 HCounter- 8 a s7 G8 a5 F5 r; H+ Q! i: iCountermeasure / G1 w; S& D" w; U( z9 c5 us (ECCM) 0 f3 k$ f) L1 M2 OThat division of electronic warfare involving actions taken to insure friendly 8 D: ]- U4 ^, t+ h7 p7 Ieffective use of the electromagnetic, optical, and acoustic spectra despite the 7 F; u6 p8 ^2 @; penemy’s use of electronic warfare to include high power microwave techniques.4 @9 G" v3 z3 u, Z Electronic& l+ p8 f2 l8 s2 ?+ N Countermeasure ( W% R; ? c3 |) x5 V7 p; s3 a(ECM) + O+ P' M! Z, b9 v! k3 M$ ]That division of electronic warfare involving actions taken to prevent or reduce an1 v; z! v* C+ G- t0 m( ]' B. F enemy’s effective use of the electromagnetic spectrum. 0 ~1 O( e+ [' PElectronic8 J# m( J& D8 j Industries" E7 |8 a. M1 I Association (EIA)% U8 d" [1 G+ W. k# o! r S s A standards organization specializing in the electrical and functional, R" L- L8 @3 F# X* l characteristics of interface equipment.9 h* l4 A# j u2 E4 Q Electronic+ _- `2 J2 [+ Q1 a% A. o4 N Warfare (EW) - B$ z: @2 D YAny military activity involving the use of electromagnetic and directed energy to & R% q9 y" f: c4 o4 g6 _control the electromagnetic spectrum or to attack the enemy. The three major $ d7 @% ]/ u8 O7 N% c( b, Gsubdivisions are:9 M# D7 `0 `0 r0 x& N) d4 O5 L3 c •Electronic attack – Involves the use of electromagnetic or directed energy to: Q" R6 W z! K N( f {: N) X attack personnel, facilities, or equipment with the intent of degrading, 4 h* j4 c! A, H% l' |neutralizing, or destroying enemy combat capability. Also known as EA.5 o7 ~ A R2 ?# s5 m1 ]4 t- K Includes: 1) actions taken to prevent or reduce an enemy’s effective use of ; P2 _+ a; K7 _! e$ z4 B( U% Uthe electromagnetic spectrum, such as jamming and electromagnetic& a5 L. s7 b5 \5 |3 t, q/ Y deception, and 2) employment of weapons that use either electromagnetic or ( \* K' X; U- ?: I; Adirected energy as their primary destructive mechanism (lasers, radio # K |* {2 {0 C8 p7 d" }# Ofrequency weapons, particle beams).8 |" @( j$ p2 K- q; c •Electronic protection -- Involves actions taken to protect personnel, facilities, b2 W7 w% r' l5 z3 N a( ~and equipment from any effects of friendly or enemy employment of& @' b/ L4 G$ c$ l/ {! I electronic warfare that degrade, neutralize, or destroy friendly combat 5 p; Y: m& c; v! |/ q9 y! \' R) X4 Lcapability. Also called EP.8 p% U8 `" y3 n& K, { •Electronic warfare support – Involves actions tasked by, or under direct ?4 @! A P M1 Mcontrol of, an operational commander to search for, intercept, identify, and 9 a& F$ G) D6 U3 `- ulocate sources of intentional and unintentional radiated electromagnetic " [: g0 `( P; e2 ^' X. w* H# [8 Y8 Renergy for the purpose of immediate threat recognition. Thus, electronic3 {4 |4 r% L2 ?6 t1 R0 N warfare support provides information required for immediate decisions! q0 b/ P: F( `1 v8 D involving electronic warfare operations and other tactical actions such as . x% B& g( T' z. ]& }. d3 }, athreat avoidance, targeting, and homing. Also called ES. 7 D/ i; r& b( ^! IElectronic" y ^- ~% b% c( V8 V Warfare (EW). B1 U) _( Z0 W, a& L8 y) _ Environments9 s( C% Y5 U4 l9 a" p. j Electronic warfare environments result from radar and communications jamming 0 P; A' s" N; L8 land other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD ) h& _; `7 r& @' f1 L6 \system. 0 E( g5 t8 m2 l+ sElectronics, l, V4 v- t! R4 ]) f Intelligence/ c8 B" n& Y( U2 L& N% l. L (ELINT) . s4 \4 x+ d+ k3 u% |! FTechnical and geo-location intelligence derived from foreign non-communications ' Y0 a* P5 L# N' R; Qelectromagnetic radiations emanating from other than nuclear detonations or 0 t+ r6 H' }* j; ^' y/ U4 Dradioactive sources. V# ~$ r G* A1 _( u% Q7 J8 P Electronics* M4 o: }1 W8 V0 l6 ? Security (ELSEC)! L6 i9 S8 C5 n1 @2 [ The protection resulting from all measures designed to deny unauthorized 2 \! e) _7 W- Y. O% k$ i. Fpersons information of value that might be derived from their interception and7 E3 i& y+ E7 | study of non-communications electromagnetic radiations, e.g. radar. 7 J7 X% a% D+ h! F4 N; [8 D$ EElectro-Optics$ D7 M, @% h* u. m4 i7 U Infrared (EO/IR) / D+ d; O; V; Q$ p* CTechnologies/techniques employed by optical sensors in the wavelength1 n7 {( F6 b- S- v# c- | spectrum slightly longer than visible but shorter than radio.. O; |/ n# \+ l3 S2 u MDA GLOSSARY, VER. 4.0 E % q: L% b8 l6 O4 U2 Z8 w! C7 G92$ F& S- f/ J5 g Q2 i! n Element A complete, integrated set of components capable of autonomously providing( ]2 |! |& R3 Q7 r! a BMDS capability.- c3 T- }* ?. W' I: F Element g5 P/ F9 N' ^0 X# jCapability8 t8 D6 `% T9 o( E2 r9 c3 y Specification . A, D& \! d" X(ECS) b d. k9 m# k: _1 KA document that identifies the element-level BMDS capabilities and " p" O! e3 x, A+ }- Q+ [specifications necessary to achieve the system capabilities identified in the SCS. # s/ z( |# | s1 s9 f9 ~8 }5 U$ }The ECS further defines the SCS-apportioned mission/technical performance 8 ~: M9 g$ A" {capabilities and allocates these capabilities to the element’s components., Z: ~" ?0 n- W& |) ? Element Control 3 H7 ?7 k, z4 J& C0 n" pDirectives (ECDs) , Y2 \; c# q& u8 _9 H0 ~The command and control data instructions to control the conduct of the 0 ~% B5 e! ~8 c( D0 S' Nengagement. ECDs are developed by command and control software based - q* f5 O+ M. c: K% Zupon variable parameter input by the operators (both pre-planned and real time), 7 P+ D+ o, j/ R( w5 Gand operator defined rule sets embedded in the software. The individual battle " T! J1 m" K& z: F0 nmanagement processors use these instructions to accomplish the assigned tasks' X3 ]! \1 O# h3 m from the operations order. ECDs are contained within a Task and represent the$ U0 F7 l7 Y6 B: }7 ]$ P form of parameter values that influence the resource management processes of, w) G" L" e6 t9 d8 r# s Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and& z) r& X* l8 s# Z/ o Communications Management (CM). There will be numerous ECDs per Task.* M+ e6 c+ p4 C3 c, M" z/ ?, T8 n Element/ e# q, A0 h) ]; l2 ^ Operations$ I( f: q3 Q9 _% m) { Center (EOC) ( d; z. x; R* G8 [) |An Air Force operations center, which operates and maintains a BMD weapon or* O% Y# ]* c% z5 ~ sensor suite. (USSPACECOM)# J0 B, n- J2 d' y1 h ELF Extremely Low Frequency. ( O* e" I0 D2 j5 X; B C8 qELIAS Earth Limb Infrared Atomic Structure.' {8 y; w5 E5 J& {: E ELINFOSEC Electronic Information Security. , b6 X# y A% Y4 ~# WELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-3-9 10:31 , Processed in 0.052003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部