航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation9 T# i4 r2 U" E1 X f5 x; j* o7 [ COMSEC Communications Security.) r5 [: |1 W$ v Concept0 }4 Z, k. k( ~9 e: R Exploration & ! d& `. U: G' B- x4 S/ A; |Definition2 ^9 |* f8 C1 a3 f% z0 N( ` The initial phase (Phase 0) of the system acquisition process, beginning at1 H$ |5 q3 j( x" r5 V0 } Mission Need Determination. During this phase, the acquisition strategy is : C' r5 M7 @) K* ]6 ?* e/ A& Gdeveloped, system alternatives are proposed and examined, and the system: v5 u- \* a% g program requirements document is expanded to support subsequent phases. / v- i/ o, ]6 u b& u5 iConcept of0 t- T( i0 n& C Operations/ [$ I) {& L' D: U5 U% i9 q (CONOPS) : m3 P- a: d5 d- e$ z(1) A statement, in broad outline, of a commander’s outline or intent in regard to : a( t; L1 y4 q9 Y+ Pan operation or series of operations. The concept is designed to give an overall3 d! ]/ o+ T. O1 _& i picture of the operation. (MDA Lexicon)0 g2 A" }9 X, J (2) A verbal or graphic statement, in broad outline, of a commander’s; @9 c. ^! [% O) V assumptions or intent in regard to an operation or series of operations. The 4 I6 `9 c5 M# C' M, ~concept of operations frequently is embodied in campaign plans and operation $ ~; I+ C0 Y1 m* v2 h+ G+ s0 Iplans; in the later case, particularly when the plans cover a series of connected# o8 Z* |- X3 M1 o# s( C operations to be carried out simultaneously or in succession. The concept is0 t8 w$ G; u* q# O1 _' e4 e$ E designed to give an overall picture of the operation. It is included primarily for ! S5 [/ R4 J c% O& K% kadditional clarity of purpose. & B; _# v& n/ s* hConcept Plan An operation plan in concept format. Also called CONPLAN.1 a* r/ q: q0 s/ K7 q) ], I Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of, z3 \5 H9 |1 g' v% l0 o: f4 | the acquisition process, or combines development T&E with operational T&E. 0 A9 O' e/ K0 l. ^) qConcurrent 8 Q$ U7 k( d( V! FEngineering+ i0 C4 k5 H' Y# x. m A systematic approach to the integrated, simultaneous design of products and" L: f+ i( D0 t( y& D1 u their related processes, including manufacture and support. This approach is& f9 k4 `# R% q. g9 ?, p intended to cause developers, from the beginning, to consider all elements of1 B/ v# @' z! W2 B* _# h the system life cycle from requirements development through dispersal, including % M# W7 G! {' l! D% U. D" o& ecost, schedule, and performance. + ~, d5 e, b- f; FCONEX CONOPS Exerciser. \3 Z6 q- J t* G; _. ]$ W% q+ k% o Configuration A collection of an item’s descriptive and governing characteristics, which can be$ d' X- v" v0 J) L3 C% B expressed in functional terms (i.e., what performance the item is expected to' ?4 \6 S# _" ~# x. D) J4 [ achieve); and in physical terms (i.e., what the item should look like and consist of 7 \+ r9 l Q. Y7 g& Q$ L5 Dwhen it is built). : u7 n+ [) Q F+ v. \MDA GLOSSARY, VER. 4.0 C n% ]" Q+ m6 L q59 8 O9 A# S6 ^( K( a# q9 [& r" PConfiguration4 k2 s+ ]7 T, \4 f6 { Audit' k6 I1 P+ V* {5 g7 `% R c One of the Configuration Management tasks which includes a functional ( d3 e3 m" G t# t0 \: X( Pconfiguration audit (FCA) to validate that the development of a configuration item ( f0 n" }6 O' @' A0 ]0 n5 g2 L2 Hhas been completed satisfactorily and that the configuration item has achieved 1 ?9 y( t. {" b7 F* Uto specified performance and functional characteristics, and also includes a ! j8 e3 {- t3 Dphysical configuration audit (PCA) to verify that the configuration item “As Built” n9 K* ?* u9 r, G. [0 O! [ conforms to the technical documentation which defines the configuration item. ?' Y' H) Y E+ f( ~3 vConfiguration2 t0 @* M! Z; V4 A Baseline 5 G# n& o* G/ T6 A; Z( p# NThe configuration documentation formally designated by the Government at a5 Z+ N1 O: S7 ?. i3 a specific time during a system’s or configuration item’s life cycle. Configuration 2 |2 m7 ]* _3 Q8 \, b+ R6 m1 ~baselines, plus approved changes from those baselines, constitute the current * `' R5 T- m+ r: _5 vconfiguration baselines, namely the functional, allocated, and product baselines., D w& \, f; d1 G* ? Configuration: u. L: r* Q: z( J8 G3 g: X Control& C1 ]/ R: k U5 \7 {+ G One of the Configuration Management tasks that involves the systematic ; |% m0 ?( f Aevaluation, coordination, approval, or disapproval of proposed changes to the ; _2 K" q% I" D% odesign and construction of a configuration item whose configuration has been 1 j: c0 F2 k5 y/ Pformally approved. % j6 ]' P6 B- d. X7 q4 g9 `0 t: @Configuration4 K" m4 x& N- W! i5 q2 k Identification ! h' W6 N% Z7 VOne of the Configuration Management tasks, which require that for every 3 Q# u# R! [2 ^2 v5 I+ ochange that is made to an Automated Data processing (ADP) system, the design * r. {, ]+ w/ Z- ]+ F; Yand requirements of the changed version of the system should be identified. , O Y; L* L p6 h2 ^7 y! |5 |Configuration 2 L6 J2 ?2 N" W$ `( [$ Z9 jItem (CI)6 I' {% c% J8 \% G, s0 u An aggregation of system elements that satisfies an end use function and is! }! x R% W4 j2 y designated by the Government for separate configuration management. & a4 g( x7 c0 Q1 m3 NConfiguration items vary widely in complexity, size, and type. Any item required0 k- `4 i+ b; \ for logistic support and designated for separate procurement is a configuration 3 U+ M6 e Z" y6 ~+ ^0 r6 xitem. Configuration items are traceable to the work breakdown structure (WBS). - B8 Y$ E) m' l% X. t' iConfiguration , D% o! m4 h0 f+ g3 OManagement# B8 U v3 S/ ^: C0 x- J3 @* h) ^ (CM) ; g- T( n1 M- t) k LIn computer modeling and simulation, a discipline applying technical and ( S# _8 n f9 o* i' o Aadministrative oversight and control to identify and document the functional: C- s4 C- a, A' \' w2 ? requirements and capabilities of a model or simulation and its supporting - q. h9 `+ [1 q: ]: S- _databases, control changes to those capabilities, and document and report the. A2 U6 M. B1 E* G- Z, V7 d- Z changes. See also Accreditation. ) h. {0 |6 p( o) {, s# eCONOPS Concept of Operations.0 m$ G8 j+ @3 Z a8 U CONPLAN Concept Plan3 {/ A* i3 ~7 \5 N CONS Contracting Squadron. ?! g* `* J e J( [ Consolidated' R' L8 ^) D( x' j* K; r9 G' V0 r Command Center6 ~- w+ v# H4 t (CCC) ( f& `- G- w7 X" L5 \A single command center from which USCINCSPACE/CINCNORAD can direct all 2 g G7 N% \; V; \his assigned missions, to include BMD. (USSPACECOM) Located in Colorado & V- ?+ b" [) J) y- YSprings, CO. 7 ^: b4 _# G+ aConsolidated8 D6 [; y- Z5 n& q: o$ a Intelligence ; w9 x! l) B/ [+ p8 P5 r \' oWatch (CIW)& D* X1 k! j' C% g$ N A consolidation of intelligence watch functions within the Intelligence Operations$ j f% |3 k+ F0 m Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD $ I* P1 q" {+ O8 O9 ?! e% yAerospace Defense Intelligence Center (ADIC), and the Air Force Space z [4 j/ W! W0 ?6 A, {/ U; z7 _Command Space Intelligence Element (SIE).8 J8 \' o6 ?. h4 i# E Consolidated : T) T) |9 a" h- M. H2 CSpace ' U6 T/ M; ?" |5 SOperations 1 [( \4 @6 n6 w3 L. dCenter (CSOC)# p, E( D. W0 p8 G+ D; _) I/ U) O Series of centers at Falcon AFB, CO, which operationally control and maintain) O0 z. K/ b% o( P8 x assigned DoD satellites. 0 x% _% m1 [, U3 T+ cConsolidated/ f7 F. k; C8 ~ Space Test+ ]' w) a) M- y% D. e Center (CSTC)) `. u1 J' Q5 U+ B, n8 c5 N" D Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and ; r4 Y, d3 a3 Ainitial on-orbit checkout of operational satellites, operate R&D satellites, and& B7 C# t0 a4 s# x& u0 n) j3 Z serves as a backup to CSOC for operational DoD satellites.) K+ n2 ?! H. ^- e6 E x MDA GLOSSARY, VER. 4.0 C . w) G* s% A3 F: u9 E% V60 6 l% \! N5 n/ M$ G' }Constellation( ?$ Z7 {/ I j/ Y8 j8 Q7 Z2 c Size (CSIZE) u; Q) i$ z8 E' \9 j+ ZThe number of satellites of a particular system placed in orbit about the earth. ) y1 h3 }1 {% [* P% ]- k" eContact Fuse Device used to detonate warhead on physical contact with another object.. N+ s. q4 j+ k. s \7 e0 l p+ r( Z Contingency . a4 @- p( G" q" j9 DDeployment Plan( z E& _' R8 ?/ H9 q (CDP) ) H' u4 @: t5 S2 y5 JAn executable plan designed to deploy an early missile defense capability and , X, V$ g6 n! U+ Ereduce deployment time. The plan provides specific executable deployment: _. j+ X8 g3 s options and describes activities required before and after a deployment decision. ; f" W5 u, d& F) ]The plan also allows decision makers to have oversight on technical progress," b8 X4 P' [! v d cost, schedule, and risks associated with a deployment system. ( U$ J9 V$ ^: L( M6 pContinuity of* d- \$ q" V3 p2 n/ ~7 m Command. B1 S! l7 w! A( U1 N0 O/ L" N The degree or state of being continuous in the exercise of the authority vested# l" V& g1 u$ h* K9 ~ in an individual of the armed forces for the direction, coordination, and control of 5 N' Q' h2 [2 D7 M. p1 W/ `military forces.4 X+ o( s. q! F# l& v3 C4 N" x Continuity of& g. u! |4 f& Y6 W# g# A Operations) ?/ |6 M1 `3 V4 L3 W% N0 V The degree or state of being continuous in the conduct of functions, tasks, or 4 g" G4 r6 O u4 u# b$ X4 i% fduties necessary to accomplish a military action or mission in carrying out the8 @0 y" O3 f( P$ n8 _ national military strategy. It includes the functions and duties of the commander,4 l; b; u1 W/ f* }, T, n F* ^ as well as the supporting functions and duties performed by the staff and others( K& t( \5 X8 L* { [; a/ R" u acting under the authority and direction of the commander. " R1 a8 S3 M1 g- _Contract# x, V/ m5 x. X2 p6 z! x" U Administration8 [0 u" W$ O* f/ k+ z7 C* ? Office (CAO) / Q; v% U- a0 S* J0 L, f% ZThe activity identified in the DoD Directory of Contract Administration Services 3 A) ~; c7 Q$ cComponents assigned to perform contract administration responsibilities. It is a6 U7 f4 k, \- G2 L general term and includes Defense Contract Management Regions (DCMRs), 0 T3 A R2 h. n% n: m9 }Defense Contract Management Area Operations (DCMAOs), and Defense Plant 1 n1 N7 E9 q" C) t9 |; v% U* uRepresentative Offices (DPROs). (Defense Systems Management College 3 [' z' Z" l# ]% L5 \( u% PGlossary)1 Z; X7 g" D5 ?) h" | Contract Data $ c- w s8 a; D( Y# ^- q5 ^1 ?Requirements6 n# @. t: @6 h p7 r List (CDRL) ' E' E% z8 @4 o& Z- Q0 p& }& yDocument used to order (“buy”) and require delivery of data. Tells contractor / ?- o, U. V- Bwhat data to deliver, when and how it will be accepted, where to look for % t. ]4 m3 }( M# c" c* N* `) P/ h! vinstructions, etc. 3 n0 A T' L) R: W$ T5 q z: R7 fContract 9 n# F7 X. E* z* T* W, z* R! KDefinition/ q# U- {; v% d8 P& }: [ A funded effort, normally by two or more competing contractors, to establish " j% @7 A7 H1 Z% I9 @. N+ t7 Wspecifications, to select technical approaches, to identify high-risk areas, and to# {7 d4 ]4 U* m! O make cost and production time estimates for developing large weapons systems. ) P- }, S( `, `- o; EContract Work ( Q: \( J$ c. ]* V# dBreakdown: m# b- O) y# ~& o* @- z4 b Structure# x" Q5 H+ p+ k9 q, T9 S, K The complete WBS for a contract developed and used by a contractor within the - l! X, _& F5 a8 L) D! W( Mguidelines of MIL-STD 881A, and in accordance with the contract statement of7 J) q) f* G) n work.+ D* g) |9 L' J+ l Contracting w' r8 C( i" P! m7 t$ o) l Officer (CO) . X1 s( \6 x7 b5 v Z- kA person with the authority to enter into, administer, or terminate contracts and; e" }- N/ A% o make related determinations and findings. The term includes any authorized& ?- A9 g( F9 a7 X representatives of the CO acting within the limits of their authority. A CO whose* F1 l" p3 L% ^ primary responsibility is to administer contracts is an Administrative Contracting . d) H# k, y+ Z- B4 v% ^4 }# X) cOfficer. One whose primary responsibility is to terminate contracts and/or settle 5 g4 N I H" Z) q$ C% w. p( J! Oterminated contracts is a Termination Contracting Officer. A single contracting) X8 {2 i0 N3 \ officer may be responsible for duties in any or all of these areas./ E3 p5 l) L3 V: C5 \ s* J7 b( R Control Authority that may be less than full command exercised by a commander over, _! n1 {4 N! z7 b8 V% f part of the activities of subordinate or other organizations.- ?/ Q1 M' L8 `; c/ P7 N0 o Control : x2 [6 Q6 ]. h; WAbstraction' ]$ j4 `3 \3 @, I* o, f (Software) The process of extracting the essential characteristics of control by ( c& X/ `" }3 q- t; F) }: gdefining abstract mechanisms and their associated characteristics while/ [1 s6 W6 T, C/ j6 j" p# X) J disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C$ L- H0 L+ ?9 ~' p7 `) X) g o 61. v1 g4 [5 _- b( n( z Control and; e+ P8 d5 X% I! U8 N+ }" i Reporting Center0 H- {- u: A0 G t) `9 p8 G# q An element of the US Air Force tactical air control system, subordinate to the4 M' ^ t( g) ?' I- h tactical air control center, from which radar control and warning operations are; w Z9 W A% z& T t. s) e conducted within its area of responsibility.* X1 T; H. F9 d% ?: P- {$ g Control and 9 U! b4 ~5 t! z; b/ R, j% h6 DReporting Post + [9 B" u' l+ u& b1 ~( p5 fAn element of the US Air Force tactical air control system, subordinate to the # b$ Q" n; w5 H" W* Ucontrol and reporting center, that provides radar control and surveillance within( Y/ V w! {6 G' w, Q5 x its area of responsibility.% Q( e/ }3 \; Q5 \" }5 p Control Area A controlled airspace extending upwards from a specified limit above the Earth. 6 q8 T8 q( p3 O! l& c# h" K7 N0 _. gControlled / `0 T7 d) z2 s9 b) gEnvironment 1 P% x* F/ @+ u5 }! E# i' g6 f7 lArea where entry into the radiation hazard area is controlled. 5 ^- ^ K' d7 q& \9 B/ n4 bControl" X" O- X ^. ]9 ?5 @1 N Procedure ! I# }9 K' w( R. u) h: bThe means used to control the orderly communication of information between - z$ C+ b9 }" zstations on a data link. Also called line discipline. ' W# B* V% t: h% v' J# t( CControl Station The station on a network, which supervises the network control procedures such! R* R1 d. J! U as polling, selecting, and recovery. It also is responsible for establishing order ) w! q% i! T7 D9 \& Zon the line in the event of contention, or any other abnormal situation, arising0 o& f1 _6 L& j between any stations on the network.# }, b1 y: a* d Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to2 n& t+ C+ W' K6 x process sensitive defense information and that is under sufficient physical and : b/ ^# U0 K9 o. N! E! e9 Jtechnical control to preclude an unauthorized entry or compromise. / Y6 I0 O+ E! D0 @( @CONUS Continental United States. 4 I/ f, S7 ^5 w7 o0 [% ?Conventional Co- % |; P O7 ~% t* c6 U# y1 uProduction 7 E7 M" n2 k( H# P3 a+ BAn effort between governments to produce the same end item, or components1 _& X$ g9 }% S! B4 T3 B' o6 D+ C of the same end item, in concert. 7 _0 b/ k, r5 h; n; bConventional ! _, ?% k/ a$ y8 n+ Q4 Z' c" pWeapon" }, k7 o9 r" `3 q+ c' i A weapon that is neither nuclear, biological, nor chemical. * G* B% {, L% l5 cCoop Cooperative - U; t( o+ S! f; @1 jCoordinated * y$ y" x9 Y1 B9 ZEngagement. h0 h- b$ _4 F z! ], p Planning/Actions0 W% S' q; [! b; |; b Necessary coordination among engagement components to ensure maximum9 D' H l6 C) ]* c4 ^9 e2 C effectiveness of the SDS and resources are not wasted on targets already 9 W! r8 {. G+ S$ mtargeted./ n6 i- a0 l' Z" s W# E Coordinating * ^4 h7 `. _+ G5 H8 ~Authority - P7 n' l, G9 d }& X9 h# P6 `! FA commander or individual assigned responsibility for coordinating specific9 a2 |. T& P _! X/ N functions of activities involving forces of two or more Services or two or more 6 z. W; s' K7 |5 s2 Bforces of the same Service. The commander or individual has the authority to& `7 y/ X# g( s" x1 T: X' v# X5 ]2 B require consultation between the agencies involved, but does not have the( U% V6 I/ o9 A. Q. g authority to compel agreement. In the event that essential agreement cannot be ( I( J( K0 [" C5 C! J2 m8 Yreached, the matter shall be referred to the appointing authority. # w' z9 l6 ~* k, S5 \COP Committee of Principals# u7 _4 k& G% k$ d z COR Contracting Officer’s Representative. Contracting Officer.+ h' U2 Q# r! L CORBA Common Object Request Broker Architecture. d* T. j! o" ~7 e; uCORM Commission on Roles and Missions. $ @$ G6 Q) S% y, j7 V4 m7 c6 oMDA GLOSSARY, VER. 4.0 C 4 a2 a6 K$ ~* w* d* T+ v( d62 " G& {, v- P: Z' A4 o8 A. C. t& xCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens& d6 |) P' X# a2 x perpendicular to one another, designed to act as a radar target or 7 I/ O3 r/ P# i" l5 g) mmarker.2 `/ i4 E+ j+ H9 y, k (2) In radar interpretation, an object that, by means of multiple reflections + T4 ^# M# V* \from smooth surfaces, produces a radar return of greater magnitude than + [9 r2 i8 z! Q% u8 imight be expected from the physical size of the object./ m4 J9 H* i7 F. @( T/ F" L0 J) p Corps SAM OBSOLETE. See Medium Extended Air Defense System." @: U( B6 }* E8 P \ Correlation (1) The process of relating observations or tracks from one set of data to* ~/ ^ y' G4 n& d3 e- X% u observations or tracks from another set of data, i.e., collecting data from% _; M) b b% D: @, i: p8 Z different frames or sensors that presumably relate to the same target. (2)0 o! `) [. w, m7 V# {$ J l$ K0 r In air defense, the determination that an aircraft appearing on a # I, v2 S9 l; rradarscope, on a plotting board, or visual is the same as that on which + I) \3 U5 K8 ^* C' ^- yinformation is being received form another source. (3) In intelligence & O Z! v ^5 b: A8 Nusage, the process which associates and combines data on a single ; b- m; l7 V; ]5 q- w1 sentity or subject from independent observations, in order to improve the 0 K0 N& u; x+ `2 ereliability or credibility or the information. / Q. w: _; K2 @( k1 n3 {COSEMS Evolving architecture operations support tool." E) [; T. ?/ Y+ z1 A COSM Computer System Operator’s Manual4 k4 t+ m& ]0 C7 d: ]/ i COSMIC NATO security category. 4 U+ Y4 x5 s4 CCost Analysis; i3 A; W$ ^* [ Improvement * E8 o# L4 B( R/ D, oGroup (CAIG)/ o& O$ s. t$ ^( A* H5 f! u An organization within the office of OSD Director, PA&E which advises the DAB , x5 a7 b6 k# f7 w) zon all matters concerning the estimation, review, and presentation of cost / M+ A: {' ]% n o8 P/ Lanalysis of future weapon systems. The CAIG also develops common cost3 C/ y4 K0 {5 k estimating procedures for DoD.5 _* I+ j9 I9 ~' q2 } Cost Analysis : U, e; S u' [) {5 U: G1 @% VRequirements6 V6 g; n2 ]: E6 q$ o* Q9 r( Y Document4 y2 G1 e7 w2 j6 s! n (CARD)# M( E5 J" |: U; d! z) {! @ The document describing the technical baseline, which is a subset of current 6 k; L8 N4 h" ~0 c+ a! o. E/ tsystem technical data and is used to generate the baseline cost estimate for an 1 }. X, \6 _) o( A; x: S% ^SDS element. It includes, but is not limited to, the element description,6 K' ~6 w& B( k# l, j/ w: \' Q L interfaces, operational concept quantity requirements, manpower requirements, ! B) a8 n! b0 {+ V: W7 F) V* \activity rates, schedules, research and development-phasing plan, and facilities ) u1 r* o# b( g0 z! rrequirements. J- f2 W$ E; n) h* M& ] Cost and 8 f) `, t; ~+ Z6 @Operational/ E2 y! J0 l- \- }! r6 j Effectiveness 0 B, r1 I. \, W9 e, PAnalysis (COEA) + D, w2 x& J& H1 B, z$ j- V$ [An analysis of the estimated costs and operational effectiveness of alternative 6 d$ I% I: M! Y* @2 Amateriel systems to meet a mission need, and the associated program for% X: Z5 u5 I$ \4 F9 B7 | acquiring each alternative. % C: h8 _% D9 DCost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk- C, Y0 ?8 P9 O* g& v due to cost estimating errors and the statistical uncertainty in the estimate. : z% o' q, S' _# x eSchedule/technical risk is risk due to inability to conquer the problems posed by * }. l6 _ k8 X! R1 L/ \the intended design & V$ ^. K7 c( WCOTR Contracting Officer’s Technical Representative. See Contracting Officer.* n* B W' Q# g0 Z8 R# b COTS Commercial Off-The-Shelf.' Q& b9 b3 D D! D T Counterair A US Air Force term for air operations conducted to attain and maintain a desired! X5 F6 }4 S& ~4 Y* J4 t degree of air superiority by the destruction or neutralization or enemy forces. 8 O ^9 j2 D! K- G3 Q# g3 K7 {Both air offensive and air defensive actions are involved. The former range / m8 r& s. O, A, g- Mthroughout enemy territory and are generally conducted at the initiative of ' ]+ ]' U$ J( [6 Wfriendly forces. The latter are conducted near or over friendly territory and are5 p# U* V4 t: G$ ?, r: g generally reactive to the initiative of the enemy air forces. ?, ^( F& `% d. N MDA GLOSSARY, VER. 4.0 C 5 d* J7 E1 X- x$ h7 r- f9 d. u637 l2 l) P5 M: O4 f5 f7 f" T Countercountermeasures& Q4 m& Q3 }+ f2 y; x6 P) p (CCM) - I6 @. d" J+ `) zMeasures taken by the defense to defeat offensive countermeasures.) Z2 e3 o0 @! S: I5 Y( a" k- h% F Counterforce The employment of strategic air and missile forces in an effort to destroy, or2 e; K7 s! h+ m$ X& ] render impotent, selected military capabilities of an enemy force under any of the 2 ^) B {$ x* I5 h1 Ncircumstances by which hostilities may be initiated.& m$ i5 H( f* x Countermeasure A design or procedural measure taken against covert or overt attacks.$ D( U* y4 y; F/ L* M% Z; | Countermeasure & k2 W7 r# R- z' _1 {: D0 Xs (CM) $ A# Z, m6 H- n- o/ \" L+ r- ZThat form of military science that by the employment of devices and/or) o0 D3 B% u/ k techniques has as its objective the impairment of the operational effectiveness of* g- `! n* w9 d: v8 H enemy activity. # K) D/ t c, E# ZCountermeasure9 q) b, B, V2 D s Rejection $ |' g: }$ V* u: W( C- I(Surveillance) ! d. a L# J8 uImprovement or rejection of an object signal in the presence of3 i* m+ j" m- l5 | countermeasures. 8 O/ {, I8 {( p! Y8 m0 N$ |Course of Action- y' K3 W7 M3 a$ X* s' E (COA)+ q: C# D- r: `; [ (1) Any sequence of acts that an individual or unit may follow. (2) A possible" V B7 F- E' |7 O# b! }0 n plan open to an individual or command that would accomplish or is 4 g) y4 n( a6 B; ]0 l( n' Q' zrelated to the accomplishment of his mission. (3) The scheme adopted2 l2 m5 G9 \2 P- k to accomplish a job or mission. (4) A line of conduct in an engagement.. K. R( v9 H' w) t& H (5) A plan to accomplish a mission. It describes the execution concept6 p5 \2 y( Y( Y5 O. [& |. i for BMD of North America. It will specify the engagement priorities,0 V9 N2 o! B* x( S# c, J resource allocation and desired results by Area of Operation (AO). i# D0 N# G0 X+ z+ n(USSPACECOM) (6) The scheme adopted to accomplish a task or- ?" V1 T) y6 V# o3 T% S5 @ mission. It is a product of the Joint Operation Planning and Execution - K' N, ^0 f% }+ A4 ] g3 n1 \System concept development phase. The supported commander will* ~5 w5 K: j( E0 Y: Y: F include a recommended course of action in the commander’s estimate.% q" ?% I- D& v) s7 G* W" D The recommended course of action will include the concept of 9 M2 N- J# L& x$ d+ a! ~) ~) Aoperations, evaluation of supportability estimates of supporting & p3 H1 h( u0 G+ @organizations, and an integrated time-phased data base of combat,, F' h# z1 I( Y( g0 p combat support, and combat service support forces and sustainment.. ?& H. K( H- X4 J, l! b Refinement of this database will be contingent on the time available for) y& e) h. s* D3 | course of action development. When approved, the course of action9 @, t2 h a$ n |, ?& i becomes the basis for the development of an operation plan or: z# J) P/ N! G operation order./ T/ s9 O7 F: _ Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, " e# `% ]8 A. b4 u* `0 G7 u8 n$ c9 yand other geographical presentation systems. (2) Cover or protection, as. I6 L3 K8 j# }: |8 T the coverage of troops by supporting fire. (3) The extent to which ' L- D7 I E/ Z5 w% Eintelligence information is available in respect to any specified area of2 [, ?# F6 S. c& T7 T interest. (4) The summation of the geographical areas and volumes of : l& W! M. Y: K% t% C2 vaerospace under surveillance. r/ u6 d: v0 m0 A2 j9 o) g. ZCovert Timing+ ?/ P* E' M, u/ ^4 q6 D Channel6 e6 D/ d0 L" z: v6 n A covert channel in which one process signals information to another by( R2 R7 K* c, a0 h- i modulating its own use of system resources in such a way that this manipulation9 U2 M8 N: w F5 F affects the real response time observed by the second process.. K6 q6 [* X1 r) _, Y# b. Y$ u- Z6 C2 g CP Command Post. - T$ D8 ]) ]+ n& s2 C( `CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.2 |- t% M# i6 c5 D! ~5 t( u0 X4 ^ CPAF Cost Plus Award Fee. 8 Y, L$ [3 D0 L# [* CCPAM Chief of Naval Operations Program Assessment Memorandum (Navy) ( z9 h2 H% Y' z; T' UMDA GLOSSARY, VER. 4.0 C 9 W3 `* Z5 @ `. ~1 |9 [64 * |" }9 w* X3 c" X0 b0 GCPAR Cost Performance Assessment Report.0 w# @7 k# v# X8 P. u! O CPAT Critical Process Assessment Tool, J8 M/ V z& O) K1 p& K CPB Charged Particle Beam. 8 ~8 M! O4 P8 R$ tCPEV Communications/Processor [Network] Experimental Version.# y1 ?1 _! O7 G" n& @. e, X9 B CPFF Cost Plus Fixed Fee. - d- E" r3 i- Z0 KCPIF Cost Plus Incentive Fee.- Z) [6 }7 R6 ?/ m CPIPT Cost-Performance Integrated Product (Process) Team. 9 |8 n0 V. ~. \, {- PCPM (1) Critical Path Method. (2) Contractor Performance Measurement.5 F( O. W# C1 Q) S$ o CPP Critical Performance Parameter. 9 D6 `, n, |4 t8 r: B8 g- U1 \- oCPR Cost Performance Report.% R6 j# U( S+ V, v# O0 C( ~ CPR/NC Cost Performance Report/No Criteria (Contract management term). & n3 w3 ?3 V4 T$ ZCPS (1) Consolidated Program Summary.7 T4 n& S; I) v- M# m" b0 y5 O (2) Competitive Prototyping Strategy. - ]' w' v$ i) C, s7 l+ Y S$ h1 \" }(3) Current Program Status.9 Z8 _7 M3 a7 p0 Q+ n' m CPU Central Processing Unit (TelComm/Computer term).( S' I. b/ g5 z# a9 } CPX See Command Post Exercise. 5 J8 t6 K. c+ @8 h( W& o4 cCQAE Chief/Contract Quality Assurance Evaluator. 7 b' M' }. d" b6 vCR (1) Computer Resources. (2) Continuing Resolution (US Congress term).0 [9 y* J8 |# b$ o, C4 ]9 E CR-UAV Close Range Unmanned Aerial Vehicle. + i7 |6 s {5 \6 F `1 N! yCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement* ?! |2 T, M1 R# |- Q1 j CRADA Cooperative Research and Development Agreement. 5 ^# A! r! {+ A8 ?6 n, ~9 dCRAM (1) Control Random Access Memory.: p! R8 X2 Y! z: V' ~) m (2) Cross-tie Random Access Memory (Computer term).3 |3 C) R& Y: q z- h- _0 D& z0 E CRB Configuration Review Board. 0 B0 H1 J. o v+ hCRC Control and Reporting Center. : d5 r, A( d2 G. d: eCRD (1) Capstone Requirements Document." f) }! D. D+ W' R4 k8 h. Z; y (2) Component Requirements Document.) p' C" u I% Q8 @( o CRDA Cooperative Research and Development Agreement. ' v! Z8 g- d pCRG Communications Relay Groups (PATRIOT).* |+ a+ h; R: R' E/ h CRI Classification, Recognition and Identification." V6 Y9 B* k3 g% B* b CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 8 c/ j, z9 s K1 z' {4 w0 ]" t654 g9 |* v6 ]/ H6 x5 o6 O0 z+ b% N Critical Design ' z$ O3 R. q# B; ^Review (CDR) , N: L, g2 F( q% e3 p3 {A review conducted to determine that the detailed design satisfies the ) R5 Z- b4 y0 D1 Jperformance and engineering requirements of the development specification; to! ]: e: u6 n, c. |! s# C! y establish the detailed design compatibility between the item and other items of. b& Z4 M1 `9 Z# i equipment, facilities, computer programs, and personnel; to assess producibility % u3 w5 B5 G/ {. O# s3 xand risk areas; and to review the preliminary product specifications. Conducted- j$ H! K1 `1 B/ s: d7 ?6 @ during Phase I, Demonstration and Validation (for prototypes) and Phase II,, [9 h, R6 f4 T5 b$ k Engineering and Manufacturing Development.8 Q- N5 Q" l$ ?( ~ Critical $ D; A- r/ b' I& K0 ` aInformation , s# L3 b' K) }+ {" @Specific facts about friendly intentions, capabilities, and activities vitally needed [4 u( f8 K/ D: _5 u9 U, w- vby adversaries for them to plan and act effectively so as to guarantee failure or 9 [* t' S/ k( J( k: _. d: Junacceptable consequences for friendly mission accomplishment. ; ~) E5 d# k0 _ p, \Critical $ x( D( x6 ^8 n# gIntelligence ' o5 J z7 X+ ^6 d: Q( @2 f+ [0 R MParameter& X+ F8 o! }0 d A threat capability or threshold established by the program, changes to which 4 ]7 d- H( I5 d& _- ^/ d; `could critically impact on the effectiveness and survivability of the proposed , W$ U6 e- [8 Q- w( csystem. % `: D* A1 t! ^. S3 SCritical Issues Those aspects of a system’s capability, either operational, technical, or other, . \! s8 I: Q! J0 W# U, Lthat must be questioned before a system’s overall suitability can be known, and # S" ~+ G! L8 mwhich are of primary importance to the decision authority in reaching a decision 5 h9 n% K! ]: Z0 a6 Y# sto allow the system to advance into the next phase of design, development,8 b' Y% E. d6 [ production, or post-production.4 `% C7 t( {# S' G Critical 4 P% y0 ], I5 F' \- X: e$ e* z/ GOperational ) t8 A7 F2 q/ n7 \# w2 K1 XIssue7 o, ], a9 h7 k A key operational effectiveness or operational suitability issue that must be - Q, a9 n3 {! Y1 C& Fexamined in operational test and evaluation to determine the system’s capability m& H) W( m0 I0 r- F8 Mto perform its mission. A critical operational issue is normally phrased as a , z2 x7 z8 I* ]question to be answered in evaluating a system’s operational effectiveness " Z, ^/ z# {3 Z4 x- F0 _and/or operational suitability. Q1 k0 D9 a" ]9 K8 A9 CCritical Path & X$ L2 a, J# }- Z- u' yMethod i6 @: p0 D& I6 e4 f1 r A technique that aids dependency of other activities and the time required to z2 y* S, j p ]9 P& j8 D complete. Activities, which when delayed have an impact on the total project# s9 e: G( k2 c. y, _ schedule, are critical and are said to be on the critical path.+ N+ B6 x+ ^. F8 G4 Y7 ]+ e; E1 x$ \- O Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to4 H) Y5 D0 A% C the viability or the operational effectiveness of the SDS.! v. ]0 T8 D; B% f0 @( B Critical Security 2 j) @4 v, J& @Risk $ O* X' B4 G# bThe existence of a security vulnerability that, if exploited by an adversary, could / |7 y; J/ ~3 rcause exceptionally grave damage to the viability of the BMD or the operational 3 k& y/ i0 o. z5 ~$ X3 C2 E2 Ceffectiveness of the SDS. Critical risks assume an adversary’s capability to. }7 U: G+ a4 [% A1 i$ T, m cause major system disruption or degradation (e.g., single point failure),9 Z- f) c8 f4 Q1 G4 T+ J: S destruction of mission-critical components, or usurpation of system functions.6 j$ ~- c3 I. ~' [6 ] Critical5 n; Y; S y1 Z$ f Supporting0 }% r4 O3 D1 o Technology y2 y3 o3 `6 d A technology that program management personnel consider a critical part of the8 b w" T3 Z( p6 [/ M) g program being described. - I' [0 x$ z0 n: v! fCRLCMP Computer Resources Life-Cycle Management Plan./ |; p# z3 R. r7 ^ CRM Computer Resources Management.+ j! `4 d h" f$ W; }' O( M CRMP Computer Resources Management Plan. 0 E8 T0 l2 ^$ LCRO Chemical Release Observation.) I" y( B- K& Z' M, \) ^ CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC: ]$ p! Q, ~/ {& L/ [ term.) " }7 ^& t7 V$ f2 i- }, iMDA GLOSSARY, VER. 4.0 C/ \% l0 S2 w: A4 d+ W. D 66 9 O; n9 d$ r* G* a) l* yCRS (1) Computer Resources Support. (2) Congressional Research Service. (3) ' S! g: Q5 u. d9 MContractor Reporting System., t8 w. |5 c: p, x0 v# u" R CRT Cathode Ray Tube. . z3 Q A+ h) b0 t% G4 tCRWG Computer Resource Working Group. 8 j* |! o( y# W$ x6 nCryocoolers Cryogenic Coolers. ; I6 ?; Y2 W0 W/ {/ G; A8 c2 w: rCryogenic Of or related to cryogens (substances which are used to obtain low : A2 \9 s- v0 h jtemperatures).4 t% _9 E. o6 w- x) {% k Crypto A designation or marking which identifies classified operational keying material,; y- x) K0 f$ H1 j! h+ r and which indicates that this material requires special consideration with respect& Z4 D0 }( `0 I9 `5 z5 @ to access, storage and handling. 0 }" p- A( P0 E8 Y0 q* s1 z. t/ \Cryptographic6 w$ u$ {# S$ Q System$ T/ d* X8 g+ o The documents, devices, equipment, and associated techniques that are used# r% l! X8 Q6 d+ F5 i j as a unit to provide a single means of encryption (enciphering or encoding).; k. X, S8 X ]* w4 J6 `# K8 y+ V/ q Cryptology The science that deals with hidden, disguised, or encrypted communications. It$ \3 b# W6 [0 f4 q+ y includes communications security and communications intelligence. $ l+ G. R( c. J8 j' pCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. - f* S% F/ e) |7 u ]* sCS/CSS Combat Support and Combat Service Support (USAF budget term). " K. b; G6 u2 o5 Y5 OCSA Chief of Staff of the Army. 9 z$ ], z3 ]9 C5 J/ ~/ o: gCSAF Chief of Staff of the Air Force.) p- W1 F7 Z1 U- i6 l6 r. H! F CSC Computer Software Component.$ `9 J1 Z' ] ~6 p8 Y CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) 2 j4 N4 L) e6 NCSCSC Cost/Schedule Control System Criteria. ?' G& Y% t# b# r+ {( E8 YCSD (1) Constant Speed Drive. (2) Critical System Demonstration.% [0 x9 S+ x- [: Z4 i# u CSE Center for Security Evaluations (DCI). 5 R8 ?& Q% \: x1 KCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon : L m1 L$ y" }& sSystem, located in Cherry Hill, NJ.5 F; C; Q3 [* M2 z2 _, W CSF Consolidated Support Facility, Arlington, VA.& d& O V* _4 g+ o: }8 |$ _ CSI (1) Critical Safety Item. (2) Critical Sustainability Item. ) P/ w9 I6 K) \4 \1 e( i! }/ qCSIP Current Systems Improvement Program. 8 U# B% A- }1 n; w, KCSIZE Constellation Size. " h% W: j2 N1 i# LCSL Computer Systems Laboratory.9 T( ~) h; a L CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.( O0 I! ]! h2 y: B( x6 E- h CSNI Communications Shared Network Interface (NATO term). / z0 B3 _8 C( @) X9 ?4 nMDA GLOSSARY, VER. 4.0 C & B4 p6 j2 N4 r) ]6 x67 & @0 z3 K& ?) ~" k+ UCSO Closely Spaced Objects.5 S$ G" J( {9 W8 n3 j CSOC See Consolidated Space Operations Center. / U C- V; o# f: F7 J; r) TCSOM Computer System Operator’s Manual* t2 v2 u; l$ u6 f0 M$ \ CSOSS Combat System Operational System Sequencing . z, J3 p7 I7 ECSP Communications Support Processor (numerous locations, including USAF Air9 ^1 H" s$ M% X$ B* \6 y) r Development Center, Rome, NY term).* Z/ @/ n7 U# x# K/ y+ t# G ~ CSRD Computer System Requirements Document.2 w) E: C$ Z# e* [ CSS (1) Cooperating Space System. (2) Communications System Segment. (3) * n: t6 B# q. U4 c [Contractor Support Services. (4) Common Sharing System. (5) Communications ' ]7 q; v: ?" L2 pSupport System (Navy term). (6) Common Support System. (7) Combat Service- ?+ o7 ^& Q( B- ` Support. 2 d8 e4 j u. x# }( G; u6 j( FCSSCS Combat Service Support Control System (USA term). 6 e) }! K) W* aCSSPAB Computer System Security and Privacy Advisory Board. 1 M; J( @$ i0 ~; K% w/ FCSSO Computer Systems Security Officer. 7 M, F8 s5 c/ c! ]8 o. Z( ACSSTSS Combat Service Support Training Simulation System (US Army term). $ b. E5 i b: }5 @, VCSTC Consolidated Space Test Center. 6 ^1 `! F# w4 v) ^$ I6 V: r2 U' RCSTI Civil Space Technology Initiative. ) A0 g) L! T$ [) ACSU (1) Computer Software Unit. (2) Communications System Utilization.0 E# f k0 {# y CSUR Communications System Utilization Report.* a# g4 h0 o2 C CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry., O( _& ]9 t3 f( m (4) Cryptologic Technician (Navy occupation specialty).+ z' R& l# ?3 ?6 j/ p% N CTACS Contingency Theater Air Control System (JFACC term)./ O9 v2 Q4 ~, [0 N, Z4 y+ ^ CTAPS Contingency Theater Automated Planning System (USAF). 8 B# `0 d2 S6 A7 @CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term].0 z- n" _7 M0 m* u CTBM Conventionally-0armed TBM.; z+ U |# h) R- o CTC Combat Training Center, Ft. Leavenworth, KS. m6 I" y! O1 s% a) ~- |CTCC Critical Technology Coordinating Committee.3 w' D3 V/ d- T0 J& q CTD Communications Test Driver.* }3 O4 S) [" _" H& B8 T1 d2 a CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. Z3 X5 d+ E$ @5 j! q CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally . _( g* u2 u5 ?3 t( j$ wfunding selected test investments proposed by the Services and Defense& p$ ^4 C a! s" ], w. K" D5 Y4 Z Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C 2 z+ r- B: a O687 ]+ q+ T$ r& a CTF Controlled Test Flights. 1 v9 W+ i$ S) ~$ qCTI Concept Technology Insertion. , R) M/ Q( E2 WCTN CALS Test Network. # H" L) e- t* L* i' iCTOC Corps Tactical Operations Center.* T# j' ~+ T' V3 n CTOL Conventional Takeoff/Landing aircraft.! h. d/ |- O7 y0 s1 ?* c9 Z) E CTP (1) Critical Technical Parameters. : s( {- m3 N$ j( p; a2 R( c0 @(2) Communication Tasking Plan. 6 E, U( k2 n+ _; f9 z( P' q/ s% S(3) Consolidated Targets Program. ( O' H4 n9 [$ _$ `/ {9 |CTPE Central Tactical Processing Element.( M2 r3 E* c0 E5 q& v; [: D! g3 L) S$ j0 F CTPP Consolidated Targets Program Plan. ! F9 x+ w$ J5 }' G1 ICTR Cooperative Threat Reduction (Treaty negotiation term). 8 w& _: e( h% M, J. cCTRS Centers, U7 D3 N6 w2 G! X3 _2 { CTS (1) Clear To Send (TelComm/Computer term). " c2 j, K3 C1 V8 K(2) Contact Test Set (USA IFTE term).' v6 B' O w: D. S/ z5 L CTSS Computer and Telecommunications Staff.& E1 [+ A- Z9 ^; ?( p$ T CTT Commander’s Tactical Terminal (US Army). & N$ Z8 _$ p9 T2 O+ fCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).* Z! K; {0 I/ Z7 Y CTV Control Test Vehicle(s). 2 o9 i, i) o2 H0 w! i1 [1 FCUDIXS Common User Digital Information Exchange System. 7 ]0 C3 ^6 K3 z, E+ B! @5 zCued Operation The directing of one sensor based upon the data received from another sensor.* V7 U4 r) T: ?5 h5 y; O Cueing Command The command within a tactic, which specifies the sensor element’s coverage : ^: |% Y# \% ~' a6 n3 O" nvolume.( a! O! \- X& ^& V+ J d0 s4 ] Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage % S, v: v0 e: K' Hvolume.* Q6 N1 h/ O2 G% A8 h- R CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae.# q# b t4 |) n( v* B CV/BM Carrier Vehicle/Battle Management.$ [$ q4 p, t) ]+ o3 M CVBG USN aircraft carrier battle group.9 P1 F# n% T5 D8 W# J: Q CVHG Carrier, Aircraft (V/STOL), Guided missile.4 Y3 _& q: [ I7 S CVISC Combat Visual Information Support Center.9 n5 I- |; Y- E6 S" C# \ CVL Copper Vapor Lasers. ) ~3 J* P# M5 k5 V0 q! rCVN USN nuclear powered aircraft carrier. 9 J ~% X, q" u9 A. j# c* {( lMDA GLOSSARY, VER. 4.0 C ' ~3 |1 I8 T4 a4 P# ?# L69( f+ o% A& C7 A7 | CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave./ F f& c d+ E) G8 i CWAR Continuous Wave Acquisition Cycle (Hawk).3 N0 E8 x5 y. z ~% U( ^ CWBS Contract Work Breakdown Structure. ) t8 G2 }6 D9 U. ~, \0 D" q& \# kCWDD Continuous Wave Deuterium Demonstrator.1 q: ?" z$ Y& `5 s+ Q0 W* f CWIPT Cost Working group integrated Product Team.( S4 c$ V" @$ u) X5 |/ A4 D CY Calendar Year. # P) D, F+ f) j) ?0 vMDA GLOSSARY, VER. 4.0 D 3 n Z: D9 {3 t5 `2 [& u9 u9 Q# B71 2 C2 u. r. i* U' ?$ W+ ]D Deuterium o9 g; K0 }5 [) q, @" m D Spec Process specification. ) n$ A8 n5 s2 x6 ?' ] ID Star Measure of infrared sensor sensitivity.: C) i. h e2 x D&D Design and Development ; P8 u+ f1 j7 K1 j% ?D&T Detection and Tracking. 8 G2 o( B' V* u: VD-IFOG Depolarized-Interferometric Fiber Optic Gyro. " R! d! d' d% |6 i3 R% H0 YD-Level Depot Level (ILS term).+ i1 V- X0 r0 `. y% ~2 P6 _& j D/A Digital-to-Analog" i; {$ Z$ X1 Z D/V Demonstration and Validation. 4 A8 [) y% Y5 X% O+ F+ AD2 Projective (interceptor) in the Hyper-Velocity Gun program./ Q' r' A$ U% V+ }6 Z" u9 j DA (1) Department of the Army." r1 x: a% f5 g- ?% |& e (2) Department of Administration. + Y- K; ?6 |3 s% ]2 R(3) Decision Analysis. 4 i. F, ~; z7 B Q8 m( W4 J(4) Developing Agency/Activity." ^ Z# s+ t- [' K: f- t (5) Data Administrator. 9 K! ^6 @9 S0 U; Z+ y1 N. F% b(6) Direct Action.. @1 e7 e5 w# Y# B% ~ (7) Data Adapter. 3 ~3 P9 q- u- e" ~0 IDAA Designated Approval Authority (DD 5000 term).6 u r9 n+ q) ^/ H8 @7 N, e. B2 F P DAASAT Direct Ascent Anti-Satellite. ( I+ u( H5 I9 @2 |+ h+ }3 tDAB See Defense Acquisition Board.+ `$ g4 @. }0 Z# X- O! @8 l+ c3 Q. n r DAC (1) Days After Contract [Award]. - k2 ^" B7 v; j! {9 e5 [& f7 H(2) Department of the Army Civilian.0 E8 O$ j& c9 H+ U* i- P1 }& O (3) Directed Attack Characterization. 3 B# o( }0 M; y9 B! v% a(4) Deploy ACCS Component.: z2 k, }5 t6 x: H (5) Digital-to-Analog Converter. + @& m' `+ o2 y2 P1 gDACS Divert and Attitude Control System.6 T9 R& W2 R2 W* d) Z: O& W3 ~ D, @ DAD Defense Acquisition Deskbook.6 t" r ?$ I5 d/ W# S DADS Distributed Air Defense Study (1993). 8 h' }- M9 H1 U8 |DAE Defense Acquisition Executive.: d8 O5 C8 \9 W$ U DAES Defense Acquisition Executive Summary.3 l0 E$ |( \& B6 \ DAGGR Depressed Altitude Guided Gun Round.0 w1 T5 n0 x" {. [7 I DAHQ Department of the Army Headquarters. 0 j+ Y1 e |: G G/ `+ ADAI Damage Assessment Indicator (targets).5 _# X0 h! y5 \7 M: I6 h+ r5 l DAL Defended Asset List.0 A; W0 |1 s9 T1 E+ H MDA GLOSSARY, VER. 4.0 D8 J) o: l+ ?! j, h6 J 727 [# P: x2 w! j" E: J2 o6 ] DAMA Demand Assigned Multiple Access. 1 ]2 I% V* J5 _4 oDANASAT Direct Ascent Nuclear Anti-Satellite.9 D+ [/ v0 B9 F5 ~3 T/ P0 @: W DAPR Director’s Annual Program Review (SDIO term)6 q# n6 y3 Z+ W9 _ DARO Defense Aeronautical Reconnaissance Office (OSD)./ w# L" S1 H0 ?; y5 U+ k1 m3 }/ G DARP Defense Aeronautical Reconnaissance Program.7 y4 Z6 v3 ]: t$ U, [# ?5 j- s DARPA Defense Advanced Research Projects Agency. See ARPA.% |; o! q# f% R- d) m- q8 [ DART OBSOLETE. Defense Acquisition Review Team.1 W" H& J. a: E4 B! M DASA German Aerospace. Member of the MEADS Program Team. - V/ l, A. p Y$ b* NDASC Deep Air Support Center (JFACC term).0 p( t) Q- b8 T; D' _ DASD OBSOLETE. Deputy Assistant Secretary of Defense.' U" T8 M4 |( Q+ _3 _' P DASD (C3) Deputy/Assistant Secretary of Defense (C3)7 A- z+ |) Y" t2 j/ ^ DASO Demonstration and Shakedown Operation. 5 Y. h3 W, w2 X P5 ]Data Integrity The state that exists when computerized data is the same as that in the source # c" p( V: R" e4 }' S: Vdocuments and has not been exposed to accidental or malicious alteration or5 X' c6 n a, y3 W7 w+ E destruction.' T, a5 c9 g! O% W1 ~9 l; P* s g' e Datalink (1) The means of connecting one location to another for the purpose of 8 j9 s [- y5 O0 P {6 x: ttransmitting and receiving data. 5 V3 m: Y/ B) P0 h. |+ l5 J(2) A particular path between two nodes over which data is transmitted. It; a2 f B* B/ W8 G8 Q% S includes not only the transmission medium, but also digital to analog # e; ^! g; J2 S9 f0 bconverters, modems, transmission equipment, antennas, etc., associated" X2 `; u: x- E$ _/ S with this path. In the SDS backbone network, it was a path between two! k) p% B; n, U1 l- @* G% ^ SDS elements. In space these datalinks were microwave or laser. On 4 [3 ~0 N8 d& S( ]! `$ ], L6 ?the ground, they could have been wire line, microwave, or optical fiber. 6 Y2 X; A. b* NDAU Defense Acquisition University, Ft. Belvoir, VA. 8 W0 Y3 Y# W6 o7 c! Q1 J( _DAVID Development of Advanced Very long wavelength Infrared Detector (USAF4 H( i, R9 b" `" A Phillips Lab term).; q4 Z+ Q' d0 d2 W: e! O DAWS Defense Automated Warning System.+ O. B. E( }, r! R& X* b" O Dazzling The temporary blinding of a sensor by overloading it with an intense signal of " t9 Y8 t; V0 b: B4 eelectromagnetic radiation (e.g., from a laser or a nuclear explosion).0 f& R& [9 | \- Z) i& j* M4 [ DB Bata Base9 T/ R0 d% p! d" Y6 y DBME Database Management Environment (Computer term).5 k. v j/ p3 g# [; e9 o DBMS Database Management System. " p( w. k; a2 x3 R9 a4 P) sDBOF Defense Business Operations Fund.5 Z! u2 X. ~* G' Z9 T: x8 i4 ]& D DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D ' j5 _9 L4 i' ^. F0 f9 [6 G73 $ c* `8 \; G7 C3 `7 c# [0 P! l" e6 D3 wDbsm Decibels per square meter. 2 z& c2 V6 d! ~* D: Q. I9 V6 A/ ZDBSM Database System Management. & @& z# g; ?" C3 Y3 ]DC (1) Disarmament Commission. (2) Direct Current.9 ~" n! u/ l: J2 `* v: M DC-X Delta Clipper Experiment. ) T7 p' S& M) D) V/ q5 H9 aDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications* k8 s" Z0 F3 U* N V J Agency. (Now known as Defense Information Systems Agency (DISA)). 3 V+ \7 d7 {( h0 LDCAA Defense Contract Audit Agency. 1 K6 E6 ^3 c! n; {: \8 o, `% D: nDCAS Defense Contract Administrative Services. 0 v. v, V! F9 A, H6 X% T/ p' L0 V& mDCCO Defense Commercial Communications Office (of DISA).; Z' M& `6 o2 _. R/ m4 k7 J/ J DCDS Distributed Computer Design/Development System. 5 Z3 c5 V% X3 RDCE (1) Data Communications Equipment (TelComm/Computer term). ) n A# A1 d( y. ]# c9 F(2) Distributed Computer Environment.4 ?, x+ | e' n5 l, r p1 ^& W DCEC Defense Communications Electronics Command. - A, w) k6 Q: u `$ j: U* ^) nDCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. 1 B) ^! P& w1 [4 c+ cDCINC Deputy Commander-in-Chief.3 `. L, I% j! K$ }* H DCM Defensive Counter Measures. C) |+ j+ ?+ b5 k* N9 H qDCMC Defense Contract Management Command 9 i5 O* k% |- mDCN Document Change Notice.5 h- U. F; B* D/ y$ g2 y; l% G DCO Director of Combat Operations (JFACC term).: I1 |* v; I3 `$ y! b _5 _ DCP (1) Decision Coordination Paper (see ADM). 4 K9 ^) ]' y3 i! f1 p(2) Director of Combat Plans (JFACC term). ; L1 `% J8 Q; G7 R! X/ d- v* UDCPG Digital Clock Pulse Generator.2 |# n b1 A ~$ L: E DCS Deputy Chief of Staff." p. [3 {8 \4 l3 F8 M2 U: z DCSOPS Deputy Chief of Staff for Operations and Plans (Army). " J9 C0 F% _9 J! l# V, K2 n! xDCT Digital Communications Terminal " O, k1 X: l/ e1 Y- Z+ hDCTN Defense Commercial Telecommunications Network. + _7 t, t3 G( S4 A) wDD Variation of DoD.; O" A0 `; h8 n8 [. | DDCI Deputy Director of Central Intelligence.# O" L$ j; |: E DDEL Dwight David Eisenhower Library, Abilene, KN (army term).: _ D4 W! q6 J7 o: S- ^/ v4 I DDG USN guided missile destroyer. 2 d' Z: t7 k* V4 K3 k$ F1 _MDA GLOSSARY, VER. 4.0 D1 D/ Y: q7 r- ^ O" d1 [ 74 1 _. T& {6 I3 X+ c6 T, LDDL Disclosure authority letter.; A# R0 s- M4 A% m: x2 K) w( r DDN Defense Data Network.% ?+ g# f6 w# ] |/ @ DDR&E Director, Defense Research and Engineering. & `# V0 O& h, F% gDDDR&E Deputy Director, Defense Research and Engineering., b8 \" M; b1 \: r DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). & x/ P) k& }& W! `9 m1 Z) O% v5 {DE (1) See Directed Energy. (2) Delay Equalizer. 9 q7 k& _$ a/ Q) h9 } k" ADEBRA Debris, Radiance Model. - D0 t3 V8 F8 P1 i, FDecentralized0 U( n: e; ^2 g6 o Control( H7 I4 p, T7 g" W' n0 v In air defense, the normal mode whereby a higher echelon monitors unit actions, 8 \7 d& F5 t1 ^' I- N4 K9 Gmaking direct target assignments to units only when necessary to ensure proper - e! N2 r' Q9 m% }7 g) i9 S! ofire distribution or to prevent engagement of friendly aircraft.8 K1 f g6 G7 U0 @% c. y# u Decentralized 9 |* x" a0 o) Z) OExecution * {( m' v+ b+ s1 z1 tThe distributed and integrated implementation of USCINCSPACE direction by , z: w% X- U9 U: }+ t: T/ n# gthe BMD forces. (AFSPACECOM) 8 F: {# a& A2 UDecommissionin ' D7 u) X" s& p5 ]g ( y8 V# L& ]6 D/ n. g9 SThe removal or the rendering useless of obsolete or no longer needed 7 l& L/ b( q( j: `! rcomponents of the BMD system from service.) E' T9 S7 J1 g( \7 {; G7 R Decrement A directed funding level reduction for an acquisition program." x% v1 R O# L1 z t3 ]/ ` DED Data Element Definition (Computer term). + O8 Z+ f4 x" q) c. hDedicated Mode: f+ [: O7 o! |$ y# Z8 L; U q9 C of Operation* c; k4 k/ j4 F5 K" q* ` (ADP Security) 9 u4 ~6 c. [) a3 U* YA mode of operation where all users of the AIS possess the required personnel: |! q+ o: C, `" S security clearance or authorization, formal access approval (if required), and a w5 `% i! l% g8 V N* @ Need-to-Know for all data included in the AIS.0 Y; I v+ F1 q Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about . r5 M4 J8 y3 |+ E0 v: o4 P7 z; f5,600 kilometers) above the earth’s surface. $ l6 U: I" ~, E$ }/ A) L4 bDef Definition. . i5 k# z8 ^4 }! w& lDEF (1) Defense. (2) Demilitarization Enterprise Fund. + B" }6 @" [" Q- z# WDEFCON Defense Readiness Conditions." Q$ k; w% c2 ~( r1 Y Defended area1 _8 s0 t( q8 h; Y5 p4 B) r coverage" g0 B; F- E- L' j+ ` Defended Asset ! ]4 u! d: d! r" D5 G# l" \. \& KList (DAL) - Q, `; [# n# _ \! f! g: ~4 \The geographical region that the BMDS can protect from ballistic missile attacks : F9 Z4 f. i" Z/ l; k1 \$ Rwith a specified level of probability of negation. May be specified for a particular ! O% p' t* l: b3 B. r0 _threat type, launch point(s), launch regions, raid size, etc. - {$ \9 j1 @' O) ^ MA ranked listing of facilities, forces, and national political items that require, R% K- I/ r0 W4 f1 M% m9 L protection from attack or hostile surveillance. The list is compiled from Federal4 l! k5 {% d. Q9 K" V departments and agencies, Unified and Specified Commands, and the Armed L% `% T7 Q# p$ c: v2 n5 |+ jServices to ensure National Security Emergency Preparedness functions. J- R: J( w. c! H, ~MDA GLOSSARY, VER. 4.0 D 3 }# Y5 T) d7 `, {753 D% O; I" }' _ Defense K: p4 G$ o8 z/ d4 o! B Acquisition# s: P- ^8 V( C: O Board (DAB)( T o. F5 [# x/ l2 a The senior DoD acquisition review board chaired by the Under Secretary of3 s1 Z6 ^" v) V" V- D, e Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the : k8 }7 V! X3 G6 ~* W0 L2 oVice-Chair. Other members of the Board are the Deputy Under Secretary of - ?! ^# i+ `" {7 ^( S! w+ A XDefense for Acquisition and Technology, Service Acquisition Executives of the / k9 G. ]; v* q) b( S0 hArmy, Navy, and Air Force; the Director of Defense Research and Engineering;, p3 u" Q' |" ~) u: T the Assistant Secretary of Defense for Program Analysis and Evaluation; the 8 G! ~' G8 `5 g* X: b( ?Comptroller of the Department of Defense; the Director of Operational Test and7 s% t& u+ a8 Z, D* c) @" Y Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the 3 G; [/ l( r: h; Y8 ~3 r" WDefense Acquisition Board Executive Secretary. Other persons may attend at: k1 B3 C: S4 h( t+ T the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition ( S: Z+ Y$ }- ^Board.”) 0 a2 d7 T; @9 T5 z4 h# ^. T3 G: w0 jDefense! n9 V0 k4 T ~5 ?4 [% }* z' o0 \ Acquisition" z4 v: q; Y; _/ ^5 ] Board Committee2 q" n9 L8 q( k4 D) ]4 i Advisory review groups subordinate to the Defense Acquisition Board. The : z: L& R; g! m$ v* UUnder Secretary of Defense for Acquisition determines the number of * y* |* @1 \6 H, W, T/ ~Committees. The purpose of the Committee is to review DoD Component- ^. ~0 o; S, P: n7 S1 E programs prior to a Defense Acquisition Board review in order to make an# t) y+ Z3 u/ @3 u) g independent assessment and recommendation to the Board regarding the . i. h0 t! d* D4 w1 Aprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense 3 {7 |1 m/ d s& `1 MAcquisition : L7 F, t2 h$ F! U- B1 YExecutive (DAE) 1 U1 }# p+ s- v5 r3 N- GThe principal advisor to the Secretary of Defense on all matters pertaining to the : M3 a( n1 }0 EDepartment of Defense Acquisition System. The USD (A) is the DAE and the* }, z9 t6 D3 N/ R& I3 p% m$ A Defense Procurement Executive (DoD Directive 5134.1). : g6 e7 q/ d; A9 JDefense 7 V0 K% t2 X' k8 V5 E+ m! ]0 V- U6 mAcquisition8 U- @ C$ S0 A0 Y. \* Q Executive" B: i! {5 p! p& m Summary (DAES)0 `) J2 k3 r4 T9 m h! R The DAE’s principal mechanism for tracking programs between milestone % s1 V' Q, J- a0 j, Creviews. Includes programs subject to the Selected Acquisition Report (SAR), 8 U, n* g8 _" y3 R* s' U: vand any non-SAR programs subject to review by the Defense Acquisition Board.7 X7 t' t) C! {% { Defense 9 o! c6 Y! r9 t' b5 r! OEmployment+ A! _1 }# d9 r4 k, D. P4 T" j Option (DEO) / {# c! {0 A5 Z3 b5 V! IEngagement strategy provided to USSPACECOM component forces to achieve ) g; U, T3 L5 O8 c) t5 C* L9 M3 qspecific military objectives against a ballistic missile attack. It defines hostile & r" q5 U# p9 y+ q3 Y! utarget priorities, provides assets to defend, and allocates SDS resources to be - n6 c Y; E- S' F' s/ k9 p" Uemployed. A number of DEOs may reside in a particular Preplanned Response/ t8 ~- U% t1 G) [# h5 D2 H Option (PRO). However, default DEOs (those believed to be best suited to , Q2 ]) }& f$ z' Y& l p& D- |2 rcounter the threat initially) will be automatically processed and executed when 7 Z4 j/ d0 n+ ?* g6 lDefense Activation Authority (DAA) is given by USCINCSPACE. 8 t6 I2 e4 P( Q0 g2 oDefense 8 L, w, ]# Q, K2 vEnterprise6 w9 C7 ~* t7 i Program (DEP) - i4 @6 f, d1 QAn Acquisition program designed to streamline the acquisition process by waiver $ D2 E2 p9 z, Y& u( D) Zof selected regulatory requirements. 4 D0 T4 o! L) A2 hDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb 6 M, W8 {6 N) f7 _; Eand progressively weaken an attack, prevent initial observations of the entire+ @. [/ Q- [" C position by the enemy, and allow the commander to maneuver his reserve. 6 T( [9 S$ V: E+ D) I- ~$ I7 c1 `) aDefense/ W; l3 n+ `: v7 `2 r0 W/ U( A( c Meteorological 0 c: c2 d5 l+ e! uSatellite Program ' G- Z. v- |5 b+ r(DMSP) + s: _& n% F! i: mSatellites designed to meet unique military requirements for weather information.. L: g/ l+ {) Y* m/ ^ Used to detect and observe developing cloud patterns and follow existing0 d6 T/ a% F) \ ]/ W- \& ? weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.' j @( V/ m* v4 h$ l9 f3 }' s Defense Planning$ l" m. v( ?$ u6 \9 t. T. l/ a$ S) t+ T3 d and Resources; J4 x }- H; o! T! c Board (DPRB) , s# o% u( A# V0 b- oA board, chaired by the Deputy Secretary of Defense, established to facilitate K- w5 ~7 _8 D4 K decision making during all phases of the planning, programming, and budgeting& ~9 X* X" x4 |6 e2 n2 @) I( k system process. Board members include the Secretaries of the Military0 n) F5 D9 p5 M$ D' o Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of % z0 U9 b; M- y3 dDefense for Acquisition and Technology, and Policy, the Assistant Secretary of - { Y }% l V* CDefense for Program Analysis and Evaluation, and the Comptroller of the 3 {6 v6 b3 e0 N& R; Z# SDepartment of Defense. # r' u) K& E' S$ J# L. K% y# `MDA GLOSSARY, VER. 4.0 D ) K3 w) v$ Y$ l( n- S1 Q76 , S7 x4 W0 L2 |3 v) c0 aDefense Planning) {8 i: @. J/ M# T6 l& D Guidance (DPG) # v' p! ~5 W4 D j% `2 hDocument issued by SECDEF to DoD components providing strategic framework/ K, D5 t9 L, C/ W& F6 w for developing the Service POMs. Result of planning effort by Joint Staff, OSD,. b0 a) U& T" P8 a, @) k- {/ J and Services. In connection with two-year budget process, DPG is issued every+ v5 ?5 I4 ^" v5 r& o other (even) year.; R+ o7 r& U$ Y' c) M# o# {8 Q { Defense Priority# Z! l# d! W6 R+ j. C/ x and Allocation$ g! e9 n8 z5 \$ [8 [; T System (DPAS) 5 ~% M, B8 z' rThe implementation of a statutory requirement where contracts in support of! K6 }" c: B* T; Y. f8 E# W3 j; Y- X national defense must be accepted and performed on a priority basis over all: y: `8 Q8 D0 t: O" U other contracts, and which requires the allocation of materials and facilities in$ d+ w/ F+ {! n# j8 w8 ~3 b such a manner as to promote the national defense. See “DO” and “DX.” 4 ^0 y$ ]* T3 s8 q* N j/ S, YDefense , N3 o+ E5 H& E5 D. t* P6 FReadiness% x# a7 w- c" y! K Conditions$ n, m- {/ j2 Y! A- ]% u (DEFCON)3 k3 [' X+ M+ j' q8 p A uniform system of progressive alert postures for use between the Chairman of 0 c) H' J; H" I) b' kthe Joint Chiefs of Staff and the commanders of unified and specified commands- E+ z- ^, V+ x( I( @8 R and for use by the Services. Defense readiness conditions are graduated to 1 s. J8 \1 V2 ~match situations of varying military severity (status of alert). Defense Readiness : H* r/ l: M; L1 F kConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as$ x/ z0 `5 D8 C% j7 O L0 R( d appropriate.2 j9 v5 H4 E$ l2 U0 `4 z& ^ Defense Satellite $ I$ e P0 m& W' U3 v$ CCommunications$ d3 B1 S$ l: r+ M Systems (DSCS) : _: @7 o3 _) K7 R7 W- }$ qAdvanced communications satellites in synchronous orbit around the earth. 2 Q1 R3 R. K6 t* X! VProvides high-capacity, super high-frequency (SHF) secure voice and data links - K h6 L! z- {5 B) X7 Sfor the Worldwide Military Command and Control System (WWMCCS). They; ]3 D2 R0 s# f4 l, S5 s support terminal deployments for contingencies; restoration of disrupted service ! Y) v0 Q& x& Y% aoverseas; presidential travel; global connectivity for the Diplomatic9 w S1 e H3 a6 P$ |7 J0 y6 Z% N+ U Telecommunications Services; and transmission to the continental United States ) w8 f6 j% Y: E4 m+ jof some surveillance, intelligence, and early warning data.; J+ T, r3 d. g, t Defense Satellite S$ y, b, J' H8 B% M (DSAT) Weapon3 H; k0 P7 y5 d; t/ W A device that is intended to defend satellites by destroying attacking ASAT' j0 ?. n3 f: z3 G9 z& Q' y0 A weapons.. A/ J" h/ }2 }8 o Defense Support + i9 H' u" S/ J5 J- j. B* \1 a$ y. i: ?Program (DSP)) `8 J6 p e& C$ g: }6 E) C A system of satellites in geo-stationary orbits, fixed and mobile ground ) {# i1 ^0 S0 c# g& bprocessing stations, one multi-purpose facility, and a ground communications . ^1 \! K8 q# @. Z* Pnetwork (GCN). DSP’s primary mission is to provide tactical warning and limited ( Q- D/ C) h) k0 H, Yattack assessment of a ballistic missile attack. " s6 t Q( \) \Defense% k9 Z5 ?4 F, s' c1 \6 Y, W; Y1 H Suppression & J! S3 k8 T- qTemporary or transient degradation of the performance of a defensive system0 [% w( R. ]* m. P# H& [, W below the level needed to fulfill its mission objectives, by an opposing force. 3 {' Y3 v( u1 H5 `(USSPACECOM)+ |# k6 W1 o- v! X# V Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic + k/ e5 E% s1 P6 {1 Hmissile trajectory; i.e., boost, post-boost, midcourse, and terminal. * F9 r6 m- \+ A2 LDefensive! U& h* }& h6 w) A2 q& l* Q L1 ] Counter : w1 O% \3 M N0 Y. f- ?Measures (DCM) & Q3 X$ y( y9 i1 Q* OActions taken to eliminate an ASAT attack.8 u- A- |' I4 N2 i9 K Defensive' D X& e/ k; @- i) e Technologies. s( R. A0 t( Y% B/ F5 p Study Team 0 l8 x9 o/ g$ h* G% }(DTST) ! f5 O1 P# p1 m- D4 T) L; PA committee, generally known as the “Fletcher Panel” after its Chairman,9 a4 i0 k6 g/ M: R4 A6 q appointed by (former) President Reagan to investigate the technologies of$ F Q8 w5 j+ C" y potential BMD systems. 6 a& Z5 h, Q+ Q& L' ]4 h5 ADEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.7 J% X6 a+ I2 U0 }& l" k, [ DEIS Defense Enterprise Integration Services (ex-DTIS).! t! c# Z: ~9 Q! h DEL Delivery. + H# u, N& v6 D) E6 tDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion 6 G: e. e. W4 ?0 Y+ t% s3 o3 vof shots about the aiming point. See also Circular Error Probable. . }- G$ t- G; S% O2 m* D& ^1 ]MDA GLOSSARY, VER. 4.0 D + x: J5 h+ l0 W& M77 0 K, W6 k4 Y, n( CDelta-V A numerical index of the maneuverability of a satellite or rocket. It is the ; Q: p% `5 E: j! {8 K8 bmaximum change in velocity, which a spacecraft could achieve in the absence of ) m9 B8 C. T: {, i* @! `# t+ V2 la gravitational field. * f, E; y8 K8 `Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). * W9 n, [. z; Y' E9 ADemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its # t/ I5 _8 ]3 z* L" i1 x3 ?desired function (matching RV characteristics, screening RV, etc.) ) c! _ M5 q/ t2 k- G' K/ kDEMO Demonstration.3 p/ \5 o' ~$ v- a4 G3 C$ h Demonstration% x+ ?, h( @4 l6 v: a. i0 l% k and Validation 6 _, f O8 F4 v) I1 A5 r, l9 ~( t( Q(Dem/Val) q7 j7 q0 b7 v. R/ u% [- F. n( FThe acquisition phase when major program characteristics and product designs! P: u# N" U j" @2 N are refined through extensive study and analysis, hardware development, test,: a k y- |$ [4 G1 H! p! q and evaluations. The objective is to validate the choice of alternatives and to `5 K4 [7 T) Z2 }6 S0 vprovide the basis for determining whether or not to proceed into Engineering and5 z1 a% X/ d2 {- v4 G1 o Manufacturing Development (EMD).- U) k1 u# h$ P& J" R; \- b Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities.: _' p$ P/ h$ x Z: { It may include destruction, removal, contamination, or erection of obstructions. " k6 [- f8 ~+ w$ h' \4 \3 HDEO Defense Employment Option. 2 n2 p5 i8 F4 ^; r4 QDepartment of : v3 `6 H, L9 f8 }0 ODefense4 c1 u- T& g3 | Acquisition6 [3 g t* y& W' K7 ^8 C# t+ h System # g1 ]5 Q) Q2 K- zA single uniform system whereby all equipment, facilities, and services are ; |8 p$ Y2 m# i$ e0 hplanned, designed, developed, acquired, maintained, and disposed of within the: `' i; z1 j. s& o: H* ^ J' m. W Department of Defense. The system encompasses establishing and enforcing( J3 y" o q* m* _. s1 I6 f policies and practices that govern acquisitions, to include documenting mission$ E- i: l( {3 R/ i! S6 F; B4 | needs and establishing performance goals and baselines; determining and ( V; ~1 z* n1 B/ S) iprioritizing resource requirements for acquisition programs; planning and7 y/ f3 K( T+ S7 s executing acquisition programs; directing and controlling the acquisition review o+ H8 T: U" E. i process; developing and assessing logistics implications; contracting; monitoring ! {* C7 `1 w) ^7 |) rthe execution status of approved programs; and reporting to Congress. (See* L7 z0 Q, ~/ r& G, M' Y DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)" T: {' D6 h( ]/ V. o Deployment (1) The placement of force elements in battle positions to obtain a higher \3 I: `5 Y N' X' [ state of readiness.8 n6 d( I' m ]" s7 o (2) The movement required to place force elements in battle positions. % Y+ Z* L9 |: r3 v(3) Fielding the weapons system by placing it into operational use with units $ y* M5 k7 U9 i' W W3 u$ Lin the field/fleet. 5 e o: s2 l' C# I(4) To arrange, place, or move strategically." v) H5 ]- _* e7 X" C' G- H( Y Deployment , ], m' @6 `9 F0 i0 B$ [5 cPlanning 5 u( o# q8 s5 B2 T- h(1) The development and maintenance of plans required to initially deploy,6 I/ `9 A. t7 L0 F- y! | maintain, and evolve the operational system in accordance with 2 @$ c3 v$ N" X3 Nschedules and priorities. It includes factors such as launch facility0 ]4 S5 P9 |9 P; U; ^ availability and planning for the availability of other required elements + v" I l; L' C& X0 Q/ u+ r: Psuch as trained personnel or units. In addition, it identifies the impact of/ y& @; r: t2 h+ L deployment on operational readiness and any testing constraints 2 I+ ^7 N) Y# \. ~- uassociated with deployment.- j0 V+ m- |, Y/ K5 N; ~ (2) Encompasses all activities from origin or home station through - J( \ x/ w, Z4 |. w# {! Odestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding6 [7 d4 k6 h) I& Q& f7 [7 w1 o areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment & m! k6 C- ^2 J: c) u- u5 [/ Z: gTesting5 m5 |* P8 I, [% `6 ] The testing and/or simulation of system assets in the physical and operational7 @* _( z4 W3 |0 p7 v( w environment in which they are expected to perform./ ?% G1 b! @8 u$ y& @" M DepOpsDep Service Deputy Operations Deputies.2 i$ l: C: A( G" n" j) h MDA GLOSSARY, VER. 4.0 D; x; c- C7 z+ M7 Z" P4 S* M 78 4 g: |& T5 v$ R# _Depressed) y, c( V) s, i; D Trajectory8 T& M! `7 b6 z. s- h5 b Trajectory with an apogee below that of the minimum-energy trajectory. 3 b9 t( W" }+ `( zDEPSCoR Defense Experimental Program to Stimulate Competitive Research. 2 J0 n, f- H( `: QDEPSECDEF Deputy Secretary of Defense.2 _1 H5 w3 h( r5 G9 \( Y DeSecState Deputy Secretary of State./ ?7 s/ x2 G9 R" A& G& ~/ K DERA Defense Evaluation and Research Agency. Consolidated research and( J$ R Q( y" y, n0 @' r& O. A% M development resources of the U.K. Ministry Defence. Headquartered in 5 r* z- m& s0 g) \% b) sFarnborough, England.* w! Y# _/ c6 C9 [0 H9 d Derivative1 R* J3 A2 u: k8 I+ _/ P9 n Classification) c" Z3 b( ]5 Y9 o A determination that information is in substance the same as information . f" l8 D) D. c) S8 Q& v3 ^# hcurrently classified and the application of the same classification marking. 0 {# l4 k5 @. ~+ vDES Data Encryption Standard.6 W; g- g0 r7 z DESC Defense Electronics Supply Center (DLA term). 7 y q }7 B8 E$ lDesign " q w' ?# f! s' d$ E9 } GConstraints 7 H/ F) c5 ^0 J7 T! PBoundary conditions within which the developer must remain while allocating : _' p' W2 {' [( g5 Aperformance requirements and/or synthesizing system elements.7 ~# U( E1 D- x& N, [; z Design3 |# E7 |# J2 C9 O Parameters. }; o% q: O1 j/ F9 i2 x Qualitative, quantitative, physical, and functional value characteristics that are & `4 j' h( C/ \5 D- ?5 n- z/ ^inputs to the design process, for use in design tradeoffs, risk analyses, and 9 e9 q0 \8 k/ T2 e2 }development of a system that is responsive to system requirements. * [0 V5 w. p5 c) M$ T3 X! vDesign Phase A period of time in the software life cycle during which the designs for% ?' O3 G; M+ p5 r" K architecture, software components, interfaces, and data are created,8 E/ h) ^1 a1 f G' S documented, and verified to satisfy requirements. & _" c$ x8 N7 R! L; c; H1 T3 HDesign-to-Cost Y5 h3 m6 l# j (DTC) Goal' ^; s, z! {- ^: c8 W3 ?/ r Management concept wherein rigorous cost goals are established during' |8 X0 M/ |0 X3 m, F9 |; T development, and the control of systems costs (acquisition, operating, and 4 L( ]1 I; m% l, a$ ~7 Osupport) to these goals is achieved by practical tradeoffs between operational 2 i* R6 X2 x d' ^4 Scapability, performance, costs, and schedule. Cost, as a key design parameter,5 u" t) ]4 |0 p, g& ]3 `8 Z/ b1 _ is addressed on a continuing basis and as an inherent part of the development- i- Z' }7 |; [1 j and production process. A DTC goal should be in the form of average unit& d O# E0 h% v flyaway cost. Also, DTC parameters for operation and support will be . q9 R% `- Z9 j' i! Q2 K1 Mselected—parameters that are design-controllable, significantly affect O&S costs,4 c* }" |& R& H8 v& T and can be measured during test and evaluation. Parameters may be 0 v, S$ h5 @. ]5 I6 jexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or4 h* M" Z0 |0 c7 w' Z maintainability. Firm goals and thresholds will be established no later than entry: L. F: b" r4 \$ I$ h into EMD (Milestone II). This is an in-house goal, almost contractual in nature, " R! r& O3 z- p* P! u H! D& v# ?between the PM (Service) and the SECDEF. Allocations from this goal will p0 I! J4 H" e' n: ibecome the contractual DTC goals for contractors supporting the program. # W# d$ M& f8 l) vDet Detachment.( K8 i, o% J1 i5 w DETEC Defense Technology Evaluation Code.* i8 M1 [5 s' c" E ]3 N Detector A passive IR, visible, UV detector turns photons into an electrical signal. The ( k# q9 i1 U2 H; M+ P- x. TIFOV of the detector is its solid angular sub-tense. There is sometimes ! [# ]: s4 {' T* O- {confusion between the detector sub-tense (size) and the pixel (picture element 8 f/ S0 M- ^$ d* f. U N! ^ S6 ]: _, Esize). They are the same for a staring sensor, but in a scanner it depends on$ F. u; b, q Z" n' _1 \3 Z V$ r" } the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. 0 l' @& d* a$ D( U: A0 jMDA GLOSSARY, VER. 4.0 D 6 r( _8 w+ A, W/ c4 X" \3 Y79 3 r) Y( W, ~4 t" \2 wDEV ENV Development Environment.; z5 ~( J* j. H8 {; R' O/ H Development : p1 ^; U* ^/ L x9 d# a* uTest (DT) . l# ?, w1 W7 A4 ~/ J* W0 @Test conducted by the development test organization to achieve specified test $ f# o/ G+ K7 Mobjectives. It may be a complete test, a subtest, or a phase of a test.4 H' J: P2 |) }( n. V' Q& @. H Development 7 X- c$ O" \* s9 A1 GTest I (DT I)& {2 q, e5 Q0 c$ ~4 V A series of tests conducted during the demonstration and validation phase. % g5 }* l3 T$ T S Y& e7 RComponents, subsystems, or the total (or full) system are examined to determine % g, b2 a2 A) L4 m j$ T& Lwhether the system is ready for EMD. State-of-the-art technology is addressed6 J! c; ~" p2 J3 G% l0 s in DT I.3 ^) G/ C, E$ z/ |+ E( Y Development% m4 H8 R9 ^- K8 I Test II (DT II) # \- `$ F# N" h2 u# u+ JA series of tests, normally during EMD, which provide the technical data 6 s% A F2 ? N+ Y2 ~necessary to assess whether the system is ready for low-rate initial or full $ Q" c, f% T$ ?. K2 bproduction. It measures the technical performance and safety characteristics of* _1 t5 t l; X0 h2 ]; r( ? the item and evaluates its associated tools, test equipment, training package,$ f$ @% c" g) B" v and maintenance test package as described in the development plan. DT II , x' p3 O$ y- K, zaddresses accomplishment of engineering design goals and the fulfillment of - h+ [5 m0 l& p+ A% _6 m' Y* k+ Acontract specifications.+ _( Q* f2 z7 _- U! D4 s( { Development ' C8 m4 T8 I% J2 B; i: bTest III (DT III) - ]2 G$ {+ l2 \+ H2 S; xTests conducted during production. # o, q. m5 ^4 }! lDevelopment 7 T e* w) C% p( y# o- NTest and 0 [1 O6 P$ y6 zEvaluation 2 j" X; \, M; j* H- `(DT&E) 6 T |" F' O: [5 L MTest and evaluation conducted to measure progress, usually of6 W h2 A3 ^7 x4 ]" p* z1 h3 G7 j) N% H/ J component/subsystems, and the proofing of manufacturing processes and) a& i0 r# x& S1 b8 Y/ z/ Z controls and to assist the engineering design and development process and 6 p) o' Y6 g' N+ Sverify attainment of technical performance specifications and objectives. Usually$ Q7 g( ], e/ ^% b, P5 }0 E conducted under controlled or laboratory conditions. Can be conducted before : I8 D @/ C6 W' Ior after production begins. 4 d! q9 x7 d; X g+ i, SDevelopment! T! P& m: B' ]0 S& [. G) g Test (DT) / B3 R1 [, d0 F: HTest conducted by the development test organization to achieve specified test/ l: Q9 ~* {% J( J' K Q objectives. It may be a complete test, a subtest, or a phase of a test. " m; i& G) a( A; G% J/ BDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost,' S2 }; `* u) { schedule, or performance without authorization from the milestone decision $ i( W! e% g7 j7 Iauthority. Acquisition Program Baseline (APB) thresholds represent these & @; s9 h. q; `0 \$ h* Y. x f8 Wparameters. 1 w# ]3 ]) H) h& a7 RDevolution of & ?$ }0 ]7 S+ D4 p; E' g, sCommand # p) O6 w: z# |% ]( ?* ~Minimal essential operational capability to perform C2 provided in an orderly and 8 `$ `$ H& O$ J9 X0 g% jtimely fashion to a duly authorized successor. ) p5 B4 s5 b4 x% X! g+ ]DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.0 `1 y+ H1 E% }. t" V: Q1 G$ ]. z+ I. {% y DEW/D Directed Energy Weapon/Discrimination.- X ?. Y- `4 x5 N DEWG, O Directed Energy Weapon Ground, Orbital * S' H* u) G: L, BDEWL Directed Energy Weapon, Laser (thermal or impulse). ; t2 d2 I; b: X5 w) Z; V: IDEWP Directed Energy Weapon, Particle Beam (neutral or charged). , X# }& K" W- s( @. kDF-KBS Data Fusion Knowledge Based System., v5 Z5 m* E* `* f DF2 Deuterium Fluoride.8 C( x5 @' D/ F) E& y9 m DFAR Defense Federal Acquisition Regulation 1 N# t3 _0 C. {- v' IDFARS Defense Federal Acquisition Regulation Supplement.$ j1 ^5 j- e& j" k2 {. K MDA GLOSSARY, VER. 4.0 D $ G+ N# f o# q& {5 o' M804 H3 |$ A0 Y# ~9 X* t: ? DFAS Defense Financing and Accounting Service. 4 e4 i$ L7 w- B8 A0 {6 fDG OBSOLETE. Defense Guidance. See Defense Planning Guidance.- b' j7 \# }# w1 p DGA Director General of Armaments (France).' D) I, M6 K* t* e4 p DGP Defense Group on Proliferation.& f0 h. \8 ?& R4 k DI (1) Data Item. (2) Developmental Item., d4 o. v- S- T. [+ d0 U4 U DIA Defense Intelligence Agency./ d, ~# o7 ]$ U" F% Z DIAC Defense Intelligence Analysis Center. $ C6 |* a; _) W$ j+ n' L1 G* v! x GDIAM Defense Intelligence Agency Manual0 B+ W7 [8 @% E7 { Diameter (Optics) The unit of measure of the light gathering power of a lens.7 j; |8 H! k, |/ L) i9 g8 N DICE Digital Integrated Combat Evaluator. 4 A9 K8 i8 J6 X# I7 W! l# ODID Data Item Description.' ~$ J, E- a9 X Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The: e4 G) D; Y% q( M angle of spread, which cannot be eliminated by focusing, is proportional to the 7 {5 `' q0 P+ |( z) N gratio of the wavelength of radiation to the diameter of the aperture.7 E5 E5 z+ X/ Q& J4 r Digital 8 Q( W" r) ~$ D3 @ w" e4 U' NProcessing 1 e$ u& {2 E# h. lThe most familiar type of computing, in which problems are solved through the. |/ Z4 }. I: Q mathematical manipulation of streams of bits. # H7 O& G# h9 F& e* YDII Defense Information Infrastructure% U, _$ p) V8 w! I) Z# C3 g* s Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to ) r7 b0 W9 g+ Z4 t& Z12 km) between wake termination and de-sheathing.1 o9 P/ v* }& V: U% h8 l' ^2 N DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). & ^/ S$ ?+ @ ~: MDIR Director.- o/ |) Q3 f9 y9 j J; [& h! X Direct Air- V) g/ ?! T& ~7 c' \8 P. g Support Center , q$ W: N4 w+ `" y- N8 g+ x# ]. fA subordinate operational component of a tactical air control system designed3 f) g' K* @/ ~1 L0 }7 L3 w for control and direction of close air support and other tactical air support, F. O4 L, }( @" { operations, and normally collocated with fire support coordination elements.' y4 K t1 h2 A5 ^$ i* o1 ~" w Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not# M* G6 Z1 X1 l1 C& P; K7 ~ necessarily limited to items that are incorporated into the end product as labor or ) f( S. E# i5 M# g* Imaterial. ' w3 ]# @7 {" T3 q2 r. U5 U. ZDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing4 L, w9 ~, Z# W2 J3 c direct labor includes fabrication, assembly, inspection and test for constructing $ U/ L( j! b1 w/ O1 k" @4 rthe end product. Engineering direct labor consists of engineering labor such as5 x+ l# |, X& Q ^5 ^7 w reliability, quality assurance, test, design, etc., that is readily identified with the * I( R0 [ n1 z& o5 d+ Zend product.7 L7 ^8 R% U& [, Z( @( ~% d# ]7 G7 \* | Directed Energy 4 e) P; [0 U4 W( F! P2 K' v' Z; D(DE)) B* [/ }6 F% J( @% t$ i' q 1. Energy in the form of atomic particles, pellets, or focused electromagnetic ' }& r" f7 u8 H7 T2 Mbeams that can be sent long distances at, or nearly at, the speed of; ]/ X; H4 i: l9 N% Y light. " [6 U5 L$ p( c$ F% T2. An umbrella term covering technologies that relate to the production of a 0 z4 E1 ^! U8 T6 R1 E' D( ibeam of concentrated electromagnetic energy or atomic or subatomic particles.& ?: }+ V! x, T MDA GLOSSARY, VER. 4.0 D & D: A# s. m& L817 i: G6 ^' J/ j F* G7 p' _ Directed Energy 7 Z2 T; w$ x* A2 b( U. V7 p& [! D7 N3 cDevice& z6 H) |% F( `. L8 G A system using directed energy primarily for a purpose other than as a weapon.( O2 K) w( R. v Directed energy devices may produce effects that could allow the device to be 8 x. m- F3 _5 d$ |. K) q- W5 vused as a weapon against certain threats, for example, laser rangefinders. ( X: H% [* L, Z! C: x- zDirected Energy / b n' n6 @9 i/ [- ^, K: @/ yWeapon (DEW)! N$ O% ` \& t1 H* ~8 D A system using directed energy primarily as a direct means to damage or destroy5 ?. p9 T6 W$ q0 u! C" [ enemy equipment, facilities, and personnel. 5 [$ `' Y9 z( T+ a6 h$ s6 J) F! {2 zDIRLAUTH Direct Liaison Authorized.$ {5 y9 S- `5 s% g- w! u DIRNSA Director, National Security Agency.# _6 u1 p: S8 Z, m DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. 9 @4 O" M9 @$ L2 UDISA Defense Information Systems Agency, Washington, DC. (Formerly known as , a( c- P; h2 `0 U* ~Defense Communications Agency). O, }* s( \. K" XDISCO Defense Industrial Security Clearance Office 6 u! k! l0 F+ O$ U0 j/ b( u1 O: Q8 TDISCOM Division Support Command (US Army term)./ K& q' x& @9 d, u Discretionary 7 g) u) l- Z9 HJudgment 9 q% [5 v2 O3 o# vThe authority given USCINCSPACE or his duly authorized representative to+ K1 z4 U7 u) Q8 ^/ e- t perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination4 p3 D! Y/ K: R6 }! [ DISN Defense Information System Network (DISA term).3 D; T8 [8 `0 t/ d5 a- j, N7 C DISSP Defense-wide Information Systems Security Program." ~8 G4 a% c' |6 q DISUM Daily Intelligence Summary (JFACC term).. i3 M- c( @6 T DITDS Defense Intelligence Threat Data System. 3 v) G/ |$ b# u2 x- P: UDITP Discriminating Interceptor Technology Program. The objective of DITP is the $ H' ^: R: r6 e$ I' hdevelopment of advanced interceptor seekers to counter advanced threats. $ Y5 I3 j, N7 x# c/ c# ^+ h. pDITP will integrate passive and active sensors into an interceptor seeker that * W# k$ X9 E( r1 W$ P' Pintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP * [9 t' Y. S# [7 V" T, Oflight demonstrations will involve the tracking and interceptor on-board + W2 p1 C0 a% {discrimination of targets of opportunity while providing fusion processor data : _, I/ e5 j% T u/ G9 ttelemetry. (See also ASTP). $ `2 ^# q5 S# kDIVARTY Division Artillery (US Army term). + I x; ^/ s3 q9 q' L- U% yDIW Defensive Information Warfare.( [! ?8 z c# y% _- B/ k! b, i, ] DLA Defense Logistics Agency, Alexandria, VA.5 p% {' e8 G: b1 @+ N( T DLSC Defense Logistics Services Center (Battle Creek, MI).+ z9 R9 d7 H9 y# I' h$ ^ DM Data Management2 P/ ]2 q- @2 ~5 H0 ^* B$ O, f DMA Defense Mapping Agency, Fairfax, VA. 7 e9 U! |5 k3 }$ eDME Distributed Management Environment.; m2 U: k. h0 k; o: f9 M8 _7 O DMI Dual-Mode Interceptor. 7 w+ a% V! K: NMDA GLOSSARY, VER. 4.0 D 7 O$ k( N1 q& G. y$ s. K82; t0 B) ?' h/ G4 U7 i DMRD Defense Management Review Decision. ; }4 _- |# N4 D$ kDMS (1) Defense Message System. ' c/ b# n' T2 e0 i(2) Dissimilar Mission Simulator.' c9 @/ s) }, i" H% }: K DMSO Defense Modeling and Simulation Office (OSD).& m" T/ r- u3 R- g DMSP Defense Meteorological Satellite Program. 1 ~; m9 u1 ~" y( A* |) [/ n* yDMU Disk Memory Unit. 2 k L# U% e0 O8 O5 `7 TDNA Defense Nuclear Agency, Alexandria, VA. L2 t! w0 r1 v b, ^; ?* Z DNMS Distributed Network Management System. ) ], n( R/ h. o: WDNSIX DoDIIS Network Security Information Exchange ! ?4 e6 R& E9 ^. ^6 _DNSO Defense Network Systems Organization. / E$ Y1 J) X3 }" u, Q, [DO The lowest rating under the DPAS. All “DO” orders take preference over unrated2 i6 P/ ]7 s% S1 X) r5 d orders to meet a required delivery date.5 c. k& w: n$ }9 X5 L Doc Document 4 h r) A# f5 t) LDOCPREP Documentation Preparation.7 f, w, ^! f, L( P4 C4 E Doctrine Fundamental principles by which the military forces or elements thereof guide - T# K e, x, N( H! _ ^8 Rtheir actions in support of national objectives. It is authoritative but requires- x- h0 e8 L- D- I/ ^ judgment in the application. See also Combined Doctrine. , |! @3 I0 S: S8 m& d& jDoD Department of Defense- h5 ^& f/ T1 Z& h: S' [8 D$ v DoD Component 7 k' g8 u4 l- a m2 rAcquisition . G: n6 }' W O! L( I. ^1 xExecutive9 n7 _' M% J! ~& c3 Z: h A single official within a DoD Component who is responsible for all acquisition* W( g6 h/ Z# s7 l functions within that Component. This includes Service Acquisition Executives % _/ |, P+ |2 u: W" o. zfor the Military Departments and Acquisition Executives in other DoD . G0 j# H0 o/ ?+ sComponents who have acquisition management responsibilities. ' V- [) t6 T" _7 ODoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,9 r L) I- }8 z# m$ w Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the) G4 D) N, h! ~ Defense Agencies; and DoD Field Activities. / X& ^3 s" B8 r v5 W% FDoDD DoD Directive.5 h% @4 _+ C. G5 s4 J( { DoD Directive4 _ h$ K: S' b 5000.1 ) p0 N9 a- H4 L6 ]; w+ w. g“Defense Acquisition.” The principal DoD directive on acquisition. It establishes $ y0 X: r! _2 Z; b' zpolicies, practices and procedures of governing the acquisition of defense 0 U9 q X6 I# F3 C' yacquisition programs. ( R2 g. k2 K7 L$ q; e. A# y: p& D9 _5 MDoDI DoD Instruction.4 ^$ A4 V; k3 V! L DoD Instruction, V# U r: B+ z( N( B 5000.22 k+ c2 A1 E* c& m; J2 h “Defense Acquisition Management Policies and Procedures.” Implements DODD ; A' u4 b4 c C0 @: b5000.1.2 I7 f5 p: @/ U0 [ N DoDIIS DoD Intelligence Information System.1 J' Y, ^9 g% ]8 O4 S( B DoDISS DoD Index of Specifications and Standards.3 ]* Q5 O7 ?9 |% O; K DoD-M DoD Manual.; c5 v$ o, \ C MDA GLOSSARY, VER. 4.0 D ! m% Q3 o( N9 f y% ~; w83 6 e3 w% q: _) b& w1 `DoDR Department of Defense Regulation.9 T* W) L, i+ t9 X# V" B DOD-STD Department of Defense Standard.% D4 Y6 f# x0 X& G2 J DoE Department of Energy. ) E5 X. I% g$ d2 l) l6 }DOF Degrees of Freedom. . K' x; c+ y& {0 V: QDog House Large Soviet A-frame radar used as a component of the Moscow ABM system 3 X$ U; W, i- e6 I1 d8 Zhaving a detection range of approximately 3000 km. It is believed to provide3 w, b! t' f7 z* z2 y battle management for the totality of Moscow defenses. # O( Z: w1 y$ m; r/ G# p& r FDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).- C; o7 C" z) P DOPAA Description of Proposed Actions and Alternative (environmental term). 3 d/ E. Q9 L3 w8 Z QDoppler Effect The phenomenon evidenced by the change in the observed frequency of a * g+ a+ [1 |5 n# ~, \ \sound or radio wave caused by a time rate of change in the effective length of; L/ N! j7 ^ a# F the path of travel between the source and the point of observation.- @) k/ h* d8 M; u3 O( V" N3 R DoS Department of State (US). x- s/ J# a* M4 X @2 rDOS Disk Operating System (TelComm/Computer term).: i& o& w/ ?$ J7 j% [: [0 g DoT Department of Transportation [US]. ) l& V @6 j$ YDOT Designated Optical Tracker. . Z+ y+ T' w6 b3 ~% k. LDOT&E Director, Operational Test & Evaluation.* w' H/ T, N& O! D* I! ^$ t DOTH Defense of the Homeland.( D% {4 ]( |6 r* U1 K Down Select To reduce the number of contractors working on a program by eliminating one or! L% I% Z- {0 z) a$ f3 a0 J/ n more for the next phase.# A( t6 ^ R, d- x DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.9 Y1 D4 q ~4 ]( v+ _+ e9 q6 i DPA Defense Production Act.. d( }8 s$ b' ~1 U, A DPA&E Director, Program Analysis and Evaluation.$ k k2 L; f+ u1 U( [% R DPAS Defense Priority and Allocation System. . q- X2 G/ ?6 m( l, Q3 b' SDPAT Dynamic Program Analysis Tool. + T: C, m' G2 X/ O* D2 k- n2 ?DPB Defense Policy Board. 7 {) c4 g' |* q. [8 f; O6 SDPG Defense Planning Guidance. 7 O1 }* M R% `0 O* t VDPM Deputy Program Manager." g* K+ \) w- ?: q: C Y4 A DPML Deputy Program Manager for Logistics2 M& B# x2 g( i+ { DPP Distributed and Parallel Processing (Computer term). & j) z2 X( R* y$ \; n( ?DPR Defense Performance Review.7 D7 v* {( U4 [3 Z5 H! V MDA GLOSSARY, VER. 4.0 D/ h% F9 p6 J4 s _- W# u7 a! v 84+ z4 T8 l, Z0 c/ ]1 s5 n4 c DPRB See Defense Planning and Resources Board. 7 W- A* ~$ k; M+ HDPRK Democratic People’s Republic of Korea (North Korea). ) L& J6 `& X4 [* vDPRO Defense Plant Representatives Office. ; r ?4 c M( ]4 ?4 ]3 f0 fDPSSL Diode-Pumped Solid State Laser.+ f0 w/ q. G: I! ]9 Z8 Z DR Deployment Review. 0 F5 i4 G! i0 M& Z6 f* r p; |DRAM Dynamic Random Access Memory., V1 u" o1 v6 W1 x Draw-down Curve A method used to encapsulate the overall performance of a BMD system that ' [# H/ r- [7 o" r6 qplots the probability of survival on the vertical axis versus the number of attacking H* i9 E& i# c7 R. BRVs on the horizontal axis. Used in conjunction with attack price, they are the . b$ k1 z; R2 P( O" gmost important expressions of a BMD capability. $ C. X0 y! B6 \: e$ EDRB Defense Resources Board.4 N2 S; b Y- I1 ^( K( b% l DREN Defense Research and Engineering Network." |9 t5 _, q# w- \, X DRFP Draft Request for Proposal.6 M0 h: \1 U& Q2 X) N5 s" H Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from7 j' d& i6 t0 n0 l' a7 p gravitational and atmospherically induced torques on the spinning projectile.1 J2 j& g9 T2 D8 \6 s- O1 S. D DRM DAB Readiness Meeting (DD 5000.2 term).8 x4 w: n h! y# ? Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also . D1 u9 N) G9 h6 G! x( B( jRemotely Piloted Vehicle.6 Y3 u+ C7 d3 W+ U1 Y) ]. N DRP (1) Deployment Readiness Plan (US Army term).+ `! m# l& n$ p- r9 b& _# O+ \ (2) Deployment Readiness Program. ! [0 c! h6 \& r. J1 s4 WDRR Digital Receiver Replacement (USN term). . f U# Z" |1 J# H. D4 l: A- \) jDS Deep Space. + ~! v9 w5 [4 u: kDS-1 Category of telecommunications circuit capability.. U W# Z4 X+ N6 X6 }$ d DS-3 LAN Category of telecommunications circuit for a Local Area Network." |6 c# c& c3 t DSAA Defense Security Assistance Agency (OSD).! s+ I: B1 Z# s/ b4 R* |* `1 z DSAT Defense Satellite Weapon.1 l9 g7 } O! g7 a6 C DSB Defense Science Board.0 \; C' w( ]) a0 C. u% c3 [4 J$ Y" \ DSCS Defense Satellite Communications Systems. ) Y% ` V6 K# ~/ \7 |DSCS-3 Defense Satellite Communications System Three. ; p$ R' H9 r; Q2 r/ HDSCSOC Defense Satellite Communications System Ops Center.0 c3 u6 Z: o# M$ p# y. O/ e DSI Defense Simulation Internet" ?) Q1 [* H) e MDA GLOSSARY, VER. 4.0 D3 C( l4 X9 q- U, d5 M0 }: H 85 & m/ T2 F) w9 d" D; b1 iDSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet9 Q( a. @1 C6 V" i5 ^) U3 g System.% K! K7 I: }. F7 O9 P3 B DSM Decision Support Matrix - ]: ]* S& _2 pDSMAC Digital Scene-Matching Area Correlation. # }5 k R* m; F1 \1 l& a1 VDSMC Defense Systems Management College., @ |$ n$ A3 `) c# z: Z& a DSN (1) Defense Switched Network (formerly AUTOVON). * l, a- v- O6 y* w% Z- X(2) Deep Space Network (NASA term). 0 w0 H& d$ c" MDSP (1) Defense Support Program. (2) Defense Standardization Program., {* v# S* g/ \+ d8 W2 g: T DSPRTM Defense Support Program Real-Time Model.' r5 l6 ~) q2 O* s6 z" P$ N! V' ? DSR Data Set Ready (TelComm/Computer term). 1 w5 q+ o0 Z( H* { s* \DSRCE Down Scooped Radio Control Equipment (TelComms term). ' z. F! Z$ T% p1 C O3 R- k) L) c! qDSS (1) Defense Supply Service. (2) Digital Signature Standard.. Y0 ^7 D8 ]3 {, m DST Defense Suppression Threat. + Q8 z3 o; y2 P' X( k5 u; uDSTAR Defense Strategic and Tactical Array Reproducibility.0 u4 i1 z1 ]# v, k! t" G DSTO Defence Science Technology Organization (Australia).- h; W# U" F8 L/ V DSU Digital Service Unit (Telecomm/Computer term).1 t |3 e7 S" W: }: l0 L7 h DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to 9 H1 V/ I2 O, S8 N( a' Qthe DNA.1 }3 g/ u. [/ E- i DT (1) Discrimination Technique. ( _+ ?7 h- s* M8 y B. G/ M(2) Development Testing.! p) @; I* t, E" k# j: e" o3 { (3) See Development Test I, II, III.5 C" j$ ~ m: R (4) Down Time (ILS term).) `: i1 \) _8 X3 Q. g6 M (5) Depressed Trajectory. 1 Y6 c8 n# R& Y: F, @0 w/ i( w(6) Dedicated Target.1 ], j6 Z. d7 z2 E DT&E Development Test and Evaluation. % @% u0 Y' t: L) r9 P. pDT/OA Development Test/Operational Assessment.3 U% B- {% e8 C8 t: J/ I DT/OT Developmental Test/Operational Test. / ^. R. A8 d1 M* T SDTAP Defense Technology Area Plan. / K% h, e/ q5 C2 aDTC Design-to-Cost./ i' A0 p# a% ^, E) ? A' t. e DTD Digital Transfer Device (TelComm/Computer term). 2 }& d, e2 N( L( _DTE Data Terminal Equipment (TelComm/Computer term). , a9 r* O' J( \8 s# O! N" N, aDTED Digital Terrain Elevation Data.' P0 r% k& D& Y. x( w5 M DTIC Defense Technical Information Center, Alexandria, VA. 1 ~5 z! x: g( p9 E; u' j1 pMDA GLOSSARY, VER. 4.0 D 2 u, h( P# N" \& |86" {: K2 F5 S: y& V: }- Y DTIS Defense Technical Information Services (now DEIS). 6 U t: G+ l2 e) v$ SDTLCC Design to Life-Cycle Cost. ; D: i. J4 {) @+ e# j* h! pDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL * g, | y. O" w) U3 q) v ^) Kterm). ) k6 c, ^* w3 O9 w. C" M2 \* M, IDTLS Descriptive Top-Level Specification." E( [: S i$ P' D DTMF Data Tone Multiple Frequency (TelComm/Computer term).: E$ U0 i) b: E1 [ DTO Defense Technology Objectives.6 l, `' a0 g' g" D7 t2 B! g; ^ DTOC Division Tactical Operations Center.9 W, `4 e- J& [) m5 D DTR (1) Demonstration Test Round. (2) Development Test Round. $ K3 o9 O& c9 a6 M* Q+ B& H; t+ _DTRM Dual Thrust Rocket Motor. 1 |$ G9 D; ]+ SDTSA Defense Technology Security Administration. ( V y* R2 f DDTSE&E Director, Test Systems Engineering and Evaluation. ! s+ T' ?& r8 \5 d2 b7 lDTST Defensive Technologies Study Team.. y- f$ P) o; l3 Q7 E. q% U; R DTT Design-To Threat( B6 r9 s: i* Y1 A2 d1 z DTWT Dual Traveling Wave Tube (Electronics Engineering term).2 K9 _- j2 I) k9 ~+ h5 u# M DU Depleted Uranium. ! T: w# ^) o* vDUA Design Upgrade Assessment.! [5 p* b7 m+ \# o5 W/ L Dual Source Two contractors producing the same components or end items for the same 6 o$ |3 P+ n S! G5 Y2 c. R5 gprogram. A" Q+ n$ ~* d; v5 f. B3 ODUNDEE Down Under Early Warning Experiment (MDA/DSTO term).% H: @, Z( U" t( [' Z* ^( d) c DURIP Defense University Research Instrumentation Program.0 N( V5 d: K! x: ~3 N DUSD Deputy Under Secretary of Defense.6 E$ l( z. j( V! c DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). . D5 L6 t0 b# x8 b/ ~DVAL Demonstration Validation.4 t' L% S5 c9 O% ]6 ^1 K/ |, w" ] DX The highest rating under the DPAS. It takes preference over all other rated and . i1 ]* z8 {1 K2 C5 c* S! n" Q! Hnot rated orders on a contractor’s production line. The BMD program carries a$ o; q% _2 A( @. {0 ~+ _9 V# Z “DX” rating.2 I7 ^' Q9 j7 V! G( N# ^( c MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 ( Y- F t i {E East- K7 w3 ]+ Z3 ?; V2 S E2 I See Endo-Exoatmospheric Interceptor. : K6 n( {6 K. [, E0 ^! dE2SRD Effectively Two-System Requirement Document. Z7 a! }! N' o E3 (1) Electromagnetic Environmental Effects.5 [: D E5 @9 p# y. Q( c8 i0 o (2) Electrical, Electronic, and Electromechanical. 8 d1 ~9 P! [- }E Spec Materiel Specification. + ]) Z; e# S, i% n5 y5 ~$ V, FEA (1) Environmental Assessment. % i# J1 ]; E7 q6 o/ _* u(2) Engagement Authorization. ( z, @: Y+ r& {' I" F3 G5 X(3) Executing Agent. # V! x5 q+ \5 U& x8 v(4) Evolutionary Acquisition. 2 V, C) R( C1 t" \( U(5) Environmental Analysis (environmental term). 5 }+ r" t- O& _: [( K3 K(6) Executive Agent.. w! J2 `. x( l EAC Estimated Cost at Completion. ]* p% L7 z' ` EAD (1) Engineering Analysis and Design. (2) Extended air defense.- R: l0 U0 K- p) s3 X/ A8 w EAD/D Engineering, Analysis, Design and Development.7 A2 W8 K9 g1 z9 T% A3 o/ ~ EADSIM Extended Air Defense Simulation. 4 W! q& K5 Z" B' mEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing 4 j. r% S1 V _9 Y9 b, {users to model military response to airborne and ballistic missile threats.% [7 ^( t8 f: G2 D5 I# q. ? EADTBP Extended Air Defense Test Bed Program. ! g* y% Z7 p3 f3 o8 l5 ?9 mEAGLE Extended Airborne Global Launch Evaluator.6 E: E! x- \0 [) p0 f4 E. M9 P5 e EAM Emergency Action Message.# J: j! c3 ?: V! o" b EAR Export Administration Regulations.+ r9 |) K, [6 \) v* Q; m) E$ d Early Operational: b3 w3 ~6 z3 a( v3 N. G5 o Assessment 7 o5 @( J/ O$ [. p4 EAn operational assessment conducted prior to, or in support of, Milestone II. 3 J' l( Q" I1 kEarly User Test # n8 Z" L/ _" Q9 _' [& ]) \/ I(EUT) " r# F. J+ g# A) BA test employing representative users to examine materiel concepts, training or" M/ ?- e) G: s4 E% |4 b1 Y: u4 t logistics planning, or inter-operability issues. EUT can be accomplished during 6 i2 u/ T2 H$ d, Q7 a* [DEM/VAL on brassboard configurations, experimental prototypes, or surrogates 4 v/ w- c" E& p) I- u2 N. W4 sto provide data leading to the decision to enter full-scale development., ]$ m+ y) V- o' B* U; `3 f Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of 0 u P8 x( O/ e- R [surveillance satellites and long range radar.6 Q: H+ Y8 g6 ?" X, c (2) Early notification of the launch or approach of unknown weapons or1 d8 F9 ^3 @+ E+ W: x9 o weapon carriers. / y$ x# W" f8 d" A3 uEarth Limb The apparent outer edge of the earth as viewed from space.& B( _& ^; V' q; i4 ^! u Eastern Test " _7 l5 s% N7 \% g! B" yRange (ETR)* z! u9 u) K8 B, W# K5 X Beginning at Patrick AFB, FL, this range stretches halfway around the globe ! u& |. Z; J- ]8 j! ~) o8 awhere it meets the Western Test Range. An array of launch complexes, sensors, 9 Z) D; K! n' s* ]" land tracking sites make up the Eastern Test Range. The ETR is now operated O0 c; Y; c6 J8 D" w$ S [ by AFSPACECOM as shown in WTR definition.% u# S. m) [, g: a. |' p. a& k MDA GLOSSARY, VER. 4.0 E+ |2 y& m' T3 i 885 ^$ x1 ]! E7 ]9 b8 G6 ~ EB (1) Electron Beam. (2) Enhanced Blast. 1 b& d; b, A/ F+ W9 ]( oEBB Electronic Bulletin Board., Y! b y7 c# O. F$ ^ EBCDIC Extended Binary Code Decimal Interchange Code. 6 Q# D) ]2 I: B* lEBW Electron Beam Welding. $ j& N- I( j ~1 z& F7 PEC (1) Electronic Combat.2 V, d* K4 |9 \' O' m (2) Error Control. % V9 k/ F) T2 j/ l: M(3) OBSOLETE. European Community. Now known as the European Union & f8 ?+ s: c' `" _ a. n(EU)./ u- K5 a( T$ b" f9 D' y: ` EC/EDI Electronic Commerce/Electronic Data Interchange " e' f. |: y8 B' pECAC Electromagnetic Compatibility Analysis Center.; t$ T; u1 [- ?$ c `' L( ` ECB Engineering Change Board. # T ?- z( N/ t- KECC (1) Equipment Control Center. (2) Element Control Center (USAF term). 8 R; H& ^$ t& O. iECCM Electronic Counter-Countermeasures.- W+ m1 ?$ G9 b8 s7 a' P0 ~! b! b ECDs Element Control Directives.8 d" v. _8 P: }5 s; | ECLS ERINT Command and Launch System. 2 u8 k8 C6 h" ~, eECM Electronic Countermeasures. j4 N: ?& U! a% q# V2 oECN Engineering Change Notice.4 J4 ^5 {4 o1 `( N, K: f ECO Engagement Control Orders. n H1 m8 {( B9 t p ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.2 t4 C4 w' f% p1 j- \ ECPMO Electronic Commerce Program Management Office. ! ~8 u3 m8 ~3 @' _! ~ECS Engagement Control Station (PATRIOT).; W7 i! m# ?2 x! ]+ `4 C& { ECU Environmental Control Unit. : F0 ~, }' w E8 ~: k9 jEDAC Error Detection and Correction & t! e2 |; Q$ k# X9 x- D1 CEDGES Electronic Data/Guidelines for Element Survivability. ' U2 \( r" ]1 L$ P4 Z+ ]9 mEDL Electrical Discharge Laser1 T% s$ i' p; \5 H) o EDM Engineering Development Model.' i `, u' w/ ?! f2 V0 f1 c2 _ EDP Engineering Development Process1 M/ W7 r8 M% H, H" u0 Y EDR Embedded Data Recorder (PATRIOT).9 q' i# Y" n: c& q EDS Electronic Data Systems Corporation" x) r& N/ t5 z8 Y7 @ EDWA Engagement Determination and Weapons Assignment (PATRIOT).6 V+ v/ x, }- ` MDA GLOSSARY, VER. 4.0 E 8 @" m7 g0 f( _89 $ p( U! P" @3 g% }7 iEDX Exoatmospheric Discrimination Experiment + B* D5 u' Z' b" U2 pEE (1) Electrical Engineering. (2) Engineering Estimate. + F7 e; B7 U6 b) w* AEED Electro-Explosive Device. A8 D$ N! ^- Z/ c5 DEEEV End-to-End Experimental Version.# i$ N" _- d1 R! F! u2 K# A EEFI Essential Elements of Friendly Information. ; k4 w9 X- A9 A/ i" SEEI Essential Elements of Information. $ O* ~9 g5 S7 f @0 S& iEEIC Element of Expense Investment Code. 9 R/ H& e8 s& wEELV Evolved Expendable Launch Vehicle (USAF term)8 ~, j& D3 I* {4 h K+ e EEU Electronic Equipment Unit.6 d4 w) S* H9 C8 z$ q* d EFEX Endo-Aeromechanics Flight Experiment. ; q7 E+ G8 Q) X# P4 A3 uEFF Electronic Frontier Foundation. - e2 a S3 x3 g$ l7 @( s# NEffectivity A designation given to the BMDS configuration and demonstrated capability at : e, K4 v6 E: W- x9 X. ]2 `a point in time, becoming effective at each increment when an element or, q- K+ |& F" n7 A/ p component is inserted into a particular Block.+ B2 L) t( t( N Effective Damage That damage necessary to render a target element inoperative, unserviceable,: W/ n% H* ?. R nonproductive, or uninhabitable.% [( o8 n X0 C" | Effluent Plume The pathway of movement of effluents through surface water or air. : _& j2 f# t" b+ WEFP Explosively Formed Projectile.6 t% D2 l' T, J+ h' i EGP End Game Processor.- V& M" t7 f: {! y5 z0 W EGTR Eglin [AFB] Gulf Test Range. 1 |% }0 S5 w0 d5 M; CEHC Enhance Hit Capability (USN term, related to SM2 Block IVA).3 e8 c8 }9 g0 [6 D$ q8 D EHF Extremely High Frequency. 5 |* A9 o# k# v, y, behp Equivalent Horsepower. 5 `7 l1 i& Y6 H9 h! tEIA (1) Environmental Impact Assessment. 2 C, r/ c3 ~# P t4 q2 I. c(2) Electronic Industries Association. 2 n6 {2 E C# C, ^6 h$ S$ x! cEIAP Environmental Impact Analysis Process. 5 l: z) F+ E! `; E& eEIP Exoatmospheric Interceptor Propulsion. \ I$ E# j6 @5 g% H0 uEIPC Electronic Information Privacy Center.1 u+ B" x9 ]; v w. G6 i% D EIPT (1) Element IPT. (2) Engineering IPT.* g. h, }2 h4 u( ^, u5 x9 A4 y& ~ EIS (1) Environmental Impact Statement. (2) Explosive Initiation System. . t1 ~6 q8 H& ^" y! ~* ZEISA Extended Industry Standard Architecture (Telecomm/Computer term).! l. u3 P6 p3 [5 i" @ MDA GLOSSARY, VER. 4.0 E6 Q/ |7 m- p% K( K) O 90: g% u1 V* N1 ?* n EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. ) S8 K5 I8 b, w! s( \/ u0 r/ LElastic Range The stress range in which a material will recover its original form when the force 6 K" W5 `4 E+ ]( S7 D% l(or loading) is removed. Elastic deformation refers to dimensional changes & v9 i# i) t; J3 \7 \" ~$ \* v3 O8 `occurring within the elastic range. 8 R0 G5 s. }1 Y c( LElectro-Optics! z5 g' c7 r4 d# E; ~ Infrared (EO/IR) 3 l5 w4 y" s0 R, A/ i) gTechnologies/techniques employed by optical sensors in the wavelength; w; Y, {6 R+ b" w) h6 u spectrum slightly longer than visible but shorter than radio. & v. ^! o8 h% U/ zElectromagnetic @2 ]& s+ Z. T+ v6 M4 m) P) ?0 u Compatibility; v* m3 g" Z1 c& h (EMC) 9 ^; c# \8 S ]$ @" q4 B6 ]A condition when all electromagnetic emissions from electronic, electro-magnetic,) l' n, X' G; X p# } and electro-optical components of a system interact without interfering with one ) }9 R9 a8 `7 a1 ~# Z" P D1 {7 ganother.- B# Y! [8 M o0 _0 I Electromagnetic* V) w% f" F3 ?6 } Emanations P! a8 ?7 _. m- a+ v$ F4 h Signals transmitted as radiation through the air, through a vacuum, or through8 j$ E8 h4 _: g, A. @7 X conductors.8 Y! j9 }. U9 g8 u4 ?( U Electromagnetic* L" ~9 G/ ?3 x& j" a) i Field (EMF) ( B3 i# l F7 X1 D3 r% LAn electric or magnetic field or combination of the two, as in an electromagnetic; }. |: x i k( d$ [& ? wave. Created by electric charges in motion, having both electric and magnetic * J5 k7 C r' P, j' v% dcomponents oriented at right angles to one another and containing a definite $ i/ T5 X4 H0 @4 z* X1 [" ]) \# kamount of energy.% |* K7 f: e# z Electromagnetic : {' g t; G6 s" U: U% CGun (EMG)& x6 q n- F9 K; q# E A gun in which the projectile is accelerated by electromagnetic forces rather than 8 H% r# [1 U( H3 k$ P. Sby an explosion, as in a conventional gun. 1 f' T) n' g B; U+ CElectromagnetic* {( G P0 Z* @0 \8 V7 r! W Interference (EMI)) I T. J3 A& J7 x8 r0 T; [; C Any electromagnetic disturbance that interrupts, obstructs, or otherwise : |1 ^7 s+ k" G* g; ]- udegrades or limits the effective performance of electronics/electrical equipment., k& X* M- z5 Q, O& O( z2 Y It can be induced intentionally, as in some forms of electronic warfare, or' a0 M4 w; ~2 ^6 X: s, U" ~ unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.( z% q1 K( ]' L$ R, ~" T+ W9 o/ @5 r6 ^ Electromagnetic 3 C0 E6 ?& V: d V" ?Pulse (EMP) & m( ]' x- `1 lThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of ) h$ l& A) P" u; `) r6 O( Y) uthe nuclear device or in a surrounding medium. The resulting electric and / y+ l# O5 r. B% ?2 mmagnetic fields may couple with electrical/electronic systems to produce7 v) a: w: _/ T# i& _$ V1 x$ { damaging current and voltage surges. May also be caused by non-nuclear 0 X& B# H1 M \' A/ Emeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic 6 y% z5 V4 Z4 q7 o9 ARadiation (EMR)% [+ e! r, T% Q0 B9 ~) P3 P3 n. M (1) A form of propagated energy, arising from electric charges in motion that ; U& Y" n' L" O! v2 k' B$ ~produces a simultaneous wavelike variation of electric and magnetic$ Z" ]9 r% [! ~0 `" R" o7 ^ fields in space. The highest frequencies (or shortest wavelengths) of5 @2 ~ |0 D$ M: m d, b such radiation are possessed by gamma rays, which originate from! u+ y9 f8 r4 N( s processes within atomic nuclei. As one goes to lower frequencies, the $ G# f2 K" s9 J5 q3 Velectromagnetic spectrum includes x-rays, ultraviolet light, visible light,0 e) I/ s S( Z9 k, C infrared light, microwaves, and radio waves.6 f. v1 X! |* l( B' Y7 a/ ? (2) Radiation made up of oscillating electric and magnetic fields and* z6 |. Z+ v- S+ F% d propagated with the speed of light. Includes gamma radiation, X-rays, - U; I9 Y) {! _* N* Vultraviolet, visible, and infrared radiation, and radar and radio waves. 0 y k( P6 N4 VElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices: z. Y g2 A( ^4 g0 ` used in system/subsystem design, excluding employment in the RF spectrum.. y5 Y2 }8 j: X. d) D Electromagnetic8 |9 b! P2 m& o( ]9 @1 q Spectrum! W+ F! ]! R1 D; r, |3 b. ^ The range of frequencies of electromagnetic radiation from zero to infinity. It is( {: n+ x6 X. J5 w& D0 t divided into 26 alphabetically designated bands. " }* i1 t& Y' O( c! o7 I1 ^MDA GLOSSARY, VER. 4.0 E1 w1 F" \7 V+ o0 S) b% U) T4 Z 91 " X: R$ N) q; V1 TElectronic : E1 w$ u& X& G9 z# s! uCounter-( m8 I" W/ C& G j2 W4 R8 g! t Countermeasure ! }6 d2 X j; l; H5 is (ECCM) 4 @" t) b# W/ U ` v0 zThat division of electronic warfare involving actions taken to insure friendly+ ]9 D, B7 @' g0 Y% r effective use of the electromagnetic, optical, and acoustic spectra despite the " D- ^# e: o/ _enemy’s use of electronic warfare to include high power microwave techniques.# B6 F6 ^* _$ \0 y. e1 } Electronic 4 Z. |% P7 {! ^3 H# l( S6 eCountermeasure # ?; Y) M- C; H# z(ECM)* S6 e8 ^% i8 R1 _+ p: j$ p That division of electronic warfare involving actions taken to prevent or reduce an 2 E: V, d4 X9 p1 S! ]0 n8 M+ _enemy’s effective use of the electromagnetic spectrum.: Z2 Q' i$ `' v) N Electronic T# C0 r& C m( E n5 v+ S Industries. J x, P& u! l3 ]5 \ Association (EIA) - y; x. s+ c- ^, t8 PA standards organization specializing in the electrical and functional9 H; {0 M: Y6 N% P) j characteristics of interface equipment.( J3 O5 A- X+ ~. _% M2 M Electronic# w8 v/ f5 n: Z* @ Warfare (EW)" s o. r3 t8 @8 I Any military activity involving the use of electromagnetic and directed energy to 8 h% m: T) I) Kcontrol the electromagnetic spectrum or to attack the enemy. The three major 6 [0 ]3 k M7 [% Hsubdivisions are: " B( K% L( j: f" [9 v•Electronic attack – Involves the use of electromagnetic or directed energy to 8 d; n3 a1 T/ u( `attack personnel, facilities, or equipment with the intent of degrading, ! x# x4 `( H3 U! ~! o2 ~neutralizing, or destroying enemy combat capability. Also known as EA. * k4 `9 o& {5 X( k' E) X- bIncludes: 1) actions taken to prevent or reduce an enemy’s effective use of Q- D7 D( T& L) C+ V/ Vthe electromagnetic spectrum, such as jamming and electromagnetic & @. L% t: L. A0 g( ndeception, and 2) employment of weapons that use either electromagnetic or ' g) `, S+ E; C2 gdirected energy as their primary destructive mechanism (lasers, radio % c* T1 \3 C) m( B( C+ |frequency weapons, particle beams). + }1 Q; {. W8 ], H" W•Electronic protection -- Involves actions taken to protect personnel, facilities, 7 Q2 q: S+ K$ t6 E' eand equipment from any effects of friendly or enemy employment of% |- ]0 m. v* p; Z7 q9 ?8 W- S' ` electronic warfare that degrade, neutralize, or destroy friendly combat+ X& `6 H* `; y" y. E capability. Also called EP.3 a g: w4 z5 P •Electronic warfare support – Involves actions tasked by, or under direct0 D5 c0 E6 E' l+ p# i/ l control of, an operational commander to search for, intercept, identify, and: `7 H3 Y g0 N5 Z locate sources of intentional and unintentional radiated electromagnetic/ W& M- v, Q5 H2 N/ m4 v energy for the purpose of immediate threat recognition. Thus, electronic # Z4 E* h2 [0 z9 [1 Kwarfare support provides information required for immediate decisions 8 K1 y* v1 r1 ^7 B, c' F0 Jinvolving electronic warfare operations and other tactical actions such as" s6 W. y% w8 Z) H threat avoidance, targeting, and homing. Also called ES. 6 L, k, J' i$ B$ l5 B7 GElectronic6 ?" {0 F# N& f/ m Warfare (EW) 3 m1 B% E9 r( Z8 F$ W# {Environments; @" i: O5 q( p7 F0 b" _ Electronic warfare environments result from radar and communications jamming# S" Y+ y/ ]4 ^- ~ and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD2 [$ Y" v- v. y: \' Z. V system. ! T$ \. A/ a& l! f! q; ~Electronics 5 n- G+ |/ T2 v( @# PIntelligence - o0 d6 O9 y1 V# ^(ELINT) 2 `. B4 {7 O6 O; H2 ?. hTechnical and geo-location intelligence derived from foreign non-communications ( c% w( K3 ~; h, S$ j' zelectromagnetic radiations emanating from other than nuclear detonations or8 r" u- H3 R1 ?5 K# p4 c: \7 d( n radioactive sources. 2 v- H; I6 P! t+ C8 M, j; w* e2 YElectronics' P0 w- m r/ H7 z" G6 N9 o Security (ELSEC)5 \# u6 B1 {' c The protection resulting from all measures designed to deny unauthorized , A2 f& E# G$ f7 dpersons information of value that might be derived from their interception and' e6 g# a1 S. s! Y study of non-communications electromagnetic radiations, e.g. radar. , _" h9 _/ k4 H- |! n+ S- U2 dElectro-Optics . X" J% f1 k# _# ]: }Infrared (EO/IR) # v0 a7 _9 i( L' {Technologies/techniques employed by optical sensors in the wavelength $ N0 T% w Q5 l2 jspectrum slightly longer than visible but shorter than radio. 1 T& p3 A5 _: @MDA GLOSSARY, VER. 4.0 E. B- S2 C% d2 K) m- H 92% e! ^& p& d6 T& u, a Element A complete, integrated set of components capable of autonomously providing% u8 ]! x( F" U0 V$ f BMDS capability. k% b0 d) q" l Element 1 i% R6 v6 H! q' b7 l/ fCapability5 Q2 j2 } B( F- w9 e' O) r0 _; g Specification , g) ?& O3 G1 j1 Z) D* e/ A(ECS) + `4 P) D* X. W1 Y ^0 SA document that identifies the element-level BMDS capabilities and, y" l+ A- u: A3 s; m8 }8 D) y specifications necessary to achieve the system capabilities identified in the SCS. ( D# _' U) T3 MThe ECS further defines the SCS-apportioned mission/technical performance / @# X7 e6 O* ?8 Q, |capabilities and allocates these capabilities to the element’s components. D) T, g. [8 p. P# H E Element Control3 ]* h! A" Z" I! b( p Directives (ECDs)) I& e/ A$ p- J6 O! S The command and control data instructions to control the conduct of the' z7 `# O; K7 x3 I; f; ~: h engagement. ECDs are developed by command and control software based0 M. S7 y" N: s0 i* B upon variable parameter input by the operators (both pre-planned and real time), / Z9 V0 M9 I N" d& n* Hand operator defined rule sets embedded in the software. The individual battle- V8 L: b! a: b8 L0 e) B management processors use these instructions to accomplish the assigned tasks6 w) S) {9 F% n- y# e: z' O from the operations order. ECDs are contained within a Task and represent the. d& {8 @* D7 N3 M form of parameter values that influence the resource management processes of4 u7 i k: U" N4 }+ ?. m Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and , }; O! ?2 F4 x( J! P' ?Communications Management (CM). There will be numerous ECDs per Task.3 _6 e3 `5 \' ]# w1 W9 X7 G Element 0 T* m/ f4 q& u8 V0 H0 h7 zOperations : e# b6 a1 L: A: k3 v* _$ N1 ?+ }Center (EOC)* a3 s! T& x& C6 }2 ` An Air Force operations center, which operates and maintains a BMD weapon or O, F3 X/ o; _" |1 Y- csensor suite. (USSPACECOM) 6 f, r% A' u N1 MELF Extremely Low Frequency. . y- r# g4 y9 WELIAS Earth Limb Infrared Atomic Structure.8 A( Y2 d$ c' ]# G0 K0 T5 }; l# e ELINFOSEC Electronic Information Security. , {9 y% R# [1 V6 g0 LELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-15 16:50 , Processed in 0.050003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部