航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation( I& z' q9 G& j- n3 ^ COMSEC Communications Security.6 D& ]1 o: j0 G& m3 \ Concept & W) g2 A5 a9 F- Q' y2 \Exploration & % J% d, I3 }7 {5 K$ K+ m: n" |Definition. K/ P9 o& \, Z The initial phase (Phase 0) of the system acquisition process, beginning at 9 C. s; X% E' I- YMission Need Determination. During this phase, the acquisition strategy is. r7 O4 w& y9 D% \; ]8 V developed, system alternatives are proposed and examined, and the system$ o, {( g2 V+ V6 h$ Q9 T1 H- X6 f3 J program requirements document is expanded to support subsequent phases. ' ^8 V6 M* Q/ X! XConcept of ' T5 n9 g% G# ^& Y7 W" \6 x4 c: G7 vOperations" c ~/ {$ B! ]2 [3 Y l (CONOPS)4 V* X9 c1 }5 | (1) A statement, in broad outline, of a commander’s outline or intent in regard to ( s" n( }6 c5 x2 C4 Wan operation or series of operations. The concept is designed to give an overall * s/ ~) q1 Y9 s$ ?. r9 fpicture of the operation. (MDA Lexicon) 4 s, |# e' d7 v5 ]* w/ @(2) A verbal or graphic statement, in broad outline, of a commander’s 7 } z7 p+ ]* }% p# r3 Jassumptions or intent in regard to an operation or series of operations. The" u q& r9 d6 N: l- L+ f3 Y concept of operations frequently is embodied in campaign plans and operation* @# i6 t, n# I R5 ?7 V plans; in the later case, particularly when the plans cover a series of connected + u! z, s5 l6 E+ a& S) hoperations to be carried out simultaneously or in succession. The concept is/ m( L: b4 K) a. X/ y designed to give an overall picture of the operation. It is included primarily for : W* l7 F5 D; m' t1 K: padditional clarity of purpose.% h/ I" }4 A$ G, ~( T/ T6 S Concept Plan An operation plan in concept format. Also called CONPLAN." f# S# |8 \( q3 m Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of: c) F/ V6 \6 i5 Q% e the acquisition process, or combines development T&E with operational T&E./ C" n. P/ g: s t! P0 f3 X Concurrent/ g4 y. x- ^3 _3 f# U' L Engineering 0 A- x3 V$ K" {; a2 q& P% I PA systematic approach to the integrated, simultaneous design of products and & V2 N6 d6 M" G- `1 Ztheir related processes, including manufacture and support. This approach is( I; G+ u" N/ T% }% h! ?* W; G( i intended to cause developers, from the beginning, to consider all elements of, ^: W, [7 l: | the system life cycle from requirements development through dispersal, including& s. a v& ~& N# ~4 r" X; x cost, schedule, and performance. 6 n5 C3 S: w6 eCONEX CONOPS Exerciser. S- S6 ?" N' u/ i& k& I6 h Configuration A collection of an item’s descriptive and governing characteristics, which can be- n. f: o3 G2 d: k7 C expressed in functional terms (i.e., what performance the item is expected to- ^9 A a/ ]* \( S7 j achieve); and in physical terms (i.e., what the item should look like and consist of" A# Y/ z2 B( {8 R! U1 p2 |8 e1 @ when it is built). 0 w* u3 L% P: F5 E% y: LMDA GLOSSARY, VER. 4.0 C 9 U, Z8 k3 W3 H' \7 Q590 M5 |# D* Z0 Y2 k) ? Configuration " L' @4 d) Q5 B/ vAudit , k) ?& _& h: a% {% rOne of the Configuration Management tasks which includes a functional% \% |5 ~/ Y+ v. w3 _ configuration audit (FCA) to validate that the development of a configuration item+ i( h5 U+ c* _2 V has been completed satisfactorily and that the configuration item has achieved' D5 n0 C" L6 Q, @, P) o# U6 N( x to specified performance and functional characteristics, and also includes a ; K9 r: [. T" H. `; z* U2 g2 iphysical configuration audit (PCA) to verify that the configuration item “As Built” % r- f% E1 {9 ~, X! R' u Uconforms to the technical documentation which defines the configuration item./ m9 _) L$ j; O Configuration 0 y9 x8 l5 ~( a% F. g: {' DBaseline7 m3 L0 _( L+ j4 n/ D0 {. M The configuration documentation formally designated by the Government at a3 {" C5 \! O& N0 z; h4 `* D; }# _9 y' L specific time during a system’s or configuration item’s life cycle. Configuration ) V+ z m: | Nbaselines, plus approved changes from those baselines, constitute the current! @8 E$ f1 P7 x configuration baselines, namely the functional, allocated, and product baselines.8 H( t9 ]# N+ v3 {6 d) `' G' G: b Configuration : M* j- n! G0 z5 W8 q0 c# ^( ~Control& B7 b W) ]" W9 W One of the Configuration Management tasks that involves the systematic 7 E# c8 C+ [ Cevaluation, coordination, approval, or disapproval of proposed changes to the' z. r! n* S8 w O- w! j design and construction of a configuration item whose configuration has been - ]6 A2 x8 S" C3 Fformally approved. 9 W* Q ?7 z- N9 D" d( M) U: sConfiguration. Q/ j, A L1 I& U2 S) C Identification2 u: T" j8 z$ v- l1 c+ ?: [ One of the Configuration Management tasks, which require that for every0 A: S* H3 |6 Q, H/ @9 e change that is made to an Automated Data processing (ADP) system, the design) x1 |; b3 o: Y; x and requirements of the changed version of the system should be identified. 7 }2 G. M% v3 p2 [, i" y* AConfiguration9 h0 q, _3 ~( m; l7 m: ]# S Item (CI) ) l0 b/ I G; k( aAn aggregation of system elements that satisfies an end use function and is : x# @9 q# j: N3 r/ }designated by the Government for separate configuration management. ( r& X9 H& c0 YConfiguration items vary widely in complexity, size, and type. Any item required; O2 S/ C" s2 ^( g: l for logistic support and designated for separate procurement is a configuration" R4 \2 L6 z: @ Z4 j* p, ? item. Configuration items are traceable to the work breakdown structure (WBS).! Z; G- ^# D% D, c& R Configuration3 c: Q0 \( j: w3 L Management6 Q! y; h/ h! O (CM)0 t! w1 u* U2 M- G0 n) | In computer modeling and simulation, a discipline applying technical and# i% f8 ?% d# H4 W6 j- n administrative oversight and control to identify and document the functional 9 M+ d5 s U* M7 k+ I. arequirements and capabilities of a model or simulation and its supporting 7 B$ V3 j) U# M$ Edatabases, control changes to those capabilities, and document and report the g1 b$ f, V7 h% q, ]; b4 D* M3 zchanges. See also Accreditation. 8 h* f3 a. D, ], `2 D7 uCONOPS Concept of Operations.4 ^2 E0 l/ Z6 x- F1 X. i CONPLAN Concept Plan ) M! w6 D, i# u3 Y4 l( o- ~CONS Contracting Squadron.2 Y3 ~/ L0 |* M/ Y9 l Consolidated2 M# `9 \- B$ y" @/ x4 ?/ Y Command Center $ z6 C2 s# C. i/ E; T(CCC) : g) Q# C7 m" p& y" pA single command center from which USCINCSPACE/CINCNORAD can direct all 8 [! h; @3 A9 Z# N. `2 S& D9 Phis assigned missions, to include BMD. (USSPACECOM) Located in Colorado. P) Y+ D8 U6 u. C, Z; L Springs, CO. - I$ |' y+ G9 LConsolidated: w- k' ^9 E, Z8 g { Intelligence ; z1 \3 ]. @. L# Z7 mWatch (CIW)6 I% f6 p) }5 g& b8 ~% a4 ^: J7 a6 y8 | A consolidation of intelligence watch functions within the Intelligence Operations/ k( q! L4 X+ Q/ C Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD# |$ i6 h" J* v: }7 G Aerospace Defense Intelligence Center (ADIC), and the Air Force Space2 s, _$ U, L F2 W8 \% N* p Command Space Intelligence Element (SIE). , U k2 ?( h! N' p2 `9 R1 P8 ~Consolidated & L$ P% V$ u1 C5 F ZSpace # K7 C, b& l( MOperations6 J# [% ~) F8 U Center (CSOC)) H8 b! h- A+ E; y' ]( V Series of centers at Falcon AFB, CO, which operationally control and maintain ! a7 X D! l- ^" P" n* v, Z+ cassigned DoD satellites. 6 t# D. M X) z" T% ^) E, \. bConsolidated 6 g8 N) T6 c6 f* B; l5 f& WSpace Test4 m% b" f9 _9 b7 l$ Y4 ^$ X Center (CSTC)! l2 i/ w. T+ g3 `. I( ?' u Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and1 t' l& r; q+ \/ E initial on-orbit checkout of operational satellites, operate R&D satellites, and 0 P1 Y5 N1 V9 v: {/ dserves as a backup to CSOC for operational DoD satellites.) C) k3 p% I5 |0 b* ~& ~3 w1 h MDA GLOSSARY, VER. 4.0 C 5 ~. m0 g0 I, u- e& @9 }/ m) t606 m% v( ?! {4 W2 G1 t9 U% \: e Constellation0 g5 |# f+ u0 [# L$ j- M: |% R Size (CSIZE) 4 j; e' Y" v# ?4 w4 g2 U' p& aThe number of satellites of a particular system placed in orbit about the earth.3 Y- E- L+ j( F$ V0 T Contact Fuse Device used to detonate warhead on physical contact with another object. : g/ ~. I5 v3 uContingency r! h4 F* s6 q% l2 ~/ ^# sDeployment Plan8 a$ B! k. C" ^, f (CDP) t# B& ~: B1 ~3 b An executable plan designed to deploy an early missile defense capability and$ B/ q- g2 _: n3 W0 N reduce deployment time. The plan provides specific executable deployment 3 H6 j& L' j3 O6 w6 m( S3 Qoptions and describes activities required before and after a deployment decision.' O* d/ i1 U, s1 e5 R( c The plan also allows decision makers to have oversight on technical progress,( g6 V) ?0 ?8 j% C( ?' i cost, schedule, and risks associated with a deployment system.. @1 h# S) x- r' g Continuity of! Q+ \7 J! d9 k2 } Command2 y+ F! _+ S$ T8 L9 n' ] o The degree or state of being continuous in the exercise of the authority vested( W) J# f+ l8 u& [ in an individual of the armed forces for the direction, coordination, and control of) Q) s' P0 W' X: p1 F/ N9 A7 I+ r military forces.1 { M; i0 a1 G( L& F* y6 k Continuity of . n# J% ^4 t7 G) g* Q1 h0 [Operations) ?$ t7 G& d1 P8 C2 W The degree or state of being continuous in the conduct of functions, tasks, or# v8 N1 }: l# U duties necessary to accomplish a military action or mission in carrying out the . s: F- P1 P. E2 P5 }7 {$ rnational military strategy. It includes the functions and duties of the commander,, ^) ?5 J# C8 d- v S. m as well as the supporting functions and duties performed by the staff and others * W$ _2 F) b' B3 V; \& Y1 ]acting under the authority and direction of the commander. ; q/ M$ m2 @: W1 wContract " O4 j" V9 j0 }2 A: ]Administration! G) J& ], s; |. @0 ? Office (CAO) 6 d5 h" ^3 R& e" D1 W, yThe activity identified in the DoD Directory of Contract Administration Services% ^4 I& B/ a P" E* | Components assigned to perform contract administration responsibilities. It is a - c( b! Y- o. P% Kgeneral term and includes Defense Contract Management Regions (DCMRs),7 b! ^% w6 w. b% e Defense Contract Management Area Operations (DCMAOs), and Defense Plant & F7 F2 f% y* D, u1 URepresentative Offices (DPROs). (Defense Systems Management College- p, h t4 a% L9 G Glossary)( ^# n$ {7 A- ~( } Contract Data 6 U; e) d& C7 f6 s7 bRequirements) y3 z5 j6 e" [ List (CDRL) ' c9 i* W, n* i1 `0 ODocument used to order (“buy”) and require delivery of data. Tells contractor 6 [, q; K/ y% o! _! h owhat data to deliver, when and how it will be accepted, where to look for9 k# Z* Q" p+ b; Y! t instructions, etc. b" i2 X& N$ q" h' HContract ! \1 k w1 S/ }, {Definition4 u& v0 J9 T6 c1 ^" v& f A funded effort, normally by two or more competing contractors, to establish& }- y5 t6 I1 g5 U6 x' ? specifications, to select technical approaches, to identify high-risk areas, and to ; B# z7 ?! Q. R$ ?! P; }make cost and production time estimates for developing large weapons systems. ; E+ G' ? }) K* U3 m! z5 q9 fContract Work & C$ `% M1 p& e# ~3 C+ qBreakdown* q- t6 I# z$ \ Structure - t4 y9 @7 j5 [7 E0 {/ m% S& y" G* wThe complete WBS for a contract developed and used by a contractor within the& |- J6 O! z! d guidelines of MIL-STD 881A, and in accordance with the contract statement of% W# Q: v2 [9 S S. H work. 7 ^1 ^ a9 }9 B% q; B: S& d9 xContracting' g. d& C- k1 s7 G q Officer (CO) : @. S" k7 |0 @A person with the authority to enter into, administer, or terminate contracts and5 V& `3 F, T8 D( C make related determinations and findings. The term includes any authorized & i$ y2 H6 a% D9 j5 o9 Wrepresentatives of the CO acting within the limits of their authority. A CO whose 5 T- I V( i0 p/ v0 E; ^primary responsibility is to administer contracts is an Administrative Contracting- K% x& s' A/ `# G Officer. One whose primary responsibility is to terminate contracts and/or settle 1 [+ C$ A# y* S5 o. Jterminated contracts is a Termination Contracting Officer. A single contracting ( m1 x; k: T& z# c1 Wofficer may be responsible for duties in any or all of these areas. . X% v# ]7 f \" QControl Authority that may be less than full command exercised by a commander over4 e4 d+ C4 l1 z6 Y* i8 ^" J0 g part of the activities of subordinate or other organizations. 8 P* y6 n2 }: s! f5 |Control; G9 G% j' a5 i7 L1 W Abstraction- [+ T+ G9 f1 ~0 o4 t, M (Software) The process of extracting the essential characteristics of control by b y: L. r3 ~3 h defining abstract mechanisms and their associated characteristics while 1 v2 X& | q' u% R, f0 v, Idisregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C. F% Y' `* P7 ~& b8 X' }$ X# } 61 $ s: z: A ~1 y$ Z6 JControl and9 y1 I# ?* \8 j- ~! }7 s( ~) A Reporting Center 5 k, p1 A6 r# o' kAn element of the US Air Force tactical air control system, subordinate to the 7 F, {& m T8 c; U% S6 L( ]tactical air control center, from which radar control and warning operations are6 ~0 B$ m4 p& p! W conducted within its area of responsibility.: Q7 G' T# w, y* U, I8 i6 r* m- k Control and : w( Z. T F! ~Reporting Post# R7 Y' V; l) G! d! {$ b$ j4 m( R7 {5 G An element of the US Air Force tactical air control system, subordinate to the( `& x% U+ |) \' L- U: f, T control and reporting center, that provides radar control and surveillance within/ }: f( N: N9 n/ ^0 I( I0 I8 o its area of responsibility. ?% \3 k4 Y; c2 N! B$ K2 _Control Area A controlled airspace extending upwards from a specified limit above the Earth. 6 }# J# X( H3 R) g- zControlled, o' w# X! G/ S1 l4 {4 D+ F6 _ Environment . Q N; ^+ T8 D: j% XArea where entry into the radiation hazard area is controlled.: i6 F6 f) k% |' b; d! H. M Control & x( o0 C9 x" w, EProcedure % n; ]$ F! V5 I. bThe means used to control the orderly communication of information between; Z8 F# @4 W4 I9 n4 D stations on a data link. Also called line discipline.2 u5 ]" Y( }, S2 S; V6 \ b Control Station The station on a network, which supervises the network control procedures such 1 \5 K8 Q2 S5 \% z) Aas polling, selecting, and recovery. It also is responsible for establishing order F G% p; `% f; t on the line in the event of contention, or any other abnormal situation, arising u& c# L9 _6 e jbetween any stations on the network.: l" L/ P+ G" M3 T9 ^! v Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to ( O2 F9 f5 }% L; o5 E% p I" Uprocess sensitive defense information and that is under sufficient physical and 3 S$ x/ c9 a/ T V) n& H8 r8 }7 ^technical control to preclude an unauthorized entry or compromise. + W+ I, u3 N) O& \5 w% p* n& xCONUS Continental United States. $ [6 V! b1 ^; V$ l' j" c; B' uConventional Co- : E' B# O P. S7 ]4 `Production ( v8 I5 \" H9 o: D; \0 y) KAn effort between governments to produce the same end item, or components . m7 a% p( W* Q7 y1 yof the same end item, in concert. ?: y' B1 W) J! R8 K1 h; oConventional6 r2 N; ^/ S. j( l/ `4 m( _ Weapon ' `, M/ O1 J6 S. x, F1 k# H1 WA weapon that is neither nuclear, biological, nor chemical. 7 q& h4 |% r1 b' I* HCoop Cooperative9 t, |# }$ B. ?- U Coordinated$ e* t0 S7 K1 V9 O' c8 H' f Engagement ( X; o" L9 `7 |2 {& [: mPlanning/Actions% W P. }+ y7 E" d' K1 m Necessary coordination among engagement components to ensure maximum 2 Z: s! }* P" t4 Feffectiveness of the SDS and resources are not wasted on targets already & \ ?0 R: n+ Z* G4 Qtargeted. % W" E$ ~! F4 ` S H i* G' n- GCoordinating- r: `: O0 n5 b* p8 ^) D: q% l Authority # t! \1 C. ]# V5 t9 n) Y# @A commander or individual assigned responsibility for coordinating specific . D$ M9 B8 f6 Pfunctions of activities involving forces of two or more Services or two or more * K) B( }( P" `+ a' z1 S* q3 nforces of the same Service. The commander or individual has the authority to% M3 Q; l1 w! U( T require consultation between the agencies involved, but does not have the p; J2 K6 o9 u+ b4 pauthority to compel agreement. In the event that essential agreement cannot be | a0 @. t! S8 A" o' `% ?9 U2 creached, the matter shall be referred to the appointing authority.' B" K. f3 |; H7 q4 H" p" P COP Committee of Principals, m# ]7 {* t9 q/ ^ COR Contracting Officer’s Representative. Contracting Officer. 3 G8 N& f- ^0 [CORBA Common Object Request Broker Architecture. / \) i, Y) K B6 g. A- DCORM Commission on Roles and Missions. . J0 q) d8 ]7 e6 o5 CMDA GLOSSARY, VER. 4.0 C/ U! Z" y ^) | 62 ( S' B: J5 F' C2 h8 ?& T! jCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens0 Y- G2 ~) e; D: B0 @7 S perpendicular to one another, designed to act as a radar target or; x' h3 K, ?" K6 q* P& D$ O2 z c marker., A$ I! j$ p- _9 ^0 ~ (2) In radar interpretation, an object that, by means of multiple reflections' m* G3 n& o$ K0 _2 w* r from smooth surfaces, produces a radar return of greater magnitude than 5 E# M& B, ?6 A2 f! t* V9 `4 v5 |might be expected from the physical size of the object. u7 H, z# C5 P) pCorps SAM OBSOLETE. See Medium Extended Air Defense System. 6 j/ U/ {9 M K- ]' b) CCorrelation (1) The process of relating observations or tracks from one set of data to 1 B: i o0 P i0 [4 cobservations or tracks from another set of data, i.e., collecting data from % T% @8 R' b) H, Xdifferent frames or sensors that presumably relate to the same target. (2)% j, H1 A# |1 a% ]. k, ?* U In air defense, the determination that an aircraft appearing on a; R3 W! b, Q8 C3 S& t4 W radarscope, on a plotting board, or visual is the same as that on which8 s; X( E5 c2 j* ~* \ information is being received form another source. (3) In intelligence ; \% J% n: |8 o4 A: w. }2 Q v$ f% g/ Fusage, the process which associates and combines data on a single 3 i) q% _* M/ x8 Q4 u9 centity or subject from independent observations, in order to improve the / \+ }2 |) k) ?$ @! ]% W4 [reliability or credibility or the information. % M( t+ R( F, x+ n% R qCOSEMS Evolving architecture operations support tool.$ l" T" i8 U. r0 s9 R9 N% V4 f/ X COSM Computer System Operator’s Manual. a5 F/ c. k# O" g. I! n COSMIC NATO security category. 8 d% ?- }( F% a% J, mCost Analysis g; B" I7 W# j- J9 DImprovement T9 ]' ?. x: K% X5 f) c4 | Group (CAIG) . W4 |! }6 v# v; O1 ^0 X$ u; t0 SAn organization within the office of OSD Director, PA&E which advises the DAB# C: S8 b# g$ @! C( C) g7 f on all matters concerning the estimation, review, and presentation of cost 0 a8 F2 t5 i" Aanalysis of future weapon systems. The CAIG also develops common cost . j$ A; f V. B" B0 Iestimating procedures for DoD.+ v8 o: r/ m1 R. R' x4 |, h f Cost Analysis& N9 d7 ~7 I: i+ R Requirements * ?) {! B% {! M$ lDocument8 V# _$ A4 h& l- B; @, ]3 v( [) p/ L (CARD)' z: |1 Q, b g. f$ O" B/ |6 k" m" Y The document describing the technical baseline, which is a subset of current3 j$ i: Z' S( s5 @ system technical data and is used to generate the baseline cost estimate for an 2 g. n1 C7 e! }* f( B( c+ YSDS element. It includes, but is not limited to, the element description,# s* j q/ m" t interfaces, operational concept quantity requirements, manpower requirements,# M4 M- W& C. h' Q& k' F activity rates, schedules, research and development-phasing plan, and facilities# L% R. d8 I4 V0 T. d7 \" E requirements.) v/ m9 x3 t1 a1 t4 [0 G! T( i; k Cost and ( S5 a+ c$ z+ i0 ROperational - z0 h) c+ ~: r" AEffectiveness0 ^9 N2 N6 U E Analysis (COEA)1 I8 ^ D$ { j An analysis of the estimated costs and operational effectiveness of alternative0 [. q s- P# `2 C materiel systems to meet a mission need, and the associated program for * R* R: C" h; d1 u) S! I" L. nacquiring each alternative.! N- W" n6 y0 C4 t Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk % v- L8 E% X3 h6 ^due to cost estimating errors and the statistical uncertainty in the estimate. - E. b* w2 P6 H: ~: T, \Schedule/technical risk is risk due to inability to conquer the problems posed by) Z6 e" E- s7 w* J the intended design + P& k7 Q3 @* r/ yCOTR Contracting Officer’s Technical Representative. See Contracting Officer.; a. Y( y: A6 t COTS Commercial Off-The-Shelf.8 v" e6 e0 g6 ~! _" c$ n Counterair A US Air Force term for air operations conducted to attain and maintain a desired 6 b* q2 D0 M; l) B( w4 J9 v* ~: y, Gdegree of air superiority by the destruction or neutralization or enemy forces.* u9 U0 h+ X* \( C Both air offensive and air defensive actions are involved. The former range0 M0 K/ d- q6 ?! P$ x8 Z throughout enemy territory and are generally conducted at the initiative of3 _* G5 w+ |, }9 e! H9 g1 L friendly forces. The latter are conducted near or over friendly territory and are 0 t7 M3 J1 Q' O2 @, A9 E) Ngenerally reactive to the initiative of the enemy air forces.9 ~" [" X: S. ?5 v; ~* T" E MDA GLOSSARY, VER. 4.0 C : x9 L5 `7 O# t, j2 c6 i63 ; D% Y m/ d$ u( cCountercountermeasures 8 C7 u+ e* H& j(CCM)5 a7 d: B+ f7 F8 _4 I2 I& a8 W1 h Measures taken by the defense to defeat offensive countermeasures. # Z3 _9 e1 g4 O# G( _- {/ Y8 pCounterforce The employment of strategic air and missile forces in an effort to destroy, or% E" w+ o! p+ \5 z render impotent, selected military capabilities of an enemy force under any of the8 |9 i* V! K. I3 P2 D4 T circumstances by which hostilities may be initiated./ n! A, `; Z, r9 l Countermeasure A design or procedural measure taken against covert or overt attacks. # Z4 j' B- l3 X# R+ b9 oCountermeasure7 `; |% G6 ?7 V! u( S5 i2 r s (CM)9 f. \) a {$ r4 o That form of military science that by the employment of devices and/or / r, f8 g& Z5 `. O. a0 Ttechniques has as its objective the impairment of the operational effectiveness of( ?, c8 R* \; A4 J* d. u enemy activity. ( e, M$ T0 \8 b0 O$ L. j" p9 jCountermeasure' L1 S6 y k9 l s Rejection; I/ T, n2 t" c: \! V0 O0 | (Surveillance)$ L/ r0 s( ]/ |8 ?8 G Improvement or rejection of an object signal in the presence of8 M% W j) |4 R4 L% X: p countermeasures.3 I# N& d$ g7 l1 N Course of Action9 f3 r' ~. ~4 S$ X (COA)8 P2 h0 u6 \5 H L3 f# I (1) Any sequence of acts that an individual or unit may follow. (2) A possible2 g$ s9 E3 @, ?- D plan open to an individual or command that would accomplish or is " T1 E: c! A7 f2 Z9 xrelated to the accomplishment of his mission. (3) The scheme adopted - v; ?+ u" N& n% Y" M4 Kto accomplish a job or mission. (4) A line of conduct in an engagement./ U. U6 G; E3 s: J. | (5) A plan to accomplish a mission. It describes the execution concept4 P& f" R1 ~1 }5 `* { for BMD of North America. It will specify the engagement priorities, + ^4 |. }0 T3 H0 A0 H. U' ?% kresource allocation and desired results by Area of Operation (AO). # Q. w5 v# M9 q9 f(USSPACECOM) (6) The scheme adopted to accomplish a task or1 @0 {$ a1 Q0 f+ w1 | mission. It is a product of the Joint Operation Planning and Execution - |. q2 n$ ~5 Y: W. [System concept development phase. The supported commander will6 q& N8 J+ X5 {4 x" `( } include a recommended course of action in the commander’s estimate.+ a7 k/ g: \- K) }4 L! h8 _2 _ The recommended course of action will include the concept of! U# J# T* M0 I, E: ?; V$ J) X operations, evaluation of supportability estimates of supporting5 h& f8 H9 m6 y1 h organizations, and an integrated time-phased data base of combat, 0 x5 T$ V2 ?7 ~3 L5 R ]combat support, and combat service support forces and sustainment.& }7 L7 m7 v; z6 X Refinement of this database will be contingent on the time available for4 u" P. L f6 D* y5 p course of action development. When approved, the course of action0 v- x, ^. d$ A- q becomes the basis for the development of an operation plan or 1 D; j0 _) C8 l$ V/ ~% X* ?operation order./ M) k! G( q4 V0 P" a, t) k Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps,1 j! i# o7 e( ^( H7 c% {* y# [ and other geographical presentation systems. (2) Cover or protection, as 4 R& X A2 p ~+ b6 s& uthe coverage of troops by supporting fire. (3) The extent to which " h& l( Q. c0 W0 ~intelligence information is available in respect to any specified area of 1 @& K' d0 D4 `. W, o, xinterest. (4) The summation of the geographical areas and volumes of / R* f3 e( e7 @$ Yaerospace under surveillance. 0 m2 B8 W& V$ W7 ]! U$ pCovert Timing$ C% o' Y2 S, q% u Channel5 o+ n$ O; a2 L6 M" U1 r8 x z A covert channel in which one process signals information to another by( X/ [2 i& `8 ~ z modulating its own use of system resources in such a way that this manipulation. _3 _: b4 S) ] affects the real response time observed by the second process.6 ]/ X2 W3 l5 E. |+ A CP Command Post.5 c( @; r6 Z( k+ _7 y7 ]. W8 W+ n5 Z CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.5 X; V6 F/ @1 @2 q CPAF Cost Plus Award Fee.! y% J- X% L% j3 ?7 P8 t. R7 E CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)5 t9 v1 G; ^# K; M MDA GLOSSARY, VER. 4.0 C 7 K6 j$ d# {$ ^644 `; |" D& n$ X' R/ `2 p CPAR Cost Performance Assessment Report.- p& s; P U+ p3 x; \' \; [ CPAT Critical Process Assessment Tool 5 u9 f0 y5 S/ w$ g" FCPB Charged Particle Beam. + B$ u; w; A6 c Z* eCPEV Communications/Processor [Network] Experimental Version. ' P) e4 M% Y9 a$ ECPFF Cost Plus Fixed Fee. 7 r* L- a9 q8 }+ _: a: iCPIF Cost Plus Incentive Fee. W; F' z) b; r# {( `CPIPT Cost-Performance Integrated Product (Process) Team. 7 D) |4 u- g6 M( A1 T6 wCPM (1) Critical Path Method. (2) Contractor Performance Measurement. 9 |5 j% n$ P3 F. d- L p" w7 dCPP Critical Performance Parameter.; x2 M# o/ j \9 u CPR Cost Performance Report.9 f& z1 d7 E+ c/ G1 j5 T6 W* v CPR/NC Cost Performance Report/No Criteria (Contract management term). 1 y+ g% u% E0 x0 u' GCPS (1) Consolidated Program Summary. ; u- g4 \9 X6 B3 c' ?+ q9 X(2) Competitive Prototyping Strategy.$ L# a5 b! T3 P (3) Current Program Status.. `6 @/ y D7 i( F& M CPU Central Processing Unit (TelComm/Computer term). * g, @. g" Z/ qCPX See Command Post Exercise. ; z! z* I: v# @4 {CQAE Chief/Contract Quality Assurance Evaluator.5 R( A; [. o# I! H6 Y/ H' J4 L& B CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).; V/ v9 V+ n* k; j! y CR-UAV Close Range Unmanned Aerial Vehicle. % U1 M/ E7 q9 X; u$ y+ E7 dCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement3 \- p( J3 u. j: m# A CRADA Cooperative Research and Development Agreement. 0 I1 e7 ]/ r1 k' U1 F- _CRAM (1) Control Random Access Memory. : s$ M8 z" t# X) x. C(2) Cross-tie Random Access Memory (Computer term).9 P4 ?1 A+ V# D4 v# |7 P CRB Configuration Review Board.8 O' j) C* k/ Q/ m, } CRC Control and Reporting Center.9 ]+ c6 e$ j' T. Q' R0 V6 ] CRD (1) Capstone Requirements Document.* H2 u7 X$ ^) [2 \1 x0 V (2) Component Requirements Document.+ \, U% E: D: b# p" k CRDA Cooperative Research and Development Agreement.. e: M( i$ N/ \2 ?6 E CRG Communications Relay Groups (PATRIOT)." T* n3 x1 M$ K& \* a" I7 V7 |! V CRI Classification, Recognition and Identification. & @0 y6 G' M' ^8 mCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C, a1 ~( E+ \1 \2 M$ T8 N% j" i 65 ' [2 y5 G: _" K6 F; `- \" XCritical Design 4 E9 M% T+ H' t' CReview (CDR) k4 a) S' T- Z. }! _A review conducted to determine that the detailed design satisfies the 5 s" H/ q6 C% K% x9 Iperformance and engineering requirements of the development specification; to 0 b! m& x% l+ i' restablish the detailed design compatibility between the item and other items of ! y4 z7 q- O4 m. I' n8 h) hequipment, facilities, computer programs, and personnel; to assess producibility + k5 _" B0 m6 ?% d; R+ x/ a9 _and risk areas; and to review the preliminary product specifications. Conducted , i2 Y0 K. I w# G( j2 ^$ w0 N6 fduring Phase I, Demonstration and Validation (for prototypes) and Phase II, ; V/ P2 Z% ]% S$ [+ n2 t/ m; I: Q. bEngineering and Manufacturing Development. 7 o2 Y' Z- q2 f, H' M8 UCritical9 l8 _+ m# i1 p Information 5 [7 q0 m0 X0 dSpecific facts about friendly intentions, capabilities, and activities vitally needed" m* I! M8 g O& \ by adversaries for them to plan and act effectively so as to guarantee failure or' {3 {* U. K$ z7 D2 e unacceptable consequences for friendly mission accomplishment. , [7 c) ^7 f. j0 X1 q7 xCritical + I' s8 j* G8 _3 kIntelligence/ G6 O. n4 v' z! x Parameter: q; v4 z( f0 V6 ?- J- c A threat capability or threshold established by the program, changes to which* _% Z2 r+ H! J4 M; h& {: y could critically impact on the effectiveness and survivability of the proposed- k+ l$ _2 D6 [, S( k+ C system. 7 _4 Y( A" x& }. ?% L* x5 ZCritical Issues Those aspects of a system’s capability, either operational, technical, or other, # M' x# e' r. b4 b: pthat must be questioned before a system’s overall suitability can be known, and . ^/ L3 A0 c$ e) {1 iwhich are of primary importance to the decision authority in reaching a decision% n1 d) ?6 L- Y0 N* Z. P) c to allow the system to advance into the next phase of design, development, , K S+ c' E) Lproduction, or post-production.7 Q0 W6 a* `" q( o E, Z0 R! q Critical + x4 `1 y9 v& hOperational3 B/ ?- X# M/ Z1 X; m" F Issue2 K' ?) o* S/ O% Q" f. `# G A key operational effectiveness or operational suitability issue that must be " L& q8 F8 S" |( }examined in operational test and evaluation to determine the system’s capability & G1 A( E2 v4 F4 O5 Fto perform its mission. A critical operational issue is normally phrased as a / A$ x1 p$ O4 m+ r5 d- @" fquestion to be answered in evaluating a system’s operational effectiveness& y9 h( x* |9 P4 Z9 N2 x' B and/or operational suitability.! u( Q; P9 h: C5 ? Q Critical Path - F8 Y2 \6 [$ q8 C4 T/ tMethod' P; t% h! c+ b. Q* b* j6 y A technique that aids dependency of other activities and the time required to 2 `5 y/ }. Z7 `0 W' g4 k$ O Q3 `" d: Hcomplete. Activities, which when delayed have an impact on the total project5 ?& s9 _) V- | schedule, are critical and are said to be on the critical path. , t3 K% _ W: h5 \5 |Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to 1 M: f/ `. {6 e5 l) m# l$ rthe viability or the operational effectiveness of the SDS.- j) p& L. G# e( Z: F! G Critical Security) G+ |+ b% t* s Risk: g" b% _) b( P6 K4 k# _ The existence of a security vulnerability that, if exploited by an adversary, could # T% s5 E- S* H. P# B* U5 [cause exceptionally grave damage to the viability of the BMD or the operational ! X( v4 m' L1 Qeffectiveness of the SDS. Critical risks assume an adversary’s capability to7 ^3 i* V( s% h/ s+ e5 \ cause major system disruption or degradation (e.g., single point failure),# j# P1 g& V, u+ v2 C destruction of mission-critical components, or usurpation of system functions. 8 }- n/ ]) |6 s/ `! y& hCritical ) C9 `- \1 n2 ?4 |' S$ KSupporting ) u' o8 I) x& X1 A9 JTechnology . S6 Z: S, \" w, u) ~' A, {. u" o0 sA technology that program management personnel consider a critical part of the ) }3 M" i; n3 r* Oprogram being described. , K) [' `& O8 n' JCRLCMP Computer Resources Life-Cycle Management Plan. ! u. J2 r8 O. w; ` o6 P4 oCRM Computer Resources Management.* y. l/ q0 @$ I* R B# O% D7 S) x CRMP Computer Resources Management Plan. ' d3 S* z+ G0 P" G( e: PCRO Chemical Release Observation.1 a2 }' G$ {, d; X& G: H, ^ CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC6 ~: D. [4 u5 h& L term.), k: B4 z; k }( `3 b$ I5 I3 c; l MDA GLOSSARY, VER. 4.0 C 1 h) M% g! G: \4 _66 6 x" q% d8 y) g* _* ECRS (1) Computer Resources Support. (2) Congressional Research Service. (3) $ v( l' D2 c" BContractor Reporting System., T( D3 u* P! J CRT Cathode Ray Tube.' b( P( j( R9 m! j. j$ _ CRWG Computer Resource Working Group.2 D8 e0 e$ u7 T8 m) Z }% u1 a0 v* | Cryocoolers Cryogenic Coolers. 5 S- l4 c# D6 g; a8 I0 FCryogenic Of or related to cryogens (substances which are used to obtain low 0 e% b) O8 S) A: g) q( H/ Qtemperatures).) ~ q! b+ h8 M( A2 s! b/ A5 y5 }6 L5 s1 C Crypto A designation or marking which identifies classified operational keying material,5 v$ [9 \4 \; z$ I, [" D) w and which indicates that this material requires special consideration with respect5 `0 Q1 x5 |" v to access, storage and handling.1 R+ i$ }. Y0 m5 E& _/ e Cryptographic ) E+ i) m0 |% K0 y2 C# e" ~4 d4 O$ Y" pSystem ( H& g$ ` B' ]The documents, devices, equipment, and associated techniques that are used8 W" e# {7 ~' }# D as a unit to provide a single means of encryption (enciphering or encoding).% }: j: ^+ b: |1 y Cryptology The science that deals with hidden, disguised, or encrypted communications. It" `% G3 @; G" [4 e( U4 X includes communications security and communications intelligence.7 [0 T5 M$ d# j9 { CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.) ^! M' j; m: o1 n CS/CSS Combat Support and Combat Service Support (USAF budget term). $ I% u! d; z5 j1 L. i- ?2 qCSA Chief of Staff of the Army.) [- ]8 X8 u- R1 { CSAF Chief of Staff of the Air Force.* F! ^' v/ r- P6 Y3 h; X CSC Computer Software Component. 0 n7 J. m6 \& N0 B c* E7 qCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)4 @5 ?- L- G6 i& G; p$ h4 r' ?7 ] CSCSC Cost/Schedule Control System Criteria. % g+ I j2 t$ N" b2 \CSD (1) Constant Speed Drive. (2) Critical System Demonstration. % Z5 O: ?* g! ?0 s' A6 K1 D9 xCSE Center for Security Evaluations (DCI). 9 c+ U" [' E. V: T4 J% N( `, OCSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon8 d2 ?. _/ _9 i. r6 l System, located in Cherry Hill, NJ. ( Y0 B$ u7 u' D" U: }- ZCSF Consolidated Support Facility, Arlington, VA. 4 q* G2 _! W5 d; O3 h; M. r- yCSI (1) Critical Safety Item. (2) Critical Sustainability Item./ z0 D% m* p, G8 W5 ~ CSIP Current Systems Improvement Program.( Z- B- k1 k" A CSIZE Constellation Size." H" l! Q2 r3 L/ y8 S9 { CSL Computer Systems Laboratory.5 G: G& ^1 J/ }6 o( z; L* N- Q CSM (1) Core Support Module (*C2E term). (2) Communications Support Model.9 E% {9 i# K, o+ r- C CSNI Communications Shared Network Interface (NATO term). ( A: w4 k% _+ K0 VMDA GLOSSARY, VER. 4.0 C* V! x& h. L5 N% C4 y 67 8 S8 o+ h5 K" s6 w$ y" j5 i$ HCSO Closely Spaced Objects. 7 z8 Y; P4 W- h. [) O& DCSOC See Consolidated Space Operations Center. ) e+ N4 M/ E2 t" f2 d1 `CSOM Computer System Operator’s Manual * g: q+ ` x* M. e& G! XCSOSS Combat System Operational System Sequencing! G+ G7 R- R6 { F" m CSP Communications Support Processor (numerous locations, including USAF Air# `+ }% O/ L' J+ u, a! s Development Center, Rome, NY term). 9 B0 B6 j/ r! z- ?CSRD Computer System Requirements Document. Q7 z$ T2 T. f3 C9 \2 K M- KCSS (1) Cooperating Space System. (2) Communications System Segment. (3); k+ T" e; [# \& E9 u7 { Contractor Support Services. (4) Common Sharing System. (5) Communications! Q- A5 J6 l& i* t9 T0 j1 z Support System (Navy term). (6) Common Support System. (7) Combat Service , g# w. t B2 ~; i, zSupport.& Z7 p/ ]# u; j: f% x) F CSSCS Combat Service Support Control System (USA term).1 U* J- h* _5 {& r CSSPAB Computer System Security and Privacy Advisory Board.8 D5 I5 t1 G- L. H7 f3 }+ x4 L CSSO Computer Systems Security Officer. + n! @4 H9 O$ O7 ]" H- }# MCSSTSS Combat Service Support Training Simulation System (US Army term).4 a, g: k# ]& P: \: r CSTC Consolidated Space Test Center.( h; H" J6 _7 R: o CSTI Civil Space Technology Initiative. 7 T$ H8 R5 D" ECSU (1) Computer Software Unit. (2) Communications System Utilization. # `: s3 t- w' N8 P" M% i# YCSUR Communications System Utilization Report.- K& R0 A- M+ z$ ? CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. 5 [) F w% `+ Q( ~4 J6 ?(4) Cryptologic Technician (Navy occupation specialty). 9 B# ?! F0 h8 C5 L: k: YCTACS Contingency Theater Air Control System (JFACC term).1 W) k, ^+ g; }! v& m CTAPS Contingency Theater Automated Planning System (USAF). ) I/ O+ h; |' x' mCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. * G9 E+ Y$ B: X7 E2 cCTBM Conventionally-0armed TBM. . |2 Y5 _* D9 f9 z% [6 nCTC Combat Training Center, Ft. Leavenworth, KS./ T, U$ G2 J- u+ y/ a) S8 h U CTCC Critical Technology Coordinating Committee./ a% v. }' ^ t2 C CTD Communications Test Driver.- F" |: t4 @9 c- T& {- L: e: C CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. * _. z8 h% k8 TCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally$ p( o- O& x$ N' \8 v funding selected test investments proposed by the Services and Defense ; b2 B6 ?& @# f1 V6 d" H% ?Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C5 K6 u) C' ^+ ~% a; v I 68% p! ` J, @3 M+ U. L g CTF Controlled Test Flights.+ B; a+ K& a$ y2 j9 X3 ] CTI Concept Technology Insertion.; Q2 B8 A, Q- y6 Y0 ~: g CTN CALS Test Network.: Q |! z; d) v3 U& W/ p CTOC Corps Tactical Operations Center.9 F0 P! ?: N" p$ O: l CTOL Conventional Takeoff/Landing aircraft.: s2 r6 B8 N8 A3 f- P; N: k9 x CTP (1) Critical Technical Parameters." t- f R$ {* x2 L (2) Communication Tasking Plan. , r/ S; W' R% a(3) Consolidated Targets Program. , C2 b) c& r2 w5 _CTPE Central Tactical Processing Element.4 }1 }, @, m% M3 u% |0 d+ o CTPP Consolidated Targets Program Plan. + o# O/ ~2 C$ g$ ICTR Cooperative Threat Reduction (Treaty negotiation term). ' S( Z8 Z1 C, u0 HCTRS Centers . k' e' d7 k# mCTS (1) Clear To Send (TelComm/Computer term).0 r. L2 w" ^6 f* r (2) Contact Test Set (USA IFTE term).- O2 p4 U4 H; b o: e" A CTSS Computer and Telecommunications Staff.2 \4 g# [/ Q6 O! ^2 E CTT Commander’s Tactical Terminal (US Army). 5 }9 ?) i$ h U. v* r# @9 SCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). 1 g+ x) A$ j( J+ F: X- D! VCTV Control Test Vehicle(s). : U8 q7 a5 s: [- i KCUDIXS Common User Digital Information Exchange System. 3 L7 z* ^& j7 p7 L# Y3 D0 {/ Z" R# ]Cued Operation The directing of one sensor based upon the data received from another sensor.5 m( l, y( T! _, c! V- o Cueing Command The command within a tactic, which specifies the sensor element’s coverage 9 `- S) {( a4 c$ T$ m% G1 X1 bvolume.* X$ l+ [" u% K Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage 0 w& e$ Y) o! I, c! Rvolume. : B k( L) N+ K2 nCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae./ v/ y* e2 D* E; I( C! O! X3 J CV/BM Carrier Vehicle/Battle Management.' Z: @% y( l; s1 o CVBG USN aircraft carrier battle group.9 z! t9 O1 W* a. |' t" W v CVHG Carrier, Aircraft (V/STOL), Guided missile. {" ]9 [' y/ q6 X3 h4 l CVISC Combat Visual Information Support Center.8 n1 }2 I! d( N3 }' f/ r CVL Copper Vapor Lasers. $ \: i) R4 w' ~4 c$ xCVN USN nuclear powered aircraft carrier. 9 [; S7 p0 ^( p: b8 {MDA GLOSSARY, VER. 4.0 C0 {! |. U' B+ l0 n5 w. h 692 P7 w$ y$ F6 r& g' J5 ^ CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 5 V' ^7 ?1 _0 A- v |! g3 J, c2 y! NCWAR Continuous Wave Acquisition Cycle (Hawk).% m# L9 t" F" o3 s CWBS Contract Work Breakdown Structure.% @/ a) U) O: \ k5 v CWDD Continuous Wave Deuterium Demonstrator. , B6 j* L& H% T8 J! NCWIPT Cost Working group integrated Product Team. 0 T0 v8 u4 v F( }8 F0 {* Z0 Z7 KCY Calendar Year. # X5 N8 v& M8 U2 e% L0 qMDA GLOSSARY, VER. 4.0 D7 P' k* K( R2 x9 Q+ \7 y 71 ( C. r* M! [ {4 aD Deuterium 7 l7 D; C$ h: _0 \" V4 OD Spec Process specification.+ n6 I' P/ e4 E( K D Star Measure of infrared sensor sensitivity.8 V* m8 E4 T4 r1 c4 N: d Z D&D Design and Development! l) e' c2 ~+ v2 d- i D&T Detection and Tracking.. T0 |/ Y1 M# ^5 | D-IFOG Depolarized-Interferometric Fiber Optic Gyro.% m+ U5 `% G5 J# U I4 k% c/ T D-Level Depot Level (ILS term).( \# f6 ]. Z& c D/A Digital-to-Analog 6 o& i6 O! R% L* o8 @" i( l2 WD/V Demonstration and Validation.4 Y. c0 y! ]% W, T- c$ i. m% q D2 Projective (interceptor) in the Hyper-Velocity Gun program. 5 p! n1 R- `( B6 Q1 `1 EDA (1) Department of the Army. , }! a5 W+ M; z: e) g$ a! c(2) Department of Administration.3 X& m# p% Q1 m( U3 I+ J (3) Decision Analysis.; p- F4 b" _* _8 e V m (4) Developing Agency/Activity.- S& k7 H/ {- `$ n% ^+ j, C$ q (5) Data Administrator. ( ?" ]" H1 z6 g# P* B7 |/ {) F- \(6) Direct Action. 3 \$ ?9 |$ b8 c) i(7) Data Adapter.0 v$ o: r- W% N( Z/ J! x: R6 ` DAA Designated Approval Authority (DD 5000 term). 2 [- f x! t; e" l- UDAASAT Direct Ascent Anti-Satellite.9 G5 Z! k7 R. J3 b DAB See Defense Acquisition Board.0 p: X4 ~( N6 |2 u DAC (1) Days After Contract [Award]. # Y$ R$ }7 t$ @) q* j$ @(2) Department of the Army Civilian. 7 o1 {( c* m9 J3 i! K(3) Directed Attack Characterization.$ w$ P3 ^& q4 M: A1 o (4) Deploy ACCS Component. 3 e$ N2 h( |: c( n* C( I1 c(5) Digital-to-Analog Converter.; U# t* R" C" E* Y2 k) o DACS Divert and Attitude Control System.3 m, y* _6 u( Q DAD Defense Acquisition Deskbook.$ z0 s# v; Q9 k DADS Distributed Air Defense Study (1993).: c' N W4 l$ f) l0 v DAE Defense Acquisition Executive.# y) c7 f) d3 {6 r1 n DAES Defense Acquisition Executive Summary.5 ~: K$ p* a5 _! Q DAGGR Depressed Altitude Guided Gun Round.& R: A, c& d/ S DAHQ Department of the Army Headquarters.5 w+ d% ]( ?) L3 @$ x: O DAI Damage Assessment Indicator (targets). 8 ?! X) k% L. B: q; Q: P3 hDAL Defended Asset List., z* S+ G% E' L2 a- y MDA GLOSSARY, VER. 4.0 D # S# @+ _! t8 J4 t72 @: T5 z) ?' g" q" H( K [( a1 Q$ EDAMA Demand Assigned Multiple Access. 5 e% c& T' J& v. X4 q" YDANASAT Direct Ascent Nuclear Anti-Satellite.. J; o3 C/ D/ q1 _2 J: Y) [/ j7 K) g DAPR Director’s Annual Program Review (SDIO term) 7 E9 U# ?7 v- TDARO Defense Aeronautical Reconnaissance Office (OSD). 5 `( J5 e$ w6 I, z4 L& L8 ZDARP Defense Aeronautical Reconnaissance Program. ; n1 @/ {% {. bDARPA Defense Advanced Research Projects Agency. See ARPA./ U$ ^- `4 Q" U$ P5 v, S DART OBSOLETE. Defense Acquisition Review Team.' U, g7 Q# R9 i N3 s DASA German Aerospace. Member of the MEADS Program Team.4 m) J q K: M, t7 v0 f! N6 z DASC Deep Air Support Center (JFACC term).$ K% J2 w% R7 e5 ^ DASD OBSOLETE. Deputy Assistant Secretary of Defense. ! k3 T: m1 @7 H, W+ q5 \DASD (C3) Deputy/Assistant Secretary of Defense (C3)5 v: k3 ?6 L; q DASO Demonstration and Shakedown Operation. 6 P) a0 d6 M7 {Data Integrity The state that exists when computerized data is the same as that in the source9 I& L. l9 Q) N6 V" ?" N) O documents and has not been exposed to accidental or malicious alteration or5 @2 R8 `- h( m/ I" I2 _' | destruction. 6 f1 \$ y' u# W1 K) O4 q# aDatalink (1) The means of connecting one location to another for the purpose of: k q) P4 D9 H$ i9 p0 I8 j- ~9 I; Q transmitting and receiving data. + h2 ]* B7 `. v+ M* L2 b. b, i(2) A particular path between two nodes over which data is transmitted. It4 M! t" X3 q% l( [# X1 S includes not only the transmission medium, but also digital to analog 7 y( k+ X" u4 T% ]converters, modems, transmission equipment, antennas, etc., associated- n5 p( }& p! i, Z with this path. In the SDS backbone network, it was a path between two7 i, z- g1 o5 `, z+ C SDS elements. In space these datalinks were microwave or laser. On, Q) `3 [' j' Y the ground, they could have been wire line, microwave, or optical fiber.8 P5 y: `0 ?8 U1 }2 K/ @ DAU Defense Acquisition University, Ft. Belvoir, VA. * f& i! i% J: e+ Q- e# B. S9 _DAVID Development of Advanced Very long wavelength Infrared Detector (USAF - A4 t; ?# z) [0 b y3 I" Q% p6 RPhillips Lab term).; D A! M4 o, |" l2 e DAWS Defense Automated Warning System.7 h0 F9 C8 X0 h0 P. D5 i+ S Dazzling The temporary blinding of a sensor by overloading it with an intense signal of * p- d- _& ~# z8 t1 u9 u$ Felectromagnetic radiation (e.g., from a laser or a nuclear explosion)., `' c) s1 u* v' @9 D DB Bata Base 9 o; K% W7 e& @DBME Database Management Environment (Computer term). * G. R2 _4 ~0 {1 r1 ODBMS Database Management System. d! c V9 O/ U( j. p) V' W2 t* s; h DBOF Defense Business Operations Fund. 4 G5 I( y$ S3 ]2 J. ADBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D' f4 L6 b7 g" u 734 @7 M, |& ^) x1 G4 m Dbsm Decibels per square meter.' g! d' k7 j0 I8 G3 J! G DBSM Database System Management.6 F6 Q8 E' F% U% T DC (1) Disarmament Commission. (2) Direct Current. 7 w+ I. J$ t' A. EDC-X Delta Clipper Experiment. 6 H* v* J. J7 N8 I0 SDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications E: O* d& d% _7 Q1 S- @ Agency. (Now known as Defense Information Systems Agency (DISA)). ! ?3 a, h3 c; o8 p* QDCAA Defense Contract Audit Agency. , H( N2 n& @9 VDCAS Defense Contract Administrative Services. ' _! g+ e" ? `2 wDCCO Defense Commercial Communications Office (of DISA).; E' V% g9 T4 u8 g `; k. \ DCDS Distributed Computer Design/Development System. 2 p2 d2 q% x9 |) n" U0 TDCE (1) Data Communications Equipment (TelComm/Computer term).+ M R/ {6 O; O% Q (2) Distributed Computer Environment.; t8 y$ A7 m/ V2 L DCEC Defense Communications Electronics Command. * ^. N8 A* [& i$ {DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. 2 Q; ?+ O+ F7 f: j# h# p: rDCINC Deputy Commander-in-Chief. ( E2 Y A7 b' H. VDCM Defensive Counter Measures. ) I3 x1 Z9 x9 V, O) H* B1 q! mDCMC Defense Contract Management Command - n& r. \* A' cDCN Document Change Notice. ' ]$ b# t0 V" S! I. n! QDCO Director of Combat Operations (JFACC term). 5 _. P/ l8 c: G% Y% _. z- ?DCP (1) Decision Coordination Paper (see ADM). ( G+ ?* L9 [$ N: j, N/ h(2) Director of Combat Plans (JFACC term). ( |% V" K2 f& C9 [8 B6 R. ODCPG Digital Clock Pulse Generator.+ N6 e, Z& L5 C( o$ j# e) t DCS Deputy Chief of Staff. F" U8 i5 O7 i V: jDCSOPS Deputy Chief of Staff for Operations and Plans (Army).0 u# X" L. V& x) @/ Z, S4 N: s DCT Digital Communications Terminal/ R5 x2 Z3 T5 W7 X; q# t DCTN Defense Commercial Telecommunications Network. . K6 S# u3 b# i3 P: f0 i" WDD Variation of DoD. 0 \" H, u! T4 U) W0 I9 A: \4 fDDCI Deputy Director of Central Intelligence.9 \$ W0 ~/ X- z8 X DDEL Dwight David Eisenhower Library, Abilene, KN (army term).8 G- H$ u7 ]; B DDG USN guided missile destroyer. 5 ?( A& w! V$ m# O2 R2 zMDA GLOSSARY, VER. 4.0 D% z. l* o; j7 v- V' m 74& {4 C& B6 G5 Z DDL Disclosure authority letter. & W8 G. R- h; y4 @% l8 QDDN Defense Data Network.6 _& Y0 x, M% h2 c( J& F DDR&E Director, Defense Research and Engineering. " b# a7 f5 K7 E$ d5 ~& _3 G" kDDDR&E Deputy Director, Defense Research and Engineering. ; n5 Y O, F( a, t6 _! C) gDDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). # V4 W9 I$ _ s+ i Y$ DDE (1) See Directed Energy. (2) Delay Equalizer.6 ?+ V6 G$ v1 X8 Y$ Z8 f DEBRA Debris, Radiance Model. ! x8 H; b: A8 [* _4 `* F& O$ XDecentralized * F- V# U8 g5 F. dControl+ n$ Z9 S9 F, G8 ? In air defense, the normal mode whereby a higher echelon monitors unit actions,+ d* e2 L+ m& G8 l) A8 {2 z making direct target assignments to units only when necessary to ensure proper 3 \ H5 y4 \+ O5 Y( bfire distribution or to prevent engagement of friendly aircraft.; s8 Y' }7 \7 m! e7 @5 ], r4 N0 S) X Decentralized* r) ]6 p' T) Y/ x8 ` Execution- A% W" Y& o" C, c8 w5 Y0 {$ n# \* q% { The distributed and integrated implementation of USCINCSPACE direction by5 J5 H$ Q" X8 o9 \6 [) ?4 H the BMD forces. (AFSPACECOM)+ ~8 b1 c; B/ X- E Decommissionin . @$ O6 _' E6 z! ?' }+ Wg # }* B3 [2 P" vThe removal or the rendering useless of obsolete or no longer needed/ d2 k; Z6 G. }4 J7 u/ e components of the BMD system from service.: G: S. l$ [9 ]) A Decrement A directed funding level reduction for an acquisition program.# a2 @1 T: O: q+ W3 R DED Data Element Definition (Computer term). l7 w1 p; c9 t# N Dedicated Mode4 c; b( m# {( n8 T' i8 x' f* k of Operation9 |! I- G2 l* X* W P& B (ADP Security) + J [6 I" k a. vA mode of operation where all users of the AIS possess the required personnel& W" \# T7 u* p+ h+ k2 B security clearance or authorization, formal access approval (if required), and a 9 y3 _# v3 B% j: ^% w, ?5 g4 lNeed-to-Know for all data included in the AIS.# A. D+ R- }4 R6 _6 y. r Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about , o: N* n+ ^, T" x- @* @) m& W5,600 kilometers) above the earth’s surface.) V* E% x. Y) C: C8 \4 E# B- { Def Definition.8 G- [ v$ ]: T6 w' \: |* G DEF (1) Defense. (2) Demilitarization Enterprise Fund. 6 i; F9 Q; {. ~3 Z. a1 J2 y. V3 CDEFCON Defense Readiness Conditions. 0 L8 f& a' B6 t J* b- d5 F* MDefended area " i2 K( r3 F/ C1 F. _" Bcoverage o. f' \ H8 u# S' _6 g; H Defended Asset 0 g- m* d! L1 b8 O+ J' M; iList (DAL) / {# m8 X$ T0 }3 ?2 f2 f7 \The geographical region that the BMDS can protect from ballistic missile attacks, x2 W' ^( w1 v5 w: S, m with a specified level of probability of negation. May be specified for a particular5 [+ M% e- D" C7 a threat type, launch point(s), launch regions, raid size, etc. ( ~ ~$ y. _! b' B/ ~A ranked listing of facilities, forces, and national political items that require8 W G" ]/ q7 }5 f2 d2 j0 x protection from attack or hostile surveillance. The list is compiled from Federal% U3 w8 p- M3 J8 L departments and agencies, Unified and Specified Commands, and the Armed . k7 {) t$ I- v' R; z; s9 w. EServices to ensure National Security Emergency Preparedness functions.4 r4 q; @6 P& K MDA GLOSSARY, VER. 4.0 D' W- R) @9 g3 i0 R& f) l% A 75% d5 i" G7 s% W! s5 c! s Defense R; [" C& N$ n- B: BAcquisition % E) B' P" J" s2 k1 w! qBoard (DAB) 9 L: F! u3 R6 vThe senior DoD acquisition review board chaired by the Under Secretary of* s! I: Z6 v2 R Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the " e" N& F1 k0 G) t) Y/ z/ m5 G! sVice-Chair. Other members of the Board are the Deputy Under Secretary of 8 w7 P- A# `+ uDefense for Acquisition and Technology, Service Acquisition Executives of the % o2 h; v& ], ^Army, Navy, and Air Force; the Director of Defense Research and Engineering; * X! Z6 D+ h5 Xthe Assistant Secretary of Defense for Program Analysis and Evaluation; the 8 n, s$ U( g |9 x4 ?( `Comptroller of the Department of Defense; the Director of Operational Test and 6 a/ d+ j* H. L5 u& k: N7 N8 S0 I HEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the$ _! i v+ h% ^( E L6 O Defense Acquisition Board Executive Secretary. Other persons may attend at / `: K, e% O" K4 `3 pthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition- n; [ [; @1 {# S5 S Board.”) # q. t8 g3 [: pDefense) n. N5 U4 b2 c) E7 u6 G+ }0 Y( |/ K Acquisition " j3 R5 _6 J% ?) h. a4 pBoard Committee ' ^ Q, B) _- J/ Z) v4 Y2 TAdvisory review groups subordinate to the Defense Acquisition Board. The ; g* D7 f/ Z; c( s0 f7 c) H* g: SUnder Secretary of Defense for Acquisition determines the number of3 @; v; ~+ ?, O Committees. The purpose of the Committee is to review DoD Component# Q s3 B$ D' M0 s programs prior to a Defense Acquisition Board review in order to make an8 M, m0 n$ V6 `6 h: K$ C! p$ o independent assessment and recommendation to the Board regarding the6 ] j- A5 r- `" s program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense ; t# [" [# Z9 ~4 Y% {% `. YAcquisition/ o& ~/ d& p5 f- w* n" \, k/ s/ F Executive (DAE) 2 J) j$ B- ^" W0 |6 J% m# s5 Q, N2 CThe principal advisor to the Secretary of Defense on all matters pertaining to the 5 e$ Z7 U7 ^" z# T# {; }) GDepartment of Defense Acquisition System. The USD (A) is the DAE and the & q8 N2 r' D5 ?9 M2 e Z$ YDefense Procurement Executive (DoD Directive 5134.1). - r/ I9 N. q8 ADefense u# Q I- m* i9 e3 U Acquisition * V5 s% o) l/ o% OExecutive ! C# b" v7 H' L# W& GSummary (DAES), W9 m2 D+ c$ J9 j+ l: N, P( s The DAE’s principal mechanism for tracking programs between milestone6 S2 B- d; t. x5 ] k8 ? reviews. Includes programs subject to the Selected Acquisition Report (SAR), % G1 u$ F5 R: W' _8 k4 J3 qand any non-SAR programs subject to review by the Defense Acquisition Board.0 y2 W4 C" I$ D2 L4 x$ I$ J9 u/ | Defense2 k: ]9 W% h; I; R- t8 _6 h" \ Employment / T' @- D" Z9 v8 aOption (DEO), j2 I9 b4 Q: V. }1 ?9 l% }& b+ B+ U5 ~ Engagement strategy provided to USSPACECOM component forces to achieve 3 d J4 W( {! hspecific military objectives against a ballistic missile attack. It defines hostile. k( Q( W( O6 c$ \; c: F$ @$ q+ D/ U target priorities, provides assets to defend, and allocates SDS resources to be 8 H+ J) F5 A0 nemployed. A number of DEOs may reside in a particular Preplanned Response 1 P' N5 i; H5 X- u1 ~1 H- N: l* N1 XOption (PRO). However, default DEOs (those believed to be best suited to 2 @9 a# p. O9 M: Dcounter the threat initially) will be automatically processed and executed when" p( B4 m* J7 H0 d; X0 L! v" F5 \ Defense Activation Authority (DAA) is given by USCINCSPACE. 9 z5 l* ~) p' j; I3 L" [Defense ) z( V) _! o# I4 F2 qEnterprise0 D9 v' m) i5 ?2 [2 J% k Program (DEP) & t0 W$ l/ I" ]0 MAn Acquisition program designed to streamline the acquisition process by waiver) f' ]* l# d9 F" D; V4 H/ g+ L# | of selected regulatory requirements.- y4 Y8 {/ P3 ]/ ` Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb3 W9 w) r N. b( T2 F! _8 u and progressively weaken an attack, prevent initial observations of the entire u, O" e) U4 U* X/ \: x position by the enemy, and allow the commander to maneuver his reserve. ( l% V; w9 t7 ?* m K t: |/ q$ hDefense ' f7 _" Y! [. }( AMeteorological % Q2 }# H! l6 T( w l6 Q( q4 rSatellite Program 1 K0 }6 C" N2 b(DMSP) - ~' S1 ^% O s3 s9 ySatellites designed to meet unique military requirements for weather information.' @/ i- O/ M& Y: g Used to detect and observe developing cloud patterns and follow existing$ J' t7 k# `4 }( x% k0 m/ E! M weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.% F6 |2 [4 c* u5 Z2 Y8 x6 \ Defense Planning ; q- Q, A6 L0 u4 i. k7 V# `; S9 U( Hand Resources 4 R: s" E" j" V% {Board (DPRB). e/ m0 s p) ~5 u$ K9 f$ V/ k A board, chaired by the Deputy Secretary of Defense, established to facilitate . _5 ^5 e" s& [' hdecision making during all phases of the planning, programming, and budgeting + `! a- d/ H: n5 \, `system process. Board members include the Secretaries of the Military 5 B( n6 \: N9 q' P6 F |, q SDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of ' w, q ?* A& z! o/ V2 g- b* ADefense for Acquisition and Technology, and Policy, the Assistant Secretary of $ Z( u2 l' O+ E9 `$ c4 }Defense for Program Analysis and Evaluation, and the Comptroller of the 7 e' h( M5 c$ K. rDepartment of Defense./ I5 x- l2 Q" B# _7 ^ MDA GLOSSARY, VER. 4.0 D. \6 E/ q; r% l# h4 W 76- {% F( s9 l' W3 S& R5 D0 J Defense Planning+ V% y% v# p s$ b" c Guidance (DPG)% E2 S) @, N9 [- \6 X Document issued by SECDEF to DoD components providing strategic framework 0 ^- f1 h% H1 v X! Vfor developing the Service POMs. Result of planning effort by Joint Staff, OSD, M2 c1 E! I2 l9 v& I& e and Services. In connection with two-year budget process, DPG is issued every( i1 [, g. o& I. T" m, G2 V other (even) year.# M: S- x4 M& |4 h1 ], U: L Defense Priority ( K D* [3 h/ T \5 E7 D4 Mand Allocation( N) G9 @" J( K( S$ u/ o. E5 e) p System (DPAS) , v9 N6 [; Q9 [1 }. nThe implementation of a statutory requirement where contracts in support of - x' m" m6 j, o) |. B7 P( s* xnational defense must be accepted and performed on a priority basis over all! e/ s: }4 [$ I) h, E+ y other contracts, and which requires the allocation of materials and facilities in( ^$ K! q& W; R% |+ C/ o! v such a manner as to promote the national defense. See “DO” and “DX.” 6 E- w5 \9 N+ I# h3 kDefense8 [5 a; j+ Z+ f! {2 Z' S R% _ Readiness * h0 e k& l) ~' |5 UConditions M$ ?9 X1 l' Z* m4 Z$ `. ^(DEFCON) , T9 u, |' ~2 x. _% iA uniform system of progressive alert postures for use between the Chairman of; d$ ^9 z* {- |0 V1 ] the Joint Chiefs of Staff and the commanders of unified and specified commands 2 r7 b( A5 |9 h+ k+ G$ C# T, f0 kand for use by the Services. Defense readiness conditions are graduated to1 Z! J5 }+ K" _; f1 c* C match situations of varying military severity (status of alert). Defense Readiness 6 q! c: b3 x7 n; k! Z( a, |& ^& eConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as 7 J# t: _* W/ eappropriate.2 a% Z8 H$ l( d" e$ A5 t$ X8 m Defense Satellite6 O N6 ?' Z6 B& a# l7 W0 Q# a Communications5 k. Y: q" l% X7 X$ I# @* v Systems (DSCS): {3 i2 r/ h r0 Q ^' O3 n* L Advanced communications satellites in synchronous orbit around the earth. - Z6 q( E: t4 I* T' u5 K: h: RProvides high-capacity, super high-frequency (SHF) secure voice and data links ! x; ~" _# f! }for the Worldwide Military Command and Control System (WWMCCS). They , M6 c8 b1 ^. E+ jsupport terminal deployments for contingencies; restoration of disrupted service 5 R6 O, ~+ D; h& F) T. l8 i1 t) Toverseas; presidential travel; global connectivity for the Diplomatic# U- [; B9 _( e, p C Telecommunications Services; and transmission to the continental United States6 f1 c6 }8 [2 K7 f6 P0 S! N of some surveillance, intelligence, and early warning data.: F) ~+ G' o v) c, @! @ Defense Satellite % D+ a% b1 ]: b( R- T. t0 ?! z(DSAT) Weapon# l5 `' D5 o% F3 I, B4 Y A device that is intended to defend satellites by destroying attacking ASAT 1 J h( B/ C+ p4 mweapons.0 P8 j. T& W" z" S9 O Defense Support & O. F" t$ H8 a* ^8 @Program (DSP) / M* o6 P z6 C( EA system of satellites in geo-stationary orbits, fixed and mobile ground 9 S1 q# E' c! I$ ]processing stations, one multi-purpose facility, and a ground communications3 r- S' w' B4 z, N' k network (GCN). DSP’s primary mission is to provide tactical warning and limited, y" b3 L3 \5 t attack assessment of a ballistic missile attack. * v) v2 g6 S' F- s+ wDefense / J( g& Y% d) e0 ~Suppression # s- c M2 ?/ ^Temporary or transient degradation of the performance of a defensive system# [" b7 O- E4 i: a% z6 | below the level needed to fulfill its mission objectives, by an opposing force. 7 A' {7 V) b5 @(USSPACECOM) 9 V& A+ f- K5 s$ c6 lDefense Tier The arranging of a defensive system to correlate with the phases of a ballistic$ v: [8 _& }! n/ W+ s missile trajectory; i.e., boost, post-boost, midcourse, and terminal.5 H$ ^) L7 g2 D4 X Defensive 5 a/ ~4 n* \7 j8 nCounter 8 \# i f$ a2 z0 h. k- F6 K' SMeasures (DCM) * L8 p o0 ]( h5 w6 t, xActions taken to eliminate an ASAT attack. ! y) O9 U( h I( x- g2 r/ Y8 w% eDefensive" Y& `5 i- e& O- i! F Technologies+ G; \6 E7 T- `, l) U Study Team / U3 S" B* s4 }0 X( [(DTST) $ w- i% O M5 m" Q* V) \- m" rA committee, generally known as the “Fletcher Panel” after its Chairman,6 Y4 l i) @( m4 W; X: O* K! V2 } appointed by (former) President Reagan to investigate the technologies of# D- ^9 y. J: D0 k7 Q' h/ t" Z potential BMD systems. t' N3 L' J5 D6 k# D8 ~& ` DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. ! @8 g% K4 C1 C6 X: {, F+ H. |' ?DEIS Defense Enterprise Integration Services (ex-DTIS).: B* P \7 O( }2 X5 ~) L. q" H DEL Delivery.# N" @0 g' ~) F% D0 ~ Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion2 @0 s# ^: O" j" C& g of shots about the aiming point. See also Circular Error Probable.% r% t' Z: T' x7 N, H' U5 F MDA GLOSSARY, VER. 4.0 D V+ n/ O' l6 v" p$ a% Y* p77) |, U! J- i6 Q9 j& k Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the! ^9 S2 I( A9 T# |2 v5 v" F2 S maximum change in velocity, which a spacecraft could achieve in the absence of ) Y- @. U$ K4 La gravitational field.2 S8 l6 x6 F3 X, M$ N, O Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).) [% \4 j; M" f Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its , O6 [7 l) `1 `1 F5 X2 Cdesired function (matching RV characteristics, screening RV, etc.) 6 [) X* ~) L# A* u0 r& y4 TDEMO Demonstration.. P6 F; {8 C" p* R Demonstration 9 k5 Z4 G9 G! G: {. V4 z" Dand Validation / R A5 x* h, U% g( U8 G(Dem/Val) / O! X1 x; a9 KThe acquisition phase when major program characteristics and product designs, v6 z! E' I6 a: B( } are refined through extensive study and analysis, hardware development, test, 8 ?; g+ P. M/ }% g9 l( cand evaluations. The objective is to validate the choice of alternatives and to3 u" ^( D' i2 u: t4 N8 c provide the basis for determining whether or not to proceed into Engineering and # _8 v1 @, j5 w) l* X8 ?$ y9 aManufacturing Development (EMD). 5 ?* F! B7 k8 n9 S; C0 A y1 Z" ?# SDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. 0 B! d9 e& C5 m! v. ^( D9 Y7 tIt may include destruction, removal, contamination, or erection of obstructions.( E4 O: @# {' R5 O# s( T DEO Defense Employment Option.( M- w9 c0 A: B# J* x Department of2 j3 w2 U9 S, U0 A( J k Defense , z! S6 t" s( C2 K2 Y4 YAcquisition$ O3 a$ x* Y' _7 G( ] System9 }. g" N) ^$ ?# c3 U A single uniform system whereby all equipment, facilities, and services are( A8 U" r- S& T E; f' W) @" I planned, designed, developed, acquired, maintained, and disposed of within the 5 @6 i! {5 z2 r3 DDepartment of Defense. The system encompasses establishing and enforcing 3 x9 i7 q( |5 @; T8 n1 fpolicies and practices that govern acquisitions, to include documenting mission, t0 l! b5 [& B) N3 X needs and establishing performance goals and baselines; determining and% m( \9 X2 [# O O& f+ S- ^4 | prioritizing resource requirements for acquisition programs; planning and % W0 ~& {6 A% C3 Fexecuting acquisition programs; directing and controlling the acquisition review ; r1 T* ]8 y oprocess; developing and assessing logistics implications; contracting; monitoring & O( q: Y6 w- {# e0 ethe execution status of approved programs; and reporting to Congress. (See0 A. a5 _& [4 Y, o7 n- v/ B; W' w6 x5 s DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) ~( F5 s7 P% p, S; h" |# W" Z Deployment (1) The placement of force elements in battle positions to obtain a higher 5 A! }% f- K. X- }! ]( cstate of readiness. 2 v: J# v0 _0 p) B9 `* A! L1 y- v: a(2) The movement required to place force elements in battle positions.. W8 Z0 w- S0 U (3) Fielding the weapons system by placing it into operational use with units# R: D+ N+ J; _! z' @ in the field/fleet. $ x; W8 i0 j* R+ Z! Z(4) To arrange, place, or move strategically. - J: X0 t8 I6 k5 N" tDeployment 2 S# b# H: H% @) h) r% \0 C* `Planning ! L- f1 { C Q# v4 P% F$ l0 l( m(1) The development and maintenance of plans required to initially deploy, 0 C' F8 V( ^ O; `maintain, and evolve the operational system in accordance with. u) [1 G9 b4 a; J; l7 G schedules and priorities. It includes factors such as launch facility " n8 J, S% f9 Savailability and planning for the availability of other required elements+ s( M4 S/ ]! w. X7 M such as trained personnel or units. In addition, it identifies the impact of0 Y; o; P0 E7 ?5 R deployment on operational readiness and any testing constraints # U% X4 J7 a5 u# |) t8 R7 y: ?$ \associated with deployment. % M( E. B# \9 u0 A( m2 x(2) Encompasses all activities from origin or home station through2 J- D1 ?$ e9 ^: D. z, C% S destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding( o! J; X: _/ ]0 ^, U areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment / c, R6 A+ {: B" z* i- J6 d* qTesting7 c T' J0 y2 a7 V( ?# g/ {8 C+ W7 ], R The testing and/or simulation of system assets in the physical and operational* a0 |3 w0 ?- ^7 t, W! F, N environment in which they are expected to perform. D; u7 ] x0 p+ h% WDepOpsDep Service Deputy Operations Deputies. 8 F) n0 f+ N! ~0 m* b+ V0 nMDA GLOSSARY, VER. 4.0 D / \5 M) k4 u% {1 ^78, U( M& m2 N6 w/ R, f& d9 C Depressed " }6 G) g1 ~) Q9 h, g+ j: sTrajectory5 X( L& j) S4 C, c8 ^' z Trajectory with an apogee below that of the minimum-energy trajectory. 3 | J( g! T% e0 A6 y6 SDEPSCoR Defense Experimental Program to Stimulate Competitive Research.2 T. ]9 a n% ~% a% s DEPSECDEF Deputy Secretary of Defense." Y* B+ b4 Z* t7 \$ T DeSecState Deputy Secretary of State. M: S9 P; f Z& r7 H1 r2 JDERA Defense Evaluation and Research Agency. Consolidated research and 6 M* S5 k7 F& M! bdevelopment resources of the U.K. Ministry Defence. Headquartered in( u; T( g5 Q& ? Farnborough, England. & p, _0 K+ ?. fDerivative ) y! S/ h5 v: G9 lClassification# ^4 c' i7 A* C) K, L/ ^. Y6 U- ^ A determination that information is in substance the same as information- ^6 m5 I# U/ T0 p! E currently classified and the application of the same classification marking. % W* }$ L2 f% V, mDES Data Encryption Standard. , [6 u* V6 | Y% bDESC Defense Electronics Supply Center (DLA term)./ x1 I+ R2 h9 `- Z; c Design 4 O n7 _, E8 x, k4 fConstraints0 v$ S$ X U/ b/ H0 I% B ]5 ~ |0 w Boundary conditions within which the developer must remain while allocating9 B. x2 ]7 g a) P% n( Z performance requirements and/or synthesizing system elements. & f+ s: {7 x3 c- N) h, y* u2 KDesign, m# ~0 N6 A4 c" f0 }7 c+ Q Parameters , A9 T& I. n4 `Qualitative, quantitative, physical, and functional value characteristics that are * S8 }& Y. x5 R) S; n9 Zinputs to the design process, for use in design tradeoffs, risk analyses, and& j: R2 B5 M t& v# a development of a system that is responsive to system requirements. 7 U% L* W* s1 s! }# rDesign Phase A period of time in the software life cycle during which the designs for7 e: m6 j$ }9 l/ w architecture, software components, interfaces, and data are created, * ]) V- Z8 y1 w4 U$ }7 i) _documented, and verified to satisfy requirements.+ N5 C. y4 k7 ^" S! J! m ~- X Design-to-Cost R. {' Z3 d+ X: _ (DTC) Goal2 \* r) l. C' N5 q: { Management concept wherein rigorous cost goals are established during: ^+ Z2 @! g5 J9 h) u2 C( s% ? development, and the control of systems costs (acquisition, operating, and' ], M0 j+ \% ^5 } support) to these goals is achieved by practical tradeoffs between operational6 C$ n5 n5 y/ u, I( C+ R6 M8 B8 s capability, performance, costs, and schedule. Cost, as a key design parameter,* Z3 p+ r* N- A# B is addressed on a continuing basis and as an inherent part of the development3 {8 `& l5 [7 C3 T and production process. A DTC goal should be in the form of average unit5 ~1 F& T' x* |! D m. r flyaway cost. Also, DTC parameters for operation and support will be * z! x, B, {0 q" q2 Eselected—parameters that are design-controllable, significantly affect O&S costs,- q& O7 s& `! Q w+ R0 O and can be measured during test and evaluation. Parameters may be% T2 l# T* }! ^8 D$ z, k9 X+ D, h, ] expressed in dollars or by other measurable factors, e.g., manpower, reliability, or* S) S. A7 O1 k; u maintainability. Firm goals and thresholds will be established no later than entry 8 a5 k) M N( u; |& `. Y8 M$ cinto EMD (Milestone II). This is an in-house goal, almost contractual in nature, ! h3 n: ]/ G- m% f# cbetween the PM (Service) and the SECDEF. Allocations from this goal will ! ?% T6 ]6 F. m. Ybecome the contractual DTC goals for contractors supporting the program.; |5 u9 i9 |! q/ H Det Detachment./ m+ N' M. e6 H( q& k7 e DETEC Defense Technology Evaluation Code. 7 i1 M7 U+ ]2 Z, A( S: ~$ P( U2 G% c, k, uDetector A passive IR, visible, UV detector turns photons into an electrical signal. The * F! R4 q' ~ ^5 p+ S# EIFOV of the detector is its solid angular sub-tense. There is sometimes+ `2 ~" U$ ~- |* O( X confusion between the detector sub-tense (size) and the pixel (picture element1 @6 f* R1 F6 V: d size). They are the same for a staring sensor, but in a scanner it depends on 1 [! O! B* M# M/ I, C7 Bthe array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.' Q" ]) }2 P: H; p* P$ @+ n- u+ X MDA GLOSSARY, VER. 4.0 D . R% L: q% }2 u) B( `79 8 d9 F/ [, x+ j9 d1 y; o' xDEV ENV Development Environment.$ j1 i4 y( h. S! Y Development; [0 |) ~; ]. B' n7 z0 V+ S; z" S Test (DT) 6 u% k: P9 E$ w) F& }Test conducted by the development test organization to achieve specified test* ^! a5 b I) y& n0 p4 @$ v2 N- G objectives. It may be a complete test, a subtest, or a phase of a test. 0 s4 c+ L; `2 l$ R5 ~, J b, J7 JDevelopment 1 }: d$ g$ c+ HTest I (DT I)7 e6 [- e9 N6 L0 A A series of tests conducted during the demonstration and validation phase.6 _9 r1 X7 c8 {3 v' b! t Components, subsystems, or the total (or full) system are examined to determine $ ^6 R: [( {' [. Y4 [; I3 x1 _$ {1 `whether the system is ready for EMD. State-of-the-art technology is addressed3 Y+ a# I9 b5 ~ in DT I. , E% ]$ P; ~5 S+ t7 F3 kDevelopment* g. R$ y8 M# H6 g Test II (DT II) / Y( g# y. x1 LA series of tests, normally during EMD, which provide the technical data 0 V) a* n" @$ v2 ?( ~necessary to assess whether the system is ready for low-rate initial or full1 ^' ^2 E1 b! J3 n! U+ w) a production. It measures the technical performance and safety characteristics of6 w" z3 {( x8 {7 c$ ^ the item and evaluates its associated tools, test equipment, training package, % H6 R& L# \+ X' g( j9 z. Gand maintenance test package as described in the development plan. DT II4 _. r# D/ |2 @+ w addresses accomplishment of engineering design goals and the fulfillment of) x/ M* T! d* } contract specifications. , ]0 x) C8 Q* K! e0 ~Development % k/ @& |, H7 V8 O* ZTest III (DT III)) `$ o! _, Q# O Tests conducted during production.& o- s4 s Q, ~% O Development/ _- d0 }2 ?! F }& K. b( ~ Test and ' W6 j/ M7 U0 K2 r, [, X6 {" AEvaluation1 q! ]0 F% e$ E2 X6 h& f* q (DT&E) ) ?; |# n- V, C2 U1 }- C& `Test and evaluation conducted to measure progress, usually of 3 s% M: P! z# L, r+ a$ _+ a# Acomponent/subsystems, and the proofing of manufacturing processes and" [, q7 D3 g7 I6 {% `, G controls and to assist the engineering design and development process and 1 [6 m: d# d# S4 h8 Hverify attainment of technical performance specifications and objectives. Usually/ j, v6 S) J9 L- u" I5 ~7 `9 ` conducted under controlled or laboratory conditions. Can be conducted before5 p$ Z8 z8 X+ a9 D1 c y7 f+ c& { or after production begins. ' E" M1 y$ W/ s0 e* \Development s' o* `( M# Y& W# B6 Y2 VTest (DT) $ Y4 s0 g6 t: J7 @/ N) D' S8 H0 a2 u; GTest conducted by the development test organization to achieve specified test - p0 ]+ J6 P+ L9 bobjectives. It may be a complete test, a subtest, or a phase of a test. ' E: J K" B9 @/ x' g \Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, & T. F8 Q) A0 n$ m; ]6 K# {7 l9 {: Aschedule, or performance without authorization from the milestone decision * h0 B3 E& d7 qauthority. Acquisition Program Baseline (APB) thresholds represent these - O6 o6 e; P0 \ j8 ~5 zparameters.! N# I. o' d( u' {/ U+ I9 b0 O Devolution of7 z) `) U* Y$ m Command 0 X+ X: S% R# ?" w7 V0 [) TMinimal essential operational capability to perform C2 provided in an orderly and ( j8 e& P4 l% A A# ktimely fashion to a duly authorized successor.2 {% x+ k) _: G9 Q0 m. ` J- ^- n DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare." L: h8 X. W% u9 `( P DEW/D Directed Energy Weapon/Discrimination.! E5 U, U( v/ A- @3 M DEWG, O Directed Energy Weapon Ground, Orbital ' w+ i E+ r2 B4 BDEWL Directed Energy Weapon, Laser (thermal or impulse).9 N8 R( m, ^; j3 p& L# u ~ DEWP Directed Energy Weapon, Particle Beam (neutral or charged).5 [2 a3 z8 g' |& L DF-KBS Data Fusion Knowledge Based System. ! q) G$ H, y( I& }4 ^. Z" s- JDF2 Deuterium Fluoride.0 v9 I8 {% y5 \4 y+ W DFAR Defense Federal Acquisition Regulation r# A j7 b; c, H4 Z( a DFARS Defense Federal Acquisition Regulation Supplement. 8 c6 R0 I5 E5 ]7 m( FMDA GLOSSARY, VER. 4.0 D) U; o- y" E( D) } 80 ! ^$ Z0 k! g. A2 y* G; M1 {DFAS Defense Financing and Accounting Service.) r; M6 p" X0 D( Z DG OBSOLETE. Defense Guidance. See Defense Planning Guidance.7 \8 _6 [5 N& E6 E DGA Director General of Armaments (France).3 m- k7 I0 Q8 O+ y+ q/ J DGP Defense Group on Proliferation.3 u8 W: l' G3 F) K* |3 K* U DI (1) Data Item. (2) Developmental Item. ! {1 Q3 T/ h3 F& g6 ~4 S) UDIA Defense Intelligence Agency. / F- {1 A3 m" H0 Z/ Y. W: Q' qDIAC Defense Intelligence Analysis Center.) L, j ~& ~2 n DIAM Defense Intelligence Agency Manual4 D, h( O. U8 |; g- E0 |/ M5 ^ Diameter (Optics) The unit of measure of the light gathering power of a lens.7 _, _ j& g) B- t$ \7 b) [+ m: H DICE Digital Integrated Combat Evaluator. 5 v8 R7 P U) w+ f9 s) A5 PDID Data Item Description.4 C' J1 K; I2 E' Z3 ?3 i9 r! c: ]+ Z6 i4 L Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The6 ]! R. b3 p# N3 [ angle of spread, which cannot be eliminated by focusing, is proportional to the ; Z: d. A* h8 ?5 _0 ~ratio of the wavelength of radiation to the diameter of the aperture. 2 k6 ~$ f* S2 [3 {# XDigital + A9 ]2 _3 V1 q" M$ r2 kProcessing% v* S& S3 p. }( F3 W2 r4 w The most familiar type of computing, in which problems are solved through the / G9 X* z1 |8 e2 D' Z4 Bmathematical manipulation of streams of bits.8 ?" E1 z( k9 y- n5 u DII Defense Information Infrastructure * V x# b% T- J8 m. j1 f. XDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to 6 }5 K$ m2 x/ p+ ]3 n8 K8 U5 D! C L" w12 km) between wake termination and de-sheathing.' ]& J; `" K& ~! j/ |2 V- u2 n DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). " |, ~ T0 m* q4 N Z, a ], ^DIR Director.: z0 Q/ Z9 C0 Z5 E. m& l Direct Air) k0 S/ J& B3 P' E% ` Support Center" j8 S D' K# ~ A subordinate operational component of a tactical air control system designed 5 E9 ~$ `8 M7 g- \9 _for control and direction of close air support and other tactical air support 0 M6 ^4 \- R! I# _# i9 ?operations, and normally collocated with fire support coordination elements.& I5 r6 D5 R! F1 ~6 s Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not " D/ r- \" _- t5 t. z. Ynecessarily limited to items that are incorporated into the end product as labor or 8 Y k, r* A* r5 j/ @8 jmaterial.# E& j6 u6 y1 p( f n Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing + S/ R0 p" @9 wdirect labor includes fabrication, assembly, inspection and test for constructing ' B0 L7 r9 G/ M4 [0 Nthe end product. Engineering direct labor consists of engineering labor such as3 O" E' \$ ?9 t1 U reliability, quality assurance, test, design, etc., that is readily identified with the 4 O. G# N$ i7 \; Q3 N/ Fend product.4 p0 _( H; L: P& r Directed Energy : d6 W: D0 h }& D5 ](DE) ; Y0 j+ B$ m/ J2 ^( C8 m9 T1. Energy in the form of atomic particles, pellets, or focused electromagnetic6 J* e- ?& A0 I2 p; j% Q) Q beams that can be sent long distances at, or nearly at, the speed of& _: x- ?9 ^0 } light.( V* y1 q' {+ f$ p 2. An umbrella term covering technologies that relate to the production of a- S& _) r1 i' o7 j beam of concentrated electromagnetic energy or atomic or subatomic particles.7 y! `8 c. @7 P" P8 {' X9 R& |6 T MDA GLOSSARY, VER. 4.0 D5 c! \3 `6 {0 U# u9 J% x 815 X& g( |: {# w- U Directed Energy k$ T' U& z) I3 @) x& gDevice $ c* F- s- b* @* p( O" g9 [( OA system using directed energy primarily for a purpose other than as a weapon.& y. T( o# w0 F Directed energy devices may produce effects that could allow the device to be' r. W' ~) m" G1 p4 E used as a weapon against certain threats, for example, laser rangefinders." Z: |3 V1 A7 M+ t" M Directed Energy% Y" S2 V3 b' j% c Weapon (DEW): B8 i: v; S2 Y6 Y6 | A system using directed energy primarily as a direct means to damage or destroy1 n; S* y4 n0 c n: B# y& P enemy equipment, facilities, and personnel.& z+ l& c: ~3 k3 F DIRLAUTH Direct Liaison Authorized.; O& }7 m# o, `8 ?& J6 T DIRNSA Director, National Security Agency. * j- z* {; U$ hDIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. 5 ]: w+ o7 ^# }" N) dDISA Defense Information Systems Agency, Washington, DC. (Formerly known as, k3 J, o( I4 l" \ Defense Communications Agency). . p0 r3 u7 q2 o9 z* A. rDISCO Defense Industrial Security Clearance Office 2 r: s6 K+ z1 i" zDISCOM Division Support Command (US Army term). ( M! U, ?) V4 ~( HDiscretionary % v4 k- _( r6 J1 F. F4 W7 vJudgment5 H4 h- ?- f* z6 j0 M7 A The authority given USCINCSPACE or his duly authorized representative to 8 x. R" ?2 Y( N& A* u8 ~' k( l* gperform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination7 A/ S o' a7 a; @ DISN Defense Information System Network (DISA term).3 @5 l/ E% w. Z% _. z DISSP Defense-wide Information Systems Security Program.. S# e$ g, ?7 Y4 E; C8 Z' W$ k/ j% r DISUM Daily Intelligence Summary (JFACC term). d# k: D8 d& \. ^5 f DITDS Defense Intelligence Threat Data System. 0 B8 C, M4 H# lDITP Discriminating Interceptor Technology Program. The objective of DITP is the$ t7 d O' w% k2 a0 w! a development of advanced interceptor seekers to counter advanced threats." u/ K2 Z4 P: h$ I2 y' w DITP will integrate passive and active sensors into an interceptor seeker that& V5 X! A0 ~. c. o5 T% a# b' T integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP & q+ y- K/ d9 ? x0 m- m+ `flight demonstrations will involve the tracking and interceptor on-board $ R6 l+ o8 S7 _' m% i! udiscrimination of targets of opportunity while providing fusion processor data# P; u8 u {& u3 ~% G telemetry. (See also ASTP). ! e" r' a7 |& I! h0 D3 o5 `' B" gDIVARTY Division Artillery (US Army term).- i3 m8 k' i! R* O: u DIW Defensive Information Warfare. L3 S1 u; H, c# [2 E: r! H DLA Defense Logistics Agency, Alexandria, VA. $ s, {: `" e/ P! e& `8 N9 S5 YDLSC Defense Logistics Services Center (Battle Creek, MI).+ H0 p3 o$ U& Q5 o/ k3 f DM Data Management1 a7 ~& u' Q! a$ ^$ ]+ e( y DMA Defense Mapping Agency, Fairfax, VA. * s B0 l. R- v& n4 s7 |. JDME Distributed Management Environment.5 m+ `9 g& S8 ]; c- x, ]% ~7 J DMI Dual-Mode Interceptor. ! K" A: k# {# x# `6 U& JMDA GLOSSARY, VER. 4.0 D 6 s5 {; V0 E7 f/ I, i) O1 X82, M% P+ X4 I( v DMRD Defense Management Review Decision.$ H, N& P" ^9 U# r DMS (1) Defense Message System. 8 `- r ~0 C- N9 v0 [' q3 ^(2) Dissimilar Mission Simulator.. K: @1 x+ p( M7 W; N4 K DMSO Defense Modeling and Simulation Office (OSD).! c7 u! k% Q0 v9 |+ k DMSP Defense Meteorological Satellite Program. * @2 d- y8 r* U0 R+ q' WDMU Disk Memory Unit. ( c% m$ L2 T* a ^% ^1 O* ODNA Defense Nuclear Agency, Alexandria, VA. : X- j+ ^$ p% l4 O* L! Y5 f+ z# }* LDNMS Distributed Network Management System.5 g7 d3 T. W7 k/ V DNSIX DoDIIS Network Security Information Exchange8 {: h+ A |+ L( @+ d* C1 l6 D4 h DNSO Defense Network Systems Organization.# |" k5 h/ z. f; U- \ s! ^ DO The lowest rating under the DPAS. All “DO” orders take preference over unrated/ G% u; j1 t# h8 L) A5 O orders to meet a required delivery date. A# w- g0 \0 R( } Doc Document $ k. {5 L* I+ A% _DOCPREP Documentation Preparation. / V/ f4 K; [$ k* @& u) _Doctrine Fundamental principles by which the military forces or elements thereof guide % T, I$ W$ m( y mtheir actions in support of national objectives. It is authoritative but requires% a% n& Y$ f; B( p9 S; M( p. ~ judgment in the application. See also Combined Doctrine., m- @" k7 B- n% d DoD Department of Defense3 | ]. q) M% G; {1 G$ p) ~ DoD Component 5 F% \6 K5 X7 F% Z$ d SAcquisition # Y! J! Y# c; v; G& {Executive % {% ]7 \- l+ y0 A7 G J. ]: DA single official within a DoD Component who is responsible for all acquisition 8 x2 X) Y7 d4 y0 s: ?9 ?3 p3 C; Q1 afunctions within that Component. This includes Service Acquisition Executives , G F, f$ Z; t2 z( rfor the Military Departments and Acquisition Executives in other DoD , g& G: x* Y; G; EComponents who have acquisition management responsibilities. / f/ D& Z+ K5 JDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, y$ W7 ~0 `2 m! R" w8 g; L5 p& aJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the, o3 \& A3 m6 c- U Defense Agencies; and DoD Field Activities. 2 k, T* j4 Z; [" LDoDD DoD Directive. $ o2 V" v0 H O, n7 IDoD Directive9 f' d# g* ~% z# J S$ o& Y2 W+ m 5000.1' j+ W% I9 F8 {, Y. T: O “Defense Acquisition.” The principal DoD directive on acquisition. It establishes 2 G* _; t3 e* q3 v! gpolicies, practices and procedures of governing the acquisition of defense 8 V2 I! c( P; Z6 l5 c1 R8 Dacquisition programs.( v$ l! P- F0 T9 b a/ C DoDI DoD Instruction.3 p0 l, Q- F8 x; s& v DoD Instruction) F+ Q. p; p" f9 _4 W; ~' ^6 S% x 5000.2 . T( l1 U' N( w G2 I“Defense Acquisition Management Policies and Procedures.” Implements DODD ( {7 [; I8 D4 c5000.1. ' t/ g3 ~8 ]& f3 T- JDoDIIS DoD Intelligence Information System. & h$ J0 h4 Q, t/ A' w# I1 R$ vDoDISS DoD Index of Specifications and Standards.) T- _! O3 C$ ]' B7 }) B DoD-M DoD Manual.5 U: O5 T# Y1 \# g. a& I& u MDA GLOSSARY, VER. 4.0 D 3 i' W# q8 V% ]- @, l) U83( E' N- d9 N" Z+ Y3 t( Q: C8 ] DoDR Department of Defense Regulation./ }9 j# @# k1 v% O# ]7 q DOD-STD Department of Defense Standard.' e6 e# T/ A. g# b DoE Department of Energy. ; v, M' m3 i& u8 |: K* ZDOF Degrees of Freedom.: Y3 j& e% G% V8 H6 o% X- S Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system 5 j1 F+ B0 V' B! U& r& w- Y6 shaving a detection range of approximately 3000 km. It is believed to provide 0 G* ?# L* Z! m* jbattle management for the totality of Moscow defenses.) |2 w0 A x, A* c DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). 3 e. O M0 N9 bDOPAA Description of Proposed Actions and Alternative (environmental term). 8 i. _- |1 m* PDoppler Effect The phenomenon evidenced by the change in the observed frequency of a, A6 V2 j9 X% f! g% H sound or radio wave caused by a time rate of change in the effective length of 5 W3 l# H3 h9 Sthe path of travel between the source and the point of observation. K( w2 B) H* M5 yDoS Department of State (US).: r7 t1 R5 y0 C/ u: G& [! d DOS Disk Operating System (TelComm/Computer term). . A5 O6 M7 g) {* L# y# KDoT Department of Transportation [US].* [, H$ L# Q) I" E' v/ r/ p3 u DOT Designated Optical Tracker.8 ?$ Q' g5 O$ v6 t+ z DOT&E Director, Operational Test & Evaluation.! s. V \# k5 S9 L- z o% P DOTH Defense of the Homeland.+ G0 }5 Y u/ ]2 Z; A c Down Select To reduce the number of contractors working on a program by eliminating one or$ i. ?3 ^( C8 N. x% T more for the next phase.. M% M% u5 c$ H W+ j DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. $ N0 T% G) O6 tDPA Defense Production Act.5 u0 u |4 O1 N- I; S8 W/ _; e& p DPA&E Director, Program Analysis and Evaluation.* r$ w3 k$ X: e3 w2 q4 G DPAS Defense Priority and Allocation System.! d% j0 Q( J* c DPAT Dynamic Program Analysis Tool. " N' c+ f3 l+ H* N; M4 h5 Q& ?9 ?% aDPB Defense Policy Board.) E. B# {/ T1 E7 A+ ] DPG Defense Planning Guidance.% s, H$ K5 C3 ~ DPM Deputy Program Manager.( N m" a* H* A' P9 D DPML Deputy Program Manager for Logistics : @) E0 a8 u- [! cDPP Distributed and Parallel Processing (Computer term). s; u, ?- I* t) q! D5 b, O0 ]DPR Defense Performance Review. - z( }! X& K/ g5 S# u! K5 eMDA GLOSSARY, VER. 4.0 D - r, E H2 M3 z! x# B84. m" I4 E: T( V7 f0 x/ B DPRB See Defense Planning and Resources Board. 5 V6 C3 G+ ^8 H1 X* Q! wDPRK Democratic People’s Republic of Korea (North Korea)., G! O8 B' g* N2 X4 i. U; e DPRO Defense Plant Representatives Office. R0 Y" \4 l3 s DPSSL Diode-Pumped Solid State Laser.( y" G" c( v1 D. ]* T+ l2 Q DR Deployment Review.4 F" K$ A* V) I: q; ?2 ]+ _ DRAM Dynamic Random Access Memory. / J7 H0 X1 W+ ?) iDraw-down Curve A method used to encapsulate the overall performance of a BMD system that. T8 q. a+ R+ k4 r+ B7 w plots the probability of survival on the vertical axis versus the number of attacking! m2 p3 ^+ ^; D8 ~/ X1 f0 I RVs on the horizontal axis. Used in conjunction with attack price, they are the0 l3 H, W4 Q: Q' J& f, q3 L& U most important expressions of a BMD capability. 0 K4 t* e& b2 p+ X6 x q! q! h# vDRB Defense Resources Board. 6 s: @& c' f# T1 D% z/ t% p; ^DREN Defense Research and Engineering Network. 8 V" w2 h$ J' ODRFP Draft Request for Proposal. / t8 t! e7 Z5 b% G& d1 M- ADrift In ballistics, a shift in projectile direction due to gyroscopic action that results from 3 s0 d6 n% [* j1 u, Z5 Rgravitational and atmospherically induced torques on the spinning projectile.3 s8 K9 l2 K( ] DRM DAB Readiness Meeting (DD 5000.2 term).8 n- ], m, J f0 e% x8 ~ Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also9 @- ~+ u% I1 j( s Remotely Piloted Vehicle. 7 ]$ j* u* J) w0 b2 p* j+ tDRP (1) Deployment Readiness Plan (US Army term).- g- C& M+ S8 u, B4 _ (2) Deployment Readiness Program. . T i6 d; w. QDRR Digital Receiver Replacement (USN term).6 c, a% f( K: D6 }7 h' ^# E5 I l DS Deep Space.9 ~$ s$ h9 a8 A1 B5 b! V9 f+ h DS-1 Category of telecommunications circuit capability.) n$ U8 ~# [# N! U! j4 v DS-3 LAN Category of telecommunications circuit for a Local Area Network. - J7 ~4 l& E7 u, tDSAA Defense Security Assistance Agency (OSD).5 Q: m, m/ o; ~" n* T; G: G3 E DSAT Defense Satellite Weapon.5 m, J$ K3 u( N5 X9 G# ] DSB Defense Science Board. 3 K# u* P9 S' M9 e* YDSCS Defense Satellite Communications Systems.& M# ]% _6 U) ]1 Y DSCS-3 Defense Satellite Communications System Three. $ T9 H2 ^) r& |DSCSOC Defense Satellite Communications System Ops Center. 2 O! j& p5 H6 M2 p4 VDSI Defense Simulation Internet2 I! z& x7 `- ] MDA GLOSSARY, VER. 4.0 D9 ^. Z9 g* p, ^* y1 W+ e 85. u7 e7 n' c: P$ F$ v DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet + c7 [: Y/ w* g8 o& G; ?System. 3 C4 m) K0 Z* J# q4 K# m! JDSM Decision Support Matrix! z) y; x) I: m& y4 y% f0 o DSMAC Digital Scene-Matching Area Correlation. # Y. H7 d9 v1 `6 R9 Y* c: w1 ODSMC Defense Systems Management College.' G* Q9 @) `; b7 x DSN (1) Defense Switched Network (formerly AUTOVON).2 z e4 Y4 q5 ?7 i a (2) Deep Space Network (NASA term).4 d/ L! \# R8 ~* _ DSP (1) Defense Support Program. (2) Defense Standardization Program. ' g7 F# ^+ D1 ^. D" a( HDSPRTM Defense Support Program Real-Time Model.1 |. j1 D; C+ e/ C# B DSR Data Set Ready (TelComm/Computer term). # W! z3 B+ P! r8 tDSRCE Down Scooped Radio Control Equipment (TelComms term).* D9 d9 E$ Q1 g4 {$ ?6 Y: I DSS (1) Defense Supply Service. (2) Digital Signature Standard. 3 y. L K0 \& UDST Defense Suppression Threat. 7 C) B7 m1 o3 O: W; n5 tDSTAR Defense Strategic and Tactical Array Reproducibility. 5 u, ^2 f$ ]& z3 x* `DSTO Defence Science Technology Organization (Australia). 0 D3 V8 c6 R; ?) DDSU Digital Service Unit (Telecomm/Computer term).! s5 p# d- Q+ D3 S( f$ ^ ^ DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to ( ~1 \% x6 {: v% V+ g; othe DNA. : {; n7 ?. u) `+ N/ P- A% XDT (1) Discrimination Technique. + Z% h$ _6 C. B) ^- h0 a: ?(2) Development Testing., r3 `( _0 V9 q9 D" M (3) See Development Test I, II, III.- ^8 x" q. w9 Z i (4) Down Time (ILS term). - E9 r9 J5 y8 K5 z$ K(5) Depressed Trajectory.3 p5 E7 K4 L9 h- B; A ~ v (6) Dedicated Target. , s( X. C5 g( y* yDT&E Development Test and Evaluation." [$ e' c4 B0 O9 E$ F DT/OA Development Test/Operational Assessment.3 R8 I8 P$ `8 \6 x. p( z0 j, x; y0 R DT/OT Developmental Test/Operational Test.# T/ g8 X, E+ S# z DTAP Defense Technology Area Plan. ) _/ x" k7 o! J) f# o9 t6 PDTC Design-to-Cost.. ~: u, }& C) A; F/ } DTD Digital Transfer Device (TelComm/Computer term)." s( r+ p! G, U. F! L DTE Data Terminal Equipment (TelComm/Computer term)./ v2 p. B& A6 |7 p" p DTED Digital Terrain Elevation Data.6 R2 x+ Q; \% v# W; E: q% \$ t DTIC Defense Technical Information Center, Alexandria, VA.% {+ E; X6 N o MDA GLOSSARY, VER. 4.0 D7 [; l4 V: P& H K* A! a) c 86 v3 S" f! o7 b/ P* m% r* P+ y DTIS Defense Technical Information Services (now DEIS).* |+ Q+ h; ~) [1 b7 z DTLCC Design to Life-Cycle Cost./ v2 l; V$ @1 v$ S( }, a+ M- J DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL ' H3 u% }7 k+ ^1 pterm). " h/ b* Y1 `6 w6 qDTLS Descriptive Top-Level Specification. $ s; N: r* F5 \3 H9 QDTMF Data Tone Multiple Frequency (TelComm/Computer term). : f2 y/ z% g+ G2 G8 O# c# ~DTO Defense Technology Objectives.* S' k$ p1 `' _ DTOC Division Tactical Operations Center. ; M! m0 e" c, s) s# ODTR (1) Demonstration Test Round. (2) Development Test Round. 4 A- c- v: E' IDTRM Dual Thrust Rocket Motor. ! G( ^& E! A; Z+ B5 d) V" EDTSA Defense Technology Security Administration.7 W9 m0 R/ H t DTSE&E Director, Test Systems Engineering and Evaluation.& i) N$ h& b$ K* q: g7 J* |. i DTST Defensive Technologies Study Team.* K/ E2 u! o4 G2 ?6 e# ? DTT Design-To Threat- f- F+ V9 ]- s; F3 ?. H. \ DTWT Dual Traveling Wave Tube (Electronics Engineering term). , ^0 Y( Q& A. i6 m9 u9 z$ _ qDU Depleted Uranium.) W8 x& }/ M1 j, ~; V DUA Design Upgrade Assessment.+ J5 q' u( ~! g; u$ f# I! A Dual Source Two contractors producing the same components or end items for the same8 u' t2 i- q0 X- U/ R program. " Q7 M+ ^4 y8 [: X2 g: P5 RDUNDEE Down Under Early Warning Experiment (MDA/DSTO term).# J; a$ l$ K7 f8 s5 O/ W DURIP Defense University Research Instrumentation Program. 7 w! [% i7 K: ]+ D! D- `7 cDUSD Deputy Under Secretary of Defense. 6 i5 |9 O6 [4 y& l' QDUSD (ES) Deputy Under Secretary of Defense (Environmental Security).) |9 W3 `5 t7 L' U+ C1 U3 U DVAL Demonstration Validation. ' y( d% ^) D) F- e+ f/ tDX The highest rating under the DPAS. It takes preference over all other rated and % I8 N( ?* }4 Z; Cnot rated orders on a contractor’s production line. The BMD program carries a: [5 `* f: a3 e& F% P" y “DX” rating.! G, t6 }# X: a6 m+ c; g! i7 u MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 , h: ^6 _# {% t2 CE East & Q% |/ z0 u5 ], G3 |0 } aE2 I See Endo-Exoatmospheric Interceptor.# j6 k9 J# E" m# G: H' T# P3 c E2SRD Effectively Two-System Requirement Document.. @: ]' J; ^& p& Y E3 (1) Electromagnetic Environmental Effects. # S- a% X2 n8 X+ M* E(2) Electrical, Electronic, and Electromechanical. # S( X2 D+ x7 M1 RE Spec Materiel Specification.0 J: q: T% A9 ]8 [" y4 [ EA (1) Environmental Assessment. ! I: B2 w7 x" ](2) Engagement Authorization. ! I" b4 S' v% @* }7 S(3) Executing Agent. 3 s0 m. j$ f% P: i9 d(4) Evolutionary Acquisition.: |0 @/ }: s m (5) Environmental Analysis (environmental term). ! E. ]( V K6 k5 @. B(6) Executive Agent.0 C5 S; B1 q9 {/ h2 r) w EAC Estimated Cost at Completion.& i; [" T! K8 r7 h EAD (1) Engineering Analysis and Design. (2) Extended air defense. J1 _4 g$ \2 ~/ j& D/ w& N6 lEAD/D Engineering, Analysis, Design and Development. ; d1 @3 e4 n2 T& O" ]EADSIM Extended Air Defense Simulation.: s* r. {4 B; A+ `8 s1 Q EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing y( g7 q& U- K+ m T users to model military response to airborne and ballistic missile threats.& k) m+ T5 Y1 ?9 g/ f: F/ X EADTBP Extended Air Defense Test Bed Program.; ^& v) ?6 b" a; F0 K EAGLE Extended Airborne Global Launch Evaluator. ; A8 {# f$ X) FEAM Emergency Action Message.$ M2 e6 _3 d2 @ EAR Export Administration Regulations. 0 M. _' G2 c4 W7 G3 _) Z! R% u4 ?7 kEarly Operational) C5 F% |. [0 } G5 [4 w: T" W Assessment! r/ o; q7 H# j An operational assessment conducted prior to, or in support of, Milestone II.8 z! Y3 P0 m+ K9 _$ }: c Early User Test! Z( @2 L8 o- o5 @. r (EUT) 8 J# ]5 P- g! d7 v* Q- K3 @8 BA test employing representative users to examine materiel concepts, training or . W, J" ?' i* d( T! `logistics planning, or inter-operability issues. EUT can be accomplished during " W# d) }' D; o) ~! j1 VDEM/VAL on brassboard configurations, experimental prototypes, or surrogates+ Q! ^' v, b+ L& d1 a$ i4 p to provide data leading to the decision to enter full-scale development. 4 U- B$ e* j9 u, L3 |* tEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of ' q* J8 C0 r+ f. [$ l1 Lsurveillance satellites and long range radar.: r' p0 {( W1 S# h (2) Early notification of the launch or approach of unknown weapons or & j" A3 f1 L/ s( wweapon carriers. ! j' U7 H# Z8 O1 y0 SEarth Limb The apparent outer edge of the earth as viewed from space. 4 }7 B) W4 J% K* E7 \& c& v$ l# }Eastern Test 8 T: T- M, [* w6 t, d6 lRange (ETR)" K* N# ^* Q. s* @( k) x Beginning at Patrick AFB, FL, this range stretches halfway around the globe" N" ?9 b3 w7 ^! W where it meets the Western Test Range. An array of launch complexes, sensors, / @7 p! u9 E# E0 G' qand tracking sites make up the Eastern Test Range. The ETR is now operated% M- Q9 @+ u9 Y$ I3 } by AFSPACECOM as shown in WTR definition. # d4 ]& E: ]' x, @9 |2 H" CMDA GLOSSARY, VER. 4.0 E , ], U0 k# Q' [& J% E& }88 - ^0 t0 l7 ^4 f4 s" JEB (1) Electron Beam. (2) Enhanced Blast. $ C4 g1 y$ E' {EBB Electronic Bulletin Board.' r1 n7 i2 D! R EBCDIC Extended Binary Code Decimal Interchange Code. . k& i2 s# @1 t% U. hEBW Electron Beam Welding./ p9 R- {* S' a( o4 D; H% L EC (1) Electronic Combat.1 j* Q @( q! _/ B3 m' k (2) Error Control. 2 D. p8 z0 R3 N, c2 b D, ~2 ~7 |% m(3) OBSOLETE. European Community. Now known as the European Union ( Y# |( \+ ]8 y, v/ D: S4 G7 y(EU).# W5 D9 L% `1 R EC/EDI Electronic Commerce/Electronic Data Interchange # A' |9 E6 n0 a) fECAC Electromagnetic Compatibility Analysis Center.5 B9 H; K' S2 @5 j# c6 f ECB Engineering Change Board.1 X) B2 F# B# G8 I. }- D& e ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). / G3 g+ v+ t1 D8 z) C3 V. KECCM Electronic Counter-Countermeasures. & g. H! ^) o* V/ ]/ {ECDs Element Control Directives. 3 j3 q) A0 F, DECLS ERINT Command and Launch System.- L9 c# ~+ |* k6 r' I' G8 O( G" [ ECM Electronic Countermeasures.0 Y, c2 A; g) b ECN Engineering Change Notice.0 l6 o4 K5 d# y! m( n ECO Engagement Control Orders. : u- Y$ z, X$ xECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. 4 ^) }, H) e. r) }$ E8 HECPMO Electronic Commerce Program Management Office. $ R& g8 ^$ G( D# @' ^; OECS Engagement Control Station (PATRIOT). X! {. g F" y% a* k2 m+ aECU Environmental Control Unit.) ]9 U0 L4 O8 B$ a7 B g EDAC Error Detection and Correction. r6 E1 `4 r# w0 W2 r EDGES Electronic Data/Guidelines for Element Survivability.+ w! g' A: r2 X! K4 G% E( F, k EDL Electrical Discharge Laser* L' `; e" E2 s EDM Engineering Development Model.& J( Z; y) x& O1 y8 U EDP Engineering Development Process `/ B1 z" t3 q, H$ ~$ IEDR Embedded Data Recorder (PATRIOT). 5 e" R5 Q, [- KEDS Electronic Data Systems Corporation ' ], D+ M, N. q# E3 S2 HEDWA Engagement Determination and Weapons Assignment (PATRIOT).( [, O! J, f9 _; \( c% t- H4 i MDA GLOSSARY, VER. 4.0 E0 u! c9 K# X* M$ d 89 . l8 [/ v/ o* a3 hEDX Exoatmospheric Discrimination Experiment8 m6 P- A0 n9 @6 d! R* n7 V EE (1) Electrical Engineering. (2) Engineering Estimate. 7 |, Z. o7 y- w0 vEED Electro-Explosive Device. 4 A. e+ a# L2 v5 Y5 B0 T+ f" z. kEEEV End-to-End Experimental Version. 5 ^. ^6 Q4 D) n8 X% fEEFI Essential Elements of Friendly Information.; S- B- \% E4 J7 F6 E EEI Essential Elements of Information.& \7 Z3 T( a/ z3 }% V EEIC Element of Expense Investment Code.; z& B" `1 \4 J- G) p* q7 H4 M EELV Evolved Expendable Launch Vehicle (USAF term) I; b# R' Q+ D, rEEU Electronic Equipment Unit.* x, ^6 D' o/ _' O EFEX Endo-Aeromechanics Flight Experiment. 1 z9 w, n% W ]* E6 bEFF Electronic Frontier Foundation. + m6 L! F2 `/ t- i( |Effectivity A designation given to the BMDS configuration and demonstrated capability at $ R2 ?- U" m4 E2 \ K2 }2 E9 o( h$ ^a point in time, becoming effective at each increment when an element or5 f: B9 u p. s; E i! @3 r component is inserted into a particular Block. 5 S6 b1 P; N- t( h: ], cEffective Damage That damage necessary to render a target element inoperative, unserviceable,3 W5 a, Q8 v' y" }. a" A2 d7 v nonproductive, or uninhabitable." V- L( R; A4 e. W" P6 o Effluent Plume The pathway of movement of effluents through surface water or air. ( |9 s K! L0 f1 sEFP Explosively Formed Projectile." v3 e1 D) k5 p2 H u; | EGP End Game Processor. ( e3 r- P9 D0 iEGTR Eglin [AFB] Gulf Test Range. 9 h$ D' b( P% U/ Y4 t& U$ F rEHC Enhance Hit Capability (USN term, related to SM2 Block IVA). # E8 z- _* T1 a/ B: j: YEHF Extremely High Frequency. _! C! g0 [1 Q3 ^% P$ f ehp Equivalent Horsepower. G1 P% S+ H3 \1 m' a5 z EIA (1) Environmental Impact Assessment.7 Y; p" \3 n' [ (2) Electronic Industries Association. / R; ~- W6 x3 q6 R/ B* KEIAP Environmental Impact Analysis Process.1 U6 [0 g9 Y% ?8 p/ c! j5 L# X EIP Exoatmospheric Interceptor Propulsion.9 q f2 B' z" h$ D3 U EIPC Electronic Information Privacy Center.+ b; J/ t$ B ~$ T! N EIPT (1) Element IPT. (2) Engineering IPT. + w- T( F% z i# D) zEIS (1) Environmental Impact Statement. (2) Explosive Initiation System. ; [& ^# `& g4 pEISA Extended Industry Standard Architecture (Telecomm/Computer term).- h' q/ h1 r! c1 a MDA GLOSSARY, VER. 4.0 E ) j- T, {1 E) H- @+ H90 ' S) I* p( I& T0 Q9 gEKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.. J( g: W9 `4 u0 G Elastic Range The stress range in which a material will recover its original form when the force 6 q7 Q- e. R/ G+ V(or loading) is removed. Elastic deformation refers to dimensional changes 6 |+ U( h# |! d! B; Voccurring within the elastic range., {# |- g/ [) J) Y/ J' c Electro-Optics - a; u( I! t4 F% v7 ]6 xInfrared (EO/IR) 9 j! X, }- h% N( x- `* v9 hTechnologies/techniques employed by optical sensors in the wavelength" B# q- l5 i# j1 I; V! s) u5 s0 o spectrum slightly longer than visible but shorter than radio. 4 ]+ B" |1 B% Q; B C0 nElectromagnetic2 n: Q" ?, f8 G% ^: |* x9 g Compatibility& e% z6 L. _7 }: m (EMC)6 L/ n2 M# l, y1 k9 H A condition when all electromagnetic emissions from electronic, electro-magnetic, 5 H0 W5 a2 C& L+ f9 Mand electro-optical components of a system interact without interfering with one ?; D r ~; o: Janother. 0 F5 G2 F8 f" @Electromagnetic . E& O: {4 r+ [% q4 }" mEmanations & @* A3 Y7 K% p: D3 K# ASignals transmitted as radiation through the air, through a vacuum, or through2 V; B# d" a2 q conductors. 2 {1 b8 ]" K/ h1 j9 t) f7 ]Electromagnetic. p0 ~6 d I! O/ J% P/ X* K# C/ j" x Field (EMF)/ r; g/ {( K5 Z6 K& ^ An electric or magnetic field or combination of the two, as in an electromagnetic. }3 w3 K& O O- P5 x' w/ a wave. Created by electric charges in motion, having both electric and magnetic 7 s- b) {( j1 Vcomponents oriented at right angles to one another and containing a definite 6 ]- F5 M' |. J+ Jamount of energy." _7 m4 A! }5 j \2 n% z Electromagnetic 3 c0 j: R+ m$ ?Gun (EMG)" g( Z8 E; g& Y, g$ G; K# {; z A gun in which the projectile is accelerated by electromagnetic forces rather than7 ]0 H$ i5 J6 T# ] by an explosion, as in a conventional gun. - u) D$ C7 @' MElectromagnetic % Z: D% T6 U; o: {2 G3 r* p9 R- aInterference (EMI) 0 j7 L& ]( f5 h5 Q& ~Any electromagnetic disturbance that interrupts, obstructs, or otherwise 0 I* q: l! v7 d0 F, W' A% F4 Adegrades or limits the effective performance of electronics/electrical equipment.; z0 i) ~6 @; w1 L9 k9 m/ W+ r It can be induced intentionally, as in some forms of electronic warfare, or) k) y: ^- K, `9 b0 I; X6 t& V D unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. 7 k b5 C$ ]' A% Q! n) oElectromagnetic) r2 D: d6 A9 |& | Pulse (EMP)% Z. d. x) \1 U& h( m- O8 s2 J The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of5 p: |- a- H, Q) u3 k/ | the nuclear device or in a surrounding medium. The resulting electric and9 p% \- o% }, G: D& k s magnetic fields may couple with electrical/electronic systems to produce + h/ r/ L) w8 u. ?$ Udamaging current and voltage surges. May also be caused by non-nuclear : }7 D5 p3 Z3 x7 R$ v2 Lmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic8 c ^# p1 p& [1 D4 c: [! q Radiation (EMR) * ^# Z& \2 ~; h* m, E1 H1 r& |(1) A form of propagated energy, arising from electric charges in motion that 2 [: c& T# _+ ^5 U- g* h4 d2 rproduces a simultaneous wavelike variation of electric and magnetic 1 T7 t y3 n- L! \* _fields in space. The highest frequencies (or shortest wavelengths) of i/ d8 R, S- Psuch radiation are possessed by gamma rays, which originate from : ]- {: U; q$ dprocesses within atomic nuclei. As one goes to lower frequencies, the 1 v. A& e5 C0 {- Z7 G2 J' U2 `electromagnetic spectrum includes x-rays, ultraviolet light, visible light, v- Z' }8 W) j infrared light, microwaves, and radio waves. " s$ ^4 o$ `* f* S$ \+ h(2) Radiation made up of oscillating electric and magnetic fields and . V4 c* L6 K9 F9 Y. F' T! |: ^propagated with the speed of light. Includes gamma radiation, X-rays, 5 X; e- v" u& G, _: nultraviolet, visible, and infrared radiation, and radar and radio waves. ; D; a' E1 y g# D$ ]Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices; S& ?. A& j+ D5 m used in system/subsystem design, excluding employment in the RF spectrum. 2 d3 N) s0 l8 d; s. ]Electromagnetic( k5 v) p. V( O% R Spectrum" R: y. ^2 x( p* A/ d The range of frequencies of electromagnetic radiation from zero to infinity. It is' N5 ` s8 ?7 c; h; k: ]) e divided into 26 alphabetically designated bands.3 M5 Z* C/ G* @( o. r MDA GLOSSARY, VER. 4.0 E6 {3 |5 w9 v9 o 91( f- \8 }: s, U$ u* R! I) e& j1 b Electronic1 ]+ h7 W$ c, l$ W4 e8 J# P Counter- & p3 w+ u" Z1 B) jCountermeasure r% w3 P/ p4 e. T s (ECCM)* g) X& N: C8 k/ E* Z8 F That division of electronic warfare involving actions taken to insure friendly 2 ~; r) s7 Q' E5 [- \effective use of the electromagnetic, optical, and acoustic spectra despite the+ m4 w" n5 Y; A9 h. z enemy’s use of electronic warfare to include high power microwave techniques. / K' e6 ]& f2 eElectronic - l/ ?2 }/ B8 r; b) oCountermeasure. o7 H- r+ `3 p- h' Y (ECM) $ \4 x: o4 t d/ H. cThat division of electronic warfare involving actions taken to prevent or reduce an) Y& J. ?! r! i/ B# ] enemy’s effective use of the electromagnetic spectrum. 6 f' n9 A& F, x: r- _Electronic6 l, E2 H3 {: f( n. F3 a5 K/ ] Industries & K9 D5 P7 S3 q; Z# i- LAssociation (EIA)8 T5 A+ G4 B$ d: J5 c3 X4 Z A standards organization specializing in the electrical and functional9 p% f2 I/ ]% t) Y1 v( F characteristics of interface equipment.3 K8 y( U3 [0 p1 e H$ d6 ^' A Electronic* {+ \# l' E* N$ N; h Warfare (EW) 4 b% t9 A* A9 U0 N8 L/ RAny military activity involving the use of electromagnetic and directed energy to & K6 L8 W/ x& H) D9 Scontrol the electromagnetic spectrum or to attack the enemy. The three major/ M2 P# T; T. Z+ X: C$ c7 \ subdivisions are:$ V. G U. J; y •Electronic attack – Involves the use of electromagnetic or directed energy to ( V# a6 \. e% Y! z. wattack personnel, facilities, or equipment with the intent of degrading, 7 [4 j& E. B% K) xneutralizing, or destroying enemy combat capability. Also known as EA.' @9 `$ ]' ?6 R! c Includes: 1) actions taken to prevent or reduce an enemy’s effective use of 6 [" B5 S3 R2 ^; I$ R- mthe electromagnetic spectrum, such as jamming and electromagnetic! ]6 r) r6 z: e0 J& p: q) R. w deception, and 2) employment of weapons that use either electromagnetic or P; f# W5 s$ i( m( O jdirected energy as their primary destructive mechanism (lasers, radio) R! p) B! d/ X0 R# D7 e frequency weapons, particle beams).. F, P5 }. g Q •Electronic protection -- Involves actions taken to protect personnel, facilities, 4 A7 V$ F) T9 g4 Eand equipment from any effects of friendly or enemy employment of$ M) W3 I7 {8 T- \$ o electronic warfare that degrade, neutralize, or destroy friendly combat& a: w8 _1 h' U3 v capability. Also called EP. ' [5 g2 s! f* c, D•Electronic warfare support – Involves actions tasked by, or under direct K* a B \ o3 [! G5 _: t Fcontrol of, an operational commander to search for, intercept, identify, and 5 f3 f: O: w: { H9 Xlocate sources of intentional and unintentional radiated electromagnetic ) _6 `- u$ `: Uenergy for the purpose of immediate threat recognition. Thus, electronic$ b/ z* g7 j2 a: q warfare support provides information required for immediate decisions ' ~" E& R# C, einvolving electronic warfare operations and other tactical actions such as + u) }( O% P, Hthreat avoidance, targeting, and homing. Also called ES. " ~- ` G) n6 X4 b8 P7 t4 ^Electronic0 `+ L ]' d$ I$ _. k! F/ L' s* t Warfare (EW) - m( H# H: V; AEnvironments ) j& o- T% z% J# T/ G( P& z3 cElectronic warfare environments result from radar and communications jamming + x* \; ]( ?8 g Nand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD ) g$ F) v) d: G/ v, Z) v* Ssystem.- i. ~! p* y# f5 g Electronics 0 x- J0 p; C. d/ `8 s$ I0 k! t5 sIntelligence ( E) }: A; r- e% N$ H' H(ELINT) & j! E6 j- K! qTechnical and geo-location intelligence derived from foreign non-communications& I* e* P9 [6 V3 J1 A7 D% z electromagnetic radiations emanating from other than nuclear detonations or 3 q5 `6 F. I# b v9 b( s& Wradioactive sources.+ n' i+ M1 d' p1 W Electronics " [4 C$ w* T/ w8 \6 @) NSecurity (ELSEC)! H# l5 o6 r* K: C The protection resulting from all measures designed to deny unauthorized+ j( N# o4 d9 ~$ X$ L' q9 ^ persons information of value that might be derived from their interception and 7 @# ^0 E& ?: N9 ?$ H8 Ostudy of non-communications electromagnetic radiations, e.g. radar., o- }/ L# T( O# Z5 x2 P Electro-Optics7 O9 i! t3 T7 O/ G) s$ F; J6 ^ Infrared (EO/IR)& p( ~3 E6 r7 C6 n Technologies/techniques employed by optical sensors in the wavelength+ x# m/ W( u- u9 Q# V% K( T! w spectrum slightly longer than visible but shorter than radio. ! \& i4 B& f$ O. [% q a* r9 kMDA GLOSSARY, VER. 4.0 E/ P) }4 X- O4 r) W8 Q+ C, {) g! ? 92 % u# i/ U" k5 K& f$ |, C5 ~Element A complete, integrated set of components capable of autonomously providing$ |" [ W4 f$ h BMDS capability.' b J0 G5 o2 n+ P$ z* u6 [ Element Z# ?3 W. H% `$ ]' u) ]. dCapability8 [' q1 f; p! A }; m Specification. e( j6 c$ O. C0 O; ~ (ECS) % x1 t; B5 ~- h6 m( h! Q# EA document that identifies the element-level BMDS capabilities and# ^! @6 d3 x, Z0 M1 n specifications necessary to achieve the system capabilities identified in the SCS.0 R# e4 J( u. y1 V* d6 o6 f The ECS further defines the SCS-apportioned mission/technical performance * k) S& p) i0 D( ~4 c' `9 icapabilities and allocates these capabilities to the element’s components.' E7 P& N) j3 D2 x+ U Element Control& l6 U6 r1 E; H8 @2 m Directives (ECDs) 2 Q5 V; ] m! m0 e6 m" l3 v5 nThe command and control data instructions to control the conduct of the& h( M& o7 `5 Q engagement. ECDs are developed by command and control software based 8 T' e! _( L: @' @+ @9 l# t* Tupon variable parameter input by the operators (both pre-planned and real time), 0 c2 M! D( p z/ ]and operator defined rule sets embedded in the software. The individual battle $ h6 l' c: r# h! W& U$ H, Rmanagement processors use these instructions to accomplish the assigned tasks9 u4 _5 v. H7 V$ B9 m from the operations order. ECDs are contained within a Task and represent the . Y" q, n3 ]3 d) [4 C% W) @form of parameter values that influence the resource management processes of ) X/ c! J' Y3 m' [: y) yWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and% V# y3 t8 C! U) f8 E Communications Management (CM). There will be numerous ECDs per Task./ u$ S5 |4 o! r3 \ Element" P4 t" E9 ~, S Operations . i; T; N" s; DCenter (EOC) : W- O- j5 X, a" b. g5 |An Air Force operations center, which operates and maintains a BMD weapon or ! B/ f7 [* ?0 Msensor suite. (USSPACECOM) + o: r$ ^) y% G" Q7 P) q0 J4 SELF Extremely Low Frequency. ) r6 ~& C7 a2 S* v. \9 l% tELIAS Earth Limb Infrared Atomic Structure.0 K+ J _7 K8 P) z$ @, q) U ELINFOSEC Electronic Information Security. # |4 W A7 p6 j1 n9 |' }ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-1-22 08:01 , Processed in 0.053003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部