航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation + i& i" }3 Q k& I% D0 @& t! _9 x3 a( ]COMSEC Communications Security. ; X" _3 r1 D; UConcept, K; R: c, c- u7 f' V8 d2 | Exploration &2 ~0 j4 c/ n' M @9 a# f" ^8 @ Definition I% T+ l" n/ @ The initial phase (Phase 0) of the system acquisition process, beginning at 6 n+ s7 S% v5 | ]# k4 k! \Mission Need Determination. During this phase, the acquisition strategy is ; j4 ?2 h! `! W# z! Adeveloped, system alternatives are proposed and examined, and the system 4 V s0 d4 F1 o6 b& z1 Bprogram requirements document is expanded to support subsequent phases. " v( j1 }5 _( d' f' a0 H7 F3 b( VConcept of 9 S( f3 ?! m/ D1 W- xOperations a9 C" w4 Z b3 A% v(CONOPS)1 [& a) ]' X$ d( k7 N (1) A statement, in broad outline, of a commander’s outline or intent in regard to% U# @/ s$ u1 L( U# E& _ an operation or series of operations. The concept is designed to give an overall# s& _+ P( r8 w0 K( @ b% a picture of the operation. (MDA Lexicon)- p% s: [+ }4 e; e5 u (2) A verbal or graphic statement, in broad outline, of a commander’s3 u4 z; M0 P; n F. P Y2 D B; V$ c assumptions or intent in regard to an operation or series of operations. The & c, _/ L/ {& Y- r- aconcept of operations frequently is embodied in campaign plans and operation , h2 ` W6 [& `plans; in the later case, particularly when the plans cover a series of connected ) C7 S" t! r: }0 Toperations to be carried out simultaneously or in succession. The concept is4 T8 ^( p# A& G0 ` designed to give an overall picture of the operation. It is included primarily for $ N6 ^/ {' o) f/ m: ladditional clarity of purpose. 5 x' `9 R# G& D$ h8 h, S# cConcept Plan An operation plan in concept format. Also called CONPLAN. 7 q: b. t- n* B9 D+ G4 `8 n+ rConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of v p5 T2 j _1 S" V. o; Ythe acquisition process, or combines development T&E with operational T&E.8 A5 u; I/ ], X+ p Concurrent8 z- f1 L7 a$ N# C: P Engineering9 l$ _; h" }1 O A systematic approach to the integrated, simultaneous design of products and. _( X* L4 X& R" n their related processes, including manufacture and support. This approach is ! }7 d$ Y; I9 @% ]) y' [intended to cause developers, from the beginning, to consider all elements of 8 z/ T2 ~9 t9 othe system life cycle from requirements development through dispersal, including8 c8 g* y( z1 G9 r: [0 A& d( J/ L cost, schedule, and performance. 9 `/ D6 K9 ?5 O8 @CONEX CONOPS Exerciser.% a( g$ e s4 a, H! L! j Configuration A collection of an item’s descriptive and governing characteristics, which can be3 s+ W. F9 L# t expressed in functional terms (i.e., what performance the item is expected to 0 P9 D( g/ m1 L. V+ Zachieve); and in physical terms (i.e., what the item should look like and consist of$ p, ] G/ S$ y! h0 ~* R0 a when it is built). % K& c8 x( u# I3 J1 HMDA GLOSSARY, VER. 4.0 C h; a1 C5 ^$ m4 d) j# h9 [59 2 f B+ P' G# G2 O' q8 f$ ^3 `Configuration& b8 e, c. a7 ^- M# l6 }6 ]. _& B- c2 n Audit( i+ n% Z& \8 l; t One of the Configuration Management tasks which includes a functional0 z2 q9 F2 K: k/ C+ }5 Q configuration audit (FCA) to validate that the development of a configuration item# n) a4 D% l5 s; ~' U- H! F has been completed satisfactorily and that the configuration item has achieved1 @! G" X3 k% V- o7 a D to specified performance and functional characteristics, and also includes a 5 m8 B. J2 `+ F1 z; Yphysical configuration audit (PCA) to verify that the configuration item “As Built” 2 m6 H2 d& ?' c: F+ |+ ]+ W- Q; Yconforms to the technical documentation which defines the configuration item., j5 ` R7 R& f7 h3 `' p) J& ~2 V Configuration& J# E- s3 U! ~2 F7 {; { Baseline2 o& d" J, g/ [; r, x The configuration documentation formally designated by the Government at a2 r& ], s, Z; w# h specific time during a system’s or configuration item’s life cycle. Configuration7 s$ [4 _ Q: _2 H( e7 t6 b# e: f baselines, plus approved changes from those baselines, constitute the current ! G5 w- ]5 r: w/ ^( ~* lconfiguration baselines, namely the functional, allocated, and product baselines. & I% R t' t5 A' zConfiguration) R8 J% q& F! k) h9 p Control3 x7 I u; C8 h9 g2 U One of the Configuration Management tasks that involves the systematic ) O2 u, r2 h& P: i3 j& cevaluation, coordination, approval, or disapproval of proposed changes to the . L/ |0 }$ A! f$ W. M+ X2 n1 adesign and construction of a configuration item whose configuration has been+ ^2 }, C9 @/ L0 u8 s5 ` formally approved. ( J3 |( p) K1 V; w/ e- C; YConfiguration* i' ]0 F x# l Identification* l( P( F5 a% B j. c1 w0 Q. o) \5 M* D One of the Configuration Management tasks, which require that for every 1 d3 W. o* O. achange that is made to an Automated Data processing (ADP) system, the design! B# }* o* H+ U; F4 u& \- @# V and requirements of the changed version of the system should be identified. 7 b* n" Z O, ?: hConfiguration# Y+ |, r2 M! ~ Item (CI)( n' Z4 r4 w; [9 @, K An aggregation of system elements that satisfies an end use function and is" m3 e* L, b/ ]2 p3 [% ]7 F designated by the Government for separate configuration management.- W' n1 O- C5 j l7 \ Configuration items vary widely in complexity, size, and type. Any item required f0 Z2 b& Z4 X1 [0 n8 tfor logistic support and designated for separate procurement is a configuration* I4 U0 o- W8 b1 t+ A( V item. Configuration items are traceable to the work breakdown structure (WBS). - Z( i6 A" y2 P+ cConfiguration3 @1 G( r1 R3 {1 x' @" u, A Management; B7 ]4 H q4 z1 E8 t9 `; r (CM) 7 a- a* q: L8 p+ Q7 T, x8 t/ kIn computer modeling and simulation, a discipline applying technical and0 K/ I" s4 G0 }" f0 q1 l [ administrative oversight and control to identify and document the functional7 u" f7 @. K9 n% j. z8 g0 }9 t requirements and capabilities of a model or simulation and its supporting ; u3 ?! Z. U. @0 P% _/ v' f1 g+ jdatabases, control changes to those capabilities, and document and report the # k6 _- |, v1 Z+ W. |changes. See also Accreditation. 6 ?4 U# F4 k K; YCONOPS Concept of Operations.# l) ~2 D u1 g4 x: Q CONPLAN Concept Plan2 k, `1 ?1 Z9 A% c+ Z* t: T4 u CONS Contracting Squadron.9 }+ W! t, V& w8 h! X. m" M Consolidated. V% l8 Y& s/ L! R Command Center 9 I, f U' H: t8 a7 u# q) A A(CCC) ; t% p' U; l- a! J+ X3 Z, s' |( m' \) OA single command center from which USCINCSPACE/CINCNORAD can direct all Y5 M8 L/ D4 W. Y. t5 A2 X: H his assigned missions, to include BMD. (USSPACECOM) Located in Colorado& X. w7 I: w. {; e" r* y6 g Springs, CO. 5 @; {2 B" V+ w6 f$ M# l) G# |) AConsolidated T$ S; B X# I- E( ] Intelligence' G7 n2 n( {3 F. @1 p) Z) V Watch (CIW) 5 `3 i$ f& P- T5 `$ V R+ ~, nA consolidation of intelligence watch functions within the Intelligence Operations4 @; O) d" K* H Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD1 r7 j7 L9 Y3 m, p( T9 R+ J) C: s Aerospace Defense Intelligence Center (ADIC), and the Air Force Space; _$ E+ V/ Y. U! g, s Command Space Intelligence Element (SIE).) [4 e% x! B4 W* K4 l, b Consolidated0 y5 `- M) g' W- z Space & V$ z1 a* K% L" ~6 r) bOperations! y. I- q! x' W0 m Center (CSOC)0 R! U1 S) v) Y Series of centers at Falcon AFB, CO, which operationally control and maintain - e" l& u0 e! V9 vassigned DoD satellites.9 e k- A3 R/ n$ x# c Consolidated 3 T: X8 ]; H0 C1 n# dSpace Test0 F3 {9 x+ x/ J. f' ] Center (CSTC) 1 M" j# B5 }% t( t6 X3 G' U0 XSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and 8 L& x; t- O, W! Minitial on-orbit checkout of operational satellites, operate R&D satellites, and! j& v. F# d# G" Z3 ~1 J& O6 j serves as a backup to CSOC for operational DoD satellites. 2 N, ^2 S, a# ?( E% B/ O8 UMDA GLOSSARY, VER. 4.0 C + U3 ^& F. N9 H1 F. b+ |# @60 ' d t6 C$ v! k. S2 Z: R. iConstellation $ I. x. \0 d- o. ^ KSize (CSIZE)6 x% |" A$ L, K3 W- b) i% | The number of satellites of a particular system placed in orbit about the earth. ) s( C5 B+ _* yContact Fuse Device used to detonate warhead on physical contact with another object.2 \) M: {& w: H. t3 y" d. F Contingency) X$ I. ^8 m8 h' ^/ I, Y Deployment Plan ; v8 b }" r' S(CDP) & ~* M3 m5 P, b& iAn executable plan designed to deploy an early missile defense capability and ( ? p3 z5 T: {( _7 b- breduce deployment time. The plan provides specific executable deployment ! _1 V- d& \3 L ooptions and describes activities required before and after a deployment decision., u* a; f. Y; A' r The plan also allows decision makers to have oversight on technical progress,- y4 Y! D3 |; X4 r/ e& _ cost, schedule, and risks associated with a deployment system.# @( n$ r' I; s( W n5 t Continuity of 0 S v9 j- n' y; ^Command 2 d$ \# a8 s9 c5 OThe degree or state of being continuous in the exercise of the authority vested2 c" x- E; z p, r in an individual of the armed forces for the direction, coordination, and control of; y9 \& l! \/ C+ [7 ^ military forces.( A, O* @' U) l# U Continuity of 9 S+ g% `' f1 D+ V9 r+ _Operations ( } F0 |5 E# S, vThe degree or state of being continuous in the conduct of functions, tasks, or I$ A4 S$ C' m! ~& wduties necessary to accomplish a military action or mission in carrying out the$ @1 p0 N* S, z/ X9 P national military strategy. It includes the functions and duties of the commander, * V, G6 r2 C+ d( M4 W& l* gas well as the supporting functions and duties performed by the staff and others4 c! ~$ S' w+ K* N acting under the authority and direction of the commander." w3 o `& t1 ?- U( h Contract2 F) P8 |0 u# q: v Administration4 g! |5 w3 z" ] Office (CAO)! e2 Z& C% l4 y c2 c( ~9 s) q* D The activity identified in the DoD Directory of Contract Administration Services& i# O4 W* ^* A/ A1 {* n& A- A Components assigned to perform contract administration responsibilities. It is a 5 j* t/ a( s. ]9 B/ g) Fgeneral term and includes Defense Contract Management Regions (DCMRs), % y+ P# i, A* R2 Z/ R4 _Defense Contract Management Area Operations (DCMAOs), and Defense Plant 2 N+ D( [, Z/ y7 `( [- @Representative Offices (DPROs). (Defense Systems Management College * l! a1 k7 U6 z: VGlossary): H0 Y A( z0 F Contract Data3 V1 m# \6 t; y! p0 H$ y1 l7 r Requirements `6 w, x8 H, f; \; y: S List (CDRL) + I8 ~! }' [5 ^1 uDocument used to order (“buy”) and require delivery of data. Tells contractor ) n/ n. x2 K4 \& Jwhat data to deliver, when and how it will be accepted, where to look for) n! O7 ?5 ~# ]" i- x0 i instructions, etc.) z' k8 y( z" u( j" |; e Contract " m8 e2 u0 y+ gDefinition # z* e" K+ d7 y1 ]7 [& A; dA funded effort, normally by two or more competing contractors, to establish , P9 W9 y; [/ }; f, i: F/ Ospecifications, to select technical approaches, to identify high-risk areas, and to8 J. ]8 o3 K# N& i5 `8 B make cost and production time estimates for developing large weapons systems.) e' ~; [/ g' v) z6 M2 G6 W2 `2 v Contract Work# Q0 U8 R. L2 `& z9 \$ Q Breakdown 5 J& t0 Z: f' N% t2 hStructure) K& u5 w( {2 Y% R. C The complete WBS for a contract developed and used by a contractor within the + E9 d6 y/ }, O6 X- xguidelines of MIL-STD 881A, and in accordance with the contract statement of ; p0 G$ U) B9 w5 h( y# }* ?. Uwork.4 o* }( U! I- a! f9 c Contracting " C& u1 g/ G2 W1 h' |9 WOfficer (CO)# R1 }! R' {% \; X% u1 [1 ^1 k7 P: A; Z A person with the authority to enter into, administer, or terminate contracts and0 @# S9 j, u, G k. a make related determinations and findings. The term includes any authorized , m( H$ {, @7 f4 ^. v5 ]representatives of the CO acting within the limits of their authority. A CO whose , N) F) H! G) N# R5 k1 D2 eprimary responsibility is to administer contracts is an Administrative Contracting+ m) U& m- y E5 `9 Z; P Officer. One whose primary responsibility is to terminate contracts and/or settle , x8 P+ G% {1 Z% o/ S! r& U' I0 G: vterminated contracts is a Termination Contracting Officer. A single contracting: y! e& e9 Y8 [- i9 T; ? officer may be responsible for duties in any or all of these areas. , @2 u- ^% O6 a& q" u) `5 U4 a7 tControl Authority that may be less than full command exercised by a commander over 8 O; }7 r( P8 B+ A3 Rpart of the activities of subordinate or other organizations. # c/ V* Q& I; T' L* L' V, |Control # E. \( c! W9 Z1 q8 K7 n" p& MAbstraction' [7 h9 @9 q7 B: L+ e# ~, d (Software) The process of extracting the essential characteristics of control by6 @/ m6 h, \& v7 I defining abstract mechanisms and their associated characteristics while 2 Z3 A' e2 Y) S; L8 ?disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C & m, U6 Y( v1 Y% k% F1 i61# s( N- z% k4 m9 O; \ Control and5 T) y: c& J( x9 l; X8 X4 n Reporting Center 4 D5 }6 r$ Y+ J# j6 iAn element of the US Air Force tactical air control system, subordinate to the. U: T* h x3 K! o tactical air control center, from which radar control and warning operations are 9 K3 \) I4 l( i8 x j, s% f- oconducted within its area of responsibility.8 [3 x. {/ |5 F6 `$ o Control and 6 a C3 }$ ]! n' vReporting Post$ u5 \" A4 R, H+ m# h An element of the US Air Force tactical air control system, subordinate to the- e7 G7 {9 }' o# L* u control and reporting center, that provides radar control and surveillance within + h/ w; A3 Z8 Oits area of responsibility.1 G% y: K* r8 { Control Area A controlled airspace extending upwards from a specified limit above the Earth.; B y3 T& B9 @4 V) B7 m& X6 P: O5 X Controlled, ^$ J/ W$ @: a& S, ^( _; Y Environment" b8 f2 T S! E* s3 }: C% b; W Area where entry into the radiation hazard area is controlled.: e8 N: R1 t/ [, t5 e) E1 E Control 6 \1 Y# P; a- v/ e; A! b: wProcedure & X& J8 f* f; q0 u1 \" d9 mThe means used to control the orderly communication of information between% M4 P6 l6 J$ ]& p6 }4 _& e9 Z stations on a data link. Also called line discipline. ) S3 W# C: K5 O0 ?9 RControl Station The station on a network, which supervises the network control procedures such0 W6 w+ i/ e" `% q: z3 v5 R- K, k as polling, selecting, and recovery. It also is responsible for establishing order % q, N0 a, w$ v, zon the line in the event of contention, or any other abnormal situation, arising ' x2 Q7 [# S' e: y, l5 W# ]between any stations on the network. ( Q) r9 j+ H8 B1 a2 J* D0 cControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to 8 z, E9 t& `" L9 sprocess sensitive defense information and that is under sufficient physical and / [0 k$ [4 b* Xtechnical control to preclude an unauthorized entry or compromise. # j. S* l, `+ B& l$ t- ZCONUS Continental United States. 6 w& ~" Y% e* W1 z8 l9 K$ CConventional Co- ( s/ K5 `# t/ z) P" oProduction9 o4 [( ^% F# _8 A( h/ \$ P An effort between governments to produce the same end item, or components , J0 K5 g( C# J* Wof the same end item, in concert., g# H2 g" i1 r/ x* D Conventional/ y+ N1 c4 k7 t5 k: @) j; ? Weapon ! q6 |; i* f2 p' |. @& b7 h1 jA weapon that is neither nuclear, biological, nor chemical.( Y+ X7 D9 ?4 G- I/ X2 L g Coop Cooperative 1 C8 a# c6 {# z$ SCoordinated ; m) n$ W7 ]* P, I2 SEngagement 3 z. n0 T$ j& e1 {! Z; y: bPlanning/Actions - o9 l# w* K9 O( a" QNecessary coordination among engagement components to ensure maximum 9 ?8 g Z1 `% A4 yeffectiveness of the SDS and resources are not wasted on targets already $ q6 a3 ?) R1 _1 r0 Z6 `targeted. 3 n) n* W$ D' q( ]8 \! _Coordinating8 P/ ~( @8 j4 J0 ~4 r Authority 3 [& a2 [; K, X- U3 i/ J+ {3 Y( kA commander or individual assigned responsibility for coordinating specific' p# k" O g" w functions of activities involving forces of two or more Services or two or more' V5 r' [( W8 d9 G forces of the same Service. The commander or individual has the authority to * }5 k) a, q% r& _( J8 Yrequire consultation between the agencies involved, but does not have the # [" H7 b8 v8 N9 z- r/ sauthority to compel agreement. In the event that essential agreement cannot be O' ^9 p; t0 O& q reached, the matter shall be referred to the appointing authority.# I. n$ v$ V8 F7 ]1 x1 [- }9 `1 ?! Y COP Committee of Principals 7 ^* y, c. h+ p' B( X3 NCOR Contracting Officer’s Representative. Contracting Officer., Y( V: ~9 _1 a( a0 g" L6 F& I CORBA Common Object Request Broker Architecture. 3 Z9 x8 C$ R. m% ICORM Commission on Roles and Missions. 0 S7 N4 q4 B) M/ B4 D# H& KMDA GLOSSARY, VER. 4.0 C $ v1 i" {2 Z$ \; ^7 \' _62( l* v1 ^ |8 J7 \$ i/ }. | Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens1 d- o& a9 s# o+ @ perpendicular to one another, designed to act as a radar target or . {5 `$ K. [3 vmarker. / }: S- A% e+ W/ m/ W: z(2) In radar interpretation, an object that, by means of multiple reflections ( p- `; G9 t7 }; h+ e2 Tfrom smooth surfaces, produces a radar return of greater magnitude than4 v6 Y' X8 G" }; {' \0 `/ J7 x1 w might be expected from the physical size of the object. 0 b9 K1 A2 Q8 ~, ?+ ]Corps SAM OBSOLETE. See Medium Extended Air Defense System. ( H5 M# h' E* A8 u( HCorrelation (1) The process of relating observations or tracks from one set of data to . x- a4 R3 z/ C: o; uobservations or tracks from another set of data, i.e., collecting data from: Y; w0 }" X$ f- P6 Y different frames or sensors that presumably relate to the same target. (2), T- y8 c" [' j9 U In air defense, the determination that an aircraft appearing on a : { P8 v; R) U0 cradarscope, on a plotting board, or visual is the same as that on which- ^1 j4 H* g8 \ information is being received form another source. (3) In intelligence+ d! Q. ~; y3 E C. {( I Q usage, the process which associates and combines data on a single9 q2 F8 e/ _8 _% r entity or subject from independent observations, in order to improve the0 _# O8 @; [' _ reliability or credibility or the information. ' l* G+ b6 r# `' V; ]0 i" uCOSEMS Evolving architecture operations support tool.4 K' n' B1 F" Y0 g9 O COSM Computer System Operator’s Manual1 J/ X- Z( Z0 z. |3 g COSMIC NATO security category. 7 ]# v( c8 |" g, U/ ^ DCost Analysis 0 I& W4 N/ M' E) }Improvement * Y. k/ K8 a& }2 H/ u2 iGroup (CAIG) - m8 `% ]0 C5 I. {( R% EAn organization within the office of OSD Director, PA&E which advises the DAB 3 i8 C) ]; d0 Z1 R, I1 i1 Von all matters concerning the estimation, review, and presentation of cost$ ~& F+ d- n# r8 s2 L& A analysis of future weapon systems. The CAIG also develops common cost / m3 @" |+ ]6 v. F: Iestimating procedures for DoD. ; E% ]9 K4 ~. d. h. j) w2 j! yCost Analysis* g) n/ ?5 x8 m- U5 t4 G3 u Requirements" k8 n$ {# J7 | Document/ M) ^9 m" g1 M, F+ P9 e (CARD)7 `" F' u# u- z. R- B: X' |& u The document describing the technical baseline, which is a subset of current ) @" |3 k2 \$ z1 y, r' ksystem technical data and is used to generate the baseline cost estimate for an3 S9 ?& @3 _$ l! L SDS element. It includes, but is not limited to, the element description, & z1 B6 N8 f3 M# E0 M( E4 \4 V* Cinterfaces, operational concept quantity requirements, manpower requirements, ( T0 u5 @/ {& Q! k! Tactivity rates, schedules, research and development-phasing plan, and facilities) {6 c: F( T6 h4 |+ _ requirements. ( A( h2 b5 {. a! Y8 ^) VCost and% i" y8 H9 `% R4 x1 w2 U5 R# T Operational: C. h9 J! b2 N* s+ O Effectiveness $ e1 C$ K4 m* A) Z+ M9 vAnalysis (COEA) f% \' l5 c% ^% i. G9 b An analysis of the estimated costs and operational effectiveness of alternative ( Q5 P4 |* H1 `0 Vmateriel systems to meet a mission need, and the associated program for $ E9 t; k5 c! N4 x( P4 J1 Uacquiring each alternative.) M9 f( c3 {; N3 @- v Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk4 L6 j9 Y# b7 \% o* i; r! b( z due to cost estimating errors and the statistical uncertainty in the estimate. & o+ P0 X7 P8 u7 _9 V: tSchedule/technical risk is risk due to inability to conquer the problems posed by8 q. U, v2 A; R) ^- T the intended design# U3 t5 ^5 ^$ P: z8 T) P3 p. B COTR Contracting Officer’s Technical Representative. See Contracting Officer. & o5 J! M" F% i3 MCOTS Commercial Off-The-Shelf.4 }* Z- g+ V' \) Y! N# v+ p Counterair A US Air Force term for air operations conducted to attain and maintain a desired 9 i' J0 c1 D8 r( K: jdegree of air superiority by the destruction or neutralization or enemy forces.4 o4 B3 A+ P! V. S Both air offensive and air defensive actions are involved. The former range - C& g9 x6 t; @' gthroughout enemy territory and are generally conducted at the initiative of 7 }. v5 T! `6 p4 ~friendly forces. The latter are conducted near or over friendly territory and are ' h) Q/ M! e% Pgenerally reactive to the initiative of the enemy air forces. 8 t# I" S0 l# OMDA GLOSSARY, VER. 4.0 C% r9 S: ^+ m3 D( O# l 63 # B3 k- s5 S9 ~1 WCountercountermeasures 9 ^. _: q/ n: L; S. T, x(CCM): h3 \, [# ^4 \" @ Measures taken by the defense to defeat offensive countermeasures. 6 E, L1 K2 i) G. q! [Counterforce The employment of strategic air and missile forces in an effort to destroy, or " k b' C5 x5 r) q( u. C$ ]0 srender impotent, selected military capabilities of an enemy force under any of the : x4 y9 }1 [5 P( q1 K7 o" ncircumstances by which hostilities may be initiated. : s, H: T' P! j) I) `. |Countermeasure A design or procedural measure taken against covert or overt attacks.7 P4 \6 O( |' z, S4 F/ C9 h* w Countermeasure 0 S3 G. ^" ^. M; E# ^4 Xs (CM)2 j* `- d: \$ d0 p1 X That form of military science that by the employment of devices and/or % v: |3 i# W1 W& }. d2 Z* i' j4 \techniques has as its objective the impairment of the operational effectiveness of 5 c9 B8 c [. u( Y( b) Denemy activity.9 j: @6 R+ p! |! v+ I H/ B Countermeasure + F$ a+ f/ L" ]! M! S- ]7 X# zs Rejection* B& C. U( |7 a- { (Surveillance) 9 F- f& `; H) `) y- mImprovement or rejection of an object signal in the presence of$ y b ^! m" L3 @; G2 f/ _ countermeasures. / T, f) F$ g* f+ b' ?Course of Action; V9 p/ x7 [5 t( \( P& o/ z (COA) 9 ]8 b6 k. Z- S" l" ^* t0 ^(1) Any sequence of acts that an individual or unit may follow. (2) A possible) V# q$ ?6 `) a2 s; P plan open to an individual or command that would accomplish or is 2 D4 E) R3 F9 erelated to the accomplishment of his mission. (3) The scheme adopted + A A9 B2 F8 G: e& @: h" u9 Lto accomplish a job or mission. (4) A line of conduct in an engagement.6 |. B) d- Z7 q* v: O4 r: v0 O (5) A plan to accomplish a mission. It describes the execution concept1 P$ S( M- l7 f- k& n5 J" o for BMD of North America. It will specify the engagement priorities, : S' T' t! n, ]resource allocation and desired results by Area of Operation (AO). : L+ U" l x5 P2 P/ I+ ^ j# w8 @8 E(USSPACECOM) (6) The scheme adopted to accomplish a task or 4 u8 j6 N1 P/ qmission. It is a product of the Joint Operation Planning and Execution$ j7 T }, _7 ^2 L) ? System concept development phase. The supported commander will% r% w0 c& u$ [2 _; M' n include a recommended course of action in the commander’s estimate.% s5 c2 u, L+ { The recommended course of action will include the concept of 9 }0 y% k# V- ]2 K0 l( t0 o1 woperations, evaluation of supportability estimates of supporting. Y }! ^* L5 S2 t: }0 @- \: H organizations, and an integrated time-phased data base of combat, : q2 e5 p3 ~2 J0 s2 T0 K# Pcombat support, and combat service support forces and sustainment. * r0 r7 x" c% @1 S& K- Z5 `Refinement of this database will be contingent on the time available for; k9 W) w; V) C/ g) x& F course of action development. When approved, the course of action & y8 ?' ~! d. W' m1 o* r5 V$ Vbecomes the basis for the development of an operation plan or: p9 E5 D: @" K operation order. 9 _/ h2 [" K# k1 @Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, % c! L1 W4 n xand other geographical presentation systems. (2) Cover or protection, as & s# {9 j' C& J9 @. Jthe coverage of troops by supporting fire. (3) The extent to which; @ j1 h3 s) ^ intelligence information is available in respect to any specified area of9 F$ I) ?9 J& N2 y4 M" T interest. (4) The summation of the geographical areas and volumes of 1 y7 j: r- J# jaerospace under surveillance. 6 N+ L# r: `& q, ]' FCovert Timing " t3 z! V% F1 J4 c* r" NChannel. E- e$ `; h4 K% ]! \, u; G A covert channel in which one process signals information to another by: x" ]) ]5 t' I& h5 y! ?. ]1 t modulating its own use of system resources in such a way that this manipulation c9 D3 ?3 q8 B) Daffects the real response time observed by the second process. . ~, ]1 l- ~! E' o0 a4 }CP Command Post. , q6 q" K6 O! ECPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. Z2 s! C4 ?5 y: ?, }$ k) b CPAF Cost Plus Award Fee. 0 z: z6 |' a Q C" w* mCPAM Chief of Naval Operations Program Assessment Memorandum (Navy) . e! }6 D5 S2 g: _' LMDA GLOSSARY, VER. 4.0 C + R, ?. A: e( _64 ; ~# N/ H/ \) y2 g& L9 ]CPAR Cost Performance Assessment Report. Y' F3 D' ]& B+ Z4 S2 ]/ a& A$ A CPAT Critical Process Assessment Tool ( X" r8 @) o8 v" b% ]CPB Charged Particle Beam. : R, n3 ?) i( a, U4 D( HCPEV Communications/Processor [Network] Experimental Version. $ [2 h* f9 I" K4 a i3 ?, CCPFF Cost Plus Fixed Fee. ' V3 J& y) E2 |CPIF Cost Plus Incentive Fee. q6 K' @. ~0 |( |CPIPT Cost-Performance Integrated Product (Process) Team.* H' b" e" {3 R" p% Y CPM (1) Critical Path Method. (2) Contractor Performance Measurement.( `$ N. G8 @/ N& ~" G ~% ? CPP Critical Performance Parameter.! u' z6 m7 S ~" M( x F# D1 G! x" k CPR Cost Performance Report.0 A; j7 T; J: o" ` CPR/NC Cost Performance Report/No Criteria (Contract management term). % q* q# q- G& B" v9 U4 iCPS (1) Consolidated Program Summary.% ?. Z5 T' V% f" ~+ n5 D (2) Competitive Prototyping Strategy.. b) B$ B, K' E0 j4 u7 A (3) Current Program Status. : Q, n6 z: E9 x+ v* j+ _, \CPU Central Processing Unit (TelComm/Computer term).# i0 Y1 n6 \. r9 b0 c1 ] CPX See Command Post Exercise. 6 `% v+ n( O6 C8 [2 P1 UCQAE Chief/Contract Quality Assurance Evaluator.1 v- u6 z6 b" p0 b. u* q+ w. ] CR (1) Computer Resources. (2) Continuing Resolution (US Congress term).5 P5 L, ?1 N. R, `1 W7 D! s4 f7 x6 U CR-UAV Close Range Unmanned Aerial Vehicle. # i n/ I" I$ W, ?CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement 3 c' P2 |7 j @6 n+ K4 k& xCRADA Cooperative Research and Development Agreement.: y8 g4 {2 q5 U( E CRAM (1) Control Random Access Memory.7 C; u' q. t0 A% O (2) Cross-tie Random Access Memory (Computer term). , B e! |" q5 sCRB Configuration Review Board. / k7 H' \! C* P7 o5 n6 }. hCRC Control and Reporting Center.+ H8 q4 T$ D: E; Y6 J% } CRD (1) Capstone Requirements Document. : d& R: g! ?5 C# T$ T(2) Component Requirements Document. 2 H: Q1 I# i( z+ u% oCRDA Cooperative Research and Development Agreement. ! d* R- \9 @3 ]$ @; j* tCRG Communications Relay Groups (PATRIOT).5 I* I' \. \' K: u# d4 F8 H CRI Classification, Recognition and Identification. $ x* l" ~9 L5 t- z0 OCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C. s* J8 r1 `8 c j 65/ O D0 e! s; \* }* A. U+ O Critical Design 3 a& r) o- s7 T1 e" ^/ A+ R1 w+ \7 ?3 vReview (CDR) 0 i. r" L! Y8 g4 O( hA review conducted to determine that the detailed design satisfies the * V/ O7 J+ X, wperformance and engineering requirements of the development specification; to 9 w7 q& l7 R9 u( [7 R, lestablish the detailed design compatibility between the item and other items of + w; T7 }: C) a4 s4 xequipment, facilities, computer programs, and personnel; to assess producibility+ {3 O4 l8 \$ V7 [& o$ {. b" C9 P/ i and risk areas; and to review the preliminary product specifications. Conducted. }$ U, Y, y8 s0 w! |8 U during Phase I, Demonstration and Validation (for prototypes) and Phase II,2 v2 J2 K8 r- u( g# r) k$ B, U Engineering and Manufacturing Development. " B0 l3 z/ t6 L2 l6 zCritical* j2 G. ], E/ X, V: a- L Information 5 d; p8 p. `8 l) ?, t' k$ d+ v7 {Specific facts about friendly intentions, capabilities, and activities vitally needed 1 U3 Z, [& c" t* A$ K0 ^5 N( @by adversaries for them to plan and act effectively so as to guarantee failure or3 ^) {3 I( Z* F' r3 ]4 K unacceptable consequences for friendly mission accomplishment. ! Q* h2 Q1 H( j+ [' H. }Critical( s6 \# c3 k( Z$ v0 Z9 @- I; L' | Intelligence . f- \3 @0 c: q( C# w$ EParameter . W4 U7 ]3 }8 H l0 SA threat capability or threshold established by the program, changes to which1 D4 j* r4 R2 u; N8 G/ j could critically impact on the effectiveness and survivability of the proposed7 L4 N! K9 L- S7 ?8 s system. ' V+ j+ O+ M: ~% FCritical Issues Those aspects of a system’s capability, either operational, technical, or other, : N1 Q6 n$ @( `* l! hthat must be questioned before a system’s overall suitability can be known, and 4 V. W' Y( \+ o0 T# g# ?( @which are of primary importance to the decision authority in reaching a decision L( B' t7 r# |0 Q3 x) pto allow the system to advance into the next phase of design, development,/ \2 p8 b7 J- R- ?: n, ~, _ production, or post-production.% t1 I. |6 T* g5 R% T0 O' q Critical7 A- b# p% T1 m2 R0 k9 Y Operational$ W/ B. X- P: {) I Issue % |" r* Q1 k0 Q$ Z4 }9 c1 u9 UA key operational effectiveness or operational suitability issue that must be - n+ o i+ l7 O( f# P4 n% Rexamined in operational test and evaluation to determine the system’s capability p, V `) v7 @# u$ N: q7 V2 c8 [to perform its mission. A critical operational issue is normally phrased as a ; `8 b$ `4 X, B1 |" q* Q- Qquestion to be answered in evaluating a system’s operational effectiveness : ?% j2 l9 G2 K7 K8 Sand/or operational suitability. , J( D4 E6 |1 V( ^* n3 o' SCritical Path 7 j# I; i: U9 L& w% q! t) dMethod9 Z. h& y/ I* {; e) w5 Q; x A technique that aids dependency of other activities and the time required to: D' n2 X: v3 ` complete. Activities, which when delayed have an impact on the total project 6 w( [* |: v2 a0 U' w! bschedule, are critical and are said to be on the critical path. 9 y4 Q J" @4 z0 cCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to ) O1 p9 X+ Q+ c% Z) Kthe viability or the operational effectiveness of the SDS. - W# D9 h8 R! }+ o" _6 F B6 rCritical Security + A2 t1 d% W Z; ~7 ~Risk% H% s& e. r, H The existence of a security vulnerability that, if exploited by an adversary, could/ M! z5 R7 o& M2 k- \6 }6 o cause exceptionally grave damage to the viability of the BMD or the operational, E D( Z: x( p3 I- L effectiveness of the SDS. Critical risks assume an adversary’s capability to) u: h/ g/ M4 R {" W cause major system disruption or degradation (e.g., single point failure), 6 u7 |* Y0 O; l7 w( p! n$ ?6 wdestruction of mission-critical components, or usurpation of system functions.8 |, u# \) ]9 S" E' V6 l Critical ' A# e: l! ]0 r* P ?Supporting# R3 [9 t# A. c# q2 P$ ~ Technology ]# P, i. P7 Z' R) N* a, ?* LA technology that program management personnel consider a critical part of the 0 m; m# `$ }' _, @7 ?2 Wprogram being described. / h, h R% X# {$ j+ ECRLCMP Computer Resources Life-Cycle Management Plan. - s8 s* r. D! I6 `) wCRM Computer Resources Management. , Z( Q6 j" o6 j" Y: d- QCRMP Computer Resources Management Plan. : r/ @) F: ^, o3 b$ @# BCRO Chemical Release Observation.' J1 u! B" N9 v CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC 5 ^5 v+ d& _( ]) R- wterm.) ! @3 }. ]% ~. F" HMDA GLOSSARY, VER. 4.0 C+ K* S O% R M: v, Y8 _: ^: O 66" l2 B3 S* w6 K- H. P- y CRS (1) Computer Resources Support. (2) Congressional Research Service. (3)" V5 A+ K, ]/ K0 z+ |" E# C Contractor Reporting System.* G z6 |, b) G, ?5 Z2 C CRT Cathode Ray Tube. ) A' k% P. @( \' b* jCRWG Computer Resource Working Group.4 e5 E$ @( c/ n. O A+ M1 g Cryocoolers Cryogenic Coolers. 1 b2 Z4 |- \8 u. Q% N- E: fCryogenic Of or related to cryogens (substances which are used to obtain low* B7 _6 a: J- V7 ~" C- V, \ temperatures). + w4 y- G/ g! Y6 P. l7 dCrypto A designation or marking which identifies classified operational keying material, ; W7 ?( D& a9 T/ o# ^9 l& K+ @3 xand which indicates that this material requires special consideration with respect: W4 z, M% r2 o' k7 b to access, storage and handling. $ H+ _! V" b5 _. j9 u% U3 xCryptographic/ B, e* j$ b0 W# @ System. d- o% d/ N% Y4 I The documents, devices, equipment, and associated techniques that are used" |3 |3 G' u$ ~7 s as a unit to provide a single means of encryption (enciphering or encoding).4 H6 E, `; S! B8 y S( C Cryptology The science that deals with hidden, disguised, or encrypted communications. It+ @0 {; I {: q$ e' J, B includes communications security and communications intelligence.5 U* W9 S& R) y# }0 ^5 a5 a t5 X" s CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. , k" Q' G- F# }- n! n2 ]* RCS/CSS Combat Support and Combat Service Support (USAF budget term).) g; ~+ h' R. y7 X( g: U$ t3 L6 T) z5 i CSA Chief of Staff of the Army. 9 T$ H0 ]; I- @0 L3 \3 WCSAF Chief of Staff of the Air Force.% X+ Q/ _5 q- v q# T& u5 ` CSC Computer Software Component. . K0 K3 r( Q0 mCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE): Q! S/ H1 X2 A. @# t CSCSC Cost/Schedule Control System Criteria.. ^8 u$ W k, T1 g: Z CSD (1) Constant Speed Drive. (2) Critical System Demonstration.. i. u, D! ^ Z& Q$ n CSE Center for Security Evaluations (DCI).- c9 b# b2 q1 z' f CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon & t. t3 Y8 J9 h: t/ g5 T$ sSystem, located in Cherry Hill, NJ. . A5 l* E. U Y/ \. GCSF Consolidated Support Facility, Arlington, VA.6 c5 q0 v/ ^& p- b$ @ CSI (1) Critical Safety Item. (2) Critical Sustainability Item. ; C$ y" D8 s( u, @CSIP Current Systems Improvement Program.8 R% U; q# E! N( }- G CSIZE Constellation Size.% K% w* w9 i9 H2 o# v B4 t/ z CSL Computer Systems Laboratory.* A2 M5 ]' x+ K/ P CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. $ I/ e3 A+ z, q4 KCSNI Communications Shared Network Interface (NATO term).: c( @# F* M+ w5 W0 ]1 }8 r# W MDA GLOSSARY, VER. 4.0 C ; V5 n- c; e; c( k& V; J I |4 e67 8 ~2 @) c: ~+ W6 TCSO Closely Spaced Objects.3 w- | u8 T9 K+ s* k CSOC See Consolidated Space Operations Center.4 K' l" w) ]' y CSOM Computer System Operator’s Manual3 E. ^- p7 \; d2 W. o) H6 _ CSOSS Combat System Operational System Sequencing . z/ c6 V# k. ^6 pCSP Communications Support Processor (numerous locations, including USAF Air . O6 k5 U' l, a! uDevelopment Center, Rome, NY term). : c* n8 `; }) aCSRD Computer System Requirements Document.4 O1 u4 _; x* n. K2 { CSS (1) Cooperating Space System. (2) Communications System Segment. (3) , ^$ p: i# Y s2 |5 A4 N6 KContractor Support Services. (4) Common Sharing System. (5) Communications ! Q, y. g2 Y2 t1 E5 YSupport System (Navy term). (6) Common Support System. (7) Combat Service t- m3 K- M5 o- Z. \& pSupport.+ G' d- k: ]# q2 a) [) e% k* b CSSCS Combat Service Support Control System (USA term).3 d% A* d& |3 [! p CSSPAB Computer System Security and Privacy Advisory Board.1 O& {! ?* x b/ m3 }$ ]( F1 T CSSO Computer Systems Security Officer.7 C" e& ~9 J5 e. q4 y0 j CSSTSS Combat Service Support Training Simulation System (US Army term). 0 e( b% C- p5 _CSTC Consolidated Space Test Center. 5 `$ b" ~( J4 J, h; YCSTI Civil Space Technology Initiative.$ p$ G5 C2 B' S) _: P4 I% R CSU (1) Computer Software Unit. (2) Communications System Utilization.5 g7 h/ g! g' I6 b# S2 P g! L) g CSUR Communications System Utilization Report.1 E G- G9 a& h+ d: }/ C CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.- M% w" R8 w- [7 u4 s (4) Cryptologic Technician (Navy occupation specialty). 6 N3 K' F1 z& Z, T' RCTACS Contingency Theater Air Control System (JFACC term). ) w% q1 U X. A6 f0 M; mCTAPS Contingency Theater Automated Planning System (USAF). - K4 L) z" [$ i4 M! |CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. * B* i F& z) h2 eCTBM Conventionally-0armed TBM.+ c, z* Y5 k& V4 X6 X+ q( Q; N6 w CTC Combat Training Center, Ft. Leavenworth, KS.5 a: |0 r; v4 _0 Q" X CTCC Critical Technology Coordinating Committee. 9 `( R& d6 J- |CTD Communications Test Driver. 1 e8 W/ Z3 }) _& CCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment.- \" w/ W4 @0 x% a* L CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally , |. B/ J a e) {( G$ J7 ~ H' r- nfunding selected test investments proposed by the Services and Defense9 o; [% ?& o+ a, s. k( ^ Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C! A: ~& n* e) c" G" ^ 68 * }+ E8 z0 L; b, h: }CTF Controlled Test Flights. 9 ~) p, a v N! U/ D+ n. ACTI Concept Technology Insertion./ \- ^! [) I" i) G CTN CALS Test Network.0 G2 D \8 ~: M" c CTOC Corps Tactical Operations Center. 7 y) ^+ I$ i6 }: u# ]CTOL Conventional Takeoff/Landing aircraft.1 u" Z& `- r+ k, y. W1 w* s+ x' V CTP (1) Critical Technical Parameters. : X9 J8 a% c7 j(2) Communication Tasking Plan. ! J3 Q1 e& l4 q# Z4 h9 l(3) Consolidated Targets Program. - |2 |8 Q2 ^1 b# \CTPE Central Tactical Processing Element.* l) w" X9 V# S5 }' `4 e CTPP Consolidated Targets Program Plan.8 M" X I& ]5 z# [$ x6 t$ u/ k6 G7 G CTR Cooperative Threat Reduction (Treaty negotiation term). $ D' P6 e1 r. r/ u: F. aCTRS Centers4 R! m' H. X/ U6 M/ O! d CTS (1) Clear To Send (TelComm/Computer term). 8 ?2 p$ k( r; n/ Q(2) Contact Test Set (USA IFTE term). ( ^- k+ _7 i4 \; J3 B G2 h B" g# XCTSS Computer and Telecommunications Staff.( L% Y7 w2 I5 c1 f( W7 f8 Z7 P$ o& Q6 | CTT Commander’s Tactical Terminal (US Army). 0 Y: e2 Z! t/ S& WCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). L( O$ G2 X1 z# K$ Z# E CTV Control Test Vehicle(s). $ _: m; t2 V8 g( Q. `3 ~; t: |CUDIXS Common User Digital Information Exchange System. % Z! F( h$ m' F: c. }' l" nCued Operation The directing of one sensor based upon the data received from another sensor.& A, |6 A) b, t( |0 ?" P6 `# Q: X/ o8 S Cueing Command The command within a tactic, which specifies the sensor element’s coverage& w' T: @8 M4 w7 R volume. : B7 B# X6 e4 S" PCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage8 H! M$ j* h6 v# t7 G; b" C volume.7 b, F& S2 N) b8 ]$ r CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae." H, z% m/ t# ^( T5 P CV/BM Carrier Vehicle/Battle Management. + T( k& X7 E7 _ ]CVBG USN aircraft carrier battle group. 8 \ R/ }: K4 B; WCVHG Carrier, Aircraft (V/STOL), Guided missile. ' p# R7 P0 R3 M3 e5 S% oCVISC Combat Visual Information Support Center.7 [. {" ~5 I- C' O3 I3 Y( [7 X) ~ CVL Copper Vapor Lasers.# E' p- j. M+ p4 Y9 f( a# s CVN USN nuclear powered aircraft carrier. # O& w. k: J8 P9 n) uMDA GLOSSARY, VER. 4.0 C# A ^. K. {, c& ] 696 Q6 q9 i1 X9 T2 C CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. X Z9 S' v0 [7 P( U0 N; sCWAR Continuous Wave Acquisition Cycle (Hawk).1 {, z/ e" c+ b8 l CWBS Contract Work Breakdown Structure.& l1 x" `# D; l1 m7 @5 Y CWDD Continuous Wave Deuterium Demonstrator. + c$ n7 @* @7 p+ ?0 m5 {CWIPT Cost Working group integrated Product Team./ R! o o4 m, w9 E7 Z& N CY Calendar Year. # Y0 A: N; _9 I# }% E; S! |1 nMDA GLOSSARY, VER. 4.0 D5 y% x- @. Z2 Q9 n: V 71% D" _% |- T7 g+ M D Deuterium 3 _4 j# r4 U+ \$ MD Spec Process specification. , G; h) d# u( y7 n. X1 O* U1 [D Star Measure of infrared sensor sensitivity. - f/ a9 S- c r& F! q' p6 \D&D Design and Development ! M- } M) B1 T) d) G2 oD&T Detection and Tracking. 7 L( C+ S4 [% o1 U+ n$ u6 r0 v- FD-IFOG Depolarized-Interferometric Fiber Optic Gyro.% i' `; n# ]; \; p9 z) S D-Level Depot Level (ILS term).6 r2 ^$ h- W3 ~* `& A' C D/A Digital-to-Analog& h1 z# p9 M; o, a* v# i, N( M D/V Demonstration and Validation.( r; K4 }. x \1 n D2 Projective (interceptor) in the Hyper-Velocity Gun program./ d/ @/ S b% G, t DA (1) Department of the Army. 9 [ f7 z+ A' f/ y(2) Department of Administration.( V8 g, k* {8 j0 v: ~: X% @ (3) Decision Analysis.8 u0 \: t) d6 g) [6 \ (4) Developing Agency/Activity.+ Q2 S7 [8 [- Y/ C (5) Data Administrator. ) b# t9 _( {5 I* t n(6) Direct Action. 0 O5 I: H; m, S(7) Data Adapter. : i& {, P& {# \6 fDAA Designated Approval Authority (DD 5000 term).* P7 f$ T0 t$ u6 G6 ]' e8 W DAASAT Direct Ascent Anti-Satellite. ! t! @! O+ K; `' }$ ?6 pDAB See Defense Acquisition Board.5 z$ F6 |, V# u0 i3 k( C DAC (1) Days After Contract [Award]. ( G r- A" Z( y7 }! T1 b- v1 B! V(2) Department of the Army Civilian.8 m3 y; T: @( F& Y% Q0 Y (3) Directed Attack Characterization. 6 P5 b7 Z3 d6 C c(4) Deploy ACCS Component.4 D G8 d$ T& s0 `, q (5) Digital-to-Analog Converter.& s9 h; n* j: _+ q DACS Divert and Attitude Control System. 0 {$ z0 @ m& h/ r" P4 ^5 X# M* {DAD Defense Acquisition Deskbook. 6 S& r4 d7 t$ \" ]: b5 \8 T1 @; u. [$ KDADS Distributed Air Defense Study (1993). 7 E, z$ _# N# T9 TDAE Defense Acquisition Executive. 9 d: u% s4 ~. x$ I5 q; _0 D$ M! @0 yDAES Defense Acquisition Executive Summary.7 a. h% _' ~- P+ |" l- a DAGGR Depressed Altitude Guided Gun Round. S: T. p8 u; y! K) { DAHQ Department of the Army Headquarters. * i4 @+ y7 o! u) y$ X' }3 gDAI Damage Assessment Indicator (targets).$ ]4 O& n/ |" s0 a DAL Defended Asset List.1 B$ a, O! G( w. g# D! Y MDA GLOSSARY, VER. 4.0 D! B6 F$ s7 ~7 G 72& f$ G, ?7 I7 H( g" ?9 N DAMA Demand Assigned Multiple Access. 9 t" L7 H3 _) D! S, V) i1 FDANASAT Direct Ascent Nuclear Anti-Satellite." N. S* U& w9 T9 A! N0 d% y DAPR Director’s Annual Program Review (SDIO term) ) p7 B. D- v* R3 m) i' dDARO Defense Aeronautical Reconnaissance Office (OSD). f% m a2 I3 y* y DARP Defense Aeronautical Reconnaissance Program. " C" a5 \$ S6 Z) YDARPA Defense Advanced Research Projects Agency. See ARPA. ( a( b5 E% j/ wDART OBSOLETE. Defense Acquisition Review Team.- u9 f2 o% u2 \- `3 l1 B$ O9 a& u DASA German Aerospace. Member of the MEADS Program Team. + R' K; N- z4 |4 G2 V: \DASC Deep Air Support Center (JFACC term). 6 S+ n: c9 i2 C& z' sDASD OBSOLETE. Deputy Assistant Secretary of Defense." c% H0 |/ L5 }/ o8 K# g. \4 E DASD (C3) Deputy/Assistant Secretary of Defense (C3)( _! K, q! Q- J3 X0 M; Q- l DASO Demonstration and Shakedown Operation.$ y, ^2 B4 D/ H$ ]0 s Data Integrity The state that exists when computerized data is the same as that in the source ; R- a7 H' T; ~7 o- D# Jdocuments and has not been exposed to accidental or malicious alteration or i: i2 Z9 Z: `" A" Z' W9 c destruction. : T$ D: Z& D- T* I! a' @( SDatalink (1) The means of connecting one location to another for the purpose of6 r+ u. ?; R: ~( s" c# J+ t transmitting and receiving data. 8 W6 {7 ]; k4 @0 o9 h$ h/ Z(2) A particular path between two nodes over which data is transmitted. It# x4 H9 t6 ^0 g2 T7 S! w. S includes not only the transmission medium, but also digital to analog & o& o; x8 r6 m! @converters, modems, transmission equipment, antennas, etc., associated; q$ H* D4 g W; E) ]! x with this path. In the SDS backbone network, it was a path between two2 F6 r1 y/ o3 W9 }* g1 L( B SDS elements. In space these datalinks were microwave or laser. On& W2 n n: m) _: c" ^" R% z# \ the ground, they could have been wire line, microwave, or optical fiber. 4 ]: {( p4 W. I; f- QDAU Defense Acquisition University, Ft. Belvoir, VA.1 s9 r ]8 z% M! H3 A7 Y; v DAVID Development of Advanced Very long wavelength Infrared Detector (USAF ^# h8 G* o5 k3 z+ qPhillips Lab term)., A. j$ F; D, E7 n& B$ S DAWS Defense Automated Warning System.1 b/ p. d& z0 }. n) }1 d1 ? Dazzling The temporary blinding of a sensor by overloading it with an intense signal of, _5 Z( a0 k( ?2 G$ V! o/ @, c8 o electromagnetic radiation (e.g., from a laser or a nuclear explosion). ) n; ]: m7 {3 j5 YDB Bata Base3 u. t L) H N6 ~7 A' Q) x% e0 ] DBME Database Management Environment (Computer term). ) D ~6 c7 W- i, ?, S4 RDBMS Database Management System., K+ Z, A0 C$ d7 y# N& C5 `* ], b DBOF Defense Business Operations Fund. / a, z+ | u( BDBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D& n7 {4 W, V" r' `5 x 73$ Q* o/ V) {1 B- H9 |. K/ f9 Q Dbsm Decibels per square meter. . S# _2 n) I% i1 t; R2 w" E qDBSM Database System Management.% V" o' F+ ^% R7 P+ P# Z) [: Z1 ]; P DC (1) Disarmament Commission. (2) Direct Current. 5 i1 p, m& k/ d, c) A0 e- aDC-X Delta Clipper Experiment. 1 {* d! w4 m- t5 q$ m/ s7 IDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications % |4 K" V2 N6 Z! F" K: n# BAgency. (Now known as Defense Information Systems Agency (DISA)). - v8 O0 N6 a" V7 iDCAA Defense Contract Audit Agency.; n. y. `& @2 @6 B; H: ]% v; c DCAS Defense Contract Administrative Services./ l; ^7 d y) ] DCCO Defense Commercial Communications Office (of DISA). $ Z6 H& B4 Q. r# ODCDS Distributed Computer Design/Development System. 9 L# s" v) e" tDCE (1) Data Communications Equipment (TelComm/Computer term).4 _6 @- x! q9 y0 J4 K) |+ t6 ~5 u4 R (2) Distributed Computer Environment.# g/ Z) ^: o9 U& r- A0 e6 `: u DCEC Defense Communications Electronics Command.) H) {0 A, ?# {) F- j f+ U DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. ! y: |* v6 h. e {DCINC Deputy Commander-in-Chief.1 _$ r$ E- ^) k% ]' e9 o DCM Defensive Counter Measures.8 K6 f# ?$ M' K* I1 h# ~# p3 Y; D DCMC Defense Contract Management Command $ p8 A. b# t" M6 tDCN Document Change Notice.: M6 v) `7 @" r6 D a6 H: n* S2 n DCO Director of Combat Operations (JFACC term). 5 z4 Z( J+ ~8 ^: K* JDCP (1) Decision Coordination Paper (see ADM)./ F `/ b- r% n. W7 D (2) Director of Combat Plans (JFACC term). ( [& M3 u7 B1 q2 {% _6 aDCPG Digital Clock Pulse Generator. v) o/ e; |6 z& k; k DCS Deputy Chief of Staff., v6 Q' q4 n4 w DCSOPS Deputy Chief of Staff for Operations and Plans (Army). 6 |6 Q* }- p" e! R, t S. TDCT Digital Communications Terminal . k) F- C- L' J0 n4 f, {9 BDCTN Defense Commercial Telecommunications Network.1 ~2 Y- [9 N; U# Y p+ j6 F DD Variation of DoD. * D# X+ U: n& C( HDDCI Deputy Director of Central Intelligence. . O* } C1 u4 G. s$ O! o9 zDDEL Dwight David Eisenhower Library, Abilene, KN (army term).( _, r4 {4 z! x8 K% E0 E DDG USN guided missile destroyer. 6 Y" ?2 H& k8 Z: kMDA GLOSSARY, VER. 4.0 D ( Y: P& n( l, w' G; W74 % {& Q9 V. ?+ S. \& dDDL Disclosure authority letter. - P7 r, T* X- Z+ O4 [4 ^/ g( lDDN Defense Data Network." Y- k/ q# o7 e8 B2 H. d1 a% b DDR&E Director, Defense Research and Engineering. : y+ @. M* v3 O) hDDDR&E Deputy Director, Defense Research and Engineering. ! t( N( ~5 y8 G- [9 @+ g+ c, ]DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). 5 @9 u9 J' t5 VDE (1) See Directed Energy. (2) Delay Equalizer.* v2 d, |3 R# x' \. _" ? DEBRA Debris, Radiance Model./ j. G% [; G1 z* v! j* o* t Decentralized5 R4 @0 Y! u. W, U5 B% P8 U Control 0 b, Z: A3 f) F8 w- j X. D, vIn air defense, the normal mode whereby a higher echelon monitors unit actions, 8 X# V. Z1 q4 b/ D" mmaking direct target assignments to units only when necessary to ensure proper ! x' i4 H, L4 O& X2 ufire distribution or to prevent engagement of friendly aircraft. ( C( s7 p- y" | R- @) v/ A% o, XDecentralized7 k3 o+ n U5 H6 I* r( z Execution! o( w: P4 ]3 I8 S" F4 A* A7 T- U7 a The distributed and integrated implementation of USCINCSPACE direction by* x$ S0 P0 n% N/ {6 t5 } the BMD forces. (AFSPACECOM) ! F8 b% t2 F$ A8 A* V& o8 fDecommissionin! a8 x& W& F# S9 c' s9 c' F3 B$ y) ]* _- A. D g ' w6 ?2 ?- P% MThe removal or the rendering useless of obsolete or no longer needed + ^ k' r0 z1 j8 r5 tcomponents of the BMD system from service. # I( V4 O5 H/ q5 _Decrement A directed funding level reduction for an acquisition program. 6 y7 T8 M4 m2 {0 M4 JDED Data Element Definition (Computer term). 9 I" h( V8 t/ t' [6 a% ^, _Dedicated Mode, n4 J& P! U+ C$ ?" ^ of Operation$ g& o5 Z( ^; Y+ W# D (ADP Security)! `6 @9 [6 l- B- s% ^7 J) Q A mode of operation where all users of the AIS possess the required personnel& l3 f( e; M4 T; o* [ security clearance or authorization, formal access approval (if required), and a 6 F$ @ m9 [( I! t+ H6 mNeed-to-Know for all data included in the AIS.. D5 G% c" H& a Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about# `- U! p7 {* L 5,600 kilometers) above the earth’s surface., I4 E7 Y' o8 N, q4 M' s Def Definition. 9 [% n9 a. k1 `% Y/ M$ s7 p( lDEF (1) Defense. (2) Demilitarization Enterprise Fund. 9 f% d* ?! y6 J% W; [8 z4 x7 ^' dDEFCON Defense Readiness Conditions. ; @8 T& d4 E0 y3 M% aDefended area . g" ]0 [! \; A* tcoverage8 |. x% y+ F, J7 C' G Defended Asset! y$ Q! U3 u1 e8 D% ~ List (DAL), w9 {% Q0 h5 B9 v$ o The geographical region that the BMDS can protect from ballistic missile attacks6 C, f/ G8 c7 ?. j- H! b( d with a specified level of probability of negation. May be specified for a particular7 h5 C% L; M# D$ [. y$ S threat type, launch point(s), launch regions, raid size, etc. * O8 k" Q4 Y$ _& |7 }A ranked listing of facilities, forces, and national political items that require/ U8 q# X7 c( a1 x, l protection from attack or hostile surveillance. The list is compiled from Federal 6 f/ n% y) B2 X' Kdepartments and agencies, Unified and Specified Commands, and the Armed 9 `( s- n: L' p+ J5 k; CServices to ensure National Security Emergency Preparedness functions.0 z& |7 Q4 ?9 L) N MDA GLOSSARY, VER. 4.0 D9 x/ p# ~7 y1 L 759 I0 m! r W E0 k ]: }' D1 d' L5 K Defense 0 M8 |- I' v, D5 @6 x" S- g- j+ IAcquisition3 [" c% f: S$ g p o9 O1 Z Board (DAB)9 g& X+ C% l$ t* r' z' ~ The senior DoD acquisition review board chaired by the Under Secretary of5 |6 V" f& c9 {5 S3 P) F( S Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the5 U' M# n( f5 s1 U; n" f; u Vice-Chair. Other members of the Board are the Deputy Under Secretary of! z% B6 e1 Z+ {: Q* w: S Defense for Acquisition and Technology, Service Acquisition Executives of the% E' t% Y; _- i; y+ ? Army, Navy, and Air Force; the Director of Defense Research and Engineering;: ]; [* Z; i" ]" e0 F z3 _! W the Assistant Secretary of Defense for Program Analysis and Evaluation; the 1 T; P0 T& D2 D. z- DComptroller of the Department of Defense; the Director of Operational Test and + }# ^8 y) \9 v$ u* I- J- uEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the/ z# P( w& Z, x+ I2 L( } Defense Acquisition Board Executive Secretary. Other persons may attend at U# }0 W3 O7 Z: c' vthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition 9 a4 a9 Q! x7 o& K$ sBoard.”) 7 `$ \3 E3 l( ]$ vDefense+ s) `. B, c- y$ j; I Acquisition ) R2 C9 k' @8 d. QBoard Committee! ^ C" T: d+ y( T8 W+ u; d+ y Advisory review groups subordinate to the Defense Acquisition Board. The 7 P/ H0 ^. D: [2 d* yUnder Secretary of Defense for Acquisition determines the number of9 S2 G4 o' ~9 H8 ]8 S3 M5 r Committees. The purpose of the Committee is to review DoD Component0 W& ^( h6 @6 m& \) [2 S' \ programs prior to a Defense Acquisition Board review in order to make an6 C% I4 u1 d, R D; B: J n# r independent assessment and recommendation to the Board regarding the % G2 G7 o$ r; R% t! Yprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense % x, r# M, a0 O2 ^) Y2 wAcquisition9 e& Z4 N# m) I& ? Executive (DAE) 8 O# j1 r& N" N1 [The principal advisor to the Secretary of Defense on all matters pertaining to the 5 |1 p5 d* y0 x% x3 {& T' aDepartment of Defense Acquisition System. The USD (A) is the DAE and the! p/ z7 {: q& R! g7 O/ m w( e Defense Procurement Executive (DoD Directive 5134.1).- N5 u: _7 o h) _9 H Defense : N9 I6 K1 U( Y* T- h7 X0 t/ NAcquisition$ C& M+ H+ Z% q( E* p' \8 c Executive : m/ X! p Q; K4 k% zSummary (DAES)( D/ `9 T! Q4 l) P" e$ P1 B The DAE’s principal mechanism for tracking programs between milestone / G7 H( d9 ]9 Y' B# b& l- i8 treviews. Includes programs subject to the Selected Acquisition Report (SAR), # O6 @2 m2 N9 g9 K- [ e4 Pand any non-SAR programs subject to review by the Defense Acquisition Board.; |9 x2 V6 a% ?1 R$ ? Defense" N" f4 o4 B4 Y# @0 s Employment $ H% D0 M/ ~8 pOption (DEO)( O9 S2 u2 j* T) j- f: f Engagement strategy provided to USSPACECOM component forces to achieve9 l) W5 P' V7 z6 P8 E" P specific military objectives against a ballistic missile attack. It defines hostile9 L# W3 J& V6 j target priorities, provides assets to defend, and allocates SDS resources to be / U9 r& D' Y) A, A Y5 r8 ^0 T9 Semployed. A number of DEOs may reside in a particular Preplanned Response 5 [9 E1 ?; l, b$ VOption (PRO). However, default DEOs (those believed to be best suited to 5 g+ {6 q4 x( ~' Rcounter the threat initially) will be automatically processed and executed when . ^) H, ~" @4 LDefense Activation Authority (DAA) is given by USCINCSPACE.4 B; c3 F# H* ` f& W$ I" W" ^% \ Defense ; v; E H( A7 a& s I, pEnterprise9 ~. V7 t J/ C* i8 t' _8 k Program (DEP): C( Z/ d4 e" N An Acquisition program designed to streamline the acquisition process by waiver, k, m+ G/ c; `' H/ ~: J% B* h of selected regulatory requirements.8 G: W7 U2 T- @: ^2 U4 S Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb$ g1 P& ?' M. w; k" z- ] and progressively weaken an attack, prevent initial observations of the entire1 Z, J1 q" E0 G3 |: F+ ^, d, [( p5 } position by the enemy, and allow the commander to maneuver his reserve.0 {9 A; L* y% T+ |( f5 @4 z Defense! ^1 }" O. T! g( Z0 \ Meteorological' d1 {/ \* u% A Satellite Program - O3 U. B' b( b& G" z(DMSP) ' p) q) O4 C& k ?$ r& |Satellites designed to meet unique military requirements for weather information.5 Q5 p2 _: @ \ Used to detect and observe developing cloud patterns and follow existing % `0 u6 E8 `% @: y: o9 N* H+ Pweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. . b9 y8 c4 B3 _2 y* Y6 {3 MDefense Planning ; S4 M# ?8 s5 J, Y- |* i; aand Resources * n* q7 O4 ~6 o3 bBoard (DPRB) - d* m7 o( z, c. M9 LA board, chaired by the Deputy Secretary of Defense, established to facilitate + g6 b. ^) {6 u2 K/ d8 Q) l6 Y- wdecision making during all phases of the planning, programming, and budgeting . r3 y& h( H7 [2 b( b8 dsystem process. Board members include the Secretaries of the Military ( F( \* ~: P2 t- w8 XDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of . g' R" l! I7 _- e; G! @Defense for Acquisition and Technology, and Policy, the Assistant Secretary of 2 ]" |: x8 E: R1 |: KDefense for Program Analysis and Evaluation, and the Comptroller of the( b3 `% S. h4 t Department of Defense.% E4 u% n2 @" N" c: r MDA GLOSSARY, VER. 4.0 D ( `4 i! o* C# j76* a6 K! W! [0 S3 P c. p; @+ ^ Defense Planning/ [* k. F2 u& G/ q$ m Guidance (DPG) a$ m' |$ A1 s. T, A/ x- n4 \ Document issued by SECDEF to DoD components providing strategic framework 6 G6 {+ r2 ]9 [* f, d+ Yfor developing the Service POMs. Result of planning effort by Joint Staff, OSD,; S; P: e; o2 o: e7 N/ h3 {' L8 Y and Services. In connection with two-year budget process, DPG is issued every 4 `- y& ?9 A4 V4 Zother (even) year. & B! i' y) S+ p# m$ B( ADefense Priority S+ L9 k/ Q4 [: d1 X# }! yand Allocation * b$ V! w+ n6 D+ b* {( ASystem (DPAS) 0 A& ? f1 G7 s2 V) Q7 EThe implementation of a statutory requirement where contracts in support of- E9 @3 s1 h: I2 Y national defense must be accepted and performed on a priority basis over all/ W/ Z: P# N) y8 C0 K6 ]/ j9 q& B other contracts, and which requires the allocation of materials and facilities in8 ?. J' m$ D& p6 C such a manner as to promote the national defense. See “DO” and “DX.” / Z1 b, l4 t1 n6 P. |Defense1 ^" ?; i" H9 ` Readiness ! P9 V, q) x+ _ p$ c+ s- z# NConditions 3 v6 J3 a. K* E( T, w(DEFCON) # ^# Z( j+ I: C" iA uniform system of progressive alert postures for use between the Chairman of 6 `% B, x- E! O' z3 Hthe Joint Chiefs of Staff and the commanders of unified and specified commands0 Q. S( B, U7 Q1 I; J5 F and for use by the Services. Defense readiness conditions are graduated to ( [, ]3 ^3 r! ~5 n. l, a# i+ Jmatch situations of varying military severity (status of alert). Defense Readiness \# c) \. X6 U% D6 c Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as ( j( z# x/ M# l8 `9 v. ]! kappropriate. ) d8 \5 W; M) O2 D) g! QDefense Satellite . M3 e6 _! Y% y7 m+ P2 ~1 n, B4 ?Communications ; j/ n8 s+ P; x2 L" QSystems (DSCS) 0 p* V! \2 x* v! W, TAdvanced communications satellites in synchronous orbit around the earth. 6 F" }- M4 `( w/ uProvides high-capacity, super high-frequency (SHF) secure voice and data links & J7 y% s4 J7 M# Y$ i, X' m, x# u bfor the Worldwide Military Command and Control System (WWMCCS). They2 q! ? l: ^# O5 X/ H4 C1 b8 }+ Z support terminal deployments for contingencies; restoration of disrupted service : R6 F! f$ Q4 P8 H/ N/ b& Z; ooverseas; presidential travel; global connectivity for the Diplomatic 1 x+ A% ?8 U. }) k3 s/ a& |Telecommunications Services; and transmission to the continental United States " P' U& K2 Y ]3 Bof some surveillance, intelligence, and early warning data. / X! o9 [& P* K! D4 SDefense Satellite 3 {, o+ r1 F$ @+ ^. f/ ^(DSAT) Weapon5 b( P/ J. a+ L) v, n: G A device that is intended to defend satellites by destroying attacking ASAT + n4 P- ` s9 O8 q3 J- k5 }( t) cweapons.2 ?3 X3 u6 S4 y, R! [9 y2 ` Defense Support ) K3 {1 x& l. \! v$ ^+ r ZProgram (DSP) - b1 e% M/ N& _/ G4 CA system of satellites in geo-stationary orbits, fixed and mobile ground 4 a+ o& E0 ] J! Q' G2 `processing stations, one multi-purpose facility, and a ground communications+ J, J- d, F. K- Q* ^1 r network (GCN). DSP’s primary mission is to provide tactical warning and limited W' O5 Y0 S* B' I attack assessment of a ballistic missile attack. ( A; u, \+ q) e1 WDefense- j9 r" O s5 t) E2 S ] Suppression 1 y! J) U8 I3 t7 i8 b6 qTemporary or transient degradation of the performance of a defensive system & o# C% R& @# @$ U( @below the level needed to fulfill its mission objectives, by an opposing force. 4 K3 v! `) ~5 b' E& h: }& j- O- n(USSPACECOM)6 `& r: Y& |4 `9 b* m d Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic2 V$ h9 B+ a7 Q$ G- R missile trajectory; i.e., boost, post-boost, midcourse, and terminal.: h; W0 e6 e8 n% d. [* m Defensive & M- g* I0 n: D6 v6 y x5 }Counter8 u( T$ j0 Y F' j+ N! g* B% l* ?$ j Measures (DCM)0 C1 X% B4 M |( p! b& D) m Actions taken to eliminate an ASAT attack.3 f" _2 j, t- M, d7 ? Defensive3 }2 M; c' N6 R$ q" q7 ` Technologies+ Y# P& M; N9 V# R Study Team - [7 e9 m+ u' e* J(DTST) $ N6 N" h" O) N* i9 \/ @3 rA committee, generally known as the “Fletcher Panel” after its Chairman,& u/ w5 _3 i8 R! A' h/ g* E appointed by (former) President Reagan to investigate the technologies of# `* O5 a4 {1 ]+ W potential BMD systems.5 B. x3 |5 |3 p$ z: K6 O DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.& z* g/ q% i$ I. ?* r2 ] b" y DEIS Defense Enterprise Integration Services (ex-DTIS).) l! H: t2 `$ t1 h' k9 S8 K DEL Delivery.* B* q) V2 D! h" @/ J( k5 d4 N! b Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion5 K) O( n8 d; }; P9 B; a6 ^ of shots about the aiming point. See also Circular Error Probable.8 [; x( T6 t9 m) l- V$ Q MDA GLOSSARY, VER. 4.0 D/ ^( c5 \, k# o y7 f' D 77. I" a" G+ U$ V7 C" ~. D( y$ h Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the+ n ?% i% [; R% B G7 h) E maximum change in velocity, which a spacecraft could achieve in the absence of 8 P* U0 l5 P( ^a gravitational field. 2 s9 g* A: R {! p1 B% lDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). / j: {- Y# C9 L1 q; ^Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its# b' f" }1 O9 n* B! D! c desired function (matching RV characteristics, screening RV, etc.) ' G* i4 O) j# i) c( ZDEMO Demonstration." ~ e, N& n9 C Demonstration - l3 y K `' A: J( i" Q. a0 aand Validation% T: e' T+ J' t5 W, I; [1 H (Dem/Val)/ D1 u3 u# m# P$ A4 ^4 \ The acquisition phase when major program characteristics and product designs/ C0 I R3 l/ _" @! I5 X are refined through extensive study and analysis, hardware development, test, 4 w% I1 j5 o; n) M1 X; ~4 Jand evaluations. The objective is to validate the choice of alternatives and to # X4 y* i' R$ J M! d1 O' j/ Lprovide the basis for determining whether or not to proceed into Engineering and 7 }4 g8 V( P3 L, `8 V' HManufacturing Development (EMD)., ?' S" L; C" x- Z7 ^& e4 g* V( U/ Q3 f$ U Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. 5 w5 V& P6 u9 \' F+ S# S$ K8 CIt may include destruction, removal, contamination, or erection of obstructions.1 N1 n; Z. |& [% g2 U DEO Defense Employment Option. / l: ?8 J1 {0 w: R, _ ?Department of 6 F, M; s3 g+ }3 m+ d# y# qDefense5 r$ x9 Q8 C. A4 e Acquisition # T7 Z% [4 | ~5 ^/ ~System # z. E0 `7 f) r7 {! gA single uniform system whereby all equipment, facilities, and services are6 R) E8 L3 J/ |3 A& ?) j5 U/ S5 a planned, designed, developed, acquired, maintained, and disposed of within the$ ?7 E, n; b N3 p Department of Defense. The system encompasses establishing and enforcing 6 {6 m4 V4 O7 W* Z7 q6 lpolicies and practices that govern acquisitions, to include documenting mission3 }$ m w" U1 f% F2 @ needs and establishing performance goals and baselines; determining and" Q8 t: l1 k9 w i3 T( x% G& D prioritizing resource requirements for acquisition programs; planning and, L, U) c% a+ s" Y2 ]2 p2 a executing acquisition programs; directing and controlling the acquisition review7 J2 {2 X1 Z' q+ S process; developing and assessing logistics implications; contracting; monitoring2 y! x# r u2 M0 E; {, {/ {3 p the execution status of approved programs; and reporting to Congress. (See 7 z0 |5 N0 a k# MDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”); w/ e! |, g, @ Deployment (1) The placement of force elements in battle positions to obtain a higher - T* l& n. y2 F/ P1 |/ Kstate of readiness. ' d/ k; I# G5 A' ~(2) The movement required to place force elements in battle positions. 0 V3 O* E; T: b# V- [+ U& g(3) Fielding the weapons system by placing it into operational use with units & T2 l) y2 i! G p1 w7 i ?2 Cin the field/fleet. / \" N5 u# V' _+ ?$ m(4) To arrange, place, or move strategically." u3 y# N) u/ ]% `, x& A Deployment9 h9 z* s7 v+ ?5 d7 O; H Planning5 M# v+ m' {2 l# r (1) The development and maintenance of plans required to initially deploy,4 k. X3 T+ ^4 \, [ maintain, and evolve the operational system in accordance with 3 N; N( O; K( D5 {% Rschedules and priorities. It includes factors such as launch facility - Y$ c3 o* l( K( ~; Lavailability and planning for the availability of other required elements & A5 N6 c0 k% xsuch as trained personnel or units. In addition, it identifies the impact of & b! w* m4 V4 ?6 edeployment on operational readiness and any testing constraints % r; u$ [- R c# O# P7 oassociated with deployment.1 ^2 L* S' H' ?- O3 o2 Q8 M6 D (2) Encompasses all activities from origin or home station through4 f H; O( }8 i/ ]8 h4 s destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding ; m* }: s; }/ E0 X1 N! x, Sareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment" w, n4 [+ U f. B* u* r& m Testing$ V7 Y0 ^- e. O$ \& { The testing and/or simulation of system assets in the physical and operational' E; S5 {8 i9 w- k environment in which they are expected to perform. 9 ~1 k( x: s' U8 }DepOpsDep Service Deputy Operations Deputies. 8 q/ R5 J: d" { q- eMDA GLOSSARY, VER. 4.0 D4 O* n O% b9 B- c$ d7 L) D2 E 781 s( U, p; J. M$ n; p9 M, W7 r/ i Depressed + }7 n1 ?5 p' X* DTrajectory" p8 o/ c+ X6 r6 j2 ` Trajectory with an apogee below that of the minimum-energy trajectory.& J9 U. G+ O& D- D" _$ r DEPSCoR Defense Experimental Program to Stimulate Competitive Research. , T4 X N; A# t7 S% JDEPSECDEF Deputy Secretary of Defense.0 y' v; A% N* f1 T DeSecState Deputy Secretary of State. % k6 `4 j H1 N1 u- w: }DERA Defense Evaluation and Research Agency. Consolidated research and + t2 @- u( S+ i0 w1 x0 Udevelopment resources of the U.K. Ministry Defence. Headquartered in * \4 O% T5 m& ?- cFarnborough, England. 9 U! p% M$ t4 o$ l& FDerivative5 W) V0 X) F3 E6 F2 E! C" L2 G) s Classification 9 y" g% V: ?# V) kA determination that information is in substance the same as information ' y$ ]$ b/ Z( l, U9 tcurrently classified and the application of the same classification marking. 4 a3 y9 |! C$ f! h. ]+ RDES Data Encryption Standard. , o4 k( ~# w; P+ F! i- s' JDESC Defense Electronics Supply Center (DLA term).; F# I' R- [, o Design 2 G/ H `4 w+ J1 H: E- M' lConstraints # v% }4 g: e2 B6 IBoundary conditions within which the developer must remain while allocating H! G" j8 C/ ^6 W9 [& }0 X5 o performance requirements and/or synthesizing system elements.4 Q! j2 e% H [1 k* a2 b+ \4 h Design v5 Y) K3 w6 l/ W Parameters : w3 ^& Q8 | n' B: P) o6 gQualitative, quantitative, physical, and functional value characteristics that are# X: J1 B: z9 E+ j$ N$ V; u5 M% G5 ? inputs to the design process, for use in design tradeoffs, risk analyses, and3 w7 i0 g; o% k- I$ y+ [: h4 } development of a system that is responsive to system requirements. 6 r& \6 _& W, X0 v6 B: @& b9 _# zDesign Phase A period of time in the software life cycle during which the designs for5 M/ t: p1 W4 ~0 `1 i" b9 d architecture, software components, interfaces, and data are created, * T, _* L1 Y8 m# L. h" Edocumented, and verified to satisfy requirements.. t! D" c) C/ `0 d% i Design-to-Cost [& B2 @% E6 T0 K+ |& D: ?(DTC) Goal " `7 G4 f- ^; V& T0 [Management concept wherein rigorous cost goals are established during 5 f9 T# L0 f1 O7 a( mdevelopment, and the control of systems costs (acquisition, operating, and # `: Z2 H- A1 \" @# fsupport) to these goals is achieved by practical tradeoffs between operational! l: B! ^! {- W& R- t5 X capability, performance, costs, and schedule. Cost, as a key design parameter, , M- X0 v( a7 o% `9 @is addressed on a continuing basis and as an inherent part of the development 3 x; k+ P' M' N% m3 w" mand production process. A DTC goal should be in the form of average unit 1 I" i) ~+ h& M1 ~: M* Yflyaway cost. Also, DTC parameters for operation and support will be6 O& P$ E6 ]2 C& K& O7 j4 W# ^ selected—parameters that are design-controllable, significantly affect O&S costs,! w2 A( x- h8 t1 M' d- x; R% q and can be measured during test and evaluation. Parameters may be6 _% A7 }+ A& ]2 v7 e/ W8 K expressed in dollars or by other measurable factors, e.g., manpower, reliability, or ' e2 ^/ Y8 y. V2 cmaintainability. Firm goals and thresholds will be established no later than entry f/ O T( w$ L9 e, y; G into EMD (Milestone II). This is an in-house goal, almost contractual in nature, 7 P7 x! q4 _7 pbetween the PM (Service) and the SECDEF. Allocations from this goal will : m$ L6 y6 z2 i0 ~ W2 [& d9 ibecome the contractual DTC goals for contractors supporting the program.! J+ j0 Y8 m, V8 K Det Detachment. 2 b* f: X& ?% C( X7 M1 I; C$ KDETEC Defense Technology Evaluation Code. 9 q$ t: @% J- k4 Q# uDetector A passive IR, visible, UV detector turns photons into an electrical signal. The: @* Q# C3 `+ l5 H IFOV of the detector is its solid angular sub-tense. There is sometimes F) J, f# E# C. N3 V+ R# n confusion between the detector sub-tense (size) and the pixel (picture element8 e& \6 O5 l' h! I. W size). They are the same for a staring sensor, but in a scanner it depends on% N S7 a# {0 v7 j, O the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.! s! Z+ B/ o6 u2 f- o8 q MDA GLOSSARY, VER. 4.0 D + W" M! u" S/ n _' i% R( W1 ~. K8 n4 t79 ' H4 e4 M: ^3 N& T6 ADEV ENV Development Environment.4 Y1 c) ~0 \: L! U2 E Development 9 p3 ^+ P* z2 C. B- |: lTest (DT)- N) ?6 r9 z7 t6 J z5 B Test conducted by the development test organization to achieve specified test' L4 h S t1 H( w, l$ A* t, x objectives. It may be a complete test, a subtest, or a phase of a test.) T6 |- H8 y0 u6 u" F Development4 n$ X" e4 t, K* m3 k Test I (DT I)5 y1 g8 N0 _+ ?$ ]9 L: @ A series of tests conducted during the demonstration and validation phase.1 d5 C+ P/ ]* E$ ~2 q Components, subsystems, or the total (or full) system are examined to determine 9 d t; E/ V# [* D R* |, W! ywhether the system is ready for EMD. State-of-the-art technology is addressed , N8 H, T/ Q, g3 V# x; w! @: Cin DT I.* Y/ [8 j2 Z4 e Development) S+ V& \ J$ ?8 W- i4 ~; X Test II (DT II) 7 _3 X6 O4 a' y- D7 }9 ]A series of tests, normally during EMD, which provide the technical data / _9 S/ t+ z6 t: j4 _2 E @. Snecessary to assess whether the system is ready for low-rate initial or full _& A7 j" `3 ` w5 L9 `3 r# L! [! Wproduction. It measures the technical performance and safety characteristics of3 x9 b4 K4 |% X: B6 v: {6 A1 u. H the item and evaluates its associated tools, test equipment, training package, & w. g+ ^. x+ z% S* band maintenance test package as described in the development plan. DT II' z1 S2 S* g8 B addresses accomplishment of engineering design goals and the fulfillment of7 C1 ?, U$ j6 Y- p, P1 v9 y contract specifications. ( Y$ y% \' M- h/ x7 PDevelopment) Q" [# [# ^' [0 \( I: x Test III (DT III) 7 D/ C7 |( y: }/ K4 `- e( l; LTests conducted during production.5 l2 o1 G/ H" p% `) i7 G Development " c! b# G: ^& zTest and $ y* k" {, |8 _. s) [' Q3 aEvaluation* h$ T+ ^8 F$ ~" R/ A (DT&E)4 ?' S& H x; u; \: C F9 M Test and evaluation conducted to measure progress, usually of 3 P2 _/ P# {$ Icomponent/subsystems, and the proofing of manufacturing processes and # q+ x1 u1 O9 R: q9 Ucontrols and to assist the engineering design and development process and / l, V% ?9 Q( o6 ?# dverify attainment of technical performance specifications and objectives. Usually3 ^# g. @+ g/ Y8 g conducted under controlled or laboratory conditions. Can be conducted before 2 `8 e2 s& q3 u2 i4 L* mor after production begins.; C0 A4 h& N8 @+ d/ [ Development. G7 z% K& _! m& r; S: B Test (DT) ' [4 I. {! O. S2 a! E' q) dTest conducted by the development test organization to achieve specified test. d& N" ~1 h0 @ objectives. It may be a complete test, a subtest, or a phase of a test.2 ^ s& @; U6 y Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, ) w( R: O$ M0 C+ ]schedule, or performance without authorization from the milestone decision % R+ I2 {$ h3 E1 P r4 o0 Mauthority. Acquisition Program Baseline (APB) thresholds represent these4 d5 J! A- h! y! U! a parameters.$ J4 X; N: {+ ] ^ Devolution of 6 @6 ^" A/ a+ G/ n$ U3 nCommand9 N1 P h: g6 m Minimal essential operational capability to perform C2 provided in an orderly and ; P. ^, E5 }( D% E8 ]4 U$ ktimely fashion to a duly authorized successor. & m0 ~6 t! M. y; D$ O( eDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.2 Z% \ B, D: Z# }3 } DEW/D Directed Energy Weapon/Discrimination.: T# P6 D8 J. K$ P DEWG, O Directed Energy Weapon Ground, Orbital T, c1 ?3 o" y4 l- P' W7 T1 _ DEWL Directed Energy Weapon, Laser (thermal or impulse). # g: c; \6 f; @( H q! N3 eDEWP Directed Energy Weapon, Particle Beam (neutral or charged). ( |% [$ r& V0 d4 J1 x0 [! Z# sDF-KBS Data Fusion Knowledge Based System.0 l- S! c. @% ] y5 n DF2 Deuterium Fluoride. " g( S+ O$ x6 F& P% tDFAR Defense Federal Acquisition Regulation / ~6 X; m* \9 \% }4 pDFARS Defense Federal Acquisition Regulation Supplement." Z! L$ G, f0 [5 O) S e MDA GLOSSARY, VER. 4.0 D ( M' d# H [3 _/ p8 l4 B f80 s4 H7 F! E O1 A% E) z DFAS Defense Financing and Accounting Service. ' C# u( E, w9 h& jDG OBSOLETE. Defense Guidance. See Defense Planning Guidance., `4 m. u" \. o: ^1 b DGA Director General of Armaments (France).5 S) P3 O0 R; T% ]2 h5 p: b DGP Defense Group on Proliferation.+ q o+ p: Q0 a! C: D& y DI (1) Data Item. (2) Developmental Item. ( Q7 p% g1 B6 p. ^7 ^+ z1 k% pDIA Defense Intelligence Agency.3 j. d1 T* L% v V- d! S6 ?6 y DIAC Defense Intelligence Analysis Center.1 l" w P% ~- R8 ]$ P$ G$ @ DIAM Defense Intelligence Agency Manual / C) {2 i% T; f2 b6 J$ N xDiameter (Optics) The unit of measure of the light gathering power of a lens.# Q+ s/ t6 S: Q2 T1 A DICE Digital Integrated Combat Evaluator.+ a* N5 C2 e1 \ DID Data Item Description.) C+ x2 W' \* \4 ~6 g' F Diffraction The spreading out of electromagnetic radiation as it leaves an aperture. The8 r* Q# q( T- ]/ I! m angle of spread, which cannot be eliminated by focusing, is proportional to the / C% |3 E- f; cratio of the wavelength of radiation to the diameter of the aperture. 1 D. ^2 y% m9 t; T) {$ U) E% ]Digital . \0 ? J: R/ w& u* z" d1 {2 SProcessing% l2 j( X0 g( T6 L The most familiar type of computing, in which problems are solved through the8 h3 V" J! f. A. m mathematical manipulation of streams of bits. 7 g" F, a+ p. D+ `DII Defense Information Infrastructure " A$ \4 L" n4 Q9 b+ x! wDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to' q, z2 i2 T5 R# J 12 km) between wake termination and de-sheathing.7 v& s# t5 M, T! e5 ^ DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).4 v+ g8 L3 c, r. l DIR Director. 1 X! E; p! E/ u$ P( GDirect Air : N- x1 q; F; Y ~1 w4 [. Z3 |Support Center ) K3 M6 a: N" q) y' ~% H; g' H, mA subordinate operational component of a tactical air control system designed" m& v: ~' U. I* @5 U* I; l$ l for control and direction of close air support and other tactical air support ( ^5 X0 K, t* A0 Doperations, and normally collocated with fire support coordination elements. # ~1 q$ T0 k* G. t" KDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not w7 @4 g. V. C1 W; F! C necessarily limited to items that are incorporated into the end product as labor or+ l/ A7 V1 p1 A5 R2 ] material.) k& h7 e: }) m5 B Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing , ^3 K2 t" o( W$ jdirect labor includes fabrication, assembly, inspection and test for constructing 1 A2 `5 R' t/ i" othe end product. Engineering direct labor consists of engineering labor such as 8 C6 F7 X2 n* {9 M, freliability, quality assurance, test, design, etc., that is readily identified with the 1 A. C# V* ^( Zend product.7 |+ I1 R9 w/ G8 m/ L7 s# ~ Directed Energy, w4 [4 ?# U8 s( _; ?' U, I( b (DE) 0 F/ |7 h0 a" X5 J, H1. Energy in the form of atomic particles, pellets, or focused electromagnetic : B- a- X) {# r* v0 gbeams that can be sent long distances at, or nearly at, the speed of3 O, c* h4 ^7 d: M1 Z! C light.4 N. D' V- x. T" n$ W$ N 2. An umbrella term covering technologies that relate to the production of a ( ?- y) ?: o2 c7 m3 Cbeam of concentrated electromagnetic energy or atomic or subatomic particles. 4 I0 k2 l" U4 Q |% a7 ^MDA GLOSSARY, VER. 4.0 D: l" X9 e" `$ B% L# ~ 81; V5 C0 y8 C9 [: D7 M' t) \ Directed Energy 0 u9 p+ e ^5 h4 v' z9 j- o2 iDevice # ~1 k5 @' O- d9 W( aA system using directed energy primarily for a purpose other than as a weapon.# s* K7 p" w% V Directed energy devices may produce effects that could allow the device to be3 l) p$ m, T2 [ used as a weapon against certain threats, for example, laser rangefinders.( W& z& S( u4 j6 {9 @ V1 B9 H Directed Energy6 b$ L- j3 O2 \4 t! C! Y# c+ `6 E Weapon (DEW) 1 y0 [1 @- y: S# iA system using directed energy primarily as a direct means to damage or destroy& j! u- S* u. q7 `, |9 u& }# v enemy equipment, facilities, and personnel.7 g1 [/ ]) O' L5 j2 T/ K3 P DIRLAUTH Direct Liaison Authorized.8 V/ l# b5 }$ L# d DIRNSA Director, National Security Agency. % G+ K2 f6 \3 y5 E' _DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. : E9 ]; `% g- Y/ ]. k0 iDISA Defense Information Systems Agency, Washington, DC. (Formerly known as6 O$ q! Q) J- h% l& w Defense Communications Agency). 0 Z& n6 [3 \1 n7 |+ U; R2 kDISCO Defense Industrial Security Clearance Office # w) @1 C5 |; \$ I. L- M( g6 hDISCOM Division Support Command (US Army term). + l. [: s3 g8 ?) r3 R) E4 qDiscretionary 5 I/ M/ V) @/ |7 W+ @$ `, d. rJudgment 1 H3 V2 A e' W% o/ |2 d1 tThe authority given USCINCSPACE or his duly authorized representative to, n4 V& `, z$ G% g/ _7 p& D" p2 g perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination 5 p _+ M; h. H. L0 e0 b) X& C$ YDISN Defense Information System Network (DISA term). : [& t! o2 @1 K5 nDISSP Defense-wide Information Systems Security Program. ! U/ _! }3 }! Z! n! iDISUM Daily Intelligence Summary (JFACC term). ( D( H! X6 T0 B# o+ Z# M% f YDITDS Defense Intelligence Threat Data System. & m# ?# F' ?' E- \DITP Discriminating Interceptor Technology Program. The objective of DITP is the0 M# ^8 i3 S2 }7 A. ~ development of advanced interceptor seekers to counter advanced threats. 3 A, P4 y5 F/ `' eDITP will integrate passive and active sensors into an interceptor seeker that - i o8 a2 \4 ^integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP: [$ g: r$ p% [9 g) l3 L. } flight demonstrations will involve the tracking and interceptor on-board 3 d$ W( V! o$ O' e. g/ U: Qdiscrimination of targets of opportunity while providing fusion processor data 2 c- z; e: @* G/ Z/ a4 Ntelemetry. (See also ASTP).3 B! _- }; R6 l; J. ]5 [- r) N( A DIVARTY Division Artillery (US Army term).6 s, s+ o. i" B& u+ k% O DIW Defensive Information Warfare.0 z8 a: ~7 e5 g: \9 L DLA Defense Logistics Agency, Alexandria, VA.5 f; s$ Q! q4 h; D- j DLSC Defense Logistics Services Center (Battle Creek, MI)./ A8 ^ V* a* M) a6 b0 f' \2 K DM Data Management - _" t, D' U [9 h% ]DMA Defense Mapping Agency, Fairfax, VA.# V# R8 Q* k( d4 U DME Distributed Management Environment. d! R. O! k: ?& Z- [9 C8 g DMI Dual-Mode Interceptor.) `2 `3 F* }. g; N MDA GLOSSARY, VER. 4.0 D( H6 h% N8 A4 t' M2 @ 82 0 @; A$ r+ z8 s* M" KDMRD Defense Management Review Decision. 0 o+ _$ r+ T: W; \, a% {DMS (1) Defense Message System.. ~ ]0 @- c6 A+ u (2) Dissimilar Mission Simulator.+ p4 v8 Y; n% Z$ A' ^1 \8 r" B DMSO Defense Modeling and Simulation Office (OSD). $ W( k( t( W2 u% |# bDMSP Defense Meteorological Satellite Program.8 V- r# F/ I1 M2 @ DMU Disk Memory Unit.7 N' X; p- ~0 x- _. } DNA Defense Nuclear Agency, Alexandria, VA.1 P- Y$ l: Q$ h- w T j DNMS Distributed Network Management System. 5 B: A; m0 k5 v" U' Y& Y- nDNSIX DoDIIS Network Security Information Exchange ( t( B* ]" ] f% oDNSO Defense Network Systems Organization. 1 c% m3 ?1 g2 s+ C& j* uDO The lowest rating under the DPAS. All “DO” orders take preference over unrated: I( r2 h5 E" ~ a* ~( t* z' Z1 ~! h orders to meet a required delivery date.: l$ p: [9 r% R) u7 u) a& |2 {2 {% \/ H Doc Document ! J) u; |3 q$ i7 V& eDOCPREP Documentation Preparation. / i {# a1 N& r& u+ a% ~& ADoctrine Fundamental principles by which the military forces or elements thereof guide3 h% F/ j* e, e their actions in support of national objectives. It is authoritative but requires . V, S$ K. d q9 B9 S& Mjudgment in the application. See also Combined Doctrine. % j, m5 T$ O* `, l- HDoD Department of Defense% n0 ]. \# B" A* R+ l! P DoD Component. }+ {+ s' N4 q, k n7 K: p Acquisition - Z' Q1 N2 w% I& w' oExecutive ' \* o9 r" p/ b) q7 c/ LA single official within a DoD Component who is responsible for all acquisition , |0 i/ u" n+ ]- S) H! Lfunctions within that Component. This includes Service Acquisition Executives % \; x$ i6 N$ Dfor the Military Departments and Acquisition Executives in other DoD ' r: Z* Z& y* S* i jComponents who have acquisition management responsibilities. . y0 @: `: s2 Q, G1 S. XDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,$ M& G3 g' f9 A$ U Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the. H3 R& m- C# J% a) a/ {) n) v Defense Agencies; and DoD Field Activities. - f, |$ ], ^4 Y; v9 s. v; yDoDD DoD Directive. 3 O ^+ r0 v& o+ v' c VDoD Directive2 ?# Q+ {: ^6 d& Q& O( r 5000.1. L7 Z6 E2 f4 h L$ ]; b “Defense Acquisition.” The principal DoD directive on acquisition. It establishes ' ?; O: V7 [+ S" Y4 y3 mpolicies, practices and procedures of governing the acquisition of defense" ^3 k4 G: Z$ n1 O3 O acquisition programs.) i8 B& G; J& E* |+ t d3 \ DoDI DoD Instruction./ Y. A9 ~ p! b3 {% E2 ?" z) [ DoD Instruction . l5 | z$ U) V5000.2& ]- A5 [4 F3 Z3 S; u7 o “Defense Acquisition Management Policies and Procedures.” Implements DODD ( s% U9 b, n) j- Y! t9 E5000.1.) r: d' {4 N3 A) p" V DoDIIS DoD Intelligence Information System. ( L5 ]" w7 m* ODoDISS DoD Index of Specifications and Standards. 1 P, V! f! V3 Y' eDoD-M DoD Manual.# t) K% J. p" h MDA GLOSSARY, VER. 4.0 D+ Y% z: ?0 m; A, R 83 2 \! t+ z) n. \( u9 d, H4 @DoDR Department of Defense Regulation.; p- U/ H$ L6 V4 j- |9 \' r DOD-STD Department of Defense Standard.* e% s s/ S% R1 Y: w! B8 [1 U. n DoE Department of Energy. ; P* i1 `( T& uDOF Degrees of Freedom.) I. K4 U+ v4 S7 A Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system% a) v" k `( r1 b. H! B having a detection range of approximately 3000 km. It is believed to provide! n x; [, d3 |+ j4 _ battle management for the totality of Moscow defenses.4 ^) T8 L. `" u, B# [# L0 G DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). ; `9 R3 e9 M' P" Y* HDOPAA Description of Proposed Actions and Alternative (environmental term). m6 p' O7 @9 S: R, q6 R* F3 P) GDoppler Effect The phenomenon evidenced by the change in the observed frequency of a ) U) C, ?# F3 z" F0 ?sound or radio wave caused by a time rate of change in the effective length of ! l V1 Z. T2 { T2 wthe path of travel between the source and the point of observation.+ d; t: G. X3 g4 I3 {# u DoS Department of State (US). 9 N X3 c/ r$ Z2 ^$ M6 eDOS Disk Operating System (TelComm/Computer term).! O+ N! O C" f% p& t% j DoT Department of Transportation [US]. # q3 }, ?8 o1 L N. o+ IDOT Designated Optical Tracker.$ f# c# G7 m9 k& e) k. q* u8 R DOT&E Director, Operational Test & Evaluation. 5 m- u# O3 p- k+ d& b: zDOTH Defense of the Homeland.; T$ @# i! K0 i* N& p! ` Down Select To reduce the number of contractors working on a program by eliminating one or6 w6 `5 L) @) k0 z& d* U! g2 W g more for the next phase., w( _9 W5 i) e5 T: H* u4 C8 l DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.8 C' j: _. s0 X DPA Defense Production Act./ t9 p7 t- X2 G6 _& E( h! {, M- h DPA&E Director, Program Analysis and Evaluation. % S: _* v0 X" b) m! iDPAS Defense Priority and Allocation System.- w+ N2 c0 f& Y, U% ^( Y DPAT Dynamic Program Analysis Tool. f1 U4 n5 P3 B: zDPB Defense Policy Board. , v9 W" H" r8 G1 w; zDPG Defense Planning Guidance. K) x) I2 H1 v' B DPM Deputy Program Manager." p. i; j$ Z- Q& r( N DPML Deputy Program Manager for Logistics ! g' i+ ?- b+ k1 ^0 m) W( D$ UDPP Distributed and Parallel Processing (Computer term). ) _! I5 N; J5 U% Q# Y! ]1 CDPR Defense Performance Review.+ d8 S; h, J2 ?# `; x% A MDA GLOSSARY, VER. 4.0 D P7 T. }' t. Q 84# r/ y$ H. d# ^' _+ A DPRB See Defense Planning and Resources Board. / E& |" ~3 `8 e% }& l( wDPRK Democratic People’s Republic of Korea (North Korea). ; R6 T& Y' g0 D8 i+ d. ~8 eDPRO Defense Plant Representatives Office. - I2 x4 c! D7 m2 f+ V3 oDPSSL Diode-Pumped Solid State Laser.7 ~! i1 L. c' f DR Deployment Review. & ~7 R+ [0 k! [2 a/ ^DRAM Dynamic Random Access Memory. - x0 g0 o$ l6 V& ~. ?: n" ~Draw-down Curve A method used to encapsulate the overall performance of a BMD system that ]6 ~! A( X' N) G3 Z, o2 M% |plots the probability of survival on the vertical axis versus the number of attacking - A/ k7 C5 d( v- m. [/ E' oRVs on the horizontal axis. Used in conjunction with attack price, they are the . U; R0 }' O6 ?most important expressions of a BMD capability. * }* E# Z% Q, }DRB Defense Resources Board." ~* [; N/ ?' r; d/ _ DREN Defense Research and Engineering Network. 2 A R/ w- u' e$ C6 bDRFP Draft Request for Proposal.. W. t' r5 n8 x K Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from; Z5 k) o5 \$ X( e3 F. q gravitational and atmospherically induced torques on the spinning projectile. 5 g6 S/ L( W* @% Y7 q- h5 M8 k' N& lDRM DAB Readiness Meeting (DD 5000.2 term).& a. }7 p9 a0 t/ ~" x5 T Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also% [' V! I7 N L' L/ q; v Remotely Piloted Vehicle. 2 | w: {6 P' I; S# fDRP (1) Deployment Readiness Plan (US Army term).7 m [' `7 \- k& I (2) Deployment Readiness Program.% k8 }$ s( J" O* x: [# z' | DRR Digital Receiver Replacement (USN term).. x$ u' I+ \/ g& Q9 f DS Deep Space.; Q% U8 P! f6 g! F' D, w0 Z DS-1 Category of telecommunications circuit capability.- d2 ]4 N, ^' n: ?" p5 W2 B& i DS-3 LAN Category of telecommunications circuit for a Local Area Network. 8 T9 G1 D* | x% vDSAA Defense Security Assistance Agency (OSD).5 G1 j' q9 @9 [1 ~# h' b# B DSAT Defense Satellite Weapon.( g2 y, ~! v$ r$ q2 l& b1 \ v DSB Defense Science Board.$ H9 ]2 I) I6 Z# t DSCS Defense Satellite Communications Systems.# Q) R, N( _# f" F: t* b DSCS-3 Defense Satellite Communications System Three.0 z: m# G! B6 o( |3 |. h DSCSOC Defense Satellite Communications System Ops Center.& n/ \0 L/ c5 {3 c DSI Defense Simulation Internet ' a3 ~( z( m, b: _5 VMDA GLOSSARY, VER. 4.0 D ! d. [" y( L- G" ?1 j85( R- c/ J* Z( W+ u0 u- T& Q DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet- h! u& L2 e$ ]4 ~8 ], N- i System. ; J& S f, N* Y D9 NDSM Decision Support Matrix8 t' f& H+ r1 T$ g' p7 J0 I/ K( ~ DSMAC Digital Scene-Matching Area Correlation. 6 r3 V4 j$ R4 d2 K9 m/ ]" `: RDSMC Defense Systems Management College. # I7 t6 [1 y: D5 N+ C/ W- H1 UDSN (1) Defense Switched Network (formerly AUTOVON). " W* L' ~% _, J: o; v! |/ Z(2) Deep Space Network (NASA term).3 Y( ~6 \/ Y# y+ Q DSP (1) Defense Support Program. (2) Defense Standardization Program.4 i/ Y) d" W+ c* z7 l* L/ Q5 W6 N DSPRTM Defense Support Program Real-Time Model.) l _: T5 ]" L# } DSR Data Set Ready (TelComm/Computer term).- d; k3 c- t) Q" T4 F+ k% e DSRCE Down Scooped Radio Control Equipment (TelComms term).$ T8 M1 V! n- h+ q' \' t. U DSS (1) Defense Supply Service. (2) Digital Signature Standard.0 P$ e( _9 w2 @) f3 U' A- H5 {1 A+ n DST Defense Suppression Threat., W# V8 r# Z7 w% @2 k' R; u DSTAR Defense Strategic and Tactical Array Reproducibility. " M# K, C, i0 x0 S) ~DSTO Defence Science Technology Organization (Australia). 2 }; G5 \! _0 u5 i8 sDSU Digital Service Unit (Telecomm/Computer term). 7 d# Y+ p8 w9 L3 ? d$ ZDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to 4 t3 @9 F- d' `" V7 rthe DNA. , |8 r. I/ o" f8 a4 [DT (1) Discrimination Technique.! y& p4 i5 G; ^8 ~ (2) Development Testing.2 d) Y; {8 {0 H+ M (3) See Development Test I, II, III. 7 ^; f3 K( Z8 s: }3 x% H(4) Down Time (ILS term).- v0 }3 n2 X7 z% g0 o5 K" [ (5) Depressed Trajectory. 3 U7 @' S; e8 z1 z3 ]9 s(6) Dedicated Target. / [9 E9 o y t; m( f2 P7 c; a& UDT&E Development Test and Evaluation. . m, v1 ]- H: O& U HDT/OA Development Test/Operational Assessment. . l3 L7 h: p3 y) C% q3 d3 cDT/OT Developmental Test/Operational Test. 0 }+ @# ?% I$ r' V) T2 ~! {3 z% HDTAP Defense Technology Area Plan.# ~0 [7 R0 i# N3 ~6 I( @+ S DTC Design-to-Cost. # }& I3 H9 N o3 dDTD Digital Transfer Device (TelComm/Computer term).1 z( {8 r' I- Q7 C9 V1 ]) R DTE Data Terminal Equipment (TelComm/Computer term).3 ?0 P5 j. S# X. k5 I DTED Digital Terrain Elevation Data. ' W% M* |/ {- _# [DTIC Defense Technical Information Center, Alexandria, VA.4 a* y" b7 e# D; `6 a4 U* }- t MDA GLOSSARY, VER. 4.0 D % m* l5 Z! ~. }% O86 - O5 A* R" P; P& eDTIS Defense Technical Information Services (now DEIS)./ x, `- g3 I q/ z DTLCC Design to Life-Cycle Cost. ( q: T9 g& Y& M" n1 TDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL ) d# z) C V2 ^term). + w& q; H; f2 p; G, I+ aDTLS Descriptive Top-Level Specification.! K1 E0 m1 d- A) M DTMF Data Tone Multiple Frequency (TelComm/Computer term). 9 ?( }" R# P7 F! ^8 n$ _DTO Defense Technology Objectives., V, v( b% X6 q8 p: B& }# c DTOC Division Tactical Operations Center.' X9 ?1 e4 A6 ~$ v5 q3 I ^* c DTR (1) Demonstration Test Round. (2) Development Test Round. 1 V2 |7 c Y( q; K4 o: A7 ~1 sDTRM Dual Thrust Rocket Motor. ^8 L* x" h& f" Z- ~+ S! H K# O DTSA Defense Technology Security Administration. + B3 }- U' b: m4 t. EDTSE&E Director, Test Systems Engineering and Evaluation. ( z; t- \- R; p0 c9 QDTST Defensive Technologies Study Team. : I$ O) W2 S' R+ l( N. D3 i1 _DTT Design-To Threat 4 f9 l: f% s0 }# PDTWT Dual Traveling Wave Tube (Electronics Engineering term).& e' \. A; z5 [, j8 ]; v3 w$ s DU Depleted Uranium. 8 A8 S2 G, y* @' n. c0 w# TDUA Design Upgrade Assessment.3 U! A% l9 S" A+ y( U% ]* w Dual Source Two contractors producing the same components or end items for the same & L$ z! D$ e1 Z" ^8 X( g) e! ^# T* Lprogram.& M1 r( s, T# u. {) r* I. S1 f0 r DUNDEE Down Under Early Warning Experiment (MDA/DSTO term).& }. o r0 J* { DURIP Defense University Research Instrumentation Program. # C/ B0 R* _/ C' N0 NDUSD Deputy Under Secretary of Defense.2 [8 C. F9 E; @( M8 I/ s& Q DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).. e- B8 h* N" d8 I DVAL Demonstration Validation. " T; L& |0 t) P: v" f' j+ _7 kDX The highest rating under the DPAS. It takes preference over all other rated and3 V1 K. Z0 B* L: ^ t3 f0 X' m not rated orders on a contractor’s production line. The BMD program carries a 8 C7 W" z$ K$ o0 k“DX” rating.3 [* H! c; R9 p8 k MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87! { t% `( B0 F2 J2 i) ]9 e3 h E East 2 I- c0 v0 t( W: DE2 I See Endo-Exoatmospheric Interceptor.9 g( O* A$ A* K6 B. K. @ r E2SRD Effectively Two-System Requirement Document. , q- w' h9 |$ v' SE3 (1) Electromagnetic Environmental Effects. ( p% ]8 C1 s, j# J/ U& A(2) Electrical, Electronic, and Electromechanical.' ?0 m+ j% W+ D% S0 W& ~ E Spec Materiel Specification. 1 l) V1 N3 B+ t6 m0 u7 [EA (1) Environmental Assessment.8 \" ` D/ {( y1 a: D8 O. \ (2) Engagement Authorization. 3 p' o0 j; \3 x+ `3 P! {3 `. }(3) Executing Agent.0 z) o' W# m* Q+ O9 g8 W. g (4) Evolutionary Acquisition. 6 A% k9 {# F8 v9 R' c }/ Y(5) Environmental Analysis (environmental term).7 |+ U) ~2 K2 B {1 X1 A( {) C (6) Executive Agent. 3 K' Z1 e) W! z1 V3 x5 ?EAC Estimated Cost at Completion.: Y6 s; \8 Y2 B; Z6 a EAD (1) Engineering Analysis and Design. (2) Extended air defense. + j+ `* Z3 Q# l6 sEAD/D Engineering, Analysis, Design and Development.. x1 F$ U4 Y0 b' O- z$ e EADSIM Extended Air Defense Simulation. , E& S; N& |* E6 Q! |' t5 AEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing 1 q8 \# ]0 K" vusers to model military response to airborne and ballistic missile threats. 7 a7 n+ K% _) ^% @) aEADTBP Extended Air Defense Test Bed Program. $ E& t3 u X/ Y: G3 E1 UEAGLE Extended Airborne Global Launch Evaluator.! x* W4 W6 X# z, { EAM Emergency Action Message.6 K( A' m g& B; l/ b EAR Export Administration Regulations. % e/ o0 ^# l) A6 V$ _/ \, XEarly Operational) M& q/ e' o. O0 r( x; _ Assessment0 B" L' s5 j @. g An operational assessment conducted prior to, or in support of, Milestone II.. E4 z- s; S; F9 {" c# O4 w Early User Test( F8 S3 [7 c) n (EUT)$ L" F2 n. k* U# ~- }; } A test employing representative users to examine materiel concepts, training or 0 N6 J- Y: J2 [logistics planning, or inter-operability issues. EUT can be accomplished during 2 f1 w+ q# ?& M% U8 ]- [" v4 hDEM/VAL on brassboard configurations, experimental prototypes, or surrogates: o- D: I: k ?% w5 v to provide data leading to the decision to enter full-scale development.$ p! r5 q( B/ k. y: n Early Warning (1) Early detection of an enemy ballistic missile launch, usually by means of # n W% c( t n# z% p- p5 B2 bsurveillance satellites and long range radar.+ E- |+ D2 K# j% p! T (2) Early notification of the launch or approach of unknown weapons or5 k5 R. n, T! }( L weapon carriers. 5 g7 v0 H- W/ J( K3 f, o6 P- pEarth Limb The apparent outer edge of the earth as viewed from space. + |( w# V4 a2 k6 q% }7 KEastern Test) C: @2 f2 B! ?+ `# ~ Range (ETR) : Q; ?8 m6 G1 C" \/ {, M7 ABeginning at Patrick AFB, FL, this range stretches halfway around the globe " n6 M( ?! r& i( I6 y/ v2 Twhere it meets the Western Test Range. An array of launch complexes, sensors,+ {1 g6 O7 j" R8 A3 w G and tracking sites make up the Eastern Test Range. The ETR is now operated - Q# n6 x7 T( P) w0 Jby AFSPACECOM as shown in WTR definition. W: a+ y! E: l. `8 `: o+ C; l MDA GLOSSARY, VER. 4.0 E$ s4 g/ A: Q8 c& y- L2 J v 88, ^1 u! b6 }1 _8 r3 S EB (1) Electron Beam. (2) Enhanced Blast. 2 f c6 j# X4 u6 m( }, e3 o9 zEBB Electronic Bulletin Board.- L. C( I! {8 x7 I$ G* t1 [ EBCDIC Extended Binary Code Decimal Interchange Code.- U d+ e# I# P/ t EBW Electron Beam Welding.: Z# ^: ?$ \# Q1 b- l6 S EC (1) Electronic Combat.% h; [# u: p, R- p (2) Error Control. ! }; t1 ?# R- _, S& S6 T( J(3) OBSOLETE. European Community. Now known as the European Union & i- k& G" o( ~6 `$ [+ S( F(EU).. K: R+ C8 v6 O* N9 { EC/EDI Electronic Commerce/Electronic Data Interchange " i) d$ a7 J, n/ {) LECAC Electromagnetic Compatibility Analysis Center.+ Y. q, C. @$ `3 e( h) H ECB Engineering Change Board.* [( W* r7 C0 z& E+ e$ a" ^7 | ECC (1) Equipment Control Center. (2) Element Control Center (USAF term). & c3 U9 F' E, h9 s2 VECCM Electronic Counter-Countermeasures. " y7 w2 E6 x g# |6 [ECDs Element Control Directives. % C1 p W! o' i, jECLS ERINT Command and Launch System.# `9 {3 }+ ?* x& H- @* f/ m A ECM Electronic Countermeasures.8 f! W, o$ D5 l' U: \& c/ P& P% }, a ECN Engineering Change Notice.( W4 W& _, S2 U ECO Engagement Control Orders. . X- x7 y) M) W6 X# ~+ z' K( k: CECP (1) Engineering Change Proposal. (2) Emergency Command Precedence.( M! e5 P# b6 D2 n( c. ~ ECPMO Electronic Commerce Program Management Office.- p1 |$ ]& r' i+ O4 D ECS Engagement Control Station (PATRIOT).5 D s" v4 [- q6 Q! E; U3 i ECU Environmental Control Unit. * s1 e i: Y- U8 y. { ?- @EDAC Error Detection and Correction + f" g' |: I- S5 a& NEDGES Electronic Data/Guidelines for Element Survivability.+ `; e6 h9 a5 s( ~& A3 _& J EDL Electrical Discharge Laser, M8 B0 j$ F" f5 R EDM Engineering Development Model.$ O* {4 q% Z. {9 g: K" p, y EDP Engineering Development Process) K/ S3 f) A6 W2 M# b EDR Embedded Data Recorder (PATRIOT)./ y4 p5 Z9 B6 ~( D9 Q5 y6 k$ C* S( h EDS Electronic Data Systems Corporation , R5 e# Y, b7 h- \EDWA Engagement Determination and Weapons Assignment (PATRIOT).: u$ ?) p0 X4 F4 Z MDA GLOSSARY, VER. 4.0 E 6 K# k0 P6 v$ R3 ^# `89 7 b7 @% h1 @$ ]EDX Exoatmospheric Discrimination Experiment j- J H+ m. X; pEE (1) Electrical Engineering. (2) Engineering Estimate. , \) ]: d- o7 @8 k% i1 h3 L4 ~EED Electro-Explosive Device." }6 P8 k# N' D5 I EEEV End-to-End Experimental Version. $ j/ N* L- G7 Y: x$ qEEFI Essential Elements of Friendly Information. ) D K: w$ u9 [/ ?* g7 D Q% Y4 w: A. kEEI Essential Elements of Information. $ Q6 l3 u! }) M$ |/ P( ZEEIC Element of Expense Investment Code.! k2 t& ]7 X1 s" N: E. m EELV Evolved Expendable Launch Vehicle (USAF term), m& ]8 A6 B7 s+ z EEU Electronic Equipment Unit.( V2 G( Y7 V8 v( h1 t' L EFEX Endo-Aeromechanics Flight Experiment. ) w8 `, U; y, l0 \3 ?* A( |' \EFF Electronic Frontier Foundation.2 U; V/ o* _+ D1 Y Effectivity A designation given to the BMDS configuration and demonstrated capability at , h- C: J6 P/ ^& A' b) va point in time, becoming effective at each increment when an element or ) h8 f& \/ C5 c$ n! |' |9 ^/ |component is inserted into a particular Block.9 {9 n) b7 {; M+ B6 c2 z Effective Damage That damage necessary to render a target element inoperative, unserviceable,3 d* Y5 x6 j# _2 P/ V8 G nonproductive, or uninhabitable.5 k( U. E' w E$ [# j Effluent Plume The pathway of movement of effluents through surface water or air.3 r# \6 H$ |9 k9 M. P6 } EFP Explosively Formed Projectile. - M/ p, G8 T+ d+ ]: f, YEGP End Game Processor. / \$ H. _' q2 K; t) G6 N! jEGTR Eglin [AFB] Gulf Test Range.: G- ]5 H' T6 V4 L3 D EHC Enhance Hit Capability (USN term, related to SM2 Block IVA).8 O, Q+ i7 s: `! V4 j EHF Extremely High Frequency.! Q( t% p! F a6 o. M: S ehp Equivalent Horsepower.4 H" w9 L* h7 M: Y9 g- u% a EIA (1) Environmental Impact Assessment. 7 A4 O" ^' q- o" X# u* J& I(2) Electronic Industries Association.+ z% P& z, y5 j$ B/ X EIAP Environmental Impact Analysis Process. / r( C; e/ ~# |/ R+ P$ BEIP Exoatmospheric Interceptor Propulsion.) W0 A+ \2 d Q$ O2 d2 X EIPC Electronic Information Privacy Center.1 o s$ V7 X# ? EIPT (1) Element IPT. (2) Engineering IPT. 5 | A5 j% J' zEIS (1) Environmental Impact Statement. (2) Explosive Initiation System.+ t3 N2 E/ {4 r EISA Extended Industry Standard Architecture (Telecomm/Computer term). 2 ^0 n& h" b' Z) O; KMDA GLOSSARY, VER. 4.0 E + j' o: _# d2 B) A" s1 J6 {6 T90$ i0 c7 P1 o" @# `( K* d EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle./ @0 Q7 m8 Y X0 P8 I5 d Elastic Range The stress range in which a material will recover its original form when the force5 e" H7 w% |* E: R' E/ V" K (or loading) is removed. Elastic deformation refers to dimensional changes ! O+ K- M* ]2 U: _8 Coccurring within the elastic range.$ q5 I* ^( e9 S Electro-Optics ; ^! u& b4 A" {' SInfrared (EO/IR) 9 @' ^' B# n( V8 f6 B6 bTechnologies/techniques employed by optical sensors in the wavelength# |6 }- ?( C! ^0 ~3 N spectrum slightly longer than visible but shorter than radio. 0 \& u& C, L" Y& W- {& t$ z1 @) DElectromagnetic+ L7 ?* [- s5 T Compatibility ; |) W) Q" S+ ~) J* m1 K+ f(EMC) 9 D; [1 k' Z/ ~) c8 |6 o; RA condition when all electromagnetic emissions from electronic, electro-magnetic,& z4 P4 F& p6 ^$ m% U q and electro-optical components of a system interact without interfering with one 6 p' I+ @ |8 b. `( |0 U7 Yanother. 1 h( |. _3 c8 i' {2 {5 HElectromagnetic9 B% j: F7 ^6 ^ Emanations 3 f9 N9 G) ]1 c9 WSignals transmitted as radiation through the air, through a vacuum, or through# B1 @) N; I; ]3 i2 c conductors. 6 G) N3 |) t. m2 }Electromagnetic& B2 V7 [' R* T/ d Field (EMF) 5 G0 H& h* ?" `/ ]' [/ U3 [An electric or magnetic field or combination of the two, as in an electromagnetic+ A7 P A4 h; L# i' e1 E wave. Created by electric charges in motion, having both electric and magnetic 3 H1 ^+ H3 E; G7 i. N- Xcomponents oriented at right angles to one another and containing a definite1 t0 |2 Y4 U9 B+ {% R% y: u' A amount of energy.* h, e' \) ^ S8 q Electromagnetic . `3 E/ ~& H; x0 u fGun (EMG); y8 \5 h! Q# G! n4 \9 q: D A gun in which the projectile is accelerated by electromagnetic forces rather than 4 k+ M* |% _2 Z# q5 Nby an explosion, as in a conventional gun.5 C! n- j4 u3 x5 F, b# v; I% R Electromagnetic , K" i( H$ K* J VInterference (EMI) * P( M7 K; R& p5 ^$ Z; ]Any electromagnetic disturbance that interrupts, obstructs, or otherwise : X0 d4 A' p' W! ldegrades or limits the effective performance of electronics/electrical equipment. " w2 E- Q0 ~5 q6 S9 K+ vIt can be induced intentionally, as in some forms of electronic warfare, or ( } c! ^" G+ c W7 z( I2 p+ ~unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. 5 S8 s4 \9 Z* }Electromagnetic# f. [$ w1 s% Q Pulse (EMP)+ ?6 t" J" Q& l+ t6 P7 Q The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of 8 L2 ~% j5 `+ E8 c; {the nuclear device or in a surrounding medium. The resulting electric and % A, a9 n9 d7 t$ _% Y' wmagnetic fields may couple with electrical/electronic systems to produce" p+ V# m. T- N4 @, z damaging current and voltage surges. May also be caused by non-nuclear+ ~6 o$ R& n7 O4 s! S! ^: n means.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic 7 c/ H5 v! W ?4 X9 Z6 y% pRadiation (EMR)( O( L1 }1 A0 [9 \ (1) A form of propagated energy, arising from electric charges in motion that k+ q* ?& M5 L1 ]% b1 ` produces a simultaneous wavelike variation of electric and magnetic3 q5 v1 W& ]7 u8 B; ?8 G6 b fields in space. The highest frequencies (or shortest wavelengths) of8 H1 j3 t- J' M2 l/ p- a such radiation are possessed by gamma rays, which originate from$ a2 N. a. [! g: x& y% S- {$ L processes within atomic nuclei. As one goes to lower frequencies, the4 A& R: ?0 _$ l; i electromagnetic spectrum includes x-rays, ultraviolet light, visible light, 2 y( e7 \; B4 C* `infrared light, microwaves, and radio waves.) H" J/ L/ Z/ {0 j6 s7 q (2) Radiation made up of oscillating electric and magnetic fields and 6 z7 G2 x0 M7 u4 y8 ?propagated with the speed of light. Includes gamma radiation, X-rays, 6 M) M8 B7 \: S6 e- A/ O- Y7 Oultraviolet, visible, and infrared radiation, and radar and radio waves. 5 X' J" ]3 x( g8 z, bElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices & n) L0 U& g/ k. h* K6 |! U4 W" zused in system/subsystem design, excluding employment in the RF spectrum. D5 F3 Q/ [$ D$ C. r Electromagnetic$ R9 k8 ^& h3 ~7 ~ Spectrum s- r b& \- d3 {& T4 _+ g" a3 M The range of frequencies of electromagnetic radiation from zero to infinity. It is' D ^1 u4 N# Y6 H- b divided into 26 alphabetically designated bands. ! N7 F6 t$ b5 ~. I0 i8 kMDA GLOSSARY, VER. 4.0 E. J9 S" g1 R, b+ E 91 : y# [3 J) I+ oElectronic' ?: z9 G B# Y* c0 S Counter-) a7 Z2 Y) N. l; i) N& P Countermeasure3 E) G6 {( o- |1 e s (ECCM) 1 {, `2 j Q, ^& O. E( [That division of electronic warfare involving actions taken to insure friendly / q; t, B) d+ J! }- f! Zeffective use of the electromagnetic, optical, and acoustic spectra despite the2 a L2 `# K$ c% R% Z, @4 x enemy’s use of electronic warfare to include high power microwave techniques.' h7 B9 }+ I" _' \ Electronic" W4 q9 `/ z: V% a7 M Countermeasure ( `2 |3 t4 O0 W5 D(ECM) 1 e+ Q) ?% X" z5 DThat division of electronic warfare involving actions taken to prevent or reduce an( p! I2 e/ V/ M# k; O: e7 m' o enemy’s effective use of the electromagnetic spectrum. 8 o6 S/ Y7 w* O, Y* U) lElectronic % C/ b# l: g1 l7 JIndustries 2 U, U# C0 E" D) y- D% v( dAssociation (EIA)( y5 R% g8 H7 ~+ l3 c A standards organization specializing in the electrical and functional 1 ^3 c: s: C. Icharacteristics of interface equipment. 4 k6 C0 ~" r2 D% iElectronic - C6 O. A- K/ p9 W$ |% VWarfare (EW)( \, N7 g) q6 Y) w. n. q- W0 f Any military activity involving the use of electromagnetic and directed energy to3 a9 R7 W6 p9 u6 ~" l- T control the electromagnetic spectrum or to attack the enemy. The three major! ?( L+ @+ \( L, H subdivisions are: ) ~$ I$ |" {0 c- \•Electronic attack – Involves the use of electromagnetic or directed energy to & g! n0 D9 F! n1 _9 _. w4 lattack personnel, facilities, or equipment with the intent of degrading,0 s* F- X5 ?1 z4 T1 U/ j neutralizing, or destroying enemy combat capability. Also known as EA.! @5 d+ P9 s- z, X$ Q$ S6 R/ q; Y1 Q9 o Includes: 1) actions taken to prevent or reduce an enemy’s effective use of + `: |" u* j# x9 Tthe electromagnetic spectrum, such as jamming and electromagnetic9 o* G: l9 g Y- Z+ c; T: @ deception, and 2) employment of weapons that use either electromagnetic or2 [3 U/ U. m* _7 |) e directed energy as their primary destructive mechanism (lasers, radio+ I/ ~) \5 g6 _2 F( C* Z frequency weapons, particle beams).* l' A2 {( i" y* @% f% h4 u •Electronic protection -- Involves actions taken to protect personnel, facilities,, [1 t0 i1 b0 b8 M3 S' R and equipment from any effects of friendly or enemy employment of! s& \ X* M4 H, Q& ~ electronic warfare that degrade, neutralize, or destroy friendly combat 0 Q1 A' _7 O4 w. d6 c$ b( p( F4 n6 fcapability. Also called EP. . k3 V% e% O1 e0 z9 y8 }•Electronic warfare support – Involves actions tasked by, or under direct : N$ |& e5 _; ]1 O- V; Y& Scontrol of, an operational commander to search for, intercept, identify, and 3 g" e x( ^( ~6 q, X- clocate sources of intentional and unintentional radiated electromagnetic7 K. x4 c4 o/ y energy for the purpose of immediate threat recognition. Thus, electronic9 X' F% Z# \( a! B" f warfare support provides information required for immediate decisions ' r3 s! X8 t$ z" L2 \, v" Hinvolving electronic warfare operations and other tactical actions such as ! L& c* v a0 fthreat avoidance, targeting, and homing. Also called ES. " `9 c0 W3 z! r9 tElectronic & }4 U' n! P4 SWarfare (EW) 5 M! B7 N: L- U0 `Environments9 m0 @2 f6 o- V Electronic warfare environments result from radar and communications jamming8 e+ E# i1 N6 r) W4 ]# @ and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD 6 s, k, E5 j$ e! k! Ssystem. : g) Y3 \* a& [Electronics. }$ p% L8 n: f9 X Intelligence : B8 o0 @1 ~/ i! W(ELINT)- Z* I; @) W( J! C& n Technical and geo-location intelligence derived from foreign non-communications0 v$ ^1 c/ k% M# _' m electromagnetic radiations emanating from other than nuclear detonations or 3 }9 d: H2 g* A# F3 E( o$ rradioactive sources. * \$ b1 |& M( o: ?Electronics ( J. n E( H: x* b( h- D2 jSecurity (ELSEC), U* n# |" R/ p% O. e The protection resulting from all measures designed to deny unauthorized 9 r2 E1 y5 L' |& d" r& l8 S& w% A1 fpersons information of value that might be derived from their interception and 5 ~7 F. I# R5 P" P. C; N4 Nstudy of non-communications electromagnetic radiations, e.g. radar.) W' X$ }9 n! J ]! n2 p& e Electro-Optics5 v( o6 B1 |# x; V7 @( S Infrared (EO/IR) / V1 x" i( v( q# f) N. L7 JTechnologies/techniques employed by optical sensors in the wavelength : z7 G3 Z5 E3 ~* \spectrum slightly longer than visible but shorter than radio.9 t+ q2 W1 s0 E2 ~ MDA GLOSSARY, VER. 4.0 E * Y, n- W2 {% k. b# x92 2 \. k8 V+ |1 N5 J& `8 \5 w+ RElement A complete, integrated set of components capable of autonomously providing 9 r( g: e9 W" @, N: @; M* x6 e% IBMDS capability.& |% G+ u( V$ [; S$ ?6 q! | Element % ?' `1 w9 {4 V& A+ P$ B& W8 UCapability$ ~0 j& f- ~! i! X4 y Specification " Z$ ? M0 ~% Z8 A(ECS)1 {" s; f5 D6 ?' @ A document that identifies the element-level BMDS capabilities and 2 }) ?* S1 u( g9 i1 zspecifications necessary to achieve the system capabilities identified in the SCS." A; G4 F7 X7 K$ S3 H* j6 J The ECS further defines the SCS-apportioned mission/technical performance. n- R# c: H' ?! P# { capabilities and allocates these capabilities to the element’s components. ) P7 @$ w: H! t% C7 @) H% U. J0 [Element Control |+ p/ y; h( M1 L; @( s5 ?' \Directives (ECDs)& ?, ]5 [! s" o \7 r The command and control data instructions to control the conduct of the( ]$ d% i$ N0 `: E1 U$ B$ J engagement. ECDs are developed by command and control software based! o3 H! D! f$ X* c. w* ? upon variable parameter input by the operators (both pre-planned and real time), ! L7 ~5 E- ]5 H# Z% Rand operator defined rule sets embedded in the software. The individual battle/ T1 } `# P( o- k7 x+ u' P! H3 } management processors use these instructions to accomplish the assigned tasks# J7 @3 c5 K7 ~: u$ E) e from the operations order. ECDs are contained within a Task and represent the 0 X7 I: K0 s; _/ Oform of parameter values that influence the resource management processes of 1 {. V) Z9 i6 x% y& d& p0 sWeapon Target Assignment (WTA), Sensor Resource Management (SRM), and 9 w& F# Y& X" t- Y/ \8 _Communications Management (CM). There will be numerous ECDs per Task. h# ]6 W7 C& e1 [ Element * M( b. a. d8 ~2 AOperations / Q& @& ]5 K9 g2 {- f4 PCenter (EOC) $ A0 `( l/ E" M: k& t B: \ pAn Air Force operations center, which operates and maintains a BMD weapon or/ s- Z3 [ O9 _- n sensor suite. (USSPACECOM) 5 P2 ~- K. I# m1 e7 WELF Extremely Low Frequency. 0 X) j0 n( ]4 F/ JELIAS Earth Limb Infrared Atomic Structure. 3 o8 s) E; J/ [# m6 {ELINFOSEC Electronic Information Security.: }0 c. Z; D, L; E4 b* ?$ }+ E8 m ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-14 15:55 , Processed in 0.053003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部