航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation : K" m$ f# D2 @7 TCOMSEC Communications Security. 4 w( I( z8 n& wConcept / ?# z3 ~6 F! c Y# xExploration & . Y, q4 U9 u1 v9 aDefinition" b' r# w6 _: g! e* b3 [ The initial phase (Phase 0) of the system acquisition process, beginning at # T" u$ W+ o7 w( HMission Need Determination. During this phase, the acquisition strategy is1 ]* O! ]0 b7 \% Q developed, system alternatives are proposed and examined, and the system: u- g& B3 m( \# }7 z program requirements document is expanded to support subsequent phases. ( _; Y4 t. V5 s/ c9 b. EConcept of & ?+ e r5 J. Y& E3 L0 wOperations+ s5 Y) F$ A1 g0 h9 }0 H (CONOPS) . `& j8 `5 x" \8 H" l6 v(1) A statement, in broad outline, of a commander’s outline or intent in regard to 2 N/ @2 E2 B: k: C' ^* L/ p& han operation or series of operations. The concept is designed to give an overall . X: g3 r$ d, Z5 ?* v. Tpicture of the operation. (MDA Lexicon). _/ F2 `" z- c, s" M8 P1 H9 l (2) A verbal or graphic statement, in broad outline, of a commander’s " Y; {# D9 O# g% tassumptions or intent in regard to an operation or series of operations. The' F' c7 w4 ]0 |1 z concept of operations frequently is embodied in campaign plans and operation4 m% p1 W% o6 k- y- d plans; in the later case, particularly when the plans cover a series of connected 3 d9 k$ x% d& M3 c. Q9 Foperations to be carried out simultaneously or in succession. The concept is& j$ f1 {' s1 u! Q designed to give an overall picture of the operation. It is included primarily for ) y. D( `+ F4 H" ~, h# ~- r6 g. Padditional clarity of purpose.& P4 g/ A- B& @* _ Concept Plan An operation plan in concept format. Also called CONPLAN. ; R) E0 r7 ?/ @6 A Q$ jConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of , {! y4 R7 ]- f" g+ e' rthe acquisition process, or combines development T&E with operational T&E.! L$ C$ q V- V8 E( a6 f Concurrent% g7 _, v! u; O# m" U Engineering o8 w- n1 L, p- a4 B- K/ n% DA systematic approach to the integrated, simultaneous design of products and" {" W1 }! C2 v8 F* f0 _ their related processes, including manufacture and support. This approach is9 l9 Q) A( W5 s& w intended to cause developers, from the beginning, to consider all elements of4 m' _6 Z$ B& e+ C- H* Z the system life cycle from requirements development through dispersal, including $ D1 }9 D8 B- y0 Ocost, schedule, and performance. ) d! u' n. j- M1 G4 y- N. ]" ^CONEX CONOPS Exerciser. " F& q& G% p2 D1 a0 ^Configuration A collection of an item’s descriptive and governing characteristics, which can be $ ^* b7 s% y7 r! s. pexpressed in functional terms (i.e., what performance the item is expected to+ s. ^+ }; O3 M5 Q+ S. s Q4 x achieve); and in physical terms (i.e., what the item should look like and consist of2 j+ A# @; J q* y2 t when it is built). 0 o( O' m9 o9 ], |. i! ~6 q. g5 B4 u! TMDA GLOSSARY, VER. 4.0 C ; B; j; M- B3 f# K" P59 : ~& X4 F P' h- A) [, GConfiguration 8 {9 g; ~& W' oAudit6 h. G2 @( D# M* e1 z; G% ]/ V! t One of the Configuration Management tasks which includes a functional; [) r$ a% H) h+ {2 ?) @3 b configuration audit (FCA) to validate that the development of a configuration item 2 x7 a* A; F+ G2 m1 l5 C" c/ Xhas been completed satisfactorily and that the configuration item has achieved6 B. s* g% n, u7 U% h to specified performance and functional characteristics, and also includes a2 E& W/ c" v/ f( y physical configuration audit (PCA) to verify that the configuration item “As Built” ' r: J# X1 d+ Z8 x! Aconforms to the technical documentation which defines the configuration item. 0 c3 ? p! a" h( Y* |! b/ k3 xConfiguration3 ^* o9 V" ?* G3 L A6 { Baseline 3 E7 \) n+ g2 g) w7 r, e$ iThe configuration documentation formally designated by the Government at a$ D3 ~* a& T+ C& W2 ?! ^" x specific time during a system’s or configuration item’s life cycle. Configuration8 [9 ^0 \% z! V7 O/ w9 @& w baselines, plus approved changes from those baselines, constitute the current . P" s! A* d% d; lconfiguration baselines, namely the functional, allocated, and product baselines." o: S# [" ~8 k3 [; k% c& s Configuration0 @& V) O; [# \- X Z+ T3 \ Control 0 K* A) ]0 V5 f6 W$ OOne of the Configuration Management tasks that involves the systematic 2 S' ^/ M Q& |0 h( W. c. c* Kevaluation, coordination, approval, or disapproval of proposed changes to the + v: J2 j$ M+ Gdesign and construction of a configuration item whose configuration has been: x4 a8 B: M0 g formally approved. 6 ]* G' }7 S7 W0 c, l: }# N/ F2 KConfiguration1 j8 N0 G# ?* K: ?/ G Identification: g O7 r* h" r% I) d: {3 n One of the Configuration Management tasks, which require that for every2 u$ d6 Z# k* y: c) K change that is made to an Automated Data processing (ADP) system, the design! V# q8 g& @; [9 B and requirements of the changed version of the system should be identified.* I5 F9 _$ p) v, P5 K Configuration3 @ D4 a3 R+ r, d3 ]& Z Item (CI) 5 ~% y$ ~3 U- {1 I( KAn aggregation of system elements that satisfies an end use function and is8 d2 a2 {! `+ A P, ~ designated by the Government for separate configuration management.9 Q/ j( U4 h8 M1 ?0 o* ]) T& v Configuration items vary widely in complexity, size, and type. Any item required 7 j6 M! Z u8 G$ F! v, [! ^for logistic support and designated for separate procurement is a configuration! a% R8 ]$ n9 x3 m1 H item. Configuration items are traceable to the work breakdown structure (WBS). 9 d6 Q2 @% |3 ^; b9 GConfiguration ; k/ T8 t( q1 YManagement+ D. q. p% G3 ^$ z S (CM) ) s; m+ [0 [( g% x2 R) P) t jIn computer modeling and simulation, a discipline applying technical and 8 U5 J6 @7 J: t- d5 T* Jadministrative oversight and control to identify and document the functional& b, P5 ]* z1 ^$ v( | requirements and capabilities of a model or simulation and its supporting% C' j( U& A' Z- t& t databases, control changes to those capabilities, and document and report the % y$ s* S: [9 b! k0 ^+ ]changes. See also Accreditation.1 g" y( i) t* K; [ CONOPS Concept of Operations. : m/ v& r% T0 E' ?! XCONPLAN Concept Plan: F0 b& `5 c' ~ CONS Contracting Squadron. 0 J% z# B7 e9 b3 iConsolidated ' H F0 v' r: X) C9 b0 }Command Center & ^5 C/ P0 |9 |(CCC) 9 c8 }7 p* C( J VA single command center from which USCINCSPACE/CINCNORAD can direct all! x. K: {& s' Y4 @- B4 d his assigned missions, to include BMD. (USSPACECOM) Located in Colorado B: D3 }2 l# z l4 ?' l6 v Springs, CO. ' A9 X/ l+ o3 _- D9 c& y, Z( QConsolidated 4 I" H( P1 f( z+ l% F: y0 zIntelligence 3 Z- @" }% e+ V. P$ v* {Watch (CIW) 0 j" K7 [+ x1 b1 q. a q2 lA consolidation of intelligence watch functions within the Intelligence Operations 0 U6 d+ m! G+ ?Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD; Y4 B5 H) x8 g. w2 `: S Aerospace Defense Intelligence Center (ADIC), and the Air Force Space5 ]6 {! c+ P5 `' V- u Command Space Intelligence Element (SIE). 4 K& g' [: g0 d' Z bConsolidated 1 {/ o, e/ k( }, dSpace: k9 m6 M0 g9 m: u* G Operations; p; W6 K+ t+ E5 n0 O x Center (CSOC)+ i8 ]3 J8 D' |; q+ v Series of centers at Falcon AFB, CO, which operationally control and maintain # J$ k _: ], ?3 H% v8 U- vassigned DoD satellites.! y+ q# d; F1 _# F! p Consolidated5 [6 H; i3 T0 d1 N0 w9 [" C Space Test$ C8 X3 m/ Q2 j% u. G0 p Center (CSTC) X! p7 R) a3 c* cSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and # g( A0 g6 {! rinitial on-orbit checkout of operational satellites, operate R&D satellites, and " ]1 m9 b U" e6 [5 v2 ^3 X, Wserves as a backup to CSOC for operational DoD satellites. # v# x* ]: V6 Y3 W. H2 `/ D h) `MDA GLOSSARY, VER. 4.0 C * O) _) F) q; Q3 S604 R- c0 T' Y" [0 {) J: D: c Constellation : p8 \& _" e7 HSize (CSIZE)0 u. I9 o2 i+ o! H, H The number of satellites of a particular system placed in orbit about the earth.& @! n" t5 H5 @* V. v/ F% ~/ h8 ^' D K Contact Fuse Device used to detonate warhead on physical contact with another object.$ G' i- y$ K+ c6 E/ n' e. y. b5 _ Contingency " t0 _7 w( O0 A- R' T; ADeployment Plan; F6 X2 o. j3 T, j; ~4 ]+ Z3 _. ? (CDP)( V% R, {9 @- R: T3 B; R5 B9 `! Q An executable plan designed to deploy an early missile defense capability and, U l1 z! R% T; Z4 G2 | reduce deployment time. The plan provides specific executable deployment/ z. V9 C4 u' Q8 u5 M& K1 N* \ options and describes activities required before and after a deployment decision.) |9 T( D$ A7 O2 J' m The plan also allows decision makers to have oversight on technical progress, . Y2 u8 N" J" s' N0 Acost, schedule, and risks associated with a deployment system./ g; F( V7 ]3 N6 p, _ Continuity of& t5 W0 y a( x Command( V5 a( H0 X$ q/ y8 z" v) V The degree or state of being continuous in the exercise of the authority vested 1 P/ W( W( R8 v& r2 Z4 ~- Oin an individual of the armed forces for the direction, coordination, and control of ' J7 ? E( @/ smilitary forces./ T3 u3 s- O. L# a2 b" J1 M; O Continuity of" e% l, ^5 H) Y4 c0 T# A Operations 9 t( V! ^) R4 N [! KThe degree or state of being continuous in the conduct of functions, tasks, or2 D' e% _% S/ m! C/ ] duties necessary to accomplish a military action or mission in carrying out the+ @4 }& N5 O6 `$ u- S, m! a V# M national military strategy. It includes the functions and duties of the commander, ! r/ g: n2 w+ H; xas well as the supporting functions and duties performed by the staff and others! |9 h6 K x+ H! j; H* p+ m5 `$ z2 T acting under the authority and direction of the commander. 7 {# H+ C: Y4 k7 a& x9 o. M' BContract . _0 P4 u F$ C5 SAdministration" K2 z, ~" Q" V- t* f" T7 M* T( l Office (CAO) . h( W0 Q8 k$ y4 n$ JThe activity identified in the DoD Directory of Contract Administration Services 3 p; ?2 W# k9 |( j2 S+ O$ l! z4 K# MComponents assigned to perform contract administration responsibilities. It is a) I# o! u, w. }6 l6 D general term and includes Defense Contract Management Regions (DCMRs),9 m* g/ x$ J d3 M Defense Contract Management Area Operations (DCMAOs), and Defense Plant" A( U+ U* R! v5 T" k Representative Offices (DPROs). (Defense Systems Management College4 X" S) y y( j3 g4 b$ m Glossary)2 N. U( d4 q. t8 x' d( } Contract Data # h7 _9 ^( s& p R8 w6 V* a9 x- fRequirements ' I8 S8 u7 A, F1 S6 T$ e7 oList (CDRL) 6 F+ w* Q- Z9 O- _: ^7 B: s- jDocument used to order (“buy”) and require delivery of data. Tells contractor8 O! c( w, o; o* } what data to deliver, when and how it will be accepted, where to look for+ i( \5 e) x* c) W5 ?3 ?1 s' i& n+ b# d" e instructions, etc.0 C* f U. g5 l! | Contract- S: t3 A5 Q) |# z8 ~ Definition ( Y* j O3 a$ S; Q% GA funded effort, normally by two or more competing contractors, to establish , v3 d# ^. m) u! lspecifications, to select technical approaches, to identify high-risk areas, and to. J" |, R# W# F- Z$ } make cost and production time estimates for developing large weapons systems. 7 T* U5 A" K4 W. W* G5 m iContract Work ' z3 r+ |/ A+ I8 g' Q9 }$ OBreakdown. C* \! Y+ q7 b0 B( K2 p Structure . a( K; x& y- ?% ?# o& W3 HThe complete WBS for a contract developed and used by a contractor within the 4 T8 v( d% \8 \0 lguidelines of MIL-STD 881A, and in accordance with the contract statement of 8 g3 ^6 o; N) r5 [2 x2 o$ pwork.8 S/ D! U* m) w0 e% ^ M D Contracting / ~+ }! x s# I( J6 J5 t( G7 e a+ I4 _Officer (CO)$ Y6 h- n6 r/ u* y A person with the authority to enter into, administer, or terminate contracts and- l, o G$ ]5 h) E2 i0 u4 } make related determinations and findings. The term includes any authorized ' X+ x2 H s j/ Lrepresentatives of the CO acting within the limits of their authority. A CO whose , G( O, l& X. v( b" lprimary responsibility is to administer contracts is an Administrative Contracting 9 N2 |5 Y% v- x( X/ f/ z" w. xOfficer. One whose primary responsibility is to terminate contracts and/or settle ! y0 X5 d4 z. N- uterminated contracts is a Termination Contracting Officer. A single contracting ' a6 u* z; d) Q. Mofficer may be responsible for duties in any or all of these areas. % d' ^) B9 K& j7 B0 YControl Authority that may be less than full command exercised by a commander over 9 |7 J; b# t+ T# }part of the activities of subordinate or other organizations.) _+ p9 S6 x) E$ O Control: G( P% y: w g5 D- w# U# [ Abstraction3 a( H9 E7 V% [0 z4 d7 h (Software) The process of extracting the essential characteristics of control by# E2 I! w$ n: l5 h" [ defining abstract mechanisms and their associated characteristics while ; R/ S: G1 z7 |4 Qdisregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C9 H* s( U! g0 e. S6 O- c 61 $ X; J; ^% n, ^/ d7 d6 a3 NControl and" ~1 h/ y" e" N0 ` Reporting Center( a" [6 g3 u2 i& @( K) m1 f5 W An element of the US Air Force tactical air control system, subordinate to the* d& D5 }1 p2 b0 B: r2 _$ J tactical air control center, from which radar control and warning operations are - p' E! s; M1 R/ c, |, tconducted within its area of responsibility. $ Q# [- g! @; kControl and + x, p# b% y2 |+ WReporting Post/ p% h: Q4 G" k5 U2 ` An element of the US Air Force tactical air control system, subordinate to the" f$ L4 |( }( u control and reporting center, that provides radar control and surveillance within . D. V0 k4 b* k3 J( G. {) iits area of responsibility.$ s# d2 g- C2 ^+ C3 | Control Area A controlled airspace extending upwards from a specified limit above the Earth.* R5 o( W! l+ Y' A, c Controlled : b1 G. c5 T$ z3 B5 Q9 G0 V+ f2 V+ @Environment - N5 P: V. r9 h: Z) c2 vArea where entry into the radiation hazard area is controlled.! { ?+ _. Q2 s/ n, k, R! H( v Control2 z3 H2 S9 m$ ~6 y2 a Procedure. S" x5 I: e- P; P8 N* G The means used to control the orderly communication of information between1 s" u4 u$ F3 W W+ B3 _4 ^) j6 c stations on a data link. Also called line discipline. $ m7 M/ I1 F. | Y9 X" ~; c/ S7 g! X0 zControl Station The station on a network, which supervises the network control procedures such5 v6 _7 c1 a# i/ K as polling, selecting, and recovery. It also is responsible for establishing order & n7 s/ j/ ?/ A" ~. N! Aon the line in the event of contention, or any other abnormal situation, arising. r) L0 f1 p) k9 P6 x6 {: _ between any stations on the network. ( m8 u) B1 e6 x$ U9 S( O( {Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to ) n9 |% n6 ~2 X: B# t& Fprocess sensitive defense information and that is under sufficient physical and % R$ V2 P& Y! e( I5 Y/ a, G8 K2 ftechnical control to preclude an unauthorized entry or compromise. ' L' m" [3 V4 Y, W2 |0 HCONUS Continental United States.- n3 J8 H* m. S9 |# q9 F. { Conventional Co- 6 O9 }( T# b/ |( o! h+ E! oProduction9 m) [- s6 L. A4 N7 b An effort between governments to produce the same end item, or components8 A/ T! W: e) V0 u9 s- k5 O of the same end item, in concert.$ D: ~( A4 g( _, [6 U) r) ~- C1 }8 k Conventional, s, r% `* \( @; I Weapon , b! r' y4 a) }9 F: q, v! EA weapon that is neither nuclear, biological, nor chemical.6 t# E3 T( F/ J6 o; \6 V7 B Coop Cooperative; H6 U' e+ U6 N Coordinated ; K' P z1 b$ P- G! P0 wEngagement- f. s9 n) y& [2 R% i8 d8 \% k; [ Planning/Actions ! ?% f5 {, E) P" s& B3 uNecessary coordination among engagement components to ensure maximum$ C: j. ^2 g: O! u effectiveness of the SDS and resources are not wasted on targets already . j$ Q& F- `3 r* u6 Ftargeted. ; s& e' x" l% s% @6 rCoordinating, G( u. {9 q/ L7 m! B: R0 g Authority + p: `: T4 p8 R) F6 H0 zA commander or individual assigned responsibility for coordinating specific / s) l' V# `: T9 T4 Bfunctions of activities involving forces of two or more Services or two or more9 Y# y9 G6 f. U# Z/ O' m5 `1 E; l forces of the same Service. The commander or individual has the authority to , |. Q4 F8 Q: J' ~) W4 x; Qrequire consultation between the agencies involved, but does not have the7 d/ b4 y5 X/ t6 M) d: t authority to compel agreement. In the event that essential agreement cannot be 3 j: l. \3 U6 t4 ]8 xreached, the matter shall be referred to the appointing authority. / O5 |, B* |: |% VCOP Committee of Principals& Q& C* `0 M m0 x COR Contracting Officer’s Representative. Contracting Officer.9 L% e& s4 q1 o g" Z' @ CORBA Common Object Request Broker Architecture. 1 `* c R* f% K7 P; R [CORM Commission on Roles and Missions. % ^! H9 s8 }2 yMDA GLOSSARY, VER. 4.0 C: r+ D* D. ~5 ]3 D/ G0 g 62 % b( G0 S3 [+ s( lCorner Reflector (1) A device, normally consisting of three metallic surfaces or screens9 b- f, k% a. X1 a4 A. I+ @( j, H; J perpendicular to one another, designed to act as a radar target or 1 h& e2 B' R5 n, v' J+ ?marker. % I1 a# _4 ~5 E( g3 k" R4 c) g(2) In radar interpretation, an object that, by means of multiple reflections + |- _: s2 Q$ jfrom smooth surfaces, produces a radar return of greater magnitude than* v8 U6 U1 R+ r, G might be expected from the physical size of the object. + O5 A% `, [( c: t* o/ h& GCorps SAM OBSOLETE. See Medium Extended Air Defense System. ! ?: R% z$ K! L1 m+ T/ u# Y: RCorrelation (1) The process of relating observations or tracks from one set of data to , E- Z# {2 z) o) d3 V, Oobservations or tracks from another set of data, i.e., collecting data from + y6 t; K8 ]' [) Fdifferent frames or sensors that presumably relate to the same target. (2)8 I( G( }- U& a: ~) L In air defense, the determination that an aircraft appearing on a: h7 \ M; f( T1 z6 F. s) Q7 a radarscope, on a plotting board, or visual is the same as that on which. O0 [% r3 ^6 y9 B8 D {4 q" T information is being received form another source. (3) In intelligence ! {* o! D3 m) d8 d3 r, o4 Lusage, the process which associates and combines data on a single; z" ~; f' a; o; k9 c entity or subject from independent observations, in order to improve the ! e+ {" w! u. j: O8 ?5 i9 breliability or credibility or the information.; e/ u3 _% p: n COSEMS Evolving architecture operations support tool.% W' u" M1 F' ~ COSM Computer System Operator’s Manual1 d4 i; o3 H) \" |: e8 Y# ~! J COSMIC NATO security category.* ], A- @- Z. n3 n8 L. _. X% ` Cost Analysis9 g! g% Y" \- c& e! [7 E Improvement; H& @) R( o! C7 \6 r3 e; T( a Group (CAIG) 3 f5 X9 }3 x- s0 X4 @ qAn organization within the office of OSD Director, PA&E which advises the DAB6 s# o l) Q5 I, P) i on all matters concerning the estimation, review, and presentation of cost4 ]- F* N* a5 @% [2 z- S) P, T analysis of future weapon systems. The CAIG also develops common cost; J! O4 D: I3 C* t- d estimating procedures for DoD.6 _* e% _0 Y1 R" x) E5 U Cost Analysis) u$ G0 I: ?1 H/ @ Requirements 6 E1 ~1 K1 M ^& [Document 1 g6 F& {. _1 i; z) c(CARD)% Z' B2 K* F3 M Y p0 @+ q The document describing the technical baseline, which is a subset of current' `$ H v$ u+ C4 B( ?3 p% h system technical data and is used to generate the baseline cost estimate for an , b7 O+ M- i. W3 l, k" hSDS element. It includes, but is not limited to, the element description,$ s w( ~5 T @+ H- |8 d interfaces, operational concept quantity requirements, manpower requirements, % R) i0 ~6 G0 a2 Iactivity rates, schedules, research and development-phasing plan, and facilities $ Q( [3 n. J! V. U' xrequirements. / M- J0 x# ?6 {Cost and 9 i: `0 O6 s/ E) l {- @! kOperational S' [% _4 B0 g6 wEffectiveness ' b+ t& L- ?' ]/ l: @) CAnalysis (COEA) H4 G+ X( o- P: U! v6 }3 B An analysis of the estimated costs and operational effectiveness of alternative : X% I( ?$ P- G2 y7 O- r Tmateriel systems to meet a mission need, and the associated program for1 T: D1 @% D0 S. Q$ j; c9 b5 \; C D acquiring each alternative., M5 M5 o# `" q0 `# k& l/ a Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk * F& y) X7 v; [due to cost estimating errors and the statistical uncertainty in the estimate. 3 t. k* ^9 c9 Y* S0 qSchedule/technical risk is risk due to inability to conquer the problems posed by 0 o% ~/ t3 M7 L% _( L& Ithe intended design * e) m8 a$ j8 @8 H4 X* D5 HCOTR Contracting Officer’s Technical Representative. See Contracting Officer.% C. ]/ F P' B COTS Commercial Off-The-Shelf.# f2 g% g0 |/ o p8 W `" ^ Counterair A US Air Force term for air operations conducted to attain and maintain a desired . I4 j0 E. Y/ o- I: C1 ddegree of air superiority by the destruction or neutralization or enemy forces.9 p! j; t9 k2 i1 Y( M Both air offensive and air defensive actions are involved. The former range K" E h/ @. ^- n4 h throughout enemy territory and are generally conducted at the initiative of ( t# _- K* E/ Y3 Afriendly forces. The latter are conducted near or over friendly territory and are; U! ]2 \6 Z& q( S0 {0 A; [* ` generally reactive to the initiative of the enemy air forces. : V6 m2 ^1 U6 r3 g! L' h, p* X$ wMDA GLOSSARY, VER. 4.0 C% j4 Y/ Q$ i# j( X3 @2 }% K 63 5 x9 {, g" o5 R' YCountercountermeasures+ ?2 r5 z; D2 K9 z7 r (CCM) 2 k* O0 o. K! r" w6 W. ]2 F' fMeasures taken by the defense to defeat offensive countermeasures.& z1 g# {8 B$ ~9 t, a Counterforce The employment of strategic air and missile forces in an effort to destroy, or! }* _6 f- j2 @0 F5 D7 C render impotent, selected military capabilities of an enemy force under any of the. R+ \4 i) ?/ x2 d" B( S circumstances by which hostilities may be initiated. # @9 y4 @* f& Z& o- KCountermeasure A design or procedural measure taken against covert or overt attacks., d! f; ]4 ~% R, o) Y9 X% I2 D Countermeasure 2 f/ R/ W C' L# w- D! ls (CM) 3 H1 x$ o: ? B8 I8 rThat form of military science that by the employment of devices and/or# T9 L) Y: x1 B techniques has as its objective the impairment of the operational effectiveness of 4 y" ^& ~: b/ p! K" n! I1 c* Denemy activity.5 A9 @5 ~9 R q a Countermeasure- x* K1 L/ Z9 C" @8 a. G0 m7 U s Rejection 6 ]2 A7 r' \9 i. Q* G. _(Surveillance)6 C6 b( i' N% m O% G" X1 A Improvement or rejection of an object signal in the presence of / ~) U1 L/ t4 q8 c7 }9 z$ lcountermeasures. ) Y* k/ A$ l% V7 c; M7 I# iCourse of Action x1 ?, C% C& L I' e1 ]" M5 C (COA) + E. C* d/ c) c3 \5 q9 j3 B(1) Any sequence of acts that an individual or unit may follow. (2) A possible( p9 @9 q6 A$ L plan open to an individual or command that would accomplish or is: w( K/ _! _/ j. \- |- O related to the accomplishment of his mission. (3) The scheme adopted. U) [2 j$ X/ u* s8 p2 Y# u to accomplish a job or mission. (4) A line of conduct in an engagement.. w5 H; ^6 }) J; W0 ~- S (5) A plan to accomplish a mission. It describes the execution concept 4 I- ~" _+ w; D- J9 i& ^for BMD of North America. It will specify the engagement priorities, ' p# D2 n- a. L3 vresource allocation and desired results by Area of Operation (AO).' p/ u! t1 n% M. G7 {7 ~ (USSPACECOM) (6) The scheme adopted to accomplish a task or 9 V5 V* `9 B% w% ?' |' _mission. It is a product of the Joint Operation Planning and Execution 0 v) C+ u5 Q2 Z8 J- R/ cSystem concept development phase. The supported commander will 7 D+ S( |# `8 j% v! I3 einclude a recommended course of action in the commander’s estimate." b6 T; i$ Y: L+ @7 Y* a B The recommended course of action will include the concept of! _7 J) H- \2 Q! i% t, B! U9 g operations, evaluation of supportability estimates of supporting1 R- I6 B" L9 E, G! l/ ^ organizations, and an integrated time-phased data base of combat, % V* k8 ~ M, {4 s, G% @combat support, and combat service support forces and sustainment.5 o; J! |1 b' c7 G Refinement of this database will be contingent on the time available for 1 `( ]& O# M2 R# g" b# lcourse of action development. When approved, the course of action S: @4 d; y6 c. o: F* d+ @ becomes the basis for the development of an operation plan or : `% m' l) O0 }# v9 ?operation order. 4 R( @5 n' U$ \$ B2 _8 i ~Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, 3 `! t3 c7 A; p ^and other geographical presentation systems. (2) Cover or protection, as 7 R4 T" r) B9 X% Ithe coverage of troops by supporting fire. (3) The extent to which/ x! i& d" F# `" s1 G$ ?/ d" K) L' `, `6 x intelligence information is available in respect to any specified area of ) k& G0 q( r6 x0 d) F" u4 `. p/ kinterest. (4) The summation of the geographical areas and volumes of' f. R5 N: A! J aerospace under surveillance.4 r7 O H) X* A( S; S5 z Covert Timing8 B' ?3 I4 C. N @) A9 b# H; b X Channel * r2 |8 {# T1 WA covert channel in which one process signals information to another by& c6 F; B4 ]* f9 ? modulating its own use of system resources in such a way that this manipulation1 S4 J5 P! M/ } affects the real response time observed by the second process.' T2 P9 r$ a: |& E& e! v% E CP Command Post. " ~- l( i8 f/ L2 w2 {5 n+ t# J0 L, VCPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. $ p: c1 s: I5 R4 Z: m# H# sCPAF Cost Plus Award Fee.# F; c: p6 m- P; _# `3 F' j8 l CPAM Chief of Naval Operations Program Assessment Memorandum (Navy) " R& P3 ? q3 b& JMDA GLOSSARY, VER. 4.0 C- v5 n {/ X' P1 J5 F5 r3 b 64) {. k. S# _$ S- u3 S9 T1 e* A. X CPAR Cost Performance Assessment Report. . e# h! c2 H3 m, q8 }CPAT Critical Process Assessment Tool( S t( K/ X+ u: Z CPB Charged Particle Beam., o4 b E& \) Z8 c/ x! u3 e4 M CPEV Communications/Processor [Network] Experimental Version. " A6 H9 K& p+ J8 ?$ d4 sCPFF Cost Plus Fixed Fee. 5 X V3 E+ h( J* H$ N# }! zCPIF Cost Plus Incentive Fee.: j* S5 w! p, ?$ p# [9 M CPIPT Cost-Performance Integrated Product (Process) Team. 8 }3 B$ K) L0 W2 J$ ECPM (1) Critical Path Method. (2) Contractor Performance Measurement.; y; a2 C$ k- @; I. b1 S# u CPP Critical Performance Parameter. 3 f$ `) D6 z% H2 K/ J* ?% s& D3 t& VCPR Cost Performance Report.! n/ ]: H2 U& O. k1 j3 q5 y) a- j CPR/NC Cost Performance Report/No Criteria (Contract management term).# u3 S- w5 O* W' Y CPS (1) Consolidated Program Summary. 5 z1 o4 e+ ]3 ~4 T(2) Competitive Prototyping Strategy. $ V. X. W: K% p! Q. J$ b(3) Current Program Status. ( Z$ \# w3 f, r7 ECPU Central Processing Unit (TelComm/Computer term).1 [- R/ z7 @% } CPX See Command Post Exercise. " N% K. `9 M; \6 Z# ?6 ` J6 ?0 tCQAE Chief/Contract Quality Assurance Evaluator. ) N3 P* J5 g" q" O- x. Y+ XCR (1) Computer Resources. (2) Continuing Resolution (US Congress term). ' \1 o8 u( G! o+ S. ]" X* CCR-UAV Close Range Unmanned Aerial Vehicle.3 e- D5 D' s. a# O, D0 S: \5 w CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement6 q! ^3 W) Z* O& M) e CRADA Cooperative Research and Development Agreement.( K8 P- z6 U+ ^% g CRAM (1) Control Random Access Memory. ! I- ~9 D8 s+ i* a m/ E; z(2) Cross-tie Random Access Memory (Computer term).1 x8 M$ M9 B$ f: w0 D CRB Configuration Review Board. + B' r6 g, P8 KCRC Control and Reporting Center. 2 Z% l' g7 s# \# A1 \CRD (1) Capstone Requirements Document. 6 w& f4 _; y2 r(2) Component Requirements Document. 2 I& ~# V5 t% N' S4 VCRDA Cooperative Research and Development Agreement. + O: @! w7 j8 d2 G3 f# ?. p( |9 M4 a% {CRG Communications Relay Groups (PATRIOT).# W$ u7 y: X1 b n; ^0 k CRI Classification, Recognition and Identification.2 `) @' y9 ]. b1 ?( b1 t/ p, ~* a) w+ m CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 4 Y- x' d6 \' P$ E8 G; J" p5 L65; h& u% ]4 H2 V Critical Design r% z, Z$ n0 n1 E/ q" c Review (CDR) ; h, m# d$ j3 XA review conducted to determine that the detailed design satisfies the' e$ f5 f% C. C* K- g7 S6 o performance and engineering requirements of the development specification; to & ^6 n _1 K5 ]3 ~6 _$ _establish the detailed design compatibility between the item and other items of: j" r, g. E' K z equipment, facilities, computer programs, and personnel; to assess producibility " J. |3 t. }$ k. y) d4 q7 b! ^3 dand risk areas; and to review the preliminary product specifications. Conducted 7 @6 V" |- d. A: Sduring Phase I, Demonstration and Validation (for prototypes) and Phase II, 4 K& ?+ x/ f7 CEngineering and Manufacturing Development.5 {% D0 @. `) R( I% x6 ^5 R Critical! p# Q( }( _. M0 t' w Q1 {+ E7 t, E Information+ X7 p4 w7 T5 x" C5 I Specific facts about friendly intentions, capabilities, and activities vitally needed/ ]8 B+ Y' a, M, ^5 x* B by adversaries for them to plan and act effectively so as to guarantee failure or 3 e6 N3 _# g6 J5 a/ a5 a; |% v2 Punacceptable consequences for friendly mission accomplishment. # M$ j; |, g6 `9 M$ Q; K$ y# rCritical: K% }/ A1 r- T Intelligence ) |. x- }: Y5 o" C3 `+ ~6 J/ _+ NParameter& H$ V0 o1 Z [4 i6 z1 T" X" e( i A threat capability or threshold established by the program, changes to which# G% G# I% \% i3 C0 s; s could critically impact on the effectiveness and survivability of the proposed 5 X, T! g% q! i2 S6 P' Z# R- Q/ Usystem. ( G1 J3 s( _) A- \Critical Issues Those aspects of a system’s capability, either operational, technical, or other,* V; h" e( f/ n; U that must be questioned before a system’s overall suitability can be known, and * |" t" ^, w) N6 V' Ywhich are of primary importance to the decision authority in reaching a decision 7 I; K% e# X' k) ^, c# Ito allow the system to advance into the next phase of design, development, . a1 [/ d6 e. T7 \. {production, or post-production.% s7 c& I2 A! a Critical ' e) m3 e/ @( JOperational + K9 b1 p0 a5 T8 TIssue 6 z8 s' {8 k* ]* |; f- c, UA key operational effectiveness or operational suitability issue that must be . E1 s( w# F6 E1 s, uexamined in operational test and evaluation to determine the system’s capability 4 X# S: |. ]; b; Q- wto perform its mission. A critical operational issue is normally phrased as a + P5 S5 a* i( w& ]% ^; |question to be answered in evaluating a system’s operational effectiveness 9 {8 w% Z* M8 {' q, F5 Kand/or operational suitability.0 h* ~ b* i1 P+ C Critical Path& y- t3 N. c7 ^3 u; d; l- i Method ( K e- b, P! ]9 jA technique that aids dependency of other activities and the time required to ' p! O' k) L2 Dcomplete. Activities, which when delayed have an impact on the total project" S3 q0 l- l/ V& m3 q schedule, are critical and are said to be on the critical path. 0 g4 [3 _6 ]/ c! J1 Z4 T; m; nCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to d& ^; Y# `2 n( v" j0 k" S the viability or the operational effectiveness of the SDS. 6 B5 U% f- o! x" K9 m, DCritical Security 9 z5 l7 J# T; t2 v3 y. c( B: KRisk 4 W2 b8 D! A& ?0 sThe existence of a security vulnerability that, if exploited by an adversary, could- `4 w5 D6 d$ M9 z8 m cause exceptionally grave damage to the viability of the BMD or the operational8 R: E% X1 d; M4 W3 Z; j% t% A, Q effectiveness of the SDS. Critical risks assume an adversary’s capability to$ `3 t) _7 H) X cause major system disruption or degradation (e.g., single point failure), ! ], d8 w/ |) W: i Idestruction of mission-critical components, or usurpation of system functions.. n$ I& b; W+ C' ~4 Q8 a0 c" l Critical ( T/ B! v! T9 i) p: s; Y5 eSupporting 1 D |: R1 p% NTechnology7 L; \: h3 O7 @2 C, G A technology that program management personnel consider a critical part of the + L$ `* {) }( s, Q5 j& z. Xprogram being described.2 T3 |/ G" U$ `# ~5 f CRLCMP Computer Resources Life-Cycle Management Plan. 5 U0 y: V& `& y- E4 e" pCRM Computer Resources Management.0 t0 U0 B4 K( e/ T/ {4 K CRMP Computer Resources Management Plan. 7 ~ ^3 K5 o7 @6 S/ n5 P3 eCRO Chemical Release Observation." C% h, B2 X9 q- X CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC ! ^2 A- w+ E' r2 q, N& iterm.)6 h9 O2 _ p- M" j MDA GLOSSARY, VER. 4.0 C ' L1 F# U' ^' n$ f6 ?66 6 Z+ l5 [* O( V+ }2 hCRS (1) Computer Resources Support. (2) Congressional Research Service. (3) 4 [" y9 {) i5 h$ r. M) G+ PContractor Reporting System. 0 o1 S# W: E6 mCRT Cathode Ray Tube. # o- x1 H5 Q" y) u1 d; t* K5 oCRWG Computer Resource Working Group.; P) v7 W0 u$ B/ E Cryocoolers Cryogenic Coolers. : _, H# {) S) q7 |1 @1 x% i& \Cryogenic Of or related to cryogens (substances which are used to obtain low% n: G/ e4 o' g- c& D6 P% q* ^ temperatures).( `: L7 |4 D @, `% W4 r* Z Crypto A designation or marking which identifies classified operational keying material, ; V2 s4 x4 h" r/ ~1 ~and which indicates that this material requires special consideration with respect $ h* r) I# h8 K4 gto access, storage and handling. " o1 Y! u. o5 p6 p' `& SCryptographic - `- [, c, m. N! [8 { WSystem3 I% c6 M9 @! O1 j1 B# a) o, o0 S. d The documents, devices, equipment, and associated techniques that are used & S9 q) r# n' q' l% n* }0 Qas a unit to provide a single means of encryption (enciphering or encoding).6 P9 p* M5 i$ g* o: y3 P Cryptology The science that deals with hidden, disguised, or encrypted communications. It6 Q" d. y: t$ `( d includes communications security and communications intelligence.# m Y; |$ `- }4 ^/ a CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. & V5 [1 b7 \+ nCS/CSS Combat Support and Combat Service Support (USAF budget term).( [' i6 D" L& B, D. { CSA Chief of Staff of the Army. 1 i7 P! E( {, Q. o* w% ~: VCSAF Chief of Staff of the Air Force. 3 z. R0 F" i$ T2 n" b; `CSC Computer Software Component.# N, [- p- \2 Y7 U6 v& ] CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE) Q2 I9 L: y% `" YCSCSC Cost/Schedule Control System Criteria.! h2 z# k2 Z# o( E% u; _3 K CSD (1) Constant Speed Drive. (2) Critical System Demonstration.: G/ S, Z" V# [6 A7 q. E9 E CSE Center for Security Evaluations (DCI).! W: |6 i! Z' X+ B W1 l$ p+ _ CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon H( i2 e! E' s4 | System, located in Cherry Hill, NJ.! i. N- F C1 T& B& x1 i CSF Consolidated Support Facility, Arlington, VA.3 O& G' Q6 b O' w$ `6 W: E CSI (1) Critical Safety Item. (2) Critical Sustainability Item. f) z9 @8 Z9 @9 [ I- C CSIP Current Systems Improvement Program.5 X! K/ Q' A6 N4 N( {) Y+ t CSIZE Constellation Size.1 j" |5 R7 {( ^& i( z) ~ CSL Computer Systems Laboratory. . N$ ^! `+ Y( k0 ~. aCSM (1) Core Support Module (*C2E term). (2) Communications Support Model. 7 s+ [3 z. ?6 F4 xCSNI Communications Shared Network Interface (NATO term). 3 e% ^1 C# X: K; d! |MDA GLOSSARY, VER. 4.0 C : A8 t' S2 @* y$ l678 L: e' d8 W; p, E: {0 ]8 | CSO Closely Spaced Objects. 5 I* W/ I5 X4 \CSOC See Consolidated Space Operations Center. & _6 q8 d+ c' X: ]1 r# ICSOM Computer System Operator’s Manual 7 x; a0 C! ]7 |1 h0 BCSOSS Combat System Operational System Sequencing 7 f+ A3 R- T+ ` y4 K& \7 vCSP Communications Support Processor (numerous locations, including USAF Air ; U3 r# Y. Z3 q6 cDevelopment Center, Rome, NY term). , B2 J# f1 j; Z& D, i# g1 ?CSRD Computer System Requirements Document., p+ ~$ t N7 Q& I0 w2 K CSS (1) Cooperating Space System. (2) Communications System Segment. (3) 8 d; U+ I# b( ` rContractor Support Services. (4) Common Sharing System. (5) Communications - b( g# ?& ?) Y7 W( K8 V: H( RSupport System (Navy term). (6) Common Support System. (7) Combat Service- c+ V. | V& c% N Support. ( i9 v0 A+ Z1 q9 |; A- ?. d* l: ?CSSCS Combat Service Support Control System (USA term).6 v2 _6 W/ T6 [/ s" O CSSPAB Computer System Security and Privacy Advisory Board.2 W; H4 i1 S% G0 X! Y! c CSSO Computer Systems Security Officer. * |) q2 H/ I5 a5 RCSSTSS Combat Service Support Training Simulation System (US Army term). ' @3 F1 n- v" O3 b2 n9 ?) }CSTC Consolidated Space Test Center. . |# D: \: U. @- A: HCSTI Civil Space Technology Initiative. 2 B4 l5 f% c, l' S8 n$ I+ \: I( `CSU (1) Computer Software Unit. (2) Communications System Utilization.' e ~; P' H7 d4 Z* e% U# [ CSUR Communications System Utilization Report.5 l! w, z1 y4 t h* |$ j" d% J CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. * U+ R8 \0 f4 a. H(4) Cryptologic Technician (Navy occupation specialty). & P% ]/ ]5 C& _, b. mCTACS Contingency Theater Air Control System (JFACC term).) s1 ]+ g `+ s! ?) W, J* c- C, S CTAPS Contingency Theater Automated Planning System (USAF). 5 Q7 Y5 E! K/ qCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]." e$ _7 v9 u7 V# k CTBM Conventionally-0armed TBM.8 Y9 m4 C. I! Y1 l( E9 `5 }- T( P CTC Combat Training Center, Ft. Leavenworth, KS. - q0 f4 Z7 [ T" S/ d+ d. yCTCC Critical Technology Coordinating Committee.4 t* g- J* J5 V( V4 \2 v0 T% m CTD Communications Test Driver.; S. b* U# w0 R, d# \3 T CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment.; f( S, T! g, T: K5 I, V% f2 Z CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally $ K) u1 l3 t" A0 Z4 `3 P7 vfunding selected test investments proposed by the Services and Defense& ]+ `' b; {$ e) Y2 q9 p" t( y Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C 5 w, e0 j: c y9 ] s8 n. `687 Z% }; A N& i5 P' D Z3 p3 j CTF Controlled Test Flights.) Y3 B0 x S3 q/ r1 v" I/ S CTI Concept Technology Insertion.' \$ S& M- B0 _; f: Y, t CTN CALS Test Network. 9 `7 N( `9 V" G6 tCTOC Corps Tactical Operations Center. 9 t) P& s. |$ N* ]! n& Z( \3 _4 JCTOL Conventional Takeoff/Landing aircraft. / q9 q; l; G; ^ V8 `$ @CTP (1) Critical Technical Parameters.+ F9 _4 c O% Z+ a (2) Communication Tasking Plan. % H( e* k, N! T' K(3) Consolidated Targets Program.6 P/ Y5 q8 p. A w CTPE Central Tactical Processing Element., a8 C$ N5 B" _% d( H CTPP Consolidated Targets Program Plan. ( Y; X1 ^( g6 iCTR Cooperative Threat Reduction (Treaty negotiation term). , ^7 l' x0 ~. c! [CTRS Centers/ F; e1 c, G/ {7 P CTS (1) Clear To Send (TelComm/Computer term).7 x; a, x/ ^$ W% Y (2) Contact Test Set (USA IFTE term)./ p7 z) m* Z- ` CTSS Computer and Telecommunications Staff. 6 d0 T( P8 C1 Z- ~4 [/ XCTT Commander’s Tactical Terminal (US Army).2 M2 Z: a3 Q$ M CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). ; Z* B, [. H7 kCTV Control Test Vehicle(s). 6 ~7 y5 [- u( Z* o9 lCUDIXS Common User Digital Information Exchange System.4 T3 A. ~) v/ C: x# T% A1 J Cued Operation The directing of one sensor based upon the data received from another sensor. $ l4 p2 ?, @$ t' l4 eCueing Command The command within a tactic, which specifies the sensor element’s coverage 0 L7 H+ x; u0 I; g2 ~2 ]volume. # {8 ]- N2 l6 I) h9 o1 zCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage ; z& l. x5 E' E& H# R+ [volume. 1 @0 g. x- O2 i/ m7 P- ]CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. - v8 `) X9 g# h- c( z; C5 jCV/BM Carrier Vehicle/Battle Management.% e4 K/ x9 u1 D: ^6 N9 X5 _ CVBG USN aircraft carrier battle group., f7 f4 g2 a0 ?& z7 |0 q( j& L CVHG Carrier, Aircraft (V/STOL), Guided missile./ ?" K2 J' X1 u( O2 z$ w- c1 H9 z CVISC Combat Visual Information Support Center.# g7 l' w" C& a CVL Copper Vapor Lasers. 7 K2 `" M% w$ V# s, _CVN USN nuclear powered aircraft carrier.- |% `2 N# j# C( H1 O% U2 E! l MDA GLOSSARY, VER. 4.0 C3 }3 T1 ?3 {: E 69 7 c0 }7 o: ?; v; k" s( n$ \CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave.# z# l8 I/ W# l/ ^! _7 Q+ C3 p% u CWAR Continuous Wave Acquisition Cycle (Hawk). & f; `* R* ]& U! lCWBS Contract Work Breakdown Structure.' G) r0 u6 u1 Q ~: ~: L CWDD Continuous Wave Deuterium Demonstrator. 9 Z6 g! [6 y8 g) ?1 y0 tCWIPT Cost Working group integrated Product Team. 7 n( a& f( [; L# v& q0 pCY Calendar Year. , U7 z, B5 O! W" u, QMDA GLOSSARY, VER. 4.0 D 4 ~$ P# I: l* i( M71 [7 q y+ \& B7 w: V7 lD Deuterium 4 `' V; T# A. q0 M: GD Spec Process specification. 4 c) |* T* p9 j3 C- K# e2 @D Star Measure of infrared sensor sensitivity. ' i- F: o1 A0 SD&D Design and Development: [* {3 d* n; R; O9 E D&T Detection and Tracking. # v) { W8 v2 ^* F% \- C, Z: `: lD-IFOG Depolarized-Interferometric Fiber Optic Gyro. 5 i7 _9 p. ]- H! R8 V! xD-Level Depot Level (ILS term). ' c# J; M% p$ U2 ^D/A Digital-to-Analog 6 Y/ o0 t/ I# T' w4 lD/V Demonstration and Validation. ' @: A' T5 W) P+ nD2 Projective (interceptor) in the Hyper-Velocity Gun program. % _! ?4 U6 \- B2 B, qDA (1) Department of the Army. [5 T. e+ i4 n; h, q7 n- a(2) Department of Administration. * t0 L: s+ B; l& j8 Z1 J$ l(3) Decision Analysis.7 u- J6 m9 g7 a7 t8 i& o, o, K (4) Developing Agency/Activity. 2 K9 [ Y. A' h; d(5) Data Administrator.; E, t; L& P( T6 w, j* F3 Z# h- J6 v6 X (6) Direct Action.0 m- [6 L. g- \% p2 D' v (7) Data Adapter.) L& J0 D7 o, G' G DAA Designated Approval Authority (DD 5000 term). 3 f2 T. D' D2 k1 n+ HDAASAT Direct Ascent Anti-Satellite.' l: z2 A* k- L6 H* x+ v! s DAB See Defense Acquisition Board. 0 j& N @2 C/ v- L5 G9 Y) V. vDAC (1) Days After Contract [Award]. ! M3 N# O+ I# d) e: I(2) Department of the Army Civilian." S. R3 K& B/ q% ?' s) n (3) Directed Attack Characterization./ ]7 \6 Z4 q/ `' A% g (4) Deploy ACCS Component.! J3 a1 Y9 h' _; \ (5) Digital-to-Analog Converter.) w6 e# y4 l* W7 [) {4 Z DACS Divert and Attitude Control System.7 g2 F7 J+ M# i/ a6 E% G' L4 n% s5 Z DAD Defense Acquisition Deskbook. ' a* T" e n4 g6 w/ g- b3 ZDADS Distributed Air Defense Study (1993). 7 a" T0 A9 s8 v3 _; e5 N/ ^: xDAE Defense Acquisition Executive. ( |% H" l9 {/ i5 MDAES Defense Acquisition Executive Summary.6 A# w# n4 t. X, Q( P DAGGR Depressed Altitude Guided Gun Round. 7 V6 B4 f; K0 s5 SDAHQ Department of the Army Headquarters.5 O8 ^' X% }3 q: t DAI Damage Assessment Indicator (targets).( V% j$ ^" a; c8 ^$ Q& ? DAL Defended Asset List. $ W. Q) o' V! n& ^) ]. E% QMDA GLOSSARY, VER. 4.0 D 2 P7 ]# u+ o3 a2 @72, ]1 ?; b' I# D DAMA Demand Assigned Multiple Access. . x- i. N& v. Z# O* X1 ?DANASAT Direct Ascent Nuclear Anti-Satellite. 8 o- ^( E5 _7 RDAPR Director’s Annual Program Review (SDIO term)- X1 K2 \) o$ m) p6 U DARO Defense Aeronautical Reconnaissance Office (OSD). 5 c: o! x: `1 k8 z( HDARP Defense Aeronautical Reconnaissance Program.: a) T5 w+ |4 H+ a DARPA Defense Advanced Research Projects Agency. See ARPA.1 x- R6 I [ M/ a' p DART OBSOLETE. Defense Acquisition Review Team.* Q( O) p2 _# c! t3 N( Q { DASA German Aerospace. Member of the MEADS Program Team. ) Z7 k( o: ^7 g2 w( c% z+ x e0 K! ?DASC Deep Air Support Center (JFACC term).7 Z; l" a- x: u3 b$ \( \ DASD OBSOLETE. Deputy Assistant Secretary of Defense. 6 B- m" i% C! x, v/ x: s: gDASD (C3) Deputy/Assistant Secretary of Defense (C3)* [# f1 j6 M2 f DASO Demonstration and Shakedown Operation. ( ]0 t. r9 t# m- vData Integrity The state that exists when computerized data is the same as that in the source1 d' o7 ^& a1 B2 F documents and has not been exposed to accidental or malicious alteration or. S( x6 L9 x, q! @6 C% T destruction. + G% z5 X2 [. p8 _Datalink (1) The means of connecting one location to another for the purpose of $ k/ |+ p' w$ n3 N- \transmitting and receiving data. % `, m' Y# v+ ]( z6 Y(2) A particular path between two nodes over which data is transmitted. It% O6 s& F; c+ b/ u4 k* U includes not only the transmission medium, but also digital to analog7 l% }3 r6 ?& H- f/ y4 r4 t converters, modems, transmission equipment, antennas, etc., associated & s: k! P, X5 E; l: lwith this path. In the SDS backbone network, it was a path between two ' g7 v& n- @1 X, @& GSDS elements. In space these datalinks were microwave or laser. On# E2 Q: V8 t7 R k+ x1 x$ Q the ground, they could have been wire line, microwave, or optical fiber. o* ?" `2 B) i% S9 | GDAU Defense Acquisition University, Ft. Belvoir, VA.- F- g5 L: v* V7 s) Q DAVID Development of Advanced Very long wavelength Infrared Detector (USAF * Q2 |& W) A7 v1 g& k2 IPhillips Lab term). 0 K6 K# Q4 R- L6 wDAWS Defense Automated Warning System.+ B2 e5 c9 l( s t Dazzling The temporary blinding of a sensor by overloading it with an intense signal of# b6 [' {. l7 P+ {' a* a. ] electromagnetic radiation (e.g., from a laser or a nuclear explosion). : V+ P! L+ f5 FDB Bata Base, s& y( |7 ?5 C) A: Q DBME Database Management Environment (Computer term). * g7 j- I) f8 p4 T3 m. dDBMS Database Management System.; z- g* K6 U: K. v: ] DBOF Defense Business Operations Fund. v* X3 W. T' Q7 z& m6 ]( h DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D 3 e0 j- `3 U* y z739 B3 T9 a" D9 R8 s Dbsm Decibels per square meter. . \0 h6 G* {/ h+ B. NDBSM Database System Management.' I( @% A7 Y& W% p$ h& z% B DC (1) Disarmament Commission. (2) Direct Current. . l, k% F$ [) W( {% tDC-X Delta Clipper Experiment. ) w6 @- t% W0 K& y& \, b* `- w1 uDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications : c2 I. t) u) r+ [$ E4 hAgency. (Now known as Defense Information Systems Agency (DISA)).; a6 `* c5 L4 t l1 f, i3 v DCAA Defense Contract Audit Agency.6 v: t: U8 q s% {6 n; O, L3 u DCAS Defense Contract Administrative Services.! N9 [* ]% F/ t5 j+ k7 C2 \+ V DCCO Defense Commercial Communications Office (of DISA). 1 o7 p/ i" p' e# U2 jDCDS Distributed Computer Design/Development System.) w8 F* { k d DCE (1) Data Communications Equipment (TelComm/Computer term).6 |, X$ |. O1 Y$ _' F g8 v. P (2) Distributed Computer Environment. ) }8 |; m K, P4 X9 @DCEC Defense Communications Electronics Command. ' M7 N/ W- h+ D. O* x HDCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. z6 h" F+ Z- j- l& m O$ l+ d4 A DCINC Deputy Commander-in-Chief.9 _+ k7 @ ]* V7 z# K) O) r4 l DCM Defensive Counter Measures. : D( v8 E* m3 vDCMC Defense Contract Management Command, r1 w1 u$ l6 W DCN Document Change Notice., @7 d; g% K5 E! o DCO Director of Combat Operations (JFACC term).7 T' P" U- `. T! f DCP (1) Decision Coordination Paper (see ADM). / {, u8 i/ Y: }3 {* ?7 H(2) Director of Combat Plans (JFACC term). % Q% |% {+ {3 J+ x3 RDCPG Digital Clock Pulse Generator. ( [7 [7 Q0 W3 L- m7 Y# B1 I; kDCS Deputy Chief of Staff.- ^; e" t$ _9 d1 u6 v+ ~ DCSOPS Deputy Chief of Staff for Operations and Plans (Army).6 W) L6 O0 i7 Q' p DCT Digital Communications Terminal" X ^" R; i& S# i DCTN Defense Commercial Telecommunications Network. 3 `+ [* |* [' A- l# ADD Variation of DoD.! I4 L7 ~ y( }6 k+ L# Q DDCI Deputy Director of Central Intelligence. 0 \& }! l( ~" b# |9 |& kDDEL Dwight David Eisenhower Library, Abilene, KN (army term).* u, i. R, f o1 | DDG USN guided missile destroyer.& ~. ~$ K* o' b2 ~4 h MDA GLOSSARY, VER. 4.0 D 2 L: i0 Q5 Q7 n$ O! r {74 x' ^9 Z# y6 x* P7 {DDL Disclosure authority letter.1 r& ~& {, _+ H! w DDN Defense Data Network. * o- D; a1 W1 D# R3 v7 `DDR&E Director, Defense Research and Engineering.% A% h5 v( D! C0 v+ c DDDR&E Deputy Director, Defense Research and Engineering.2 |& d: Z3 n- W0 i3 v% o; }& k DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).* l7 ?* q) T5 k( |- l, ~ ?) l DE (1) See Directed Energy. (2) Delay Equalizer. ; D4 E9 R- Q1 O4 gDEBRA Debris, Radiance Model. 9 U! V9 V+ l8 Z" k+ P. eDecentralized : x1 B* V: O+ a- }5 P! p* K* V) X6 HControl+ R0 Z b' _1 y! j6 Z ? In air defense, the normal mode whereby a higher echelon monitors unit actions,3 I3 Y6 u5 f* P7 ^' M# I5 B* A making direct target assignments to units only when necessary to ensure proper' D4 f% V" r! j4 j3 W9 N( ? fire distribution or to prevent engagement of friendly aircraft. : A' n% G; Z5 W4 }# mDecentralized ) { l$ Q; O9 L. l- n% z$ d5 c3 UExecution " h- X3 n2 u+ d; dThe distributed and integrated implementation of USCINCSPACE direction by 6 b5 Q0 s7 w4 Hthe BMD forces. (AFSPACECOM) ! w" E* ?5 H) d' t3 ^9 F- l/ [Decommissionin8 z; v, q1 J0 `% h g * L, [9 Y3 x8 M2 E6 }1 wThe removal or the rendering useless of obsolete or no longer needed, H0 ~- c# y1 B& W9 f components of the BMD system from service.: E0 l, X) t1 e- U( ? Decrement A directed funding level reduction for an acquisition program. % `+ d3 o$ k) O8 W# P4 _DED Data Element Definition (Computer term). - [: e4 I9 f/ `7 J* _; VDedicated Mode " G2 \" h; j( sof Operation n$ {% X- o& i(ADP Security) 3 e' e6 t% |! w: sA mode of operation where all users of the AIS possess the required personnel- w( O1 R) |- ?+ L* f security clearance or authorization, formal access approval (if required), and a G* x2 T: ^2 m" V# o, r Need-to-Know for all data included in the AIS.- X) t0 l! u$ H; C6 G& A! c5 } Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about* R1 e6 w( r# e, d8 i* Q 5,600 kilometers) above the earth’s surface.! l; I! l) K: [; E$ a Def Definition. 7 I9 k1 r5 D# v6 p v( g8 IDEF (1) Defense. (2) Demilitarization Enterprise Fund. 3 T, y Z; O* h3 K5 VDEFCON Defense Readiness Conditions. / K8 R! ], U9 B: w& MDefended area+ b* c% R& ? r coverage ; d+ z2 r7 q( ?3 z$ I# ?Defended Asset * f0 x, W% z" h' i4 I. Y$ V' Q9 P3 yList (DAL) + c2 @) d" e" q7 y& |The geographical region that the BMDS can protect from ballistic missile attacks ) d2 p" K7 e( R( Cwith a specified level of probability of negation. May be specified for a particular g9 l3 o8 ^/ l4 C# a* H# `threat type, launch point(s), launch regions, raid size, etc. ) d2 g6 a Q& cA ranked listing of facilities, forces, and national political items that require . \, j: o- o' t+ B/ Tprotection from attack or hostile surveillance. The list is compiled from Federal # B+ k* x& e8 `departments and agencies, Unified and Specified Commands, and the Armed 4 }1 T9 h2 O0 W; z/ }# p4 c8 o6 fServices to ensure National Security Emergency Preparedness functions. $ t/ L# c: l6 v* \( E; CMDA GLOSSARY, VER. 4.0 D # s6 i2 }8 v4 L75) g7 D+ u) g' p9 |' M. H$ u+ C Defense2 U( A% Y1 O$ v5 [ \# } Acquisition + a# u$ u' M0 `7 F0 pBoard (DAB). I6 Q/ j' U" O& [% V I: e! f* [ The senior DoD acquisition review board chaired by the Under Secretary of% R% ]0 A4 i# Q5 }" {6 X Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the * W3 H; J8 p* p. w: nVice-Chair. Other members of the Board are the Deputy Under Secretary of 3 i4 _9 E3 i0 @! t* q7 sDefense for Acquisition and Technology, Service Acquisition Executives of the . a) n* ?# h3 O* yArmy, Navy, and Air Force; the Director of Defense Research and Engineering;. i# I0 \4 b9 w6 L" Y7 v the Assistant Secretary of Defense for Program Analysis and Evaluation; the+ V& ~0 C0 K, P8 K8 v Comptroller of the Department of Defense; the Director of Operational Test and % Y( u: E% _6 V! l* \; T( QEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the 5 Y0 O; I: h( K2 j0 E( XDefense Acquisition Board Executive Secretary. Other persons may attend at 4 M3 J. s/ u$ m% D3 Dthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition7 S/ L! ^- D) H+ v9 o( M! g Board.”) / r5 b$ e% N9 aDefense- h# L" u7 W& I5 H# v Acquisition9 ^9 ]. C/ a8 f2 h% n u Board Committee3 N0 p* f0 m6 b Advisory review groups subordinate to the Defense Acquisition Board. The 3 R8 F/ I: l2 q9 G3 Q& {9 X/ rUnder Secretary of Defense for Acquisition determines the number of : v, @( y7 _5 K7 t. t+ w7 HCommittees. The purpose of the Committee is to review DoD Component / I4 Y9 P1 T/ P! pprograms prior to a Defense Acquisition Board review in order to make an : ^- _ O+ y2 Q: }" d. }0 iindependent assessment and recommendation to the Board regarding the. k8 O a. m4 {! u program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense / x4 W( V. Y6 C" A6 E" c. g9 nAcquisition 7 w% j {# Q, w" I6 k* h1 BExecutive (DAE) % b: E; ^2 ~2 ^( H% O& U% ~The principal advisor to the Secretary of Defense on all matters pertaining to the* Y: M! `2 V! g) P( h; g: K Department of Defense Acquisition System. The USD (A) is the DAE and the % J0 H, z, _+ H8 _% E( X% X+ xDefense Procurement Executive (DoD Directive 5134.1).0 K j+ E9 K8 ~( V; W# a Defense , h+ {; R( y" m6 h" F K. KAcquisition + p& | `8 W. Q9 k3 G- nExecutive , b: F- u# H4 ~Summary (DAES)6 ~, j% x- `9 U" |+ L4 H The DAE’s principal mechanism for tracking programs between milestone! J8 B/ k4 X. [$ q% |2 R reviews. Includes programs subject to the Selected Acquisition Report (SAR), * G8 D* t' `# _2 v( m, c& d' S- eand any non-SAR programs subject to review by the Defense Acquisition Board. 4 S( T3 E5 r6 s$ \6 e' J3 f4 G- WDefense5 C1 z$ t# Q# ^9 P1 O$ b0 d Employment 4 Z- o% Q* L0 |# g- `! X8 N8 o6 xOption (DEO); j: k, o+ G4 Y$ B Engagement strategy provided to USSPACECOM component forces to achieve: r- V3 T7 O- m( r# o specific military objectives against a ballistic missile attack. It defines hostile- X( p+ W5 w) {; ~3 \3 E target priorities, provides assets to defend, and allocates SDS resources to be ( j( V: g( f) W) z! L- ~# W6 remployed. A number of DEOs may reside in a particular Preplanned Response+ |' B: ?, C% C1 I! } c1 @. C6 ~ Option (PRO). However, default DEOs (those believed to be best suited to6 p! i4 d& [3 h* B7 [( ]& t9 \ counter the threat initially) will be automatically processed and executed when5 D0 a) p5 k8 B3 I" X Defense Activation Authority (DAA) is given by USCINCSPACE. 0 O4 Y- _6 {4 |# e$ VDefense5 F2 J/ T5 M6 Q Enterprise; d( Z6 w) ^/ j, j3 @$ |8 n Program (DEP)* ^% c& ~& h# ^' V( M1 u; D An Acquisition program designed to streamline the acquisition process by waiver : l; V* @ T. M9 k3 C1 Vof selected regulatory requirements.6 w3 b' ]. @% n0 ]) q Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb 4 G T3 C: [" ?" m* A8 hand progressively weaken an attack, prevent initial observations of the entire ) s0 a+ A1 g( C# t. Q: h+ sposition by the enemy, and allow the commander to maneuver his reserve./ Y t* G2 v% N1 L& [# J6 h Defense/ M0 e6 J6 F3 ?* s9 A Meteorological . M* r2 [9 _7 `# ySatellite Program ) u% ~2 _& n4 {0 v(DMSP)( B7 b+ }+ n6 b0 h5 [! n Satellites designed to meet unique military requirements for weather information.; v( M k1 O( S7 U. x8 ? Used to detect and observe developing cloud patterns and follow existing# S& W V$ A% m% e( A9 z" D/ t weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.1 ^" l6 M5 B/ C" W6 p9 Z2 X Defense Planning + g. N; R( Q: V3 k. n1 B* iand Resources, q( I' ?9 p& I' { Board (DPRB) 5 p" W* |. c) K1 D, S1 ZA board, chaired by the Deputy Secretary of Defense, established to facilitate 8 ~! g* d- j [decision making during all phases of the planning, programming, and budgeting8 {: ~0 c1 j* x- u+ [ system process. Board members include the Secretaries of the Military 6 |( p* }" E1 lDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of2 W N0 \: R0 n$ w @$ C6 [7 B/ v Defense for Acquisition and Technology, and Policy, the Assistant Secretary of 0 `7 \ Q. N3 d8 A$ E- l7 X. bDefense for Program Analysis and Evaluation, and the Comptroller of the/ ^. X5 H% s/ w1 v' z% G( T/ d Department of Defense. 7 f( q( ]6 s. e' r& eMDA GLOSSARY, VER. 4.0 D3 e8 A5 X' ^' H( u 76 7 x& O, S- P2 y0 x# G# l0 qDefense Planning5 c" A! p; M! F8 z$ S& X4 T Guidance (DPG) 1 G# J3 ^% ~: L. b1 v& [4 rDocument issued by SECDEF to DoD components providing strategic framework6 E+ x3 x, W# g ]% o for developing the Service POMs. Result of planning effort by Joint Staff, OSD, : u0 a. v/ M- p/ f4 v# Jand Services. In connection with two-year budget process, DPG is issued every6 w+ l; T8 S- n. A$ [8 W other (even) year., I+ V8 _- N+ G6 P- P Defense Priority , b S3 A) d% t# t3 {4 }and Allocation0 ?: x& T4 h9 b E! H4 K System (DPAS) 8 y9 @5 y5 l8 j) c4 c1 X$ _The implementation of a statutory requirement where contracts in support of7 _5 Z$ v q2 |+ R& l, o national defense must be accepted and performed on a priority basis over all- H/ X: J$ O* I& k# [ other contracts, and which requires the allocation of materials and facilities in% m) v& B' j- v0 Z4 o) w such a manner as to promote the national defense. See “DO” and “DX.” : @ t- {9 i* c0 a' zDefense : P R0 q9 }$ r3 K; o% SReadiness - c) _ j5 r) G+ aConditions 3 W/ _: T C$ F/ r; C(DEFCON) 7 A3 t7 Y3 x) \A uniform system of progressive alert postures for use between the Chairman of* B- U0 t+ g& |2 o the Joint Chiefs of Staff and the commanders of unified and specified commands% ]- e+ n% W) i& S1 x# e and for use by the Services. Defense readiness conditions are graduated to 3 K; H$ y( {4 r, Omatch situations of varying military severity (status of alert). Defense Readiness " B( ^* p( \# G0 Z0 XConditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as 0 C# h. ]/ V3 c" K& ]* l. P. c6 S2 Uappropriate. ) N; Y. x8 o4 a0 @* F# S% [Defense Satellite( H/ |3 f& k/ k1 n Communications - ^1 t' A( y2 ], t l% w9 zSystems (DSCS) H$ z+ S& W* t9 o; b, _! V9 G, t Advanced communications satellites in synchronous orbit around the earth.6 C( P4 i4 b1 w+ g% A/ c9 r" ? r; | Provides high-capacity, super high-frequency (SHF) secure voice and data links U! H+ ~$ x7 ~; r- B0 nfor the Worldwide Military Command and Control System (WWMCCS). They# {" ?8 t- F o/ t+ u support terminal deployments for contingencies; restoration of disrupted service 2 G( l# h6 X6 N9 C; n. Q9 doverseas; presidential travel; global connectivity for the Diplomatic $ k4 {1 z& S' W8 ~7 K' n T' PTelecommunications Services; and transmission to the continental United States 0 z0 a$ a- q# `, C9 z* d4 Hof some surveillance, intelligence, and early warning data.! Q0 I) m6 T$ V' S, h Defense Satellite ; s1 w* w- l* n. u& h(DSAT) Weapon 8 C# m/ ]5 J: \A device that is intended to defend satellites by destroying attacking ASAT + c. W' D$ g. oweapons.! s, }0 _0 J3 H* g$ k7 {0 u Defense Support 5 F8 D4 c2 q3 uProgram (DSP) 6 o# |, \( l. }6 pA system of satellites in geo-stationary orbits, fixed and mobile ground 4 a' \" C" h2 J9 K# v3 X$ A- l* R; Xprocessing stations, one multi-purpose facility, and a ground communications& w5 {! u! T2 B4 E+ F4 |$ Q network (GCN). DSP’s primary mission is to provide tactical warning and limited' f# F* C" z# Y% C' N _ attack assessment of a ballistic missile attack. $ G9 {4 F' W2 G: i4 d& v1 m/ k5 ]Defense ' g5 b" v- `2 u: ~2 f% P* ^Suppression 6 E& E! Z; q+ W: _% yTemporary or transient degradation of the performance of a defensive system3 ^' M! k7 }2 U/ y7 D4 M below the level needed to fulfill its mission objectives, by an opposing force., Q# a$ N# t* z/ B- F% i4 b1 x2 t) \ (USSPACECOM) * p! h# y3 v! zDefense Tier The arranging of a defensive system to correlate with the phases of a ballistic 7 S$ h, _, e6 S' f lmissile trajectory; i.e., boost, post-boost, midcourse, and terminal.7 b- D! m" H/ x8 i8 k }& m Defensive( s, V$ u3 y; q% P" s( [" f Counter3 d$ ~, T: m0 x/ F& n' O2 J( Y Measures (DCM) R% S% g+ z' NActions taken to eliminate an ASAT attack. 6 H' [ u5 X0 K2 m" XDefensive* W5 [' m/ n; t5 C8 [' v s1 ] Technologies4 I' ?) _- e6 z, \. R: @( I Study Team% H+ y5 {8 B& @) j2 a$ y (DTST)2 Q; s f# P A4 A A committee, generally known as the “Fletcher Panel” after its Chairman, 8 p( ^* E4 `) K0 kappointed by (former) President Reagan to investigate the technologies of 2 m* j8 M2 G: g) D8 @/ Z: gpotential BMD systems. 2 P( r3 L- v# O) o S( j! jDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD. * R7 N1 E) y# N5 VDEIS Defense Enterprise Integration Services (ex-DTIS).+ A3 P4 r4 e& h) w& n# F DEL Delivery.. n9 H0 d% I; ^. z Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion4 j& P* ^4 }9 ?- ^- a of shots about the aiming point. See also Circular Error Probable. 4 D2 V3 H, q/ }0 VMDA GLOSSARY, VER. 4.0 D. f4 D* ~ r! m- X1 r5 G S U 778 `: j- ^9 u% t: z4 z2 z Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the, \) V0 H/ f, K5 l9 V0 X maximum change in velocity, which a spacecraft could achieve in the absence of/ A# N" |- j9 u0 r# z! [. ]) _ a gravitational field. ' d% S9 Q: k2 t0 A1 e7 ]Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). 8 ^" m. |: i: j/ J" N, O1 [$ hDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its# q% \9 I9 F/ M/ e7 ?: H% x2 @ desired function (matching RV characteristics, screening RV, etc.) 2 o4 n, U9 h% v( b9 w% TDEMO Demonstration.6 N; h# E, u! b& _/ D: K0 _2 F Demonstration5 Y' Q2 ?9 A% w" t* W and Validation( P$ A* i) w5 Z (Dem/Val)7 r6 ^( n( Z# u The acquisition phase when major program characteristics and product designs7 j# _2 M6 u' I0 t" f are refined through extensive study and analysis, hardware development, test, : [6 _! i- F/ q, G2 Q0 Kand evaluations. The objective is to validate the choice of alternatives and to 5 K' j/ p& D* Y, v. ]' u# f) uprovide the basis for determining whether or not to proceed into Engineering and ( f X; G9 q& m# c; {; \6 K4 q3 nManufacturing Development (EMD).& l, A; M& z/ t: G5 Z Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. ( {/ q- z Y% X4 `- e) [It may include destruction, removal, contamination, or erection of obstructions. ! {, J; u3 B9 K+ R* CDEO Defense Employment Option.% w6 y, M( W9 L3 B3 l* v6 F1 X" y Department of6 f ?4 Z) s6 ]5 [8 }2 n/ E3 P9 Y# d Defense $ ~! F' S4 k; t% ?. a/ {Acquisition 6 U6 n, s. A! _+ q+ c( ?; Z1 x' FSystem( s/ L, n4 F0 ? A single uniform system whereby all equipment, facilities, and services are 9 X" v c$ C& S. U$ A$ mplanned, designed, developed, acquired, maintained, and disposed of within the . ^, ]6 s, t3 q8 rDepartment of Defense. The system encompasses establishing and enforcing # A6 }. u+ H! k, Ppolicies and practices that govern acquisitions, to include documenting mission1 @9 h$ i8 s& O8 M: o% x! ? needs and establishing performance goals and baselines; determining and : Q3 N( s f6 H7 U, wprioritizing resource requirements for acquisition programs; planning and1 h/ V& y3 U) j; _ x$ Y" O& J executing acquisition programs; directing and controlling the acquisition review & _5 a5 h: i$ G2 Jprocess; developing and assessing logistics implications; contracting; monitoring0 R. G0 K: f4 `0 j' } the execution status of approved programs; and reporting to Congress. (See , o, [6 N/ E, C+ m KDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) 0 t7 o& _1 O! U8 ?+ [. S# V0 M% \5 }Deployment (1) The placement of force elements in battle positions to obtain a higher 4 J, ~/ R, @4 T0 ustate of readiness. " N& |/ s7 y6 S, k(2) The movement required to place force elements in battle positions.+ w$ j5 j: D# a# A (3) Fielding the weapons system by placing it into operational use with units8 D+ |8 V d3 ]2 ?1 G5 ]3 b5 Y; k, i in the field/fleet.' L$ w- E1 q! t6 L (4) To arrange, place, or move strategically.5 x) @6 F# ~' y# n: C0 r j# `3 [# Z Deployment6 H$ j/ e6 w" ~! } Planning; v8 r+ }& ]5 |$ i- s+ u (1) The development and maintenance of plans required to initially deploy, ^3 w5 _8 q y# O7 n" d maintain, and evolve the operational system in accordance with* x' A9 q0 g! o8 Q% w z( V5 }5 h schedules and priorities. It includes factors such as launch facility - a5 E+ f' c+ t$ z+ K4 vavailability and planning for the availability of other required elements 3 G9 |9 g( n8 }such as trained personnel or units. In addition, it identifies the impact of L) T8 T: C3 o3 D- ^! V% ^ deployment on operational readiness and any testing constraints # M9 D$ B- [+ p1 hassociated with deployment.) G0 V ?6 `- C7 r0 u& v- s (2) Encompasses all activities from origin or home station through 4 o0 ~6 k% @2 c" H. L! L+ z! tdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding ; U( B$ N0 T+ T/ careas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment - w' _0 t' l6 T* C. eTesting p% z# o" [- eThe testing and/or simulation of system assets in the physical and operational0 W, B7 N' c' l' Q+ T3 w! u: s environment in which they are expected to perform.1 M$ r- x2 `- c; v- K- E1 E DepOpsDep Service Deputy Operations Deputies.* r! d& l0 k/ |! W* @3 Q) |8 j MDA GLOSSARY, VER. 4.0 D+ w3 c8 d. e+ i/ C- m3 ^4 t- s% n 78* L. ~- @1 k2 ?5 Q2 | Depressed ) L" \: ?$ G* `3 sTrajectory: i) x8 S1 \1 O: v9 u7 H3 e+ x) P Trajectory with an apogee below that of the minimum-energy trajectory. 7 i) v: n, h) y; a! `$ cDEPSCoR Defense Experimental Program to Stimulate Competitive Research. 6 Z h" D e7 T8 J1 B" ]( HDEPSECDEF Deputy Secretary of Defense.( B9 \2 p9 y# P K0 ]% a! b DeSecState Deputy Secretary of State. ' W0 N* s0 O" e9 a( \. _, `DERA Defense Evaluation and Research Agency. Consolidated research and 7 j( v* g; d) w1 Adevelopment resources of the U.K. Ministry Defence. Headquartered in& c3 _. b2 `. k6 \ Farnborough, England. 1 x8 e, _1 p. d" Y. e- `( lDerivative $ u5 E3 p/ ?+ TClassification ( {# L+ D* z9 \& ~! F6 I! D1 WA determination that information is in substance the same as information / U; i) _6 I1 Z5 o4 ~3 Mcurrently classified and the application of the same classification marking.& I1 V6 L) m8 y/ T3 b, ~ DES Data Encryption Standard. * b- [1 V ~) g+ s0 c) M( sDESC Defense Electronics Supply Center (DLA term)." |$ N, q6 R3 r Design ' y2 D0 J# `0 T7 k8 L5 i( ~Constraints 7 Q- x& n8 C j1 _ m' jBoundary conditions within which the developer must remain while allocating + ^9 C4 P) e, `: f0 _% zperformance requirements and/or synthesizing system elements. 3 W- c8 A/ I0 RDesign : Y# ^0 t; Q9 }& I3 a$ b. K% {Parameters 3 w- O9 t6 t8 l6 `% L: k$ `5 G' E) EQualitative, quantitative, physical, and functional value characteristics that are0 O! q- ^7 l; {4 } inputs to the design process, for use in design tradeoffs, risk analyses, and / f3 z* p6 _" B# a3 `; r+ U- L' ~# jdevelopment of a system that is responsive to system requirements. 7 q6 C1 M4 R6 m7 H* O, }6 MDesign Phase A period of time in the software life cycle during which the designs for 4 l: x6 I7 p& X0 y! Narchitecture, software components, interfaces, and data are created, 8 R) w: F/ I3 {# Pdocumented, and verified to satisfy requirements. . X5 a+ O3 O6 m7 k$ [0 }% y, GDesign-to-Cost- }! Z, ]% T2 ? (DTC) Goal# E V0 {! \ }" l$ v6 X7 Q Management concept wherein rigorous cost goals are established during4 a6 }6 e+ n4 h development, and the control of systems costs (acquisition, operating, and 3 q' Y$ W; Q8 M. R* c; c" C ]support) to these goals is achieved by practical tradeoffs between operational3 E D7 d, [" w0 E2 n8 F capability, performance, costs, and schedule. Cost, as a key design parameter, ( S& c: Q! e1 y( u! Ois addressed on a continuing basis and as an inherent part of the development6 ~9 y. E3 V! N) Y, J and production process. A DTC goal should be in the form of average unit 0 i: k* N8 W# ]: ~flyaway cost. Also, DTC parameters for operation and support will be 9 F7 y4 x$ C- w/ tselected—parameters that are design-controllable, significantly affect O&S costs,4 T K) N8 M" a, ] and can be measured during test and evaluation. Parameters may be( a4 P5 {: I: N2 s3 T5 C expressed in dollars or by other measurable factors, e.g., manpower, reliability, or & v7 ~# \- E4 smaintainability. Firm goals and thresholds will be established no later than entry+ e; r( F) D( T4 j2 d4 X into EMD (Milestone II). This is an in-house goal, almost contractual in nature,/ e% X4 `/ G5 t' B6 g between the PM (Service) and the SECDEF. Allocations from this goal will3 J1 d6 b% u1 H& Z become the contractual DTC goals for contractors supporting the program. % d2 L7 ?& U$ r6 {( M) vDet Detachment. , \6 P3 r$ Z) ], x6 u M/ D1 M; gDETEC Defense Technology Evaluation Code. : f) d7 T1 A' ^ D; Y! DDetector A passive IR, visible, UV detector turns photons into an electrical signal. The4 I$ E$ d1 x* ^& F6 @" g0 U IFOV of the detector is its solid angular sub-tense. There is sometimes 6 e d* {8 t1 c) Sconfusion between the detector sub-tense (size) and the pixel (picture element/ J( A& h: Q+ t' C, { size). They are the same for a staring sensor, but in a scanner it depends on: b1 B+ q( y2 I" [( k3 }- l: D the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. / v$ a3 _8 _2 P' J, iMDA GLOSSARY, VER. 4.0 D; Z4 v6 Q6 A* M0 f 79( \9 b" [( a$ n5 q2 z DEV ENV Development Environment./ f. K3 E3 B, n/ C Development 4 r. Q" J) F( }$ Q8 N" [Test (DT)+ G+ B& R* l ]; } P0 p' x Test conducted by the development test organization to achieve specified test " H- S& [; b$ a( ~0 iobjectives. It may be a complete test, a subtest, or a phase of a test. T2 w! C% A) @5 b5 r* P Development ; S% }) T" }+ x0 g" oTest I (DT I) + \8 G1 _$ z- SA series of tests conducted during the demonstration and validation phase. ; k7 e6 D- R1 z+ ~. FComponents, subsystems, or the total (or full) system are examined to determine$ g) X0 W# ?( A' M! _ whether the system is ready for EMD. State-of-the-art technology is addressed 1 C. d: m8 I- U- s/ F" Bin DT I. $ I% A' s) x1 n8 K( y" dDevelopment : ~- @2 k# J6 d% U* ^/ D0 KTest II (DT II). f2 j9 y( z0 A h; v4 ^8 G6 X A series of tests, normally during EMD, which provide the technical data }+ B+ r$ w- F8 z4 y( ` necessary to assess whether the system is ready for low-rate initial or full, ~) A, Q* K$ ?0 v, j, {# E& Y production. It measures the technical performance and safety characteristics of# f3 Y( ]8 r- C/ P% t the item and evaluates its associated tools, test equipment, training package, ' ~1 u$ y* \7 L5 w1 fand maintenance test package as described in the development plan. DT II! O0 b6 d' ~3 p: F+ C3 F$ R' ]2 C addresses accomplishment of engineering design goals and the fulfillment of" B% A; F+ v/ p3 \+ d contract specifications. . j7 |/ e) z0 F L! nDevelopment 4 t! J1 l; R' `7 l; A) l- ^: ^Test III (DT III)! g4 R4 S. \ ]1 M$ {0 {6 i Tests conducted during production.7 v; d# k& v M6 {' ^ Development / t) X" s/ J5 XTest and # ?% j; Z( b/ k# |Evaluation& ~( c8 R( t5 V# C+ @! g (DT&E) # j% P& ^% G. a/ o. GTest and evaluation conducted to measure progress, usually of . U6 k/ _: T6 T( Y) X( icomponent/subsystems, and the proofing of manufacturing processes and # O! f& _8 b- z3 ~6 Acontrols and to assist the engineering design and development process and 0 s9 y6 [# Z. x9 N* w) N' Pverify attainment of technical performance specifications and objectives. Usually 2 k; B* R# v" |conducted under controlled or laboratory conditions. Can be conducted before + s4 K9 T( J4 H( W/ x; v1 r6 |3 Bor after production begins.7 H# X9 r6 a0 U' Z. C$ E Development - H, H# E& j9 t6 i; a8 |6 TTest (DT)6 @2 X& q- M* J& V+ p Test conducted by the development test organization to achieve specified test " M( i" @8 f7 @" m/ zobjectives. It may be a complete test, a subtest, or a phase of a test.7 K4 V; J, ?* u+ G+ J* ^ Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, " h" s8 F$ I) w1 r) b: Qschedule, or performance without authorization from the milestone decision |- V4 }/ g5 a9 I0 O$ @/ Y5 P authority. Acquisition Program Baseline (APB) thresholds represent these) q: m% ~+ F) ~1 f% d9 X ? parameters. 3 z0 |$ A& X( `7 ~" |Devolution of; r V+ N5 |9 w3 ~& z Command 8 Q4 Q8 c+ ?" p$ w+ h% x6 hMinimal essential operational capability to perform C2 provided in an orderly and6 S$ [- a+ s3 @5 h5 G2 H timely fashion to a duly authorized successor. ! `, p$ Y2 n- u5 r CDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. ' g+ h# \% G, @/ B) ]DEW/D Directed Energy Weapon/Discrimination., B) o# B) Q1 G+ w& n& a DEWG, O Directed Energy Weapon Ground, Orbital g3 {8 M/ U# h/ M% I& Y2 |DEWL Directed Energy Weapon, Laser (thermal or impulse). , n- \$ a& |7 [! ?DEWP Directed Energy Weapon, Particle Beam (neutral or charged)./ M0 K& F Q1 ~, @8 g% f* R DF-KBS Data Fusion Knowledge Based System. 1 c; Z) c4 @: p6 [, q% ?DF2 Deuterium Fluoride. $ u4 H3 B- k ?( f( YDFAR Defense Federal Acquisition Regulation/ p# W. v* X' Z( N8 v: Y# m DFARS Defense Federal Acquisition Regulation Supplement. 7 p" ]+ d' d# G9 V3 UMDA GLOSSARY, VER. 4.0 D5 L+ s. u, k# e. A, z 80& R5 h7 @8 M& M( n3 s DFAS Defense Financing and Accounting Service.- e* S T) U: r3 B: b DG OBSOLETE. Defense Guidance. See Defense Planning Guidance.& G( b0 L* C, S) a5 J: y) B. A DGA Director General of Armaments (France).8 Q/ a. l3 o" E# S" }% d- H DGP Defense Group on Proliferation." W; e: C4 z9 N4 L- |+ a DI (1) Data Item. (2) Developmental Item. 0 V# }5 `* Z3 ]. d7 | y/ JDIA Defense Intelligence Agency. " f+ X" `0 O" F; K- KDIAC Defense Intelligence Analysis Center. 6 x }2 L' I- x& l7 O2 r- R! lDIAM Defense Intelligence Agency Manual . u( H# L! H7 v" ?Diameter (Optics) The unit of measure of the light gathering power of a lens. g. A' F- V% v/ J# R DICE Digital Integrated Combat Evaluator.. d y' s& l2 a* X, i* I$ m- n: q DID Data Item Description. 2 o# h' l# j! N3 F9 I/ F! d1 dDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The3 X% m. ~# [& K+ B3 C angle of spread, which cannot be eliminated by focusing, is proportional to the! l3 C" p; g6 p, w% g5 W5 o ratio of the wavelength of radiation to the diameter of the aperture.5 W+ R, p+ X1 f- v, r5 C Digital8 Q! N* R6 Z4 I' p Processing: L/ B6 v: [9 b. D9 x0 d The most familiar type of computing, in which problems are solved through the) \8 H8 M( F: B' H mathematical manipulation of streams of bits.& [: Z% ?4 l# k* o4 S DII Defense Information Infrastructure % K" A7 R3 `; y7 xDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to 5 ^- f. z8 N$ l3 Z3 ^* j12 km) between wake termination and de-sheathing.) }8 I6 v0 c: X7 t- E DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). 6 A% p* R4 T5 }) |" m {/ _DIR Director.! S& Z4 g( X6 F. [ Direct Air . Y2 e' w, P* |: a8 mSupport Center * r# o" q+ P" oA subordinate operational component of a tactical air control system designed - T! k7 q, i0 ]; f8 E$ H6 h( O8 _for control and direction of close air support and other tactical air support $ _1 e2 w2 X) t5 X2 Boperations, and normally collocated with fire support coordination elements. % M3 ]9 K6 _, o$ i D4 }) ZDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not 1 M8 o. q% N$ g& }. _9 Bnecessarily limited to items that are incorporated into the end product as labor or; b1 h$ h! }. E, y: I! n material.+ d" q3 l$ m1 D! z( }9 E Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing ' @ K* i" E1 Q- [$ e0 ?' pdirect labor includes fabrication, assembly, inspection and test for constructing" B* L y1 X# @7 U* c$ A& P the end product. Engineering direct labor consists of engineering labor such as % q7 z2 S6 @: W5 s. areliability, quality assurance, test, design, etc., that is readily identified with the% C9 U1 E7 ]7 V" T" c! l end product. 0 ^3 r o8 N- n8 V. R) jDirected Energy & v) |- E' R( n. u' w% v(DE) * j/ x) j G+ }- g) |1. Energy in the form of atomic particles, pellets, or focused electromagnetic # G( h- `4 w3 h/ mbeams that can be sent long distances at, or nearly at, the speed of * ?( J. R: N* ~' U2 z" Nlight.: |0 W$ }" n5 ~2 M 2. An umbrella term covering technologies that relate to the production of a " u1 |% d7 I/ w1 v: Bbeam of concentrated electromagnetic energy or atomic or subatomic particles. 0 P2 @* c( z* l+ U* V( D- k. {MDA GLOSSARY, VER. 4.0 D " Z6 e5 p+ T: e; w! S: P @81, d3 E i$ J: [8 h: g/ q$ W: W6 U Directed Energy 6 b, R3 d5 { x% c$ kDevice & ]* W' k$ {+ v2 _1 |9 CA system using directed energy primarily for a purpose other than as a weapon. 4 a: [3 K2 |; ?Directed energy devices may produce effects that could allow the device to be7 v+ W% k# A& ?7 c used as a weapon against certain threats, for example, laser rangefinders., p' a- Y* Y6 B9 o G! l Directed Energy - V7 M- u4 Z/ U% F' N+ jWeapon (DEW) : h; u2 Y/ I6 E8 h$ G# v5 bA system using directed energy primarily as a direct means to damage or destroy) d, d. j6 X- I1 k9 i% q* K7 S enemy equipment, facilities, and personnel.* V$ {# H3 j" _' ^# i9 g& |4 R8 }5 s DIRLAUTH Direct Liaison Authorized. # k. d; F1 h- F; z5 ]DIRNSA Director, National Security Agency.: e0 b6 G. F! u3 W/ o+ F, Y6 {- K DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.8 o- h! }/ ~# a1 P9 t2 J1 { DISA Defense Information Systems Agency, Washington, DC. (Formerly known as% @( c2 H/ X0 ?- P( L- U6 n# e( I Defense Communications Agency). 5 C7 Y* F2 U( W A4 gDISCO Defense Industrial Security Clearance Office+ p7 r0 J8 {% H; B DISCOM Division Support Command (US Army term).- Q# `$ K- N% ?6 ]8 B0 w1 T Discretionary- u, A. H5 G2 R/ | Judgment 4 ]( ?" J! z- BThe authority given USCINCSPACE or his duly authorized representative to8 m# q. V9 ]# ~$ N W( F: K6 I perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination % y% N! n- a$ ^3 G- _$ O/ O. Z- iDISN Defense Information System Network (DISA term).( U6 f) V2 p/ _, o9 Q2 v4 c% @$ P) X DISSP Defense-wide Information Systems Security Program. 8 S9 z4 u( V# L/ C1 |4 P% n3 FDISUM Daily Intelligence Summary (JFACC term).4 R! X ?9 X: e( Z/ K DITDS Defense Intelligence Threat Data System.& m* h' q1 ?( N2 }2 B7 A DITP Discriminating Interceptor Technology Program. The objective of DITP is the # S5 o5 Q" M( q! r/ G+ Z" ^8 ddevelopment of advanced interceptor seekers to counter advanced threats. $ C- ~ B3 z: U+ C4 T/ [DITP will integrate passive and active sensors into an interceptor seeker that 8 S. ?4 M+ t8 b4 x$ |/ F0 yintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP7 c8 e6 n3 u7 j, E9 q, { flight demonstrations will involve the tracking and interceptor on-board/ K) f5 \" C; F- _9 P discrimination of targets of opportunity while providing fusion processor data8 C/ c1 ^! s/ R6 o5 V, U; H% v# F telemetry. (See also ASTP). . r2 L: i9 J; W: s+ gDIVARTY Division Artillery (US Army term). ) y5 m% ~( ~( M6 v/ v! r+ vDIW Defensive Information Warfare. 1 m7 S- u6 ^$ n& c' F6 E% NDLA Defense Logistics Agency, Alexandria, VA.% Q A& S8 k2 n( ?7 M2 u DLSC Defense Logistics Services Center (Battle Creek, MI).' g/ I+ W. Q7 Q, a a DM Data Management ) |2 s* `& w3 Y* ?DMA Defense Mapping Agency, Fairfax, VA.8 [/ s- S! \' n$ q DME Distributed Management Environment.- O2 n. p$ e" ]% d- ~. y/ F6 ?, d DMI Dual-Mode Interceptor. 9 r3 h% {* D; p, C* G% q/ ` wMDA GLOSSARY, VER. 4.0 D! X9 c* o7 ~0 I6 G4 v" ]4 c2 p 82- }0 ^" c; t, ^( Y8 b DMRD Defense Management Review Decision./ ? u6 g8 U) {7 C& u1 y3 b DMS (1) Defense Message System. 5 u# @# p0 z* ` D; \(2) Dissimilar Mission Simulator. 0 g2 k( j. A4 r: tDMSO Defense Modeling and Simulation Office (OSD). 0 L5 d% N- f( DDMSP Defense Meteorological Satellite Program.; g& e }6 Y) V! q0 Z DMU Disk Memory Unit. 3 H6 c- m! `& ?* T- P$ h: x1 GDNA Defense Nuclear Agency, Alexandria, VA.) j) K& o1 o7 n6 {) m5 N1 x& c$ t DNMS Distributed Network Management System.8 m$ f) o ]( g+ [; c# _% ~ DNSIX DoDIIS Network Security Information Exchange " m7 O+ J" |6 i! {7 t3 F) i( |2 IDNSO Defense Network Systems Organization., c$ w' i! t( C DO The lowest rating under the DPAS. All “DO” orders take preference over unrated 2 G1 v1 }+ E J5 Z, W5 U8 u; \! Gorders to meet a required delivery date.3 D4 e) e& @' i4 W0 H Doc Document. f$ j1 s+ h$ h |- I DOCPREP Documentation Preparation.: o# d2 b* [6 v1 C4 n: Z! o Doctrine Fundamental principles by which the military forces or elements thereof guide# p- o; s3 _: w' F! | their actions in support of national objectives. It is authoritative but requires% n8 ~% h Z3 s. v judgment in the application. See also Combined Doctrine.; k& E& U( ~5 [; ^- p1 W7 r DoD Department of Defense, E$ G0 M; ?( y# d: a5 p1 n2 o7 [6 t DoD Component ! ?, M( i4 Z2 l% Q# EAcquisition6 ]3 O# X* t& l# T, z Executive- c w" F; E8 c9 J3 r o A single official within a DoD Component who is responsible for all acquisition , Q& v4 N/ J# o" S1 z7 u* D* w9 yfunctions within that Component. This includes Service Acquisition Executives ; M H. Y2 G( [3 x6 @* y) Lfor the Military Departments and Acquisition Executives in other DoD+ \1 ]: @7 {# y. h$ L! p3 o Components who have acquisition management responsibilities. " w4 s. p! k; X; M; @0 \DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman," {1 L$ Q+ X) s Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the! [% C: k0 g0 V% h$ R Defense Agencies; and DoD Field Activities.& p/ M0 J! g2 w DoDD DoD Directive.1 O! E$ l* A" u! j6 n9 \. P: ] DoD Directive / z6 D o1 e- b1 S" e7 S7 D& @5000.15 R2 S5 G4 ?9 |( A3 p “Defense Acquisition.” The principal DoD directive on acquisition. It establishes 7 ~0 N4 a6 t" a& E: dpolicies, practices and procedures of governing the acquisition of defense 3 a- P3 |8 i7 Z u q2 wacquisition programs.. U) d0 z4 r3 F( I5 d DoDI DoD Instruction.; U" q9 \. m) W DoD Instruction 8 m m9 t$ [6 S5000.2# ]2 g* E1 H. h D, M+ u" j# C4 R “Defense Acquisition Management Policies and Procedures.” Implements DODD + c9 [& q* [/ ^& s4 {8 k: M/ q) {6 J5000.1.( v5 X2 W8 I" R+ }) f8 p) a2 k" T1 t DoDIIS DoD Intelligence Information System.- b8 `) x, B! q6 e( V; C3 z DoDISS DoD Index of Specifications and Standards. 6 A, ]& X- b* a5 A8 Q$ `DoD-M DoD Manual. # \$ g2 p; x" a* c C' gMDA GLOSSARY, VER. 4.0 D * |& l& s: P/ l83 + n. L- c, p( k' v" Q y& b3 cDoDR Department of Defense Regulation. + Y5 q @. Q. e1 zDOD-STD Department of Defense Standard." P6 U( J( d8 @ K, O DoE Department of Energy.9 a9 B _- L4 |: c DOF Degrees of Freedom. " g8 R- @5 ^8 w6 V% J* m5 XDog House Large Soviet A-frame radar used as a component of the Moscow ABM system( g( I `, I3 Y( P& ^ having a detection range of approximately 3000 km. It is believed to provide8 Q& x8 x. D& m5 W, Y battle management for the totality of Moscow defenses. % e. C7 G& D7 @" R/ oDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term). " M; F7 C2 y; W, m! V9 ^6 f' IDOPAA Description of Proposed Actions and Alternative (environmental term).) J$ g. U. w& B# s( k2 w) N& ] Doppler Effect The phenomenon evidenced by the change in the observed frequency of a$ r8 c4 w( p. V/ e$ @& b% D sound or radio wave caused by a time rate of change in the effective length of H( r; \* A F! j( F8 @the path of travel between the source and the point of observation.4 u1 w" k6 c4 T# q9 m- ^$ U2 z! v DoS Department of State (US).' o; n1 `& E. @ DOS Disk Operating System (TelComm/Computer term).& d/ D4 o9 _- x5 Q/ m/ x DoT Department of Transportation [US]. 1 \0 z8 S' w* n- J" qDOT Designated Optical Tracker./ S; n. k4 v0 U/ z7 h" Z+ d) A% [* y DOT&E Director, Operational Test & Evaluation.6 Q* K1 e, e: s" {: F DOTH Defense of the Homeland. + V3 K }1 r c' h9 }Down Select To reduce the number of contractors working on a program by eliminating one or. m& c% |) |+ P F' L more for the next phase. , D$ F0 d1 K' c0 }" U" ^. ^DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.4 v: @2 O0 M$ `; [- F# b DPA Defense Production Act. * s+ x- F+ b+ ?3 Z, b$ QDPA&E Director, Program Analysis and Evaluation.5 H! z7 [/ O6 B# z DPAS Defense Priority and Allocation System. 1 p' [- a' G2 u( m8 DDPAT Dynamic Program Analysis Tool.! i0 W) J8 C: K9 `/ N' n DPB Defense Policy Board.( Z" F( s/ p, J/ Z DPG Defense Planning Guidance. ( q6 W7 e8 j2 sDPM Deputy Program Manager.# U5 j, }. C* F' \+ K DPML Deputy Program Manager for Logistics 1 C! V- ]2 V0 ~6 O/ u2 UDPP Distributed and Parallel Processing (Computer term).5 B3 n3 O7 `* Y" [. I) e' t2 ` DPR Defense Performance Review. p5 h3 s" C, E" w# nMDA GLOSSARY, VER. 4.0 D % h2 C6 `9 o+ L$ k84( m8 i& h* b9 R5 S, Y. j DPRB See Defense Planning and Resources Board. , M* ]* L$ d7 w: j4 M7 LDPRK Democratic People’s Republic of Korea (North Korea). , O6 r% f: V4 W3 a! G- M% \, O1 fDPRO Defense Plant Representatives Office. 3 u' H1 X$ ^/ H: h; kDPSSL Diode-Pumped Solid State Laser. j! U6 w* d; \DR Deployment Review. * X$ g/ o; b1 xDRAM Dynamic Random Access Memory.4 k: x$ @! B# @8 R* d Draw-down Curve A method used to encapsulate the overall performance of a BMD system that! c3 j3 v$ e" g9 r6 w1 @' Z plots the probability of survival on the vertical axis versus the number of attacking( E# v& Y; [% A* M& h* V8 p. S RVs on the horizontal axis. Used in conjunction with attack price, they are the3 Q0 S' W% r& A V. {. |" i most important expressions of a BMD capability./ k$ \: S+ M* }3 e DRB Defense Resources Board.; G+ a# I; B4 ^7 p7 | DREN Defense Research and Engineering Network.: Y$ [; V/ ^: t' h, E" J* U9 @ t DRFP Draft Request for Proposal. 3 U8 s% h, S& U$ o. q2 r( NDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from ! s( |! t+ v8 ], ~0 A* tgravitational and atmospherically induced torques on the spinning projectile.) l! J0 [' s; o/ } DRM DAB Readiness Meeting (DD 5000.2 term).3 t1 |; Y, e O) R. w& F Drone A land, sea, or air vehicle that is remotely or automatically controlled. See also 1 W" Y7 ?4 |3 J+ F/ MRemotely Piloted Vehicle. 1 K5 h" U- W- P% f" d# v* l5 c1 yDRP (1) Deployment Readiness Plan (US Army term). , p5 L @& }3 Y' s(2) Deployment Readiness Program. 8 n) E/ L( s1 IDRR Digital Receiver Replacement (USN term).3 {1 }. p, u y9 P1 P DS Deep Space. 7 R. M) s9 J: Z- F9 {/ D3 wDS-1 Category of telecommunications circuit capability. 4 |" h; x& ]; m7 k1 l. ?' F/ i% _DS-3 LAN Category of telecommunications circuit for a Local Area Network.8 B" g5 _; S6 |* }1 n DSAA Defense Security Assistance Agency (OSD). # ?* k v' G# A" A3 d9 V; N' v& @* W" SDSAT Defense Satellite Weapon.! t* f/ u* L8 K7 w DSB Defense Science Board.5 y, b2 I9 D. b& z4 {' }5 } DSCS Defense Satellite Communications Systems. ! k4 m# {- E$ ?; k7 MDSCS-3 Defense Satellite Communications System Three.0 _/ Z8 n8 R6 ]; }$ p/ q) U- } DSCSOC Defense Satellite Communications System Ops Center.- P' v6 I* b1 B DSI Defense Simulation Internet 5 q" B8 T v. x6 i6 Z* Z& Q! n3 y0 dMDA GLOSSARY, VER. 4.0 D- H( `% A0 D4 K4 B4 q0 @ 853 Q! i4 O5 p9 N% D% s4 |. b1 g DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet * _& X) I3 c N: Q( ASystem.6 z5 A4 H" @" O6 g DSM Decision Support Matrix z$ ~. [7 h3 z. c( aDSMAC Digital Scene-Matching Area Correlation. ' z% @: ^3 ^3 xDSMC Defense Systems Management College. & X4 ? `/ E; KDSN (1) Defense Switched Network (formerly AUTOVON).6 k9 Y) Y+ D3 O! Q* r/ K6 C& M (2) Deep Space Network (NASA term). : j8 r+ f6 g- N3 d) X, m$ I4 [( Q/ R1 MDSP (1) Defense Support Program. (2) Defense Standardization Program. : y- Z- S5 [4 d% ]& ?" K" @! iDSPRTM Defense Support Program Real-Time Model. & g# k# b: y1 A' X3 |DSR Data Set Ready (TelComm/Computer term).9 m- Z! Q/ c/ G: |% U6 G0 v9 ] DSRCE Down Scooped Radio Control Equipment (TelComms term).4 z2 @+ _& [4 X! N @; ~% V6 c DSS (1) Defense Supply Service. (2) Digital Signature Standard.( D3 g5 @: {! E" d9 e% S DST Defense Suppression Threat.4 u' M, |0 i- ~* c& ]) ^8 O DSTAR Defense Strategic and Tactical Array Reproducibility.3 B1 E& X6 t, W4 w4 R DSTO Defence Science Technology Organization (Australia).0 i& h4 U) U: e) | DSU Digital Service Unit (Telecomm/Computer term).! ], y C1 F0 y9 s# L. k5 p DSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to" t- u# P6 J% j! |) |& B2 q the DNA. # c# R) h6 A' j+ F! {DT (1) Discrimination Technique. ' O) N. L* l% I4 w(2) Development Testing.; Z/ Q+ D! W9 v (3) See Development Test I, II, III. . g+ n' ?$ @7 L3 p/ }' q! J(4) Down Time (ILS term). 0 f) V4 J% U5 H% i: |(5) Depressed Trajectory. 0 H3 |# T ?/ L5 c* F+ X(6) Dedicated Target. 7 ~0 O8 \8 Y% g4 E, L" A4 nDT&E Development Test and Evaluation.2 V7 B6 J- z( M DT/OA Development Test/Operational Assessment.+ u9 ]% Q+ a0 m5 U; H- @ DT/OT Developmental Test/Operational Test." c$ j1 y( y5 ]7 L! \ DTAP Defense Technology Area Plan.( w. l" x. h& B, s: ] DTC Design-to-Cost. ( \# U" L3 Z9 X% ?6 r: |! @' mDTD Digital Transfer Device (TelComm/Computer term). I5 q* q2 Q1 F. i& d DTE Data Terminal Equipment (TelComm/Computer term). 9 F8 w/ Y& I4 C- B1 u e5 i, z) uDTED Digital Terrain Elevation Data., Q- z" z! i% L& J DTIC Defense Technical Information Center, Alexandria, VA. 9 V) a: Q7 Y) J0 O7 d2 `MDA GLOSSARY, VER. 4.0 D( s3 t# s$ U, g+ i: u# M 86) [ J7 }+ t+ r2 n) u$ L# `' b @, { DTIS Defense Technical Information Services (now DEIS). / [, {3 `8 w+ h" VDTLCC Design to Life-Cycle Cost.+ C0 n+ K/ t/ E$ v# p n8 Q DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL" }; S. f3 l# @ N+ o* F term). 5 _; E0 U* H) g9 ZDTLS Descriptive Top-Level Specification. - C- U: j" P& p6 [- T) w8 o" ^DTMF Data Tone Multiple Frequency (TelComm/Computer term).& N+ b+ h. \/ @& c7 s9 p6 u! c- C DTO Defense Technology Objectives.2 q3 ]3 }3 m8 b& X- t; J- `( z DTOC Division Tactical Operations Center. 8 T2 J6 {5 T3 ] mDTR (1) Demonstration Test Round. (2) Development Test Round. 2 Z+ c. G! T1 n4 JDTRM Dual Thrust Rocket Motor. , F" E! @" y; a! g8 g4 N4 iDTSA Defense Technology Security Administration.6 m/ z" @% m- S( e9 g' C! h DTSE&E Director, Test Systems Engineering and Evaluation. 1 Q1 z/ l$ [; W r; eDTST Defensive Technologies Study Team.9 L# F7 }$ I `# o! c' z DTT Design-To Threat 4 F8 @- i5 y; o+ T% nDTWT Dual Traveling Wave Tube (Electronics Engineering term). 4 r8 f1 }" D3 vDU Depleted Uranium. : j7 |6 ^1 v$ k% j! x$ N4 hDUA Design Upgrade Assessment.+ q+ { @( u! `6 ?4 ~ Dual Source Two contractors producing the same components or end items for the same " e1 |& h7 f7 b, O; \$ @: Vprogram.$ ` g9 B4 N3 E: H9 c$ j4 J DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). ) c/ f7 I5 Z: }' ~2 D0 u" [DURIP Defense University Research Instrumentation Program. % x5 h# G7 k/ w- A3 @DUSD Deputy Under Secretary of Defense. 6 N8 Q" [8 x0 `) [2 g# _$ Z7 Q4 Z$ q" R7 [DUSD (ES) Deputy Under Secretary of Defense (Environmental Security).4 B1 H4 z$ l' W; a" I- \ DVAL Demonstration Validation.) u; @9 W R) J8 S+ b$ K+ O DX The highest rating under the DPAS. It takes preference over all other rated and: z. ^" N5 ~0 ?' I+ O, G not rated orders on a contractor’s production line. The BMD program carries a0 \3 J, V7 h0 L+ U7 A “DX” rating.# ]* |# ?% i3 ?* l3 O+ { MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 & C7 }4 x+ P1 h. I8 f+ tE East # E+ N' V3 _( }. U0 BE2 I See Endo-Exoatmospheric Interceptor. s5 q/ W) ~' |" ?# j! KE2SRD Effectively Two-System Requirement Document. % y" ]5 O) U% V1 IE3 (1) Electromagnetic Environmental Effects. # R: E8 |% |( b6 L6 E" Y(2) Electrical, Electronic, and Electromechanical.1 {* X4 S: v v$ J1 F E Spec Materiel Specification. : ~1 w- ?) J- x4 PEA (1) Environmental Assessment.2 J, @, U% [# Q: ~2 R8 ] (2) Engagement Authorization. c8 L& y) n2 {9 @+ g& ]0 g2 C(3) Executing Agent./ u0 E% t' N) ?8 M* `' O9 C- b (4) Evolutionary Acquisition.2 k9 S2 B9 V% c: R (5) Environmental Analysis (environmental term). 0 _. T0 [* h2 r7 p2 o7 M, s {(6) Executive Agent.+ W2 Q8 r# B4 b& @3 z8 {! y' O EAC Estimated Cost at Completion. 2 S( B- U& T C5 m3 PEAD (1) Engineering Analysis and Design. (2) Extended air defense. 5 Z7 `/ u0 e2 AEAD/D Engineering, Analysis, Design and Development. - n/ w8 s" t" r* HEADSIM Extended Air Defense Simulation.. O# ~9 D7 Q6 d EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing1 e- N7 G$ C, I/ r( C% o users to model military response to airborne and ballistic missile threats.) j* E( J R2 P L) C1 C EADTBP Extended Air Defense Test Bed Program.% `& a9 D, ]" _4 R, r% j, @ EAGLE Extended Airborne Global Launch Evaluator.' ?$ Q1 j& y" W3 M. C; P9 j EAM Emergency Action Message.7 t8 H; r o" J+ _& P EAR Export Administration Regulations. 2 ~' O+ [* Y8 m" J* i& HEarly Operational ' W, Y; D6 X) SAssessment( {( o& Q7 r5 p9 a- h; d" k. T An operational assessment conducted prior to, or in support of, Milestone II.: e& d: u& [9 I! a Early User Test: R4 Q' d( a# b1 f2 D; o$ n* S (EUT) 5 O! h5 ?+ ^' b7 g4 i* w9 GA test employing representative users to examine materiel concepts, training or ) o+ s2 H* E0 ~7 V. M3 p/ @6 ^2 Mlogistics planning, or inter-operability issues. EUT can be accomplished during 9 l3 \8 ^ [( LDEM/VAL on brassboard configurations, experimental prototypes, or surrogates+ J% K( s7 O" l+ d to provide data leading to the decision to enter full-scale development. ' L+ G* g8 Z% C e" i* DEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of $ o, T* I L* k$ [* usurveillance satellites and long range radar.. Y7 j8 D8 `/ t0 G3 V1 F (2) Early notification of the launch or approach of unknown weapons or 8 b E& O! H3 z2 q jweapon carriers.' T" U/ O: L4 @; E& F$ s Earth Limb The apparent outer edge of the earth as viewed from space. 7 V2 }( @, ^( Q9 L+ v7 dEastern Test Y: Y" u- ~- }) @; O5 x8 ?. x Range (ETR)3 G3 r5 U; ?! K Beginning at Patrick AFB, FL, this range stretches halfway around the globe' q( H2 c8 Z3 j" c6 E" x where it meets the Western Test Range. An array of launch complexes, sensors, 1 @2 l+ s0 e1 ], l2 \and tracking sites make up the Eastern Test Range. The ETR is now operated 2 I1 t! K/ n/ s9 D* J' g1 Uby AFSPACECOM as shown in WTR definition.( ?$ L% F- }' L4 e4 g, r MDA GLOSSARY, VER. 4.0 E% P3 M+ Y, t- T3 U 88 # x- @/ }3 I9 t! w, C; \EB (1) Electron Beam. (2) Enhanced Blast. . L4 q9 Y! N4 I# j- pEBB Electronic Bulletin Board. , S3 b+ S% X- y9 H+ D. _EBCDIC Extended Binary Code Decimal Interchange Code.) i1 @$ V, I P% A @, V. ? EBW Electron Beam Welding. + I" M" N" x+ {; _EC (1) Electronic Combat. 0 ?' P) ]$ S' `) r# q9 _4 l7 U+ [(2) Error Control. 1 |0 A% r. h0 [) o(3) OBSOLETE. European Community. Now known as the European Union6 a) y0 ^) x6 Q# w. k. N* j (EU). * N0 @: [: Y x% O# S+ DEC/EDI Electronic Commerce/Electronic Data Interchange 3 l d' J8 j! h" G e' aECAC Electromagnetic Compatibility Analysis Center.+ y1 }1 r( p4 z% c ECB Engineering Change Board. 9 E7 m' d* U, ^ECC (1) Equipment Control Center. (2) Element Control Center (USAF term)., Q4 Y( C, v: D; h2 Z ECCM Electronic Counter-Countermeasures." L% w6 w8 b7 }; X O# Z+ A ECDs Element Control Directives.7 B( H( |* ~) s ECLS ERINT Command and Launch System. . ]' j6 |( j/ m% O- V) QECM Electronic Countermeasures.. a% d8 E$ e- ` ECN Engineering Change Notice. " w: ~. u( W* h$ K7 ^, ~ECO Engagement Control Orders. , q* @9 D; _% @! U. tECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. ; P P5 ]8 D7 _# ?. aECPMO Electronic Commerce Program Management Office. ) g: d% K, U, v" f9 w+ K+ P$ pECS Engagement Control Station (PATRIOT).9 l* Z0 H8 z( y ECU Environmental Control Unit. 5 F0 i0 b3 T! @6 fEDAC Error Detection and Correction . Q7 P Z6 i0 h8 E. cEDGES Electronic Data/Guidelines for Element Survivability. ! o: H; ]/ ~8 D, P, \9 [EDL Electrical Discharge Laser & g) |/ O* v: D6 [EDM Engineering Development Model.5 G( a, c2 e6 U, C! c EDP Engineering Development Process + V# _' [" M$ a; _' G: UEDR Embedded Data Recorder (PATRIOT). % g8 E; P$ G' H+ M3 P) a- bEDS Electronic Data Systems Corporation & R W3 v/ i) N! iEDWA Engagement Determination and Weapons Assignment (PATRIOT). 6 ?- r( o1 A# _1 v) O, dMDA GLOSSARY, VER. 4.0 E ; \, R9 u. T( d6 s! i89 r/ o" l7 y! kEDX Exoatmospheric Discrimination Experiment # T, X1 l5 z5 [$ ?; Q) t U# [EE (1) Electrical Engineering. (2) Engineering Estimate. ; ?4 l, \7 D5 PEED Electro-Explosive Device.+ L: ]" |" M8 S EEEV End-to-End Experimental Version. 2 \9 v6 M4 c3 A( E7 G6 g: yEEFI Essential Elements of Friendly Information.3 D9 O0 n2 n0 l; @) v5 W; I) ? EEI Essential Elements of Information.9 O( U" e# p( ^3 V: f6 X EEIC Element of Expense Investment Code.+ G6 r& M6 S4 {. _ EELV Evolved Expendable Launch Vehicle (USAF term) ( |' f; }) {& q1 c+ _# BEEU Electronic Equipment Unit.4 i5 p4 x) L' g3 D EFEX Endo-Aeromechanics Flight Experiment. . \. C3 l' V( d3 r$ i% K' @7 R' HEFF Electronic Frontier Foundation. ! w- m* z9 P8 ^# C- ~. f$ R! PEffectivity A designation given to the BMDS configuration and demonstrated capability at( w7 r: F7 [# W; i! Q7 R a point in time, becoming effective at each increment when an element or * E; N* |. Z- i; d5 Q2 u d9 pcomponent is inserted into a particular Block. 7 v8 ^6 L+ j& b# V7 \Effective Damage That damage necessary to render a target element inoperative, unserviceable, 2 O" P0 d: g: R: ^- ~nonproductive, or uninhabitable.2 t% T( ?$ P" ?* R, \ Effluent Plume The pathway of movement of effluents through surface water or air. 0 K7 s1 R% Y, T* iEFP Explosively Formed Projectile. - |- R$ Z# A$ ?5 iEGP End Game Processor. . ~1 `, t/ A9 hEGTR Eglin [AFB] Gulf Test Range. 2 ?( y, B' I9 F) I9 {, a% ]" REHC Enhance Hit Capability (USN term, related to SM2 Block IVA). ( ^7 q0 k; ]/ l2 d, Y! e2 ^4 wEHF Extremely High Frequency.0 I3 y8 u) D6 h) x* }1 O7 H4 u ehp Equivalent Horsepower. X7 v# T3 f. A5 N m2 P4 @ d EIA (1) Environmental Impact Assessment.$ s0 n6 S* ?% X0 | (2) Electronic Industries Association. . S9 l9 N, d: o, w: G# I* }) ~EIAP Environmental Impact Analysis Process.! n& ^2 J1 ?: \) n) q7 }" B5 H3 B EIP Exoatmospheric Interceptor Propulsion.2 x( f2 v$ Q `8 n4 @ EIPC Electronic Information Privacy Center. + w F- p. W8 f0 s) W" AEIPT (1) Element IPT. (2) Engineering IPT.( _5 p! C, K' w |& A6 P EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.+ u7 K- V/ w& k8 c EISA Extended Industry Standard Architecture (Telecomm/Computer term). 4 x# `2 J1 H- zMDA GLOSSARY, VER. 4.0 E ) g+ o2 p- U3 b, V909 I G, x0 L* C6 n( ^% u EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.& b7 W0 W/ z/ \5 Z8 e Elastic Range The stress range in which a material will recover its original form when the force- u) e6 l$ }/ |" d. F (or loading) is removed. Elastic deformation refers to dimensional changes 5 o( T c) l+ f1 Y$ v K roccurring within the elastic range. 9 |1 q' B1 P8 f/ x$ mElectro-Optics / S& l4 T2 D' C3 C8 W! FInfrared (EO/IR)( X2 {' @* z. g, m- w' B Technologies/techniques employed by optical sensors in the wavelength$ o; l7 t: N: Q- C6 { { spectrum slightly longer than visible but shorter than radio. ! j; h9 l8 b* X6 u- G5 R4 o: @Electromagnetic$ F: _6 C G' N/ {( u2 J Compatibility / Y1 _" z$ D( z! O9 A. U(EMC) ; @5 `" n" H y- Z; UA condition when all electromagnetic emissions from electronic, electro-magnetic, ' r$ @5 f, I5 V, G/ m* Kand electro-optical components of a system interact without interfering with one$ D; M) C6 ?/ V* b another. - [7 x6 u' N1 [! o9 SElectromagnetic, X/ g8 U& |) D! b Emanations4 g+ r6 K( J* l# t7 d' w Signals transmitted as radiation through the air, through a vacuum, or through) q" u/ s$ @% Z4 I1 x. X0 v7 n conductors.- S$ m7 F" J/ Q8 h- V Electromagnetic ) \# h! g7 m! j$ P+ k: zField (EMF) & @" e: I# u' k+ xAn electric or magnetic field or combination of the two, as in an electromagnetic $ l/ E6 E- K3 ?8 @- owave. Created by electric charges in motion, having both electric and magnetic 7 H- s" c. e9 a3 e7 c& }4 ~components oriented at right angles to one another and containing a definite6 I0 J7 D. ^" T7 @ amount of energy.3 c% S8 N( W5 B9 A. x6 z" k Electromagnetic ) O5 w- B/ c" qGun (EMG)! K5 u- m9 Y( q7 X8 \$ t A gun in which the projectile is accelerated by electromagnetic forces rather than ( K" m# n5 L: g4 Y0 Uby an explosion, as in a conventional gun. 7 a( q: ]! \( t; o% oElectromagnetic {" H2 n" w+ u7 ]% pInterference (EMI) o2 _- h8 Y9 O5 D$ ]. fAny electromagnetic disturbance that interrupts, obstructs, or otherwise1 j& a; a0 Z6 q/ n9 B2 ], \, l" T degrades or limits the effective performance of electronics/electrical equipment. & W+ S% F* k0 cIt can be induced intentionally, as in some forms of electronic warfare, or $ ~ ~) s) W) _( L2 punintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. + J3 @& R! Y! b8 E& B% hElectromagnetic ' X2 S- M, D Y# dPulse (EMP)4 L. q2 c# W* b5 V# }! l R/ t The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of 2 l, {% L. V$ q2 Z0 g4 u0 uthe nuclear device or in a surrounding medium. The resulting electric and " u! D( w; Q+ H( F8 c( G8 nmagnetic fields may couple with electrical/electronic systems to produce ( I$ g, E) k- @: i% odamaging current and voltage surges. May also be caused by non-nuclear # v) d* e/ P3 T, c. tmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic0 J1 }* z5 I0 P7 S$ q Radiation (EMR) # g6 T# I7 ]3 x- Q6 T c, v; C(1) A form of propagated energy, arising from electric charges in motion that7 R6 {5 H! ^# Q5 u8 q- R produces a simultaneous wavelike variation of electric and magnetic! Z2 r" h; X. U1 x" r! \( a fields in space. The highest frequencies (or shortest wavelengths) of- j9 n8 U' @5 i# X$ q$ C such radiation are possessed by gamma rays, which originate from 5 M9 i( S- ]9 [8 @processes within atomic nuclei. As one goes to lower frequencies, the . Q9 \) P1 }' O/ @* melectromagnetic spectrum includes x-rays, ultraviolet light, visible light," Q5 e! M9 O5 S- u infrared light, microwaves, and radio waves.7 b1 ?% r% D* ~$ _7 x (2) Radiation made up of oscillating electric and magnetic fields and6 B1 N1 t. t; H( O) y0 C, j propagated with the speed of light. Includes gamma radiation, X-rays, - Q8 a6 Z f& m1 }6 |; d& V9 h/ Multraviolet, visible, and infrared radiation, and radar and radio waves. & a4 I! c1 b$ G: Z# hElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices6 y$ f) B2 ~5 @5 d6 b( ]4 B used in system/subsystem design, excluding employment in the RF spectrum.; H* s# x- N" N Electromagnetic 0 q. B- S3 L, L& ~) {" tSpectrum) w; ^; J3 y: J2 O1 r9 _2 O The range of frequencies of electromagnetic radiation from zero to infinity. It is7 M; y, D! }) t; l8 z. z divided into 26 alphabetically designated bands., F7 x: y2 O4 F2 w/ l MDA GLOSSARY, VER. 4.0 E 1 n: D+ ]0 x. u- q% \91# \- L, i( l" X' I8 j& U Electronic! E$ H4 v, N; J; Z! T2 a6 j Counter-* }5 \* Y4 U8 H& F1 X" U5 R- r+ W Countermeasure! b" X: i$ p& ? V0 U0 I9 F s (ECCM): v6 a9 m S9 m That division of electronic warfare involving actions taken to insure friendly6 ]' X: v6 V9 n$ V% m o; Y2 A# K" G5 j effective use of the electromagnetic, optical, and acoustic spectra despite the ! {% o# W4 r/ H# e5 t+ M3 fenemy’s use of electronic warfare to include high power microwave techniques.6 H4 g! `) A9 Z7 { Electronic" |7 Y) t" n3 @# m z2 t( [ Countermeasure5 P+ t- q" @, Z" Z, W8 a5 ~ (ECM)- O G3 u, Q, U# q" j) b! Q7 s1 q That division of electronic warfare involving actions taken to prevent or reduce an 0 g/ n% P, O3 k& H/ ^6 a! p9 zenemy’s effective use of the electromagnetic spectrum.9 y7 b$ g( T* A9 m1 M% ^$ g: O Electronic 7 c3 V# W( t' u9 b+ j5 t- N4 p+ HIndustries # c. V5 ?" D& x. g) }/ |Association (EIA) 9 k. e W5 J# A4 B4 eA standards organization specializing in the electrical and functional/ P1 x8 I* b; B+ ^, W6 M1 D characteristics of interface equipment.5 o Z1 X4 I8 W" ` Electronic 2 J! Q. G9 E& ?. F7 y5 h7 d* l8 {Warfare (EW)$ h) U6 V; G2 r& c1 U+ w% F Any military activity involving the use of electromagnetic and directed energy to 7 e. s* T: B+ Acontrol the electromagnetic spectrum or to attack the enemy. The three major! }8 f6 ?( b4 [- B4 J3 v' o8 j# F subdivisions are:- `: ^" U D0 L# e: c) M •Electronic attack – Involves the use of electromagnetic or directed energy to 5 s$ L; X0 ]% @+ a C# sattack personnel, facilities, or equipment with the intent of degrading," M5 o! n2 O" B neutralizing, or destroying enemy combat capability. Also known as EA.. C2 Y- t2 s* U* ?! P: M Includes: 1) actions taken to prevent or reduce an enemy’s effective use of3 V" N5 f6 E% C3 G/ {5 w: G; }1 ] the electromagnetic spectrum, such as jamming and electromagnetic5 l+ E- }* K7 [/ c" m' E deception, and 2) employment of weapons that use either electromagnetic or 7 B" T) Y/ m9 ydirected energy as their primary destructive mechanism (lasers, radio6 L8 z2 I2 H5 O6 a1 ]' r2 W frequency weapons, particle beams).4 }! Z- a4 v+ i @ •Electronic protection -- Involves actions taken to protect personnel, facilities,5 {$ C3 A \+ n' }" ?0 A) S3 G and equipment from any effects of friendly or enemy employment of* p9 U1 d. U8 r7 @ electronic warfare that degrade, neutralize, or destroy friendly combat ( p% I6 v$ H; E+ Bcapability. Also called EP.2 m S# p. o+ H •Electronic warfare support – Involves actions tasked by, or under direct. q! O/ }' T2 _- `# N" C: Y control of, an operational commander to search for, intercept, identify, and; l# }) X) x1 X locate sources of intentional and unintentional radiated electromagnetic 0 M; I' r4 \, \+ J( r$ k' s1 Fenergy for the purpose of immediate threat recognition. Thus, electronic u9 P5 T" D0 R warfare support provides information required for immediate decisions# L) n2 H6 R0 K' C! h involving electronic warfare operations and other tactical actions such as9 Z, c, V& h8 j" I* G3 A. S; x threat avoidance, targeting, and homing. Also called ES. , B# }7 n2 p" U0 j. GElectronic ! {/ P: p3 ]4 v3 hWarfare (EW) / W) n; r* d- }0 [7 L5 j4 x# T0 ^Environments ( n' L: B: p+ z, ?* t! eElectronic warfare environments result from radar and communications jamming 2 }) i3 r/ |5 Eand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD0 C: `" t1 \1 N" R/ {* C0 f system.2 D. U$ ?. a; s( S Electronics+ u- `( \- _2 a. j9 m Intelligence9 S% w7 r4 f8 F2 ]( M (ELINT) E# Y7 W* L! d& x. D2 X Technical and geo-location intelligence derived from foreign non-communications " C3 Z+ J9 \0 P9 s$ B ]) O" Q, k$ belectromagnetic radiations emanating from other than nuclear detonations or 4 b1 C5 g( o y- @2 ~5 {3 jradioactive sources.* d* R- R. ^+ V* Z Electronics % A5 k1 \2 x. @9 w/ h: S: r) Q( NSecurity (ELSEC) * G/ g% N% M' xThe protection resulting from all measures designed to deny unauthorized: X; U. ?$ O9 R4 x persons information of value that might be derived from their interception and) \- B B* j( Q study of non-communications electromagnetic radiations, e.g. radar. 2 o7 ]0 R! G: g! dElectro-Optics $ X i# H1 [/ S$ e- a$ I0 _/ dInfrared (EO/IR) ; ^4 P: V6 s* L/ X0 b) m, VTechnologies/techniques employed by optical sensors in the wavelength ( t6 u; m V) I+ O' Uspectrum slightly longer than visible but shorter than radio.8 T1 v* O# \* b2 ?! |$ Z MDA GLOSSARY, VER. 4.0 E" j; ?: D; F1 G9 |2 U. G/ u$ T% a! J 921 i+ d8 y2 H8 D/ P5 x Element A complete, integrated set of components capable of autonomously providing ( K, I. l7 \; B' N, t% ?BMDS capability.& q4 s7 U; c9 M. ? Element6 S5 ^' N1 p8 [& z Capability* g4 O8 {3 s$ k3 v) C3 X Specification " H }; [4 D& n2 V( h(ECS) 3 {2 L3 D1 m( K6 G+ K- x$ pA document that identifies the element-level BMDS capabilities and/ X; t. v3 y' ] specifications necessary to achieve the system capabilities identified in the SCS.- _, T) g+ n8 B7 A' L The ECS further defines the SCS-apportioned mission/technical performance0 ~9 ~ S4 N1 m( U( B capabilities and allocates these capabilities to the element’s components. , D0 v; C5 D% ?; nElement Control9 i& M3 x6 j5 X Directives (ECDs) g$ _" S; q( h& n* Y1 o" z! p The command and control data instructions to control the conduct of the 7 h1 t- }1 ]: N/ H5 U& [ G- _engagement. ECDs are developed by command and control software based- N G+ L- S/ h C: F7 u+ t( S upon variable parameter input by the operators (both pre-planned and real time), 9 p2 U3 W: e) `1 N! q! F8 t: U* @and operator defined rule sets embedded in the software. The individual battle ?! {: s: \1 @: v' J/ t9 Amanagement processors use these instructions to accomplish the assigned tasks ) M9 D& I; p# o4 P& x+ {% X$ O5 ^8 jfrom the operations order. ECDs are contained within a Task and represent the$ D2 Q% {/ k5 @$ n form of parameter values that influence the resource management processes of. A. a* D& W5 x( V1 C* Y. j Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and' a( g% B0 ~' Y+ E' n( E Communications Management (CM). There will be numerous ECDs per Task.' G: S8 b' @5 {. _4 I8 ]$ D3 S Element z! B* G' \$ Z% eOperations) a+ y8 R$ l# n7 F Center (EOC)$ b9 G& J2 u% z An Air Force operations center, which operates and maintains a BMD weapon or) J# u' H8 `1 K4 E- A' [/ ` sensor suite. (USSPACECOM)5 y b; x' A* t ELF Extremely Low Frequency.7 @2 a: O7 T0 V0 R _7 Y& Q ELIAS Earth Limb Infrared Atomic Structure. ( ~4 x* @, ^, l6 [2 p, GELINFOSEC Electronic Information Security.( ?" w% m+ C B+ l. z4 J; E& c ELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-23 00:01 , Processed in 0.050003 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部