航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation ; t, J; j/ n4 f/ h* D- wCOMSEC Communications Security. 2 }3 c. U, t/ M) }0 ?7 T ~4 \Concept 8 y5 U- N4 J2 N( X+ W' AExploration & % F" f) \! h% |0 A% m D. D% KDefinition+ O) A& b$ D* k/ ]* k" R/ z The initial phase (Phase 0) of the system acquisition process, beginning at/ c5 l9 h* F( X* r2 v; B Mission Need Determination. During this phase, the acquisition strategy is 6 \. ^- k" C5 C) O& i! H# R5 B, ?1 Wdeveloped, system alternatives are proposed and examined, and the system 5 q* a- T2 A) u4 u, S4 k2 Iprogram requirements document is expanded to support subsequent phases. 3 b. b! s! ~8 L/ Q7 g3 eConcept of+ O# h! S6 l7 j' c8 B Operations 0 t8 K; x9 A: T- X z( o. z0 ^(CONOPS)4 j: x2 w# y1 d" X" o, ?; n1 i (1) A statement, in broad outline, of a commander’s outline or intent in regard to9 S# m( p. M' g an operation or series of operations. The concept is designed to give an overall 1 M0 B1 u5 b# f/ H* b! npicture of the operation. (MDA Lexicon)' l! ^/ z9 o# y0 `2 q, L. w% Y (2) A verbal or graphic statement, in broad outline, of a commander’s/ K i/ R/ O- R' o3 V1 A assumptions or intent in regard to an operation or series of operations. The' s% p G w: R+ A% } concept of operations frequently is embodied in campaign plans and operation5 l/ t% E& u4 H plans; in the later case, particularly when the plans cover a series of connected8 Z: K" H. d/ v operations to be carried out simultaneously or in succession. The concept is! j: r; @" p3 ^: h$ _* | designed to give an overall picture of the operation. It is included primarily for; K% G5 D5 o* Q: l* c. ~; I. d. M additional clarity of purpose.) e0 o# A- X7 L6 f0 E0 o Concept Plan An operation plan in concept format. Also called CONPLAN.- A, j) e& b4 `4 V" e Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of& R3 F5 R& p# Z. {6 l* W the acquisition process, or combines development T&E with operational T&E.9 ]2 `6 H' @) _4 x1 v Concurrent. r. s) M3 ?9 w1 L* i: t& k# | Engineering% V$ o' u; ? o) I0 Q3 d, }/ I$ S. h A systematic approach to the integrated, simultaneous design of products and . X7 w; K4 z, L* T+ d; ?" `* p# btheir related processes, including manufacture and support. This approach is& `1 r) N; V( D* @. E, @: d/ Q, ` intended to cause developers, from the beginning, to consider all elements of" {; j( H, s I, a the system life cycle from requirements development through dispersal, including ! F$ X/ v" B. e4 i# ecost, schedule, and performance. 0 {" h/ M, ^$ l! M9 NCONEX CONOPS Exerciser. 6 r! s3 K, D5 ?; _Configuration A collection of an item’s descriptive and governing characteristics, which can be ' f. _5 U$ A7 _9 M% Bexpressed in functional terms (i.e., what performance the item is expected to ' u9 k$ _9 Z2 H" B6 I6 machieve); and in physical terms (i.e., what the item should look like and consist of4 _5 S+ O0 T3 B when it is built)." a' X9 Z, i7 e8 S& O MDA GLOSSARY, VER. 4.0 C& t7 k: o! E/ b4 F$ u 59# L3 L; m0 R5 k2 {$ C$ S Configuration h, T5 f+ _* V4 S Audit # f) o! g+ R% n4 E: EOne of the Configuration Management tasks which includes a functional! I4 Z% p$ u [0 K configuration audit (FCA) to validate that the development of a configuration item# C$ `& {4 S( {, W has been completed satisfactorily and that the configuration item has achieved3 E" y8 e8 r; y* O to specified performance and functional characteristics, and also includes a9 _* Z; N- \& Z$ E" x physical configuration audit (PCA) to verify that the configuration item “As Built” ( d' ~! S5 |/ g, q# W# N8 K" m+ G" jconforms to the technical documentation which defines the configuration item.2 g7 w: g9 {5 I% x$ f. S Configuration $ y P( Y, `$ A* k; Z8 ? z/ zBaseline! ^7 {; m& O9 `0 o9 } The configuration documentation formally designated by the Government at a # g+ j/ O2 c+ J1 _; bspecific time during a system’s or configuration item’s life cycle. Configuration: e/ z; t6 ?6 Y7 }" x* i2 R P baselines, plus approved changes from those baselines, constitute the current- S ^8 v$ {& z5 ]: y! l3 D configuration baselines, namely the functional, allocated, and product baselines. 7 z0 ]% P$ l* j2 H( \) c* EConfiguration# Z+ _$ Q G& S$ t! K$ f Control - {) Z2 Z3 \: l+ @1 Q/ U: C/ r2 N+ FOne of the Configuration Management tasks that involves the systematic 2 x( _, z! p; levaluation, coordination, approval, or disapproval of proposed changes to the - T$ d9 _$ j ^) f- W7 _design and construction of a configuration item whose configuration has been: |2 R7 E9 Q$ d K formally approved.7 N. Q9 N, b& c! u Configuration8 M' I6 q/ y* E. y Identification6 p3 z& Q/ j; j1 s- [; k8 ` One of the Configuration Management tasks, which require that for every $ e8 K; g2 `- ]. n9 mchange that is made to an Automated Data processing (ADP) system, the design : H5 E+ M- ]' O3 Y* Y" Z+ Z gand requirements of the changed version of the system should be identified. 3 l& x+ l2 T* O8 h7 AConfiguration( a2 V, E& \1 q: q4 N Item (CI) 1 ?* m$ a8 J/ W* W3 `An aggregation of system elements that satisfies an end use function and is 7 A0 I# v/ x% C3 ~; I. }5 ~* |. I- Rdesignated by the Government for separate configuration management.1 {+ i1 Q" z: R. ^+ D: [! } Configuration items vary widely in complexity, size, and type. Any item required) w% J$ q+ Q$ Y3 ]4 T for logistic support and designated for separate procurement is a configuration ' _6 o; l$ s8 ] c: c* _item. Configuration items are traceable to the work breakdown structure (WBS).) U0 p3 o B2 @8 ]+ U# b& e Configuration 5 }3 p4 _/ |$ x2 X# b* VManagement2 H# L0 N( ^4 V! x (CM); W* H9 y) j3 q) E% `2 \ In computer modeling and simulation, a discipline applying technical and 3 g# R$ c6 V5 C. q1 V+ o0 Cadministrative oversight and control to identify and document the functional : J/ o' E A; c6 C7 q2 prequirements and capabilities of a model or simulation and its supporting 3 c6 i! N) U3 M+ v. M- X+ S3 B; Tdatabases, control changes to those capabilities, and document and report the 9 ~! r" T$ o2 D: b6 \: e- Z {( w Uchanges. See also Accreditation. ^8 q2 ^6 b* G: Y, o: h CONOPS Concept of Operations.2 }+ C8 z5 L' d" v( U7 G9 y' }5 V CONPLAN Concept Plan% x) S$ \% V6 p+ \$ I; k# }+ R CONS Contracting Squadron.( N. s3 J6 V, X4 K Consolidated 0 M5 A* I0 w% O# L$ H0 mCommand Center ; ?8 X2 N# h( f1 W) L- K(CCC)/ l: ?4 t! K3 w) I- x6 \* g- H A single command center from which USCINCSPACE/CINCNORAD can direct all9 Q) t9 S" j6 D! V% A his assigned missions, to include BMD. (USSPACECOM) Located in Colorado 7 ?4 c: f0 V, {5 T: p% ~Springs, CO.) w2 @6 p" E$ K: h. [/ V+ E w! v Consolidated0 c" i3 N9 x( B" r Intelligence. B7 j4 i1 i4 r" X7 | Watch (CIW)- e; O$ O2 ?) v0 r- | h7 y, }* B! [ A consolidation of intelligence watch functions within the Intelligence Operations ! t2 Y6 U8 Y% s5 QCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD : z4 a: \" D7 q- f% Q) VAerospace Defense Intelligence Center (ADIC), and the Air Force Space9 P, B8 I& G& A2 F# T; j& l Command Space Intelligence Element (SIE).; a/ x1 C; B% t, |$ U, S' y, o' \ Consolidated 0 A6 V% R: h* a3 S5 MSpace& A5 ?$ m4 Q) @& j/ X* v- D Operations d7 I+ r- d" Q. J+ c Center (CSOC) 3 l% T# l. d; ]: @Series of centers at Falcon AFB, CO, which operationally control and maintain# Q8 A3 z8 e0 Y3 V E. y assigned DoD satellites.) i* L5 m4 O+ ]. W Consolidated # g: \9 X' _: r4 J: w2 X# o' zSpace Test ]9 E8 V: C0 j- p1 }4 |; ^* b& cCenter (CSTC) . ]+ i5 I$ p: X* |Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and, j5 c6 c6 i: h1 K" m- }( S initial on-orbit checkout of operational satellites, operate R&D satellites, and8 y/ _! h0 I, B serves as a backup to CSOC for operational DoD satellites. t+ a: f2 H$ p MDA GLOSSARY, VER. 4.0 C$ J7 g- h5 @" I+ ]$ L3 c: ^( Z 60# h! R# ^, o. `/ Y- N# K Constellation0 i" N/ b' a/ _/ @ Size (CSIZE) 6 u9 e0 s: v- f h3 o& cThe number of satellites of a particular system placed in orbit about the earth.( H* d; b h' @( M% t& } Contact Fuse Device used to detonate warhead on physical contact with another object. 4 }* ]6 k" A: S, A' fContingency 8 s; c: Q5 o9 c% W! Q. u8 IDeployment Plan3 v+ A9 l# s, A (CDP) 8 K( G! I4 v8 F' M" M" R$ F/ F. _An executable plan designed to deploy an early missile defense capability and3 @4 w; R; P! w. w reduce deployment time. The plan provides specific executable deployment$ [3 A7 k) ?0 `( d! |; M0 L options and describes activities required before and after a deployment decision. 3 W( V/ v$ J/ ^5 JThe plan also allows decision makers to have oversight on technical progress," |' }- N4 B" d cost, schedule, and risks associated with a deployment system.0 e/ y# p x9 L0 U" q Continuity of 5 v; r; B Z( {: y& U; h7 MCommand3 y# M% H; L" ]* @) C6 | The degree or state of being continuous in the exercise of the authority vested) E1 ]$ y# f# G _1 n1 Q' @7 F in an individual of the armed forces for the direction, coordination, and control of " ]% Y' ~& H5 R% w3 y3 Y/ hmilitary forces. 4 Y# o5 t, v1 q$ I/ f0 U$ mContinuity of 5 R* P" Y6 j: k/ j/ ZOperations 9 z5 G* F7 C+ D' W% i4 kThe degree or state of being continuous in the conduct of functions, tasks, or 0 j" D+ m) ?" ^( u T' A4 Qduties necessary to accomplish a military action or mission in carrying out the ! ^3 L, X' c7 C' e- pnational military strategy. It includes the functions and duties of the commander, ( D! E3 [% D" F: @( r4 c4 h8 aas well as the supporting functions and duties performed by the staff and others 0 p4 y/ q* h, T: k1 Z" C+ p8 Oacting under the authority and direction of the commander.5 l7 M1 F! ?0 K, s/ O8 x$ V) ?' h- Q) C Contract % O7 Q; ? b! _4 AAdministration $ g5 R9 w; l! F! O- R, ~$ @( I1 kOffice (CAO) - p. Q1 V( C0 y- h8 z8 @9 L% H: j% YThe activity identified in the DoD Directory of Contract Administration Services 8 D$ |8 i1 w, ~4 ?! ]8 v& r, hComponents assigned to perform contract administration responsibilities. It is a + y8 G: d! ?7 J. a; A# ugeneral term and includes Defense Contract Management Regions (DCMRs), % X+ U4 Y( }! O% HDefense Contract Management Area Operations (DCMAOs), and Defense Plant ( N8 A7 [: ^. G6 ^+ N" ?! r2 HRepresentative Offices (DPROs). (Defense Systems Management College* \0 u. ]" ?! ^) ?& X! V Glossary) : c4 \ s6 @ [# gContract Data ; W" o# o1 L4 _# K7 C, k: G1 iRequirements " `7 o/ p( \ k( P# z: M8 nList (CDRL) 5 _ T9 s) z% r* JDocument used to order (“buy”) and require delivery of data. Tells contractor 1 |% C7 V9 O! @" L* ]0 }4 ~, lwhat data to deliver, when and how it will be accepted, where to look for9 v6 @0 M* P6 m9 g instructions, etc.! M) B( x; G7 b7 ]& r v Contract5 ~. F: G2 e, A1 c, b* ]: r Definition + h- n8 G% z( Q5 CA funded effort, normally by two or more competing contractors, to establish 8 l, w7 |6 C; d* \specifications, to select technical approaches, to identify high-risk areas, and to " q3 p& e. O! fmake cost and production time estimates for developing large weapons systems. $ d5 z/ f3 o1 q1 B7 Q# `Contract Work* Z* r: ]/ [0 Q' a1 w: T, ?7 i: m Breakdown/ ^8 y" t, ^- L* i: q, R+ \4 s Structure # _) d3 s( ~ @- {0 _" zThe complete WBS for a contract developed and used by a contractor within the ' G, Q1 q6 f. C& w4 ~0 @3 d pguidelines of MIL-STD 881A, and in accordance with the contract statement of. j5 o" c: K0 A; n8 K$ T9 G0 z/ u work.) o, V2 \# q. l Contracting 4 G! B; `; Q s. L5 lOfficer (CO)9 ^( O9 A- ~7 {9 H! X; s A person with the authority to enter into, administer, or terminate contracts and3 n2 Q* u8 y: G+ L make related determinations and findings. The term includes any authorized 9 v& i/ f: U% J G# Orepresentatives of the CO acting within the limits of their authority. A CO whose ( C4 P: _( k& V6 Pprimary responsibility is to administer contracts is an Administrative Contracting/ O8 y/ v/ M, a; H, |4 B3 B Officer. One whose primary responsibility is to terminate contracts and/or settle 0 [7 u; T7 s5 ], |terminated contracts is a Termination Contracting Officer. A single contracting- m5 c! u0 @9 p' _0 B, d officer may be responsible for duties in any or all of these areas.5 v0 V9 v2 |+ V* k Control Authority that may be less than full command exercised by a commander over% {( h3 f% T+ d2 U part of the activities of subordinate or other organizations.2 o# u9 [% n) E* g0 Y( u/ s Control / T" M. ?1 S) w+ F% o6 m7 ^Abstraction $ o$ I) r3 v) ~' Z9 W4 Y# a4 F(Software) The process of extracting the essential characteristics of control by 5 A0 e8 [0 a. C: mdefining abstract mechanisms and their associated characteristics while 1 c- h4 ~% s, q1 \disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C& U" z4 E8 c! @' S5 x$ v 61 ) b/ g: t+ x1 Z6 Q1 g. \Control and4 A* L# b0 s8 L: d Reporting Center 0 b2 X* c- D0 c; c4 h* \* hAn element of the US Air Force tactical air control system, subordinate to the8 x- Z) M; s( y4 K- r, j7 N/ r tactical air control center, from which radar control and warning operations are; Y' V& X- A* O$ ]% {4 f conducted within its area of responsibility.* D3 Q3 T F7 L( {% m# { Control and 5 M- i# E# ?* U$ @# w6 zReporting Post5 L: ]) j3 h& M& Q; u An element of the US Air Force tactical air control system, subordinate to the 0 h0 u0 s6 H7 P* r! Qcontrol and reporting center, that provides radar control and surveillance within! @6 @3 x" h4 u5 y" `4 V its area of responsibility.! N& Z3 F: O4 P% B! o7 b$ O Control Area A controlled airspace extending upwards from a specified limit above the Earth.8 Q+ D, E4 D/ ~. [0 r6 h Controlled; G; m( A5 M: n7 H. f Environment1 a& ~6 h- n5 a7 K Area where entry into the radiation hazard area is controlled. M- M2 R. ?" o5 c8 [1 O1 VControl4 \, E5 F: z3 I* J Procedure ! _: p* n' p$ tThe means used to control the orderly communication of information between : V: k3 b) L4 d A/ p8 gstations on a data link. Also called line discipline. 0 K0 a o' T. X5 L4 x! nControl Station The station on a network, which supervises the network control procedures such 2 e: d4 }( C+ q Ras polling, selecting, and recovery. It also is responsible for establishing order / O$ p1 r5 b! l* mon the line in the event of contention, or any other abnormal situation, arising$ u, o0 H, t* o2 ~1 x. J between any stations on the network. 9 N; f. T/ n+ Q0 `# z; a7 C. m: bControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to: |( U+ J$ `) }. q process sensitive defense information and that is under sufficient physical and2 J; ~/ Z1 N$ V) M: n3 C technical control to preclude an unauthorized entry or compromise. * V* }+ U. g* G- c6 q, e$ i+ z! tCONUS Continental United States.* F" |+ P% d, `$ r Conventional Co- / u3 p# W& o1 o& ?7 ?% KProduction5 j8 h0 d: o4 }, f$ A1 L1 _ An effort between governments to produce the same end item, or components 6 n5 n& u1 J3 N; x) ?, nof the same end item, in concert.2 `( S. W! c2 n. Q8 I7 P Conventional/ m# P& \6 K8 [: S( a) b Weapon ! [3 v& |1 I1 ~. hA weapon that is neither nuclear, biological, nor chemical. ; Q) w3 D% e% l1 b8 QCoop Cooperative0 A6 A7 }* s$ K% W, V Coordinated, D) s" Y( M0 _: K* h" m: O Engagement8 g( w2 Z/ E* e) @/ P- @ Planning/Actions, z, p4 F1 z5 I7 N Necessary coordination among engagement components to ensure maximum 2 e7 S# d7 @: |% \: Neffectiveness of the SDS and resources are not wasted on targets already & |$ G1 o, D4 j, rtargeted. 9 ~3 K" j) `7 w. Y8 t9 T7 E/ o5 eCoordinating 3 y) H: y0 f/ z' ?$ ]( gAuthority s/ ^5 W- r& e% U0 B; aA commander or individual assigned responsibility for coordinating specific % ^4 }/ h+ g9 `% A& w$ @& Bfunctions of activities involving forces of two or more Services or two or more 6 q: {* e/ h% q7 rforces of the same Service. The commander or individual has the authority to* W+ L. i) F* `7 f1 s4 `0 O require consultation between the agencies involved, but does not have the * m2 m; ?" B/ G1 \authority to compel agreement. In the event that essential agreement cannot be( E+ |. `- D8 B1 F' u3 T3 A reached, the matter shall be referred to the appointing authority. 9 o3 B' z; R5 y- R; d: FCOP Committee of Principals 4 f9 T9 `$ p( l6 L3 nCOR Contracting Officer’s Representative. Contracting Officer. & c; l5 w- A8 D/ Z' q4 pCORBA Common Object Request Broker Architecture.) Y+ v- L5 _0 Q: ^" ^ [# a CORM Commission on Roles and Missions.& b/ L5 [) {' S8 f3 h: k+ y MDA GLOSSARY, VER. 4.0 C ! L/ m! ]9 o: [" v62 ~4 H( g$ r% M: Z( d- p Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens 2 e0 y F4 ^1 I) g- B2 hperpendicular to one another, designed to act as a radar target or8 T2 Q; u, _: B$ k) K4 I4 m! B marker.0 U3 ]/ t( _1 e( J (2) In radar interpretation, an object that, by means of multiple reflections 0 U- w" c7 a; L# }. x$ Q2 ]from smooth surfaces, produces a radar return of greater magnitude than+ p2 |, }) j# y3 Z1 w1 ^ might be expected from the physical size of the object. ' C3 c% ?9 o) }! ^$ W1 uCorps SAM OBSOLETE. See Medium Extended Air Defense System. + v0 B& U8 ]+ G3 N/ F; jCorrelation (1) The process of relating observations or tracks from one set of data to ' @1 g4 p* p% {) G+ N) v8 Iobservations or tracks from another set of data, i.e., collecting data from; G- s B6 q& d) k9 T2 z' B2 [ different frames or sensors that presumably relate to the same target. (2), R. y: @. G/ U2 C& Z0 |6 V In air defense, the determination that an aircraft appearing on a2 o4 ~5 \3 y$ V# ? r: } radarscope, on a plotting board, or visual is the same as that on which : V0 @ x3 h' H4 Y# Qinformation is being received form another source. (3) In intelligence ; b, O9 [: K1 k8 Z$ Fusage, the process which associates and combines data on a single / r0 @1 @4 ]2 e3 Kentity or subject from independent observations, in order to improve the% T" Y2 u( e; f% m2 G5 c" t9 k& h- K reliability or credibility or the information./ I8 J- ]0 w" }# d# @2 T% w COSEMS Evolving architecture operations support tool.3 u) e- V f1 P6 q' n COSM Computer System Operator’s Manual" h; m! C. {$ ~2 F COSMIC NATO security category. 1 l6 ]3 w+ W k6 v* [9 W7 tCost Analysis 6 r- I9 Z# L6 F, }7 g- A& N% oImprovement5 y# m$ Z% Q0 N9 g Group (CAIG) . m- n, q2 w T8 o& p6 sAn organization within the office of OSD Director, PA&E which advises the DAB " T+ @+ B: q7 n. y5 ]on all matters concerning the estimation, review, and presentation of cost6 U8 L- Y* F. q0 C3 ~% P analysis of future weapon systems. The CAIG also develops common cost ( F# r5 s1 H$ o8 o$ A g$ n* d/ P: j$ }estimating procedures for DoD.7 k, d N0 e6 U8 N0 C" D$ q Cost Analysis5 u% E0 X9 M$ F* ~% | Requirements# }5 N/ i9 a* R- i* g4 h1 H6 C Document 6 a5 \. l) X# M/ S4 [(CARD) 4 }, P' y& c7 n3 U% ^2 pThe document describing the technical baseline, which is a subset of current4 ?: `9 V" a! B/ E system technical data and is used to generate the baseline cost estimate for an ( H4 f1 D! G6 u- ^SDS element. It includes, but is not limited to, the element description, # P$ w. ?! D% y; V1 F" y) Linterfaces, operational concept quantity requirements, manpower requirements, " k: c' {5 r f+ a& J5 o$ r! Hactivity rates, schedules, research and development-phasing plan, and facilities * Q( r, N0 h" y9 W2 y: {$ u4 trequirements. 6 X% f5 ]2 P* s. S- UCost and# m" m5 p; T2 E+ h Operational ; z# `$ p$ [4 [) {% J; `/ MEffectiveness : d& W, ?6 v( T4 l+ bAnalysis (COEA) % h2 P. S+ Y1 U A# H' zAn analysis of the estimated costs and operational effectiveness of alternative) S+ e. |1 b. g- s$ U materiel systems to meet a mission need, and the associated program for ) g1 f3 ~. y9 `; w% K* u" J$ Uacquiring each alternative.: d% ^: S6 h5 |7 S- H Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk' g- v( p" |7 W due to cost estimating errors and the statistical uncertainty in the estimate. 5 ^4 g# B6 U9 q* v8 Z8 i3 }Schedule/technical risk is risk due to inability to conquer the problems posed by$ I- l; u8 F) y% ?1 e the intended design! M. {) p6 k# X" n1 N/ r% ^/ f COTR Contracting Officer’s Technical Representative. See Contracting Officer.- r& E& w4 Z" v$ m# S COTS Commercial Off-The-Shelf./ X/ \) H; e' P Counterair A US Air Force term for air operations conducted to attain and maintain a desired3 X$ A4 M! C) X# r; j( l. Q6 r ~& O degree of air superiority by the destruction or neutralization or enemy forces. 1 @9 @+ K7 `' |; ABoth air offensive and air defensive actions are involved. The former range; e7 G* y4 F2 X; F- x4 y$ E8 h throughout enemy territory and are generally conducted at the initiative of 4 {' _: ]$ o1 c5 ?0 H6 |$ W2 [friendly forces. The latter are conducted near or over friendly territory and are # W9 \3 u# v7 y$ _generally reactive to the initiative of the enemy air forces.2 U7 s0 g4 B* j/ N( j) L' t9 v d MDA GLOSSARY, VER. 4.0 C 4 |& o+ ]; B0 }4 U9 ?+ H0 h634 ?% M& t4 i* x" U Countercountermeasures 0 ~& i4 l- `# \4 n7 t; t# _* j(CCM) 4 @0 ]) {% K3 y2 bMeasures taken by the defense to defeat offensive countermeasures. ( H0 n. u2 k+ vCounterforce The employment of strategic air and missile forces in an effort to destroy, or! N. Y' S+ s1 ~+ ]5 x render impotent, selected military capabilities of an enemy force under any of the% C) l5 B! m5 q+ Z+ ~/ c circumstances by which hostilities may be initiated.: o9 G2 \ F. q* z# z( d0 Y Countermeasure A design or procedural measure taken against covert or overt attacks.9 Q5 u, E" I. q O; C/ I Countermeasure4 j+ ^7 |/ Q" p/ t s (CM) ) M' H! W9 F% i9 }8 }7 ]0 G- l+ oThat form of military science that by the employment of devices and/or9 c% }* b% K/ n# @3 r4 K8 Y$ [2 @ techniques has as its objective the impairment of the operational effectiveness of 0 G: y4 v: k7 j" Genemy activity.6 S+ c u. x/ n7 w$ m Countermeasure $ V) f( \) y7 Z+ cs Rejection * N, f* M1 J6 w7 \ v5 U(Surveillance) % ?$ b2 Z* G/ l4 z! C" |Improvement or rejection of an object signal in the presence of ! p- _# L' `. |$ n5 Xcountermeasures. + j2 V* t; i _8 X3 `+ Q0 j# ACourse of Action - ^$ Q# H* H. @9 q6 S& e(COA)8 c8 {7 Y7 S0 m. n (1) Any sequence of acts that an individual or unit may follow. (2) A possible) E# j9 q0 K" R4 o1 A: k8 ]8 M plan open to an individual or command that would accomplish or is 8 _* d* c8 t% Q' B: V; Z; T4 X( }related to the accomplishment of his mission. (3) The scheme adopted( M+ p1 M5 K: V/ ]2 U+ Z$ y) s to accomplish a job or mission. (4) A line of conduct in an engagement. 5 K8 M1 _: v3 w* j5 ]% ], J(5) A plan to accomplish a mission. It describes the execution concept 6 C* T( A1 Z, M( q" w! n* o& Gfor BMD of North America. It will specify the engagement priorities, ( F) A: h0 y3 j+ }7 U. o) cresource allocation and desired results by Area of Operation (AO). ( b& N. `7 d* B(USSPACECOM) (6) The scheme adopted to accomplish a task or0 R. }- g7 _, w$ `2 C3 \ mission. It is a product of the Joint Operation Planning and Execution3 q$ a6 Q+ n2 h System concept development phase. The supported commander will: U' M1 ]' B/ @+ N2 G; p include a recommended course of action in the commander’s estimate. + L. H# Y T5 \$ dThe recommended course of action will include the concept of 7 _. m- R/ x5 E6 G8 B2 e% `operations, evaluation of supportability estimates of supporting & ?4 N: P# w8 Z5 ?5 eorganizations, and an integrated time-phased data base of combat,) Q/ S% T" v$ |3 K$ P, l) T combat support, and combat service support forces and sustainment.+ Q% h" l8 \6 G/ u+ Q3 i" o) U Refinement of this database will be contingent on the time available for7 t8 l. b9 z0 w course of action development. When approved, the course of action + R) C& ~7 h8 ibecomes the basis for the development of an operation plan or: d/ P& r3 b3 R2 g% ` operation order. 0 ]8 m( n' B3 P% M2 v, `/ l( pCoverage (1) The ground area represented on imagery, photomaps, mosaics, maps,) S/ O% l2 J2 O3 u- d and other geographical presentation systems. (2) Cover or protection, as9 a2 @/ x0 e( L% G the coverage of troops by supporting fire. (3) The extent to which: Y( p) H1 k! B* }% W0 s intelligence information is available in respect to any specified area of, b9 B" t8 j3 h; U3 a( a2 j: L) T interest. (4) The summation of the geographical areas and volumes of- q1 r8 l) w1 p5 I z- X& {5 B aerospace under surveillance.) o! J) b% N% U" r0 p; K Covert Timing : f# \; I9 `: M+ G3 E( vChannel% x& R6 N8 u. i* \ A covert channel in which one process signals information to another by 2 Z9 E/ _" i/ ]modulating its own use of system resources in such a way that this manipulation& m7 B$ n, w: o& C1 K affects the real response time observed by the second process.2 `7 {! T8 p5 x/ D CP Command Post. * k' `/ m+ w+ t) i, M$ ]CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.% K$ @7 k. J- N9 p2 c) s+ \ CPAF Cost Plus Award Fee.+ Y& g5 E5 P5 }& ~ CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)! H! j3 b$ X$ h0 l ~+ K MDA GLOSSARY, VER. 4.0 C 6 m' V3 U4 o( W64) i G; V; V1 P8 U0 m0 d' C CPAR Cost Performance Assessment Report. % R Y4 t( z: N# w6 j$ q- vCPAT Critical Process Assessment Tool& s8 V/ Y5 a0 x; {4 Y( n( B CPB Charged Particle Beam.6 e& [# d; r" p* F K CPEV Communications/Processor [Network] Experimental Version. , F l$ F! v& sCPFF Cost Plus Fixed Fee. # h7 a3 j$ V' G" S/ pCPIF Cost Plus Incentive Fee.3 \- d, Z8 Q7 J( ~' R* X- G; w- H CPIPT Cost-Performance Integrated Product (Process) Team.9 y0 u, G% M7 A CPM (1) Critical Path Method. (2) Contractor Performance Measurement.* Q3 Y' ]' z9 K5 o- k1 s& d CPP Critical Performance Parameter.$ W' d' {1 a2 s CPR Cost Performance Report. # g% S7 A0 o: W% t, c0 QCPR/NC Cost Performance Report/No Criteria (Contract management term). |' ]# \' J3 H7 nCPS (1) Consolidated Program Summary. $ U9 Q( n) j& K! Q7 R(2) Competitive Prototyping Strategy. : A; Z& X9 t, N z9 N1 V& M(3) Current Program Status.5 ?& _2 Z! `: q) h; l CPU Central Processing Unit (TelComm/Computer term). 4 b/ |1 n, y3 A4 m) `CPX See Command Post Exercise. " M! K, I$ w6 H8 |8 f% Y0 NCQAE Chief/Contract Quality Assurance Evaluator.3 G1 h- x' P3 R7 h5 }8 b0 `$ @ CR (1) Computer Resources. (2) Continuing Resolution (US Congress term). 9 x8 G1 D$ w7 c, wCR-UAV Close Range Unmanned Aerial Vehicle.) E3 [. R$ z6 k6 K* b! N CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement! ^1 Y$ l$ V/ C. K! s CRADA Cooperative Research and Development Agreement.6 [& n. Q3 e6 J) J+ y CRAM (1) Control Random Access Memory.! ]8 x1 ~; r8 N. F; @ (2) Cross-tie Random Access Memory (Computer term).0 W- }( \0 e3 X0 g7 L2 f% W CRB Configuration Review Board.2 C5 F- ?0 C* w; ] CRC Control and Reporting Center. % \+ [7 e, @( o8 U% `# [3 Z: N* MCRD (1) Capstone Requirements Document. / R7 W6 J1 r( G& }(2) Component Requirements Document.2 b" ~. X" b$ n( y1 q CRDA Cooperative Research and Development Agreement.) T0 R, h: U$ k CRG Communications Relay Groups (PATRIOT).+ J& y8 n: i f4 k- g CRI Classification, Recognition and Identification.) I, ]& v' g$ b( {4 ^( }3 _& D CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C" c. C0 I7 G q1 }, K4 B A 65 ! Y& S( ?( C! M* ZCritical Design , @2 J! K9 s) _3 ?; ^; DReview (CDR)) k/ p4 r* L2 h% F: w; D A review conducted to determine that the detailed design satisfies the6 t" E8 u( F( ^# K& q performance and engineering requirements of the development specification; to $ w0 C+ n% _+ hestablish the detailed design compatibility between the item and other items of ! y9 y/ d( m! x" x. Y0 W zequipment, facilities, computer programs, and personnel; to assess producibility ! q* ]0 f: Q% b2 E( [) f" Dand risk areas; and to review the preliminary product specifications. Conducted ( V4 N, L5 z% j1 K9 wduring Phase I, Demonstration and Validation (for prototypes) and Phase II,: z7 T2 L2 ^0 z; S& l& x Engineering and Manufacturing Development. " C1 L# i9 h; |% l5 S3 VCritical; N+ P$ O% t; S Information% U9 Y$ I+ |9 M Specific facts about friendly intentions, capabilities, and activities vitally needed ) Y/ A" K2 M0 _% ?; n$ t6 Kby adversaries for them to plan and act effectively so as to guarantee failure or/ o' h5 g) P& }- |2 l3 a0 r) z unacceptable consequences for friendly mission accomplishment.4 o% J4 F/ `% g2 B$ f/ z3 T: O Critical: i' P" y3 F1 e Intelligence 6 ~. B% P# H) k* v VParameter, J4 a3 H4 W/ l8 S! O A threat capability or threshold established by the program, changes to which 4 }) q4 n( U# qcould critically impact on the effectiveness and survivability of the proposed " s% v/ o! i6 P% gsystem. . X% d! o v/ x1 I+ zCritical Issues Those aspects of a system’s capability, either operational, technical, or other,5 [* O, y7 L0 D% }5 v& v that must be questioned before a system’s overall suitability can be known, and& P; g/ k" g# q9 n. r which are of primary importance to the decision authority in reaching a decision : m. U* z. w& V( W% f7 gto allow the system to advance into the next phase of design, development,( a" V7 S; ]+ u* F) `" m production, or post-production.9 ^* L3 I Z& E) C+ d Critical - d2 @! o1 t% POperational 1 \& i* A+ d9 qIssue ) f) R6 [- Q2 DA key operational effectiveness or operational suitability issue that must be 6 h) _6 y1 u2 j. c+ Hexamined in operational test and evaluation to determine the system’s capability c* g/ U8 o) C& `9 R V1 u# t to perform its mission. A critical operational issue is normally phrased as a h, a3 O/ H" `4 @ question to be answered in evaluating a system’s operational effectiveness 2 v9 @4 f; K3 Qand/or operational suitability.( Z& h0 o, k( _0 {/ k Critical Path, _2 }$ @# ?/ R) F( s4 w Method 0 ^6 F7 U# k' l' A zA technique that aids dependency of other activities and the time required to: y, N( e6 n8 d' ?) W2 G ? complete. Activities, which when delayed have an impact on the total project/ z7 n0 W! t" V2 p) o! ~ schedule, are critical and are said to be on the critical path. % @- B8 A. y; m8 h' Z+ ]Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to9 [$ l5 U6 [" D4 e the viability or the operational effectiveness of the SDS.. R5 V" t$ ~- c& u+ N% [" ~$ ` Critical Security7 l* ^& _$ s$ x Risk ; x! C3 ]# {/ h/ j5 JThe existence of a security vulnerability that, if exploited by an adversary, could - x$ c) S/ l! T/ n" ncause exceptionally grave damage to the viability of the BMD or the operational 3 M7 T- P7 g2 J( S; Meffectiveness of the SDS. Critical risks assume an adversary’s capability to" p1 k, a! u: [- V cause major system disruption or degradation (e.g., single point failure), / ]5 L. X* x0 q- @5 @destruction of mission-critical components, or usurpation of system functions.0 h, y1 r0 w( L7 L Critical 2 M. W3 O2 S: |. nSupporting: i& o! T( a) N1 E2 ]* ] Technology : m- ?% `2 g! ^, R1 tA technology that program management personnel consider a critical part of the& ^ E' R. L9 c: Y0 M program being described.* I7 F" Q6 p! E, X2 G W+ o CRLCMP Computer Resources Life-Cycle Management Plan./ Q; a2 u; i; e: Y1 O CRM Computer Resources Management.1 F) F: m w) ~- i) { CRMP Computer Resources Management Plan.+ z% m( v6 S* |. X. X CRO Chemical Release Observation.3 O; i6 P4 e7 x& Z! j* t, B2 c4 H1 d7 R l CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC$ j1 p' n" D: R- y1 _ }. L% |8 _ term.)* N4 x# O8 ~8 \/ J3 ] MDA GLOSSARY, VER. 4.0 C$ R# H! h) }. p7 _7 Y* ? 66 ' o' z. s$ T; w% B+ O( Q v8 c6 ZCRS (1) Computer Resources Support. (2) Congressional Research Service. (3). S. q4 }* a# N5 u0 B3 F Contractor Reporting System. ' Q- c& n1 J. KCRT Cathode Ray Tube.) R9 w' s. F& W: m CRWG Computer Resource Working Group.& r8 l- o% `0 Y2 N Cryocoolers Cryogenic Coolers. * T' x0 x( Z% i: qCryogenic Of or related to cryogens (substances which are used to obtain low # ^. o8 s" m. ctemperatures).5 G& c4 \+ _, Z1 |1 q7 G/ G Crypto A designation or marking which identifies classified operational keying material, 0 J; G; S; Z- Hand which indicates that this material requires special consideration with respect 0 f. w# T) O% u" [( \; T% qto access, storage and handling.3 i v7 \* n; J0 e$ q' H Cryptographic : b9 F. B C& ?. rSystem) v3 H: F4 c/ Q0 i. j The documents, devices, equipment, and associated techniques that are used/ C! A- R2 V2 T as a unit to provide a single means of encryption (enciphering or encoding). 2 V* s+ s- v/ M4 g1 t$ I' HCryptology The science that deals with hidden, disguised, or encrypted communications. It 2 m/ X3 @1 O9 X- x& \ ]includes communications security and communications intelligence. 7 ^7 B) O0 W+ e+ k5 Y) Z/ O7 jCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.! O4 u1 H4 Y; e CS/CSS Combat Support and Combat Service Support (USAF budget term).0 J- W5 A- |8 K* _+ p4 a CSA Chief of Staff of the Army. $ m' ^9 u7 r, T# u# M# ~+ \6 MCSAF Chief of Staff of the Air Force. . R( d+ J- L2 K3 P# k: rCSC Computer Software Component. 2 x7 Q- [; e' c) RCSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)0 O; t. \/ J5 P- l% [ CSCSC Cost/Schedule Control System Criteria. ; s, ~, H; v9 n7 o- KCSD (1) Constant Speed Drive. (2) Critical System Demonstration. 9 S* q' [- }5 j4 @( y& n0 r0 V1 OCSE Center for Security Evaluations (DCI).; S7 F( J. Z7 @ CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon/ l* a4 B3 }& J" H6 I# \0 p; g. G System, located in Cherry Hill, NJ. 0 \2 r7 T' s, p p# H3 }CSF Consolidated Support Facility, Arlington, VA. ' T! m9 {7 u+ O9 H& f7 g3 {CSI (1) Critical Safety Item. (2) Critical Sustainability Item.' i, U- I; ^( k% w CSIP Current Systems Improvement Program. 1 O1 D7 I! _2 f8 V9 t1 K7 KCSIZE Constellation Size. 4 @; V3 e6 h. pCSL Computer Systems Laboratory. E) j1 ]) ?0 @8 uCSM (1) Core Support Module (*C2E term). (2) Communications Support Model.' W( h; L1 @0 M$ a& Y CSNI Communications Shared Network Interface (NATO term). ! k0 ` |' L* KMDA GLOSSARY, VER. 4.0 C 9 W0 i( l) Y# Q5 {: L0 I+ V# o670 K5 J, z/ X% r: @- x" e" Q CSO Closely Spaced Objects.( `$ E: O4 H0 \* ]; n CSOC See Consolidated Space Operations Center. $ `- ]4 R) g8 s$ J XCSOM Computer System Operator’s Manual, v, |* ^- S" u% L" O" j CSOSS Combat System Operational System Sequencing( Y' o- S: A+ s( s( K; Q CSP Communications Support Processor (numerous locations, including USAF Air" q L* y6 [9 C* D3 l Development Center, Rome, NY term).# G# \, M F. {6 u o CSRD Computer System Requirements Document. 1 O8 T5 Z$ W/ E6 i% Q2 ZCSS (1) Cooperating Space System. (2) Communications System Segment. (3) . H6 l/ u4 x* H* H: g8 y5 _Contractor Support Services. (4) Common Sharing System. (5) Communications % b( k, R- E9 K3 F. r% x; ZSupport System (Navy term). (6) Common Support System. (7) Combat Service + \6 v5 A( [8 i8 D8 q8 oSupport. ! \& e3 k! j) o$ rCSSCS Combat Service Support Control System (USA term). % M$ f0 F1 G6 u5 xCSSPAB Computer System Security and Privacy Advisory Board. - U0 C: ]3 F% }# f; a: qCSSO Computer Systems Security Officer. % W2 o' p) _0 {7 w1 g+ MCSSTSS Combat Service Support Training Simulation System (US Army term). : B J: m! S SCSTC Consolidated Space Test Center. V. A3 P" h& u: }CSTI Civil Space Technology Initiative. ; H) T+ b' V) B/ Z% ]& XCSU (1) Computer Software Unit. (2) Communications System Utilization.; ]; o9 s2 M) e) q1 y CSUR Communications System Utilization Report. " A* t/ i& M' I' n: [; U- VCT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.4 n3 e4 n. S) [: l1 { (4) Cryptologic Technician (Navy occupation specialty).8 B: R8 O* [) S. B" w CTACS Contingency Theater Air Control System (JFACC term).1 P( p8 R! X& }" D$ H* T CTAPS Contingency Theater Automated Planning System (USAF).4 @) \0 g& Z) n7 X1 d CTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term]. ( q' q5 h8 l6 xCTBM Conventionally-0armed TBM. 1 {6 N) S$ v1 V( s/ a$ z2 sCTC Combat Training Center, Ft. Leavenworth, KS. 5 _' ` p c% UCTCC Critical Technology Coordinating Committee. 5 R" f* F: M% K- H# f" ^% H, cCTD Communications Test Driver.# Z" h p1 {7 g4 W C+ o' _* k% t) f CTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. " j) p- T+ C6 {7 QCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally 7 O$ c k% R/ Q% [& ~( V* Bfunding selected test investments proposed by the Services and Defense( G& u0 f% g# o1 A# g Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C + z F8 B% e! j681 s7 j3 h$ e/ c7 V) X CTF Controlled Test Flights.( }& L9 K& b& Z7 U2 a8 s5 O9 v. _' X CTI Concept Technology Insertion.+ y, g5 Q3 X5 H6 N# ~ CTN CALS Test Network. ! g& Q9 G3 e+ A/ z% uCTOC Corps Tactical Operations Center. 2 x! F; F0 N4 nCTOL Conventional Takeoff/Landing aircraft.0 q0 }! w# M# ~' N" T CTP (1) Critical Technical Parameters.$ }% ?. G M E. s z9 D (2) Communication Tasking Plan.! p% v2 D. g7 O: t+ b( V (3) Consolidated Targets Program. / @6 B ?' c- n- I6 _CTPE Central Tactical Processing Element. ; u- C" r& q$ T1 [9 PCTPP Consolidated Targets Program Plan. . L1 e D# t5 d# ?CTR Cooperative Threat Reduction (Treaty negotiation term).; g9 v) P [9 F) G# _) d CTRS Centers * d- S" t" J( B( M( qCTS (1) Clear To Send (TelComm/Computer term). 1 x2 B- G8 \; w2 C* D6 B' E(2) Contact Test Set (USA IFTE term).; g# W: T5 S2 o) N+ d CTSS Computer and Telecommunications Staff. % A2 C4 y! h, t. p1 @- U e$ tCTT Commander’s Tactical Terminal (US Army). n9 G& ~9 i6 E2 kCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term).$ Q& k6 O2 v, M( s& a& x1 D CTV Control Test Vehicle(s)." Z9 e1 \; z: l+ ]. f9 K! V CUDIXS Common User Digital Information Exchange System. 8 L5 Q4 l. v# `+ k* s, ~Cued Operation The directing of one sensor based upon the data received from another sensor.. U& Y. }* R( ?6 h8 {6 } Cueing Command The command within a tactic, which specifies the sensor element’s coverage6 j2 l, [8 b+ m; t volume." l) v3 Y3 m/ j: e& o Cueing Data Cueing data is a subset of object tracks within a sensor element’s coverage8 f4 T# d0 F& F; R1 H2 d volume.5 j3 j5 G! x( \# X# ?. F4 K0 ` CV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. G: K8 K/ U9 D1 BCV/BM Carrier Vehicle/Battle Management./ x6 ~) }1 c S$ o* B; R CVBG USN aircraft carrier battle group.- X# h$ I8 J6 C( i8 E8 C CVHG Carrier, Aircraft (V/STOL), Guided missile.# A7 F) Z& P X2 v# ?% O5 E CVISC Combat Visual Information Support Center.0 `- t) d, ?5 I* T CVL Copper Vapor Lasers.$ c" N; V( k1 j& x) y! Z2 d( k CVN USN nuclear powered aircraft carrier. 5 ]8 H+ m; i) PMDA GLOSSARY, VER. 4.0 C& j0 r# z5 D" k' V 69. f& Q0 `% r+ ^* Y0 t CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 3 G' z, G. Y; |CWAR Continuous Wave Acquisition Cycle (Hawk)., }5 o9 t5 L r( {: | } CWBS Contract Work Breakdown Structure. 3 u8 r/ }: }$ w/ t% FCWDD Continuous Wave Deuterium Demonstrator.! f1 \ M3 k7 a+ E) C5 y$ t CWIPT Cost Working group integrated Product Team. , ]. H$ e9 S! f# _CY Calendar Year.& G% S- f0 N( |/ h0 V8 x, Z MDA GLOSSARY, VER. 4.0 D/ h* C; D! [- N7 O* F 71 * o$ v o- ^3 ?- B% \/ sD Deuterium+ W/ o) T6 D! U. e7 u+ T2 t D Spec Process specification. 1 E: Z* q: n1 Q9 m2 N/ s6 OD Star Measure of infrared sensor sensitivity. + B( d9 j+ C, m; ]+ K* Z* MD&D Design and Development 9 I* {* h& y; x9 }2 c0 hD&T Detection and Tracking.: I& F: h1 m. \ B4 t1 G3 B D-IFOG Depolarized-Interferometric Fiber Optic Gyro. 7 [: I5 i% u4 F- u* u+ y8 bD-Level Depot Level (ILS term). * s2 ?/ S/ m) l) b1 HD/A Digital-to-Analog 2 F0 d* D% C* y! @8 D% r9 Z2 r' V5 RD/V Demonstration and Validation.6 w7 P6 N! j5 j9 | D2 Projective (interceptor) in the Hyper-Velocity Gun program.7 D! ?2 G6 T7 P7 \9 h9 U7 m( f5 [8 y DA (1) Department of the Army. j4 q: Z* \ Y1 d9 t; z* R3 w I(2) Department of Administration. : B. K& r# ~4 h: d S2 G(3) Decision Analysis.. E; l1 S5 X6 Y! q3 n (4) Developing Agency/Activity. 5 G) S$ p2 E" X" \5 k [(5) Data Administrator. / @- c4 ?8 i+ Y% }5 T; @; l% V(6) Direct Action.3 E" K/ h* U1 Z. A* B (7) Data Adapter.; e3 b, S9 c% J* Y H$ T# x DAA Designated Approval Authority (DD 5000 term).) h( c. K3 O* r2 Q+ V' n# E DAASAT Direct Ascent Anti-Satellite. . C' a% |/ O6 {9 ~3 {& c5 LDAB See Defense Acquisition Board. 7 q( x/ J) k; {) H) i0 _7 @DAC (1) Days After Contract [Award].3 J# t2 C$ ]# t x (2) Department of the Army Civilian.5 k# g: X3 C. f (3) Directed Attack Characterization. 2 ~( S/ n6 a" e$ K# o0 Q(4) Deploy ACCS Component.; N. ~* \( [& _7 y2 d (5) Digital-to-Analog Converter.$ a- j7 ?% \5 j# P% y DACS Divert and Attitude Control System.; \0 ~0 i5 ?5 b/ q8 g( k DAD Defense Acquisition Deskbook. % w( z0 H# [7 S9 LDADS Distributed Air Defense Study (1993). " E( g; W& N& IDAE Defense Acquisition Executive./ K1 Q6 h# O- D' ^6 k* } DAES Defense Acquisition Executive Summary. ! G2 q! s: K% EDAGGR Depressed Altitude Guided Gun Round. ( D5 b! a/ [8 c2 \DAHQ Department of the Army Headquarters.9 a( ]/ g' E; Y" }2 w) g6 K DAI Damage Assessment Indicator (targets). ' `3 E. }4 K% W+ O* W( [: CDAL Defended Asset List. ( W# k! D+ q. H W) U7 }; HMDA GLOSSARY, VER. 4.0 D$ u1 S$ b8 X5 a" M: T, u 722 N: {. W; Z7 \! k# `% F! z* `1 O DAMA Demand Assigned Multiple Access. 7 K5 n0 m$ e1 o) NDANASAT Direct Ascent Nuclear Anti-Satellite., l& Y7 H% [8 X, {# C DAPR Director’s Annual Program Review (SDIO term)/ F O! n w+ _ DARO Defense Aeronautical Reconnaissance Office (OSD).% {3 S/ E+ p5 [2 G% } DARP Defense Aeronautical Reconnaissance Program.$ B+ p: f0 p; j# s: I, I! N, H& m- a DARPA Defense Advanced Research Projects Agency. See ARPA.6 h+ F. G7 X8 b# ~ DART OBSOLETE. Defense Acquisition Review Team. C7 N5 i5 y, L: f9 |+ ~6 m DASA German Aerospace. Member of the MEADS Program Team.9 q! Y5 \/ H6 R3 x2 c DASC Deep Air Support Center (JFACC term). - |( W! J( b& A9 r9 C/ T$ tDASD OBSOLETE. Deputy Assistant Secretary of Defense.) i% g4 [# Z' F5 w8 ]3 w2 k DASD (C3) Deputy/Assistant Secretary of Defense (C3) ' M, x( b) M& R1 N5 o7 C: o0 SDASO Demonstration and Shakedown Operation.9 p2 U7 n) E; c9 S* k Data Integrity The state that exists when computerized data is the same as that in the source 7 h; W) _8 U* d. fdocuments and has not been exposed to accidental or malicious alteration or; `& U0 L; Y; j" [ e# T1 \% Y destruction. ! m: P- d Q8 K" j; d. A( k1 r- MDatalink (1) The means of connecting one location to another for the purpose of5 Z+ T5 G: m% D1 {! C. M1 z4 j transmitting and receiving data. , {1 e4 w+ U* v! |(2) A particular path between two nodes over which data is transmitted. It Y% e {& X$ [# t4 ^0 uincludes not only the transmission medium, but also digital to analog 1 t; A! r2 w9 l7 k4 S) cconverters, modems, transmission equipment, antennas, etc., associated `* H* m1 c1 D( t8 [1 [* O with this path. In the SDS backbone network, it was a path between two 3 j! M; P& I3 b. y) f$ X" |SDS elements. In space these datalinks were microwave or laser. On ) `2 ~/ g. c9 [$ h4 Z D% Sthe ground, they could have been wire line, microwave, or optical fiber./ t+ g: O$ w0 C& t DAU Defense Acquisition University, Ft. Belvoir, VA. ) u5 Y) V+ Y6 V$ ~* sDAVID Development of Advanced Very long wavelength Infrared Detector (USAF/ t; G+ h' w5 H# j. y. v% {8 e Phillips Lab term). + C7 G! q0 M5 s0 [! b. LDAWS Defense Automated Warning System.( j4 J- C. ]2 g& U2 h Dazzling The temporary blinding of a sensor by overloading it with an intense signal of& X4 e9 V; y- `* ` electromagnetic radiation (e.g., from a laser or a nuclear explosion). `" s# X9 P" p4 e. k/ ] DB Bata Base - j7 B# x/ H. t1 X) p# RDBME Database Management Environment (Computer term).( o0 P# H" H8 g DBMS Database Management System.- Q/ j1 o w( m+ ~( Q S* e DBOF Defense Business Operations Fund.. {* {, S, y8 N DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D $ Q4 a" l& z2 o732 h8 n3 O3 h0 F9 Y. q- G Dbsm Decibels per square meter.( f' ]: j. L0 x! O- K8 \0 s DBSM Database System Management. / x# c4 n4 P: u$ VDC (1) Disarmament Commission. (2) Direct Current. 4 M/ d! [: s$ _5 _) YDC-X Delta Clipper Experiment. # @* N# a' R+ c7 b5 KDCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications/ K& n8 V4 a) f4 C9 H' X Agency. (Now known as Defense Information Systems Agency (DISA)).$ Z5 T A; [. b# W" H! c* [ DCAA Defense Contract Audit Agency. $ P; X/ S" Q% [3 o6 CDCAS Defense Contract Administrative Services.: }+ p- N$ @9 j% f' r ]* P' l DCCO Defense Commercial Communications Office (of DISA).: h" y; Z5 D% t$ s- y3 ] DCDS Distributed Computer Design/Development System. ! d8 b8 [( ?' y7 [DCE (1) Data Communications Equipment (TelComm/Computer term).6 y( t x1 Y: ~4 _, l6 t3 D) Z9 x (2) Distributed Computer Environment. ; U" S- x" z' a( T$ TDCEC Defense Communications Electronics Command., k* [* \" H4 I0 S2 I DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange./ u- d% h% b9 d6 `8 o DCINC Deputy Commander-in-Chief. 4 F2 U$ R( s7 h( @/ hDCM Defensive Counter Measures.9 g& l) H3 L- F5 m7 ~+ _* g/ l- i DCMC Defense Contract Management Command % m: d& b5 G5 V7 o; P4 [1 mDCN Document Change Notice. , O5 L X" h8 F1 Z) iDCO Director of Combat Operations (JFACC term).6 D ~' D& s# D) Y2 N& }6 ? DCP (1) Decision Coordination Paper (see ADM).- F/ J; W) z+ ^! A' C (2) Director of Combat Plans (JFACC term). # H8 |: b$ N" b( J5 GDCPG Digital Clock Pulse Generator. * V D: R9 x0 {% I) L4 sDCS Deputy Chief of Staff.) E0 U( z! a( G% p# Z3 e DCSOPS Deputy Chief of Staff for Operations and Plans (Army). ( J8 h) Y, x7 l8 xDCT Digital Communications Terminal( D# R* x2 o8 z% _! K# s& G DCTN Defense Commercial Telecommunications Network. : h0 x0 s! Y5 J" C) XDD Variation of DoD.% U6 N1 u6 y+ j. y DDCI Deputy Director of Central Intelligence.) P7 L, y+ b2 j4 w* v DDEL Dwight David Eisenhower Library, Abilene, KN (army term)./ @4 [* ~3 @% R# E' i G DDG USN guided missile destroyer.6 u$ K3 Y% @4 j' a; W. c, E MDA GLOSSARY, VER. 4.0 D9 w7 G( x0 |( Z) B4 ^0 [ 747 Y0 d' ~# T7 E DDL Disclosure authority letter.% k1 a# X+ K5 e E% u DDN Defense Data Network. 4 J* d9 B: \. g3 ?DDR&E Director, Defense Research and Engineering. i2 H/ t4 h! k4 u" u DDDR&E Deputy Director, Defense Research and Engineering.' @" p8 I3 T) | z6 L DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).& o/ _9 R# ~; j3 m+ P DE (1) See Directed Energy. (2) Delay Equalizer. 2 h: l3 b( h3 R9 xDEBRA Debris, Radiance Model./ X: t3 u" `7 n& ?% n2 u Decentralized w7 k3 u: O7 @4 b$ k% ~Control& n* v7 F$ h' u2 `9 j, q# C" d1 ]$ T In air defense, the normal mode whereby a higher echelon monitors unit actions,& q2 ]* w7 z1 `/ B3 C5 L. | making direct target assignments to units only when necessary to ensure proper ( |" A$ i# g- L' L6 F( Z8 [( Lfire distribution or to prevent engagement of friendly aircraft. # E/ ^% m% {/ Q1 R- q! Q# bDecentralized ) h3 ?; l* m, {2 }' Q/ Q) KExecution & a' }5 ]+ |3 }& MThe distributed and integrated implementation of USCINCSPACE direction by: u- e0 r0 v9 r2 v* y& x8 i the BMD forces. (AFSPACECOM) A1 A g2 s5 X. }' x5 {! {" M Decommissionin , G C* ~" ?& z& q8 dg {; m/ F! t1 U% i# KThe removal or the rendering useless of obsolete or no longer needed 8 L7 U7 T' {1 ?( [components of the BMD system from service. : L7 x0 g9 }) m7 v5 Z2 WDecrement A directed funding level reduction for an acquisition program. # N: C- D' F, n( ]: S& O8 r! ?DED Data Element Definition (Computer term).5 I7 ^' A3 Y6 l& ~% f Dedicated Mode! H/ Q0 U) A9 D4 M8 _ of Operation . P2 g2 o5 I& {- _& P(ADP Security) 5 j |. R: e" o8 ~9 u; i& hA mode of operation where all users of the AIS possess the required personnel 4 V) `/ f0 d# ~0 ]- z9 A$ tsecurity clearance or authorization, formal access approval (if required), and a( q/ D+ e) y2 z/ i! n Need-to-Know for all data included in the AIS. ( k# y3 K9 `, I \; ]Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about" |* |( s$ U7 _! @# J9 G 5,600 kilometers) above the earth’s surface. 7 d4 ]/ T* Y. U, I0 lDef Definition. % @8 u; w9 R$ W% }8 }DEF (1) Defense. (2) Demilitarization Enterprise Fund.# e5 \, s* n, a3 N( P DEFCON Defense Readiness Conditions. 6 E! Y8 e3 \- f; E" t' X. MDefended area ; Y4 }/ S- D- k# z) \" v3 ]$ b ecoverage( O, o8 Y. v4 u Defended Asset8 n6 U& Q* I% \; m7 \7 z2 U' [ List (DAL)! c" @7 _/ d- L; I The geographical region that the BMDS can protect from ballistic missile attacks+ W( J8 o- `7 j$ _: I with a specified level of probability of negation. May be specified for a particular) d# I# U0 C% Y' s- W threat type, launch point(s), launch regions, raid size, etc.! U% t2 Q# C( n" v6 v# q' E, F A ranked listing of facilities, forces, and national political items that require( F V4 E+ k6 F4 c5 ?% Z9 G# X3 _1 D protection from attack or hostile surveillance. The list is compiled from Federal " F9 r+ J% B0 T, P) A$ s+ Kdepartments and agencies, Unified and Specified Commands, and the Armed ( d4 ?- Z' a$ WServices to ensure National Security Emergency Preparedness functions. " n8 l- s9 R! X; N% `' mMDA GLOSSARY, VER. 4.0 D " f3 _4 H; h) T. s8 E# q757 B% i3 b; Z ~/ g k4 K( K/ z. D. R Defense! R& m2 ~7 t2 A5 c; p; V Acquisition # T8 W; b9 n/ cBoard (DAB)4 \' L# |: h2 g3 s$ v0 @& y The senior DoD acquisition review board chaired by the Under Secretary of - h9 ~' _$ L0 D& u' RDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the3 f, o+ c" t& ?6 G0 @3 |5 w Vice-Chair. Other members of the Board are the Deputy Under Secretary of 9 T. e" u3 k( o7 M% }Defense for Acquisition and Technology, Service Acquisition Executives of the % [: L, ^* r# j- kArmy, Navy, and Air Force; the Director of Defense Research and Engineering; 0 z/ T! X6 c- Qthe Assistant Secretary of Defense for Program Analysis and Evaluation; the' c- G. d, B4 \, Y8 L6 v Comptroller of the Department of Defense; the Director of Operational Test and & n: x1 {5 }6 y$ ?6 eEvaluation; the appropriate Defense Acquisition Board Committee Chair; and the6 L+ X+ Q6 `" s, c# k Defense Acquisition Board Executive Secretary. Other persons may attend at/ i3 h+ B, P2 D0 ]- m the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition + N4 Q+ [0 w5 r- E: m4 YBoard.”)7 z E: E% X% R Defense1 }. A$ ^( [# b+ w Acquisition 0 C, X& |; T5 o' F# q- X& xBoard Committee # Q4 W, Y! w# y. C sAdvisory review groups subordinate to the Defense Acquisition Board. The& v- @. E0 O: C$ m2 d' t Under Secretary of Defense for Acquisition determines the number of- }+ @% G2 k% v. z+ j Committees. The purpose of the Committee is to review DoD Component' T0 B+ e6 _, ]/ ~8 b: G |6 ~. Q5 D programs prior to a Defense Acquisition Board review in order to make an 4 o1 E3 R) }( g: d- K- Xindependent assessment and recommendation to the Board regarding the - z b9 R8 C& Hprogram. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense, @) f! `2 ^2 Z5 p9 \7 r Acquisition 9 H- M5 S% g0 s" w4 QExecutive (DAE) 1 W( }/ A# V6 m' W) c2 c5 H; HThe principal advisor to the Secretary of Defense on all matters pertaining to the 4 }, H* z v% l. [Department of Defense Acquisition System. The USD (A) is the DAE and the7 u9 z; M2 u! {, s8 J Defense Procurement Executive (DoD Directive 5134.1). / B9 x* H" O, \Defense : m* a# h' k1 KAcquisition% G3 D, Z+ w! a Executive* b' @9 N2 g% [* }8 m; @1 e Summary (DAES)4 G3 j1 o& ^7 O% y U4 F3 e The DAE’s principal mechanism for tracking programs between milestone g# K6 }' e. n& S4 M* r7 b1 J4 oreviews. Includes programs subject to the Selected Acquisition Report (SAR),# d# x' @" x1 H: Y0 I and any non-SAR programs subject to review by the Defense Acquisition Board. 4 o5 J3 b0 G7 z. I! W f- _7 xDefense% r1 T' [3 z- V! | Employment ; @# y" H3 ]5 d1 y, OOption (DEO) - A7 C C. M& o, wEngagement strategy provided to USSPACECOM component forces to achieve* T1 ^+ }* e" W5 Y; H7 ^0 G specific military objectives against a ballistic missile attack. It defines hostile 5 a1 l6 `" o- Mtarget priorities, provides assets to defend, and allocates SDS resources to be& R9 A9 |' s- f2 G employed. A number of DEOs may reside in a particular Preplanned Response( p" J9 G# D2 J9 j4 e6 L1 N Option (PRO). However, default DEOs (those believed to be best suited to ! N( a9 u$ F9 Z4 mcounter the threat initially) will be automatically processed and executed when ; M0 I" i9 B% P! BDefense Activation Authority (DAA) is given by USCINCSPACE. 9 o1 _/ W' i0 g. eDefense 0 X2 a. [. t# PEnterprise 2 o0 x: c/ T& E1 E; b4 XProgram (DEP) 0 c3 ^/ Z& Y7 I6 ~3 l! KAn Acquisition program designed to streamline the acquisition process by waiver0 e' X7 |: j# n2 w- \8 E% N! L' s of selected regulatory requirements. - O9 a* v, [+ S5 {Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb1 x0 w* k, D5 b0 i# I and progressively weaken an attack, prevent initial observations of the entire . q* H2 D: J% H; U8 ]9 ^position by the enemy, and allow the commander to maneuver his reserve. 4 V) t: s1 ?! q, x' Z; J* ^8 N% ~Defense& `# [" I3 D7 G" ]6 ] Meteorological v1 x. r6 n& _: l* f' M0 `Satellite Program% {8 v+ V1 f3 Q4 z6 X (DMSP)7 l! z+ l) e/ o1 `$ o% B Satellites designed to meet unique military requirements for weather information. ) Y. C+ i# |5 yUsed to detect and observe developing cloud patterns and follow existing 9 ^$ S# x/ J5 vweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.* x: ] n, |3 v' {2 a: s* m+ f Defense Planning/ D# Z" Y3 n# y& p and Resources ]/ K" ]6 d1 `) Z Board (DPRB)' ^& l& n2 }3 j% ^; H$ m1 j A board, chaired by the Deputy Secretary of Defense, established to facilitate . }) Y, w+ f8 ydecision making during all phases of the planning, programming, and budgeting 8 e+ [" |" J% L+ V8 n4 S% m1 Msystem process. Board members include the Secretaries of the Military " ~, G) H" B G* v. jDepartments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of) j" O) b" i0 E( m/ G( U) M8 X: O0 W Defense for Acquisition and Technology, and Policy, the Assistant Secretary of8 f# H9 F1 c3 Z5 c Defense for Program Analysis and Evaluation, and the Comptroller of the' W# t4 ^: a" O& ^: k Department of Defense.) W" j" i" C7 @3 i MDA GLOSSARY, VER. 4.0 D) J3 Q9 l- H6 n; z; Q 76; ~/ ?' E* l( {: m, k( Z6 `9 P Defense Planning7 a6 @7 ~% k* } Guidance (DPG) ( ?( Z+ u- i6 X% ^( IDocument issued by SECDEF to DoD components providing strategic framework 7 D5 T! N/ R/ O( P# P6 n8 pfor developing the Service POMs. Result of planning effort by Joint Staff, OSD,- Y9 [9 U; _# X9 g& Q4 B and Services. In connection with two-year budget process, DPG is issued every - ~3 G. U' ^; T8 `; ]0 D' \. _other (even) year. 0 d) ^8 Z, T: e7 ^Defense Priority5 T. @5 L' Y. K3 `* t- \ and Allocation* e5 t+ z k# l) ~ System (DPAS) _2 Q5 \8 b( b9 _. u3 n The implementation of a statutory requirement where contracts in support of + B4 u% M0 [2 onational defense must be accepted and performed on a priority basis over all' M* z/ A+ o) W( [/ \$ ? other contracts, and which requires the allocation of materials and facilities in0 ]# X+ G F+ S; _' \1 O$ K9 Q2 Q such a manner as to promote the national defense. See “DO” and “DX.”" S% I2 Z2 a" S# J Defense 0 p3 S2 {7 G% y: _. FReadiness# t( q6 F6 O& B" L5 A/ r Conditions% t$ q* Z, G- t0 _2 A (DEFCON) 8 c* l7 Q4 A' U% l$ sA uniform system of progressive alert postures for use between the Chairman of7 I3 }3 K: R9 S2 [- `2 R# e the Joint Chiefs of Staff and the commanders of unified and specified commands- O% p/ c% Z( G" h" v. {3 u+ {& T! t9 W and for use by the Services. Defense readiness conditions are graduated to5 g% I+ M5 X/ a1 S% _$ x match situations of varying military severity (status of alert). Defense Readiness& l4 o& e3 E1 G/ @ Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as % U4 \5 {4 ^/ ?$ S2 [; Aappropriate. 0 i3 `. j3 v) d( Z* mDefense Satellite - j" A5 E1 i8 P9 X' rCommunications 3 l( {% f4 ~+ w- t$ g+ zSystems (DSCS) $ ?& d$ @+ g8 i/ o% f* ?+ wAdvanced communications satellites in synchronous orbit around the earth. , s0 T7 a# Z" C2 _9 }$ IProvides high-capacity, super high-frequency (SHF) secure voice and data links % a# B: x' G; Z5 Q4 L1 q4 @! g7 @for the Worldwide Military Command and Control System (WWMCCS). They1 W; o. }* j1 N! w3 k, x support terminal deployments for contingencies; restoration of disrupted service# Q3 P+ L% B; N s8 o overseas; presidential travel; global connectivity for the Diplomatic . ~) ?8 h: ~& J8 MTelecommunications Services; and transmission to the continental United States0 v" C$ {; s" B of some surveillance, intelligence, and early warning data. 1 o) c9 S) F* }! p4 [8 aDefense Satellite& ?0 Q' Q0 G7 t (DSAT) Weapon4 e/ U8 ^) e! B. h& R A device that is intended to defend satellites by destroying attacking ASAT 7 I6 U9 R" K& ~6 |3 ]0 tweapons./ X" D/ }- y! z+ s& |6 r; R6 o& I Defense Support0 ?/ v2 `( g1 t Program (DSP) / I$ {0 e$ D7 Q8 uA system of satellites in geo-stationary orbits, fixed and mobile ground3 {4 r/ R+ E0 L3 \) y processing stations, one multi-purpose facility, and a ground communications, L7 E4 W+ r) R+ @* k8 ^ network (GCN). DSP’s primary mission is to provide tactical warning and limited $ K2 i6 {' T/ ~2 f, \attack assessment of a ballistic missile attack.$ G" o0 \/ A8 |) E% r. S2 H0 A Defense " n; T: }0 K) X# y5 }: i' R! x zSuppression4 J0 h! a, \/ D4 d Temporary or transient degradation of the performance of a defensive system2 j2 g1 o r$ b5 { below the level needed to fulfill its mission objectives, by an opposing force. 1 O# |5 r5 N+ Z3 C* l) \4 Y, a, M(USSPACECOM)' \+ @ |: ^) g; t( s i2 F4 U Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic* O) W2 S6 \* F; l missile trajectory; i.e., boost, post-boost, midcourse, and terminal. ! Y4 z/ Z/ ~, z# J4 I7 z4 mDefensive6 ]7 H# o3 E8 h4 {1 ` Counter 8 d9 x t5 ^8 k' O. iMeasures (DCM)0 d8 y/ D/ k2 r5 I- r( W9 T Actions taken to eliminate an ASAT attack. / y+ y8 Y, H- { j9 Q8 b9 T& i& fDefensive( h/ I0 y5 X* p, r/ ? Technologies % e9 }5 g; ~! V+ m, @5 \1 KStudy Team' x2 [7 |% v9 `" t, o8 ^ (DTST) & Y4 |. X8 M+ S; g; S. N1 GA committee, generally known as the “Fletcher Panel” after its Chairman,6 n6 ]6 _3 I9 i, k" k appointed by (former) President Reagan to investigate the technologies of 5 ^. f! V8 l% `6 r' @, dpotential BMD systems. & {! n6 M+ N1 u: X8 aDEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.! i( B5 z; C8 \ DEIS Defense Enterprise Integration Services (ex-DTIS). ( Z, L( Y3 F4 y; e- |0 FDEL Delivery. " w/ t, b. i' J( h' F& ^Delivery Error The inaccuracy associated with a given weapon system resulting in a dispersion % s n. B4 Y4 t: R. n9 M# M/ ~of shots about the aiming point. See also Circular Error Probable.4 z6 l9 O6 p. ^/ }* `! R MDA GLOSSARY, VER. 4.0 D5 s6 g7 X. {+ k/ b4 l 77 ( R* m, k+ w" q6 T: c- l8 NDelta-V A numerical index of the maneuverability of a satellite or rocket. It is the6 O" h. o" V4 s maximum change in velocity, which a spacecraft could achieve in the absence of & B" `: f) U: G3 ^3 G5 xa gravitational field. / t9 [- y7 Y) ?2 GDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).( H$ E' S4 K5 y Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its 4 s% u( i9 ?$ `3 [: adesired function (matching RV characteristics, screening RV, etc.) 6 T/ i( P1 @% w8 f3 mDEMO Demonstration.& h6 \% M6 T K! T; m+ x Demonstration4 _5 l' }7 M3 C1 g% R# a) ~ and Validation1 C9 c( d. I' T (Dem/Val), K+ P' o L) s The acquisition phase when major program characteristics and product designs: V; M7 ]) X9 k+ p4 j2 y5 |. ?9 k are refined through extensive study and analysis, hardware development, test,4 Y; Z2 A& |5 X: _& x' |# p and evaluations. The objective is to validate the choice of alternatives and to ! e5 k, L5 ^0 }, ^provide the basis for determining whether or not to proceed into Engineering and + w- D5 `3 |$ y, r/ a, R( K3 EManufacturing Development (EMD)./ A$ _$ Z, ~' q0 e+ Q" Z' O Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. ! W2 M) M8 H0 rIt may include destruction, removal, contamination, or erection of obstructions. 8 M% z- D3 D* G) d( o( E4 }9 Q: wDEO Defense Employment Option. 9 c2 q! ]& q; QDepartment of* I) C5 d2 ^0 s7 P& Q Defense7 i! {# M6 _% r) i Acquisition m. e4 q4 j, C0 N% v6 JSystem( L" F7 J w; c' S9 l( @: Y A single uniform system whereby all equipment, facilities, and services are( F# z C+ C0 G) Y planned, designed, developed, acquired, maintained, and disposed of within the 8 h5 c3 m/ v1 V$ p; SDepartment of Defense. The system encompasses establishing and enforcing- _3 e- G9 L" d7 U" R3 _2 K policies and practices that govern acquisitions, to include documenting mission+ W) F$ X; U4 W" ^1 v( n needs and establishing performance goals and baselines; determining and - ~7 S* ]- F, w. c0 U1 f0 Hprioritizing resource requirements for acquisition programs; planning and& g0 Q2 K0 |8 F$ k' f8 Y- H executing acquisition programs; directing and controlling the acquisition review 0 z( t8 H9 g6 e2 V& ~, Pprocess; developing and assessing logistics implications; contracting; monitoring : J% y3 Y$ Z7 o3 Xthe execution status of approved programs; and reporting to Congress. (See+ z! b! b% A% f- P# m" w DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)7 @, F: ?5 l) I Deployment (1) The placement of force elements in battle positions to obtain a higher ' @0 h; I- w3 \0 h) Jstate of readiness. 8 u7 `8 n G4 E2 ~3 \; i(2) The movement required to place force elements in battle positions. ; y, P5 ~8 Q& h: Q4 w# \( M) U(3) Fielding the weapons system by placing it into operational use with units : i3 p; l1 y! b/ jin the field/fleet., }2 T: u+ c& g; C (4) To arrange, place, or move strategically.( y% N- L$ Q2 T0 l$ W Deployment / a5 l% w6 ^1 @4 @8 qPlanning G- M+ A/ N$ g+ {1 f(1) The development and maintenance of plans required to initially deploy, 4 k, j6 r0 `7 u7 I5 Y" i+ l' Jmaintain, and evolve the operational system in accordance with u- z: c4 I+ ^- @: l( v/ C+ r schedules and priorities. It includes factors such as launch facility ! p, p" K7 ^$ @- s' S8 S5 @0 Bavailability and planning for the availability of other required elements% k! @6 @* y' p: l such as trained personnel or units. In addition, it identifies the impact of 2 v) W$ Z% I+ l3 m0 T' rdeployment on operational readiness and any testing constraints 9 f( J$ Y3 f) ?; Hassociated with deployment. 7 i j$ d6 e! z# ^8 _2 Y7 h1 B+ q; y(2) Encompasses all activities from origin or home station through 4 R6 R9 {6 K2 tdestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding ( V% Q/ e( c; n; M3 `; i9 l3 d% hareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment 3 U7 Y6 w- c0 |; t) m0 B" b$ \Testing: d% F1 |" r& C% b( _ The testing and/or simulation of system assets in the physical and operational " c+ z, G. h2 l) Y! Zenvironment in which they are expected to perform.1 R% z3 E8 J1 U1 q P7 \ DepOpsDep Service Deputy Operations Deputies.7 H: Y2 x" \/ ^- c MDA GLOSSARY, VER. 4.0 D# o |9 m% a, N& G( O. l 78 ! R, _/ e* A) c& H6 e2 g! XDepressed , O9 U4 u/ d, D V8 O# WTrajectory , E1 w3 _# X+ _' D3 y7 gTrajectory with an apogee below that of the minimum-energy trajectory. 7 ?- e. x0 u0 ?4 G5 p/ uDEPSCoR Defense Experimental Program to Stimulate Competitive Research.3 A- j2 ^9 J$ b5 o, S3 f DEPSECDEF Deputy Secretary of Defense. 8 N# `- ?2 T! ]0 O& n3 z9 A$ u! XDeSecState Deputy Secretary of State. . N ?6 Q/ W" N9 s6 }DERA Defense Evaluation and Research Agency. Consolidated research and * h# R; o* Q2 o( ~$ J0 i# I/ M7 cdevelopment resources of the U.K. Ministry Defence. Headquartered in 9 r; X/ q# P8 @+ tFarnborough, England. 2 ^1 p- t% x1 E! A$ Z$ H, |Derivative( L) j2 s7 |5 Z! C+ C/ k1 Z Classification * T2 P# \8 N0 v6 o( [, cA determination that information is in substance the same as information2 L/ J+ R' V& A2 v1 z currently classified and the application of the same classification marking.' ]2 o# M0 v7 W$ j9 s DES Data Encryption Standard.* @. s7 V9 c, l5 `8 T! @. n DESC Defense Electronics Supply Center (DLA term).5 s6 K$ l( A7 Y8 ?# {: f- L: l6 C Design 2 B- L. K" r: b" |8 p: iConstraints 4 l, c9 ]7 i$ k% v* zBoundary conditions within which the developer must remain while allocating0 X9 E0 F0 d8 K9 O6 Q performance requirements and/or synthesizing system elements. 4 C7 E9 G4 H( A9 b' G. pDesign+ M! ]5 z b/ B% F Parameters9 D3 T8 J& ^! t7 Y8 a1 {( V Qualitative, quantitative, physical, and functional value characteristics that are . ^: P' C5 O/ P; m7 Pinputs to the design process, for use in design tradeoffs, risk analyses, and - |* u8 y6 _% ?/ K3 a; v; ddevelopment of a system that is responsive to system requirements. l9 D3 i- F0 m& T; NDesign Phase A period of time in the software life cycle during which the designs for ( K5 m @: ] N# p `architecture, software components, interfaces, and data are created, $ N& e7 u0 a. f; pdocumented, and verified to satisfy requirements. 3 o- p7 Y& S: d! K. d5 kDesign-to-Cost- K- M# W- { ^+ p5 | (DTC) Goal! i4 f0 {, g- l9 s4 y a: z v Management concept wherein rigorous cost goals are established during) z( H) J8 f8 E development, and the control of systems costs (acquisition, operating, and% o" L8 b, q, s* P( j f" M support) to these goals is achieved by practical tradeoffs between operational - o# b! x' l9 [& F8 Xcapability, performance, costs, and schedule. Cost, as a key design parameter, # m, x0 I! W& H0 sis addressed on a continuing basis and as an inherent part of the development2 ~9 U0 A% y3 w- y M8 _ and production process. A DTC goal should be in the form of average unit % X; l1 A: s! K7 x" `flyaway cost. Also, DTC parameters for operation and support will be5 n7 P, y" V# Z1 |) v selected—parameters that are design-controllable, significantly affect O&S costs, , L9 A# |5 O( F& c, Tand can be measured during test and evaluation. Parameters may be ( c, @8 e' K- Z2 cexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or! Q5 [' t+ m/ i+ H maintainability. Firm goals and thresholds will be established no later than entry) K2 |5 `: N: {# m! F# } into EMD (Milestone II). This is an in-house goal, almost contractual in nature, 4 h4 M& b/ o3 v& O' J6 Obetween the PM (Service) and the SECDEF. Allocations from this goal will 3 Z0 R' K! o/ n3 U+ u: Pbecome the contractual DTC goals for contractors supporting the program.) h8 |. G9 H2 H6 S, g: T- _ e Det Detachment. $ ]5 r! [6 {% _9 n0 |. |$ I9 _DETEC Defense Technology Evaluation Code.0 L8 q- M6 o' F; f$ q b Detector A passive IR, visible, UV detector turns photons into an electrical signal. The & |( H3 Z: K3 u2 ^IFOV of the detector is its solid angular sub-tense. There is sometimes, T& f9 v" y# K+ h& Y confusion between the detector sub-tense (size) and the pixel (picture element3 q g! H! b6 S$ |% l) [' D4 V4 o size). They are the same for a staring sensor, but in a scanner it depends on ' o7 k( Q Q% ]0 |& R4 ythe array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. & M: P2 [( r S+ T( B3 y7 w4 tMDA GLOSSARY, VER. 4.0 D( {( ?/ q2 r# V& S4 c) q 792 c# X( h0 s8 R9 Z; `: T6 o DEV ENV Development Environment. 1 i0 p% `' n& G4 v( uDevelopment + p0 R# }; M7 E, W3 MTest (DT) 3 a+ C2 B8 x; X2 s/ [- tTest conducted by the development test organization to achieve specified test, Q* U/ F; m9 o2 a$ P: z; k+ ^ objectives. It may be a complete test, a subtest, or a phase of a test., _; I2 j, i. {; k2 a3 t5 E Development/ i5 z" \6 J V2 h) _ Test I (DT I) * `3 J& ]2 z% b* ]A series of tests conducted during the demonstration and validation phase. 8 ^1 s$ [2 s5 u8 P, P1 x# L% [Components, subsystems, or the total (or full) system are examined to determine ( Q+ p& @" p K6 `7 \whether the system is ready for EMD. State-of-the-art technology is addressed & m) L% d: q: gin DT I. 1 i+ h0 J {+ h1 s* A! zDevelopment 4 l# |9 Y' \5 s/ L8 l0 e0 DTest II (DT II) ( J% N9 v7 G( M4 q# E9 aA series of tests, normally during EMD, which provide the technical data! C, o7 w. t6 o necessary to assess whether the system is ready for low-rate initial or full& c; N" R# G* Y production. It measures the technical performance and safety characteristics of 1 Y5 a: O( _) I$ Cthe item and evaluates its associated tools, test equipment, training package, $ k3 A7 w, n( k* Z! d- a. k! A4 k$ {) Oand maintenance test package as described in the development plan. DT II % Q$ b8 d1 \$ r2 F* xaddresses accomplishment of engineering design goals and the fulfillment of 5 B: R4 \2 ?" v4 P6 ^# Acontract specifications." V" r$ K% N# Y' u7 T# g Development # j/ a/ @/ o3 T* m7 y, v9 G3 ZTest III (DT III); k1 _+ R3 q! O; ? Tests conducted during production.' i/ i4 g2 X0 k0 V Development* e1 u2 Z! A; e& j: S& ~ Test and6 A: W O# F$ o2 K: V5 K5 c0 [$ w Evaluation 6 C# `6 g; a: _1 Z(DT&E) 9 Y6 ?+ F* ~* ~8 yTest and evaluation conducted to measure progress, usually of 8 o3 B4 Q6 x, q5 {component/subsystems, and the proofing of manufacturing processes and ' s5 i9 R/ Y/ y/ @controls and to assist the engineering design and development process and + a5 p/ v+ Q. d# [# l) a1 xverify attainment of technical performance specifications and objectives. Usually0 m) D% q+ {$ y( @, ~ conducted under controlled or laboratory conditions. Can be conducted before & i. t. ?9 S. N! B4 p( {/ aor after production begins.8 `6 \+ N1 X' x, a' N Development2 Y8 p' d) b1 N3 s Test (DT) - k+ O0 g6 v$ A! p+ x4 I) ZTest conducted by the development test organization to achieve specified test! n4 h& ]! p' @5 m( R4 V& z4 C objectives. It may be a complete test, a subtest, or a phase of a test.5 ~7 k E. Y8 z Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost, + u4 K* ?9 V" n! N: |schedule, or performance without authorization from the milestone decision0 l' {) P% h0 [( S6 n L authority. Acquisition Program Baseline (APB) thresholds represent these/ t) m( d+ n% }4 A7 b5 t1 f parameters. ( v! K. V+ A" W! | p# J4 K) b: tDevolution of 5 b! C+ N6 k2 e0 N2 [- v6 TCommand 3 D/ I% o7 X" V9 x% g! F; JMinimal essential operational capability to perform C2 provided in an orderly and # a7 C3 p1 k4 ?0 Stimely fashion to a duly authorized successor.; X5 n6 o9 B" r; N7 h3 n) q DEW (1) Directed Energy Weapon. (2) Directed Energy Warfare." t3 ?4 U$ k7 ~: d DEW/D Directed Energy Weapon/Discrimination.8 ?, Z5 T/ z4 B9 w7 \ DEWG, O Directed Energy Weapon Ground, Orbital ( h( }; b. |# V$ `DEWL Directed Energy Weapon, Laser (thermal or impulse). # s6 D, [) W% K" jDEWP Directed Energy Weapon, Particle Beam (neutral or charged). ! L8 W7 Z! q) |+ z) `DF-KBS Data Fusion Knowledge Based System.. _, d1 _( Q3 X. w: _5 W6 [8 O DF2 Deuterium Fluoride. ! e; s, m3 |2 Z4 UDFAR Defense Federal Acquisition Regulation0 M v9 Q3 }, @/ w- ` D+ a DFARS Defense Federal Acquisition Regulation Supplement., L4 c H; E% h1 k0 w, D MDA GLOSSARY, VER. 4.0 D0 J' l- n+ I( o# p6 i) u, \# `$ f 80* _" ~6 Z5 y/ r+ Q DFAS Defense Financing and Accounting Service.8 d+ v* C2 ?$ @! `2 m" c DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. : G; B# ]5 o$ C7 k: VDGA Director General of Armaments (France). - [) q% h+ E- a& S, ZDGP Defense Group on Proliferation. % W0 ^9 s3 O; s# u: UDI (1) Data Item. (2) Developmental Item. ! o) F* M7 [8 _DIA Defense Intelligence Agency.1 \5 t; y$ ]; r6 y/ t# j' l DIAC Defense Intelligence Analysis Center. 3 M, `" x, l) k NDIAM Defense Intelligence Agency Manual# K3 j1 e4 [8 x- {3 n7 H Diameter (Optics) The unit of measure of the light gathering power of a lens.3 w. i1 {# w4 i2 ` DICE Digital Integrated Combat Evaluator.! d$ t/ ~+ X1 g8 K% F4 Y" w DID Data Item Description. % W+ |5 }4 M/ J. K+ R# J0 N- wDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The% j( l! D; t9 D- M( }5 |/ x angle of spread, which cannot be eliminated by focusing, is proportional to the ! }% C6 X1 D0 M, e2 bratio of the wavelength of radiation to the diameter of the aperture. 2 K, U! L! }8 u# j# y* ~4 aDigital7 X+ b) q0 ~$ ]7 A6 T; I( ~5 q Processing " M! ]( Z+ s; X" zThe most familiar type of computing, in which problems are solved through the 8 O( H% X- H* K7 z, m& k2 ]mathematical manipulation of streams of bits. 6 t1 j, x9 {$ u1 }0 ?+ I1 x5 v. NDII Defense Information Infrastructure 8 y* l# a( `' G9 y \Dip A period of significantly decreased RCS signatures of an RV at low altitude (6 to 0 l2 j G* S8 q+ a% Q12 km) between wake termination and de-sheathing. ~0 d0 m5 R# W! i DIPS Dynamic Isotope Power System (which provides up to 10 kW of power).# Y4 Y" c: y3 w+ C DIR Director.% l/ }3 e1 L0 D* B* t9 [ Direct Air/ J* A: u# L& k) f0 R Support Center4 |' N7 _& ` S2 D, j# m A subordinate operational component of a tactical air control system designed6 D/ O) m; c1 _# l, I U/ i5 ? for control and direction of close air support and other tactical air support' l1 N5 E& v1 z" W3 K" j operations, and normally collocated with fire support coordination elements.# W f4 V- a2 q' m Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not# |+ M2 F1 _$ V# i1 \6 M necessarily limited to items that are incorporated into the end product as labor or 8 N) @/ T% {5 _( c3 Mmaterial. ; q: d( C8 j6 _" `' A/ u9 W4 XDirect Labor Labor specifically identified with a particular final cost objective. Manufacturing5 S: G8 C% P1 O! x2 K direct labor includes fabrication, assembly, inspection and test for constructing ' e( Z5 Q- w4 V) |8 s$ Tthe end product. Engineering direct labor consists of engineering labor such as $ t2 S6 E7 h$ L, r! F! g, n0 H( Wreliability, quality assurance, test, design, etc., that is readily identified with the - u' B. w* @0 ?- C6 k2 X- {% Qend product.0 ^. r9 N, P0 o3 i0 i Directed Energy 9 h( Z: q0 I( Y. \4 u(DE)' C4 k3 ]2 D* }4 n5 i1 ~3 h- L7 a 1. Energy in the form of atomic particles, pellets, or focused electromagnetic $ w: J# s: T% P% d# jbeams that can be sent long distances at, or nearly at, the speed of 1 G! p7 v- _: M' Y1 y: Klight. q. P" W. X4 m4 c# P1 D& D2. An umbrella term covering technologies that relate to the production of a" a3 ]& y+ {7 h3 e beam of concentrated electromagnetic energy or atomic or subatomic particles.+ k3 h7 R; v; X' P MDA GLOSSARY, VER. 4.0 D 4 h* |: C' M! B0 q6 ?8 P) | V810 N3 [8 X, k: L. w, d: h$ M3 ] Directed Energy2 S2 p0 a7 @7 t: R5 D5 j: k! A/ F! Q Device 6 U& Y% Q3 e' F! X( [0 @A system using directed energy primarily for a purpose other than as a weapon.6 w) w$ X2 b1 Z/ ~3 F' h3 v) H" ^ Directed energy devices may produce effects that could allow the device to be 0 g+ g5 ^# {' Tused as a weapon against certain threats, for example, laser rangefinders. $ u4 d s: {0 ?8 F# V7 J0 y2 RDirected Energy5 i- M! w) e1 X/ M! i Weapon (DEW)7 ^9 D2 `, x: u: u: C9 O! r A system using directed energy primarily as a direct means to damage or destroy5 |" k) W& t2 \0 p enemy equipment, facilities, and personnel. j4 u- a1 M* jDIRLAUTH Direct Liaison Authorized. + M% n2 h2 V2 K: \" nDIRNSA Director, National Security Agency. 8 ~1 K8 Y$ ?2 }$ c5 LDIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service. 3 F( j: L0 Z- O* ]; H8 K7 f1 X3 yDISA Defense Information Systems Agency, Washington, DC. (Formerly known as $ ]& u- `; G6 J V ~' q- ADefense Communications Agency). + m1 O4 Z" A4 ?# V( T+ J ~. v7 j5 JDISCO Defense Industrial Security Clearance Office; T$ X% Z- U: W; @7 u! n DISCOM Division Support Command (US Army term)./ O) q* x2 @3 g' }, ?3 s# N5 | Discretionary 2 X3 [) U' T- C3 G# f5 O6 sJudgment, _" ~1 z" ]" [3 d! t- g* T The authority given USCINCSPACE or his duly authorized representative to 8 \5 Z6 x) ^% X" Y" \perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination 9 [4 _ y) t3 e6 N: ADISN Defense Information System Network (DISA term).1 K* z6 b. O$ L/ F, o DISSP Defense-wide Information Systems Security Program.7 }+ [( ?4 r5 g: v V$ o& L- A0 m DISUM Daily Intelligence Summary (JFACC term). + o6 _& L4 k& {* M3 r% YDITDS Defense Intelligence Threat Data System. * j5 b* K+ P y9 `, D4 Y( nDITP Discriminating Interceptor Technology Program. The objective of DITP is the: c- {2 y' u0 J development of advanced interceptor seekers to counter advanced threats.# [' v$ J$ Q; z( _4 D: R DITP will integrate passive and active sensors into an interceptor seeker that / y& c2 ^2 C, k$ M7 m7 i# S3 wintegrates data fusion processors, multicolor infrared sensors, and LADAR. DTP" j( O q4 i" o1 t flight demonstrations will involve the tracking and interceptor on-board / a1 \: N) h: i2 N+ hdiscrimination of targets of opportunity while providing fusion processor data/ z' C7 f) v% n& X7 m9 I9 C telemetry. (See also ASTP). : w0 @1 n2 Z4 \2 ]0 N, B# QDIVARTY Division Artillery (US Army term). 2 l( o* |% c/ i$ P* _4 @DIW Defensive Information Warfare. : K" [) ]7 }6 u; @ v; |1 ?DLA Defense Logistics Agency, Alexandria, VA.0 v1 h8 J; K$ P6 F- B7 L- m DLSC Defense Logistics Services Center (Battle Creek, MI). ' D9 D3 Z4 x0 b- YDM Data Management; K( x# x% I" w8 q% L- C! g DMA Defense Mapping Agency, Fairfax, VA. + E* p, Z2 |* ^+ y$ y' z$ mDME Distributed Management Environment. ! k, }( z$ O2 k# c# DDMI Dual-Mode Interceptor.1 x3 T7 ^# B3 N* T% s3 n3 E* Z- y MDA GLOSSARY, VER. 4.0 D 9 ?/ e( D; o v) j* U' v% p82% {$ w2 g/ A0 U6 L$ Y9 I DMRD Defense Management Review Decision.0 c, ]" ^& |. x5 _0 [, U" i/ W- } DMS (1) Defense Message System.7 e. ~: V# e3 m3 Y# R0 @2 \ (2) Dissimilar Mission Simulator. 9 ?/ L O% K0 `, T9 CDMSO Defense Modeling and Simulation Office (OSD).7 x+ f3 H$ }( i* X) @& Y+ k DMSP Defense Meteorological Satellite Program. % |" I$ S# \7 V" D. K% M6 j; {* NDMU Disk Memory Unit.) h* U" z3 c; Z) Z DNA Defense Nuclear Agency, Alexandria, VA. " e- k* m6 ?( g4 HDNMS Distributed Network Management System.+ U9 I5 |( `2 S- \# { DNSIX DoDIIS Network Security Information Exchange i1 @9 T" i$ f8 K6 X) w5 ~4 ]DNSO Defense Network Systems Organization.6 Q$ Q& N& _. V. j* M9 O# e DO The lowest rating under the DPAS. All “DO” orders take preference over unrated# x3 Q* o# Q/ Q orders to meet a required delivery date./ p* M+ @5 j5 n0 k0 o) k Doc Document , Q9 t9 ?9 N5 E1 v* @6 QDOCPREP Documentation Preparation.8 p6 K8 l$ X$ x! R; Q+ m7 \2 Q Doctrine Fundamental principles by which the military forces or elements thereof guide . w f6 k$ o( Q$ E5 w- A1 etheir actions in support of national objectives. It is authoritative but requires0 q" o+ \2 |$ n* ?. \0 Z" O& L judgment in the application. See also Combined Doctrine." V1 t5 |; U" {0 {4 {1 Z" v1 s DoD Department of Defense6 }, Y5 `# {" F) y' h DoD Component + p7 J8 ~7 z1 q l; \- r" g8 LAcquisition 5 w5 Z: Y+ r/ Q/ ?, P# `& ZExecutive " I+ o% N, ? L) Z" y( E$ sA single official within a DoD Component who is responsible for all acquisition * V# U( q1 w) e* I v$ S! Ufunctions within that Component. This includes Service Acquisition Executives! H' A( {4 H5 Q! E; u9 @ for the Military Departments and Acquisition Executives in other DoD , L, H& ` B' X! \5 V. l2 A% p( SComponents who have acquisition management responsibilities. 4 s6 H* w7 l+ M# R8 g3 [DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman, ; u, L, h& h/ j: H/ |8 wJoint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the/ c5 p2 z. ?$ N* j9 z) y Defense Agencies; and DoD Field Activities.7 q7 V5 n. b) [* _$ X- W DoDD DoD Directive./ T8 n: ?. R3 z& L! V) F; B' b& ` DoD Directive * X4 D8 D3 D: A" M+ k5000.1 ( I+ n2 O4 s2 O8 M$ Y8 E* T“Defense Acquisition.” The principal DoD directive on acquisition. It establishes+ q9 f, e1 F C$ f policies, practices and procedures of governing the acquisition of defense% O) X5 \7 W& Q: V2 o acquisition programs. 4 g5 O6 x6 [- J) u& ]DoDI DoD Instruction. u4 W7 p0 K0 e6 u5 oDoD Instruction+ h2 r* N% \" J/ a/ b1 @ 5000.2 0 z! O7 U( z: ^' o& P“Defense Acquisition Management Policies and Procedures.” Implements DODD- A3 e; k5 d" q r 5000.1. _$ J2 T5 F! M9 o) W8 B* E D0 lDoDIIS DoD Intelligence Information System. 7 f. N U- d& j- b2 _% V8 f/ K; X& kDoDISS DoD Index of Specifications and Standards.4 [8 b1 w- [0 Z1 r7 ?# h# ` DoD-M DoD Manual. % K4 k# R) d- F) fMDA GLOSSARY, VER. 4.0 D 4 C# P5 K: q) b z- [9 v4 p83 7 t5 Q2 K7 j p4 }4 g* ?) y Y$ _DoDR Department of Defense Regulation. ) ~0 U9 C* l: M: s* h# hDOD-STD Department of Defense Standard.# K; @, y* w1 y1 k% k' l6 A/ y; L* N DoE Department of Energy.1 h+ T% P, {, f9 L5 y DOF Degrees of Freedom.: Q- H+ A% Y" | Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system/ A3 T- {9 Q- W; }8 | having a detection range of approximately 3000 km. It is believed to provide5 C ?& _2 [ U* ? battle management for the totality of Moscow defenses. / B2 E( g! t( |# \" H8 JDOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).% Y2 r5 Q1 h2 {/ `, k( E DOPAA Description of Proposed Actions and Alternative (environmental term). + h) h: ^" ^8 X& V- W" UDoppler Effect The phenomenon evidenced by the change in the observed frequency of a4 W, E2 }" _4 U6 F! H sound or radio wave caused by a time rate of change in the effective length of 9 `. j z( l5 n! n5 rthe path of travel between the source and the point of observation.+ A/ _- _ c& ~; j DoS Department of State (US). 8 M( @8 W2 l7 r! f6 x$ v+ J/ }DOS Disk Operating System (TelComm/Computer term).. \1 q/ w: r) \. Q6 s, T. k6 Q DoT Department of Transportation [US]. + I: i2 _+ O" O2 ~0 u6 LDOT Designated Optical Tracker. ! h- o) @, f' ~* |DOT&E Director, Operational Test & Evaluation.# n ?7 X9 o% R% Y; C9 O1 ` ` DOTH Defense of the Homeland.# q y2 w F: ^! }5 ^( N Down Select To reduce the number of contractors working on a program by eliminating one or% u6 g4 W* G# P* u Q: I( | more for the next phase.3 w) ^1 c) U7 g: M: T DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. ) F6 \0 @9 ?7 W! K5 n: \DPA Defense Production Act.+ T9 u" p; d7 a( z. }2 ~2 Z. I DPA&E Director, Program Analysis and Evaluation.0 R' k) h! [$ N% L1 d7 F) H DPAS Defense Priority and Allocation System., V C H% Y# U f" [- x7 H) }; }3 p DPAT Dynamic Program Analysis Tool.( N) f, n% Q$ G5 l/ y/ q F DPB Defense Policy Board. ) d1 i; f, e: p6 L$ o s3 n" }DPG Defense Planning Guidance. 0 b( a8 g. Y) s; o yDPM Deputy Program Manager.0 b! r: Y5 t7 U/ A: v. j" n* X DPML Deputy Program Manager for Logistics ! d( C \4 u& TDPP Distributed and Parallel Processing (Computer term)." S+ \( q W! r DPR Defense Performance Review. + B% T6 g8 ?" H) kMDA GLOSSARY, VER. 4.0 D5 q- {' z# F% j. k) K# V 84) d! D- D+ S. S DPRB See Defense Planning and Resources Board. 0 W0 ?" L! Z; FDPRK Democratic People’s Republic of Korea (North Korea).0 U( N: b+ k4 d# v& P: g M DPRO Defense Plant Representatives Office.- M. e# c$ [3 o8 S: l DPSSL Diode-Pumped Solid State Laser.) ?6 e8 `; Y$ B: x4 B DR Deployment Review.3 B% J! b( w$ U p+ R DRAM Dynamic Random Access Memory.* B6 P: O' l# A0 i0 V& X0 ] Draw-down Curve A method used to encapsulate the overall performance of a BMD system that! W2 M+ Q6 s) W; i/ Y plots the probability of survival on the vertical axis versus the number of attacking 0 b$ F1 e+ u& C! IRVs on the horizontal axis. Used in conjunction with attack price, they are the/ B; o/ r9 V7 y; q( S( J most important expressions of a BMD capability.7 v: w4 \* v" p3 Y) [ DRB Defense Resources Board.# r( j$ C2 q# D2 a1 ^ DREN Defense Research and Engineering Network. 2 ]" G S7 p- c- A- cDRFP Draft Request for Proposal. 7 J4 p1 {1 L$ k8 S8 YDrift In ballistics, a shift in projectile direction due to gyroscopic action that results from 3 k9 V5 p& }/ [) Pgravitational and atmospherically induced torques on the spinning projectile. y* j& |, G5 T* W- O" o& _6 m DRM DAB Readiness Meeting (DD 5000.2 term). # o+ W+ E8 A, B! r! UDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also $ l1 M; w9 u$ ?Remotely Piloted Vehicle.% I6 |) j; x5 z DRP (1) Deployment Readiness Plan (US Army term).2 G/ q- Q' t$ ` (2) Deployment Readiness Program.7 }+ w& [- H5 [ o) ~! H$ m DRR Digital Receiver Replacement (USN term). 7 J' p3 ~" f$ k+ b0 }DS Deep Space. ( L5 X3 ~3 _/ v: a8 B0 G5 h% f/ rDS-1 Category of telecommunications circuit capability. / z6 y# f' P/ A8 gDS-3 LAN Category of telecommunications circuit for a Local Area Network.# n8 a2 C" L3 u% y3 G& o DSAA Defense Security Assistance Agency (OSD).- h4 E R8 {) c$ o( \ DSAT Defense Satellite Weapon.9 I* b" L5 b7 G( j DSB Defense Science Board.: F3 m5 I& j2 m9 ]. r1 b7 i DSCS Defense Satellite Communications Systems. 5 Q f: ~# v7 ]" U! v- jDSCS-3 Defense Satellite Communications System Three., ], F' j% a( C1 y& X3 h' r DSCSOC Defense Satellite Communications System Ops Center.3 {. W) O5 L5 z9 ] DSI Defense Simulation Internet% z8 H7 b! g" N) o MDA GLOSSARY, VER. 4.0 D) w, [8 g0 l) h( H; Y 85( H+ t8 s0 V8 R+ {' H DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet & j& ~ Y& Q& U* B x& g9 NSystem.2 |% z6 t- k" K, X' e z5 g DSM Decision Support Matrix1 Q* M) W: F$ ?: c7 K DSMAC Digital Scene-Matching Area Correlation. % ~4 x& w, R& H2 pDSMC Defense Systems Management College. 5 g% ?# t* U% I/ sDSN (1) Defense Switched Network (formerly AUTOVON).2 z8 O. O) Y `# u" Y. j (2) Deep Space Network (NASA term). , c" n: Y( W# z% QDSP (1) Defense Support Program. (2) Defense Standardization Program.) @5 ^2 w, \6 p5 {+ j$ K, y% E DSPRTM Defense Support Program Real-Time Model. v* q. }1 a; HDSR Data Set Ready (TelComm/Computer term).. W5 |* g' e( _: ^6 A' V DSRCE Down Scooped Radio Control Equipment (TelComms term). N. N* A, [" p7 `: d% X5 ` DSS (1) Defense Supply Service. (2) Digital Signature Standard.! ^5 R7 \! W6 y* S; C DST Defense Suppression Threat.. g% O% C4 E0 D* g3 M' ]7 k% t DSTAR Defense Strategic and Tactical Array Reproducibility.; }: p% n5 w8 H/ n! a) l DSTO Defence Science Technology Organization (Australia).% \, ]. I6 f& t; G; a# x# T DSU Digital Service Unit (Telecomm/Computer term). ! Z: ~1 I$ E6 D6 A( Q* hDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to: F9 w# T* p4 J) _) v the DNA. 4 z+ G: {$ [* v, f0 w1 E1 ~) k1 LDT (1) Discrimination Technique.8 K( y- O8 w7 t* n( @ (2) Development Testing.4 _% R" }! v* B: L; v/ \ (3) See Development Test I, II, III.& | O4 Q% W& [4 \4 o' a (4) Down Time (ILS term)., G4 q- @$ B/ N1 b( t (5) Depressed Trajectory. 3 f* L% [6 g& b" }, n* D(6) Dedicated Target. & C3 s! {; P& A2 tDT&E Development Test and Evaluation., A# d4 P( l# F DT/OA Development Test/Operational Assessment.- ?' i3 A& Q0 q8 W8 R4 R DT/OT Developmental Test/Operational Test.' j( Q) J6 r* _* v1 v DTAP Defense Technology Area Plan. , e: e* U( s3 b# C6 \2 HDTC Design-to-Cost./ x6 D; U7 {6 w1 H DTD Digital Transfer Device (TelComm/Computer term). ; i0 i. I8 M7 U _DTE Data Terminal Equipment (TelComm/Computer term). * q; i) @" u/ ]DTED Digital Terrain Elevation Data.: w/ d4 ?" K. W/ J3 Y DTIC Defense Technical Information Center, Alexandria, VA. ( }; o0 A, @" L A( c9 t" Z qMDA GLOSSARY, VER. 4.0 D5 s7 \9 U) U& p% y3 ]8 ~9 x 86 ) ^6 S4 Y& V9 ^- E( tDTIS Defense Technical Information Services (now DEIS). ) v; H+ x n8 P6 DDTLCC Design to Life-Cycle Cost. ; C# v! r8 B: L+ p- [- ZDTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL ) C! _! Q5 M. R8 e8 J, yterm).* O+ ^% F$ n* a$ y3 { DTLS Descriptive Top-Level Specification.+ Q; y+ ]! D9 I! ~ DTMF Data Tone Multiple Frequency (TelComm/Computer term).) {+ J; L1 A3 `2 q5 t- G4 H DTO Defense Technology Objectives. ' k: ^6 H% q+ L2 \' b2 x& U7 qDTOC Division Tactical Operations Center. ; _, `6 @8 n1 T0 Y. {3 M& uDTR (1) Demonstration Test Round. (2) Development Test Round.+ |0 q1 I3 p- N/ q DTRM Dual Thrust Rocket Motor. ; Z {8 I: t( g) ^& Y- K. M8 B& g& R9 k* tDTSA Defense Technology Security Administration. b, ] l# x/ o# b& [- L) p7 I+ P DTSE&E Director, Test Systems Engineering and Evaluation. " ?0 K$ r) t! K# d6 bDTST Defensive Technologies Study Team. 2 f) j) W- D0 E. N/ `' @DTT Design-To Threat 3 [9 ~: o* x+ Y H& D! i$ O# eDTWT Dual Traveling Wave Tube (Electronics Engineering term).8 s& k1 {) L, U$ ^3 f3 ? DU Depleted Uranium./ ~/ E6 M) ~, w! @& U4 O, ~; Z( o DUA Design Upgrade Assessment.! J6 c: }! D2 y/ E6 Y. Z; B8 {9 l Dual Source Two contractors producing the same components or end items for the same$ E+ N( m& r" r program.- {* [, x4 K' \ X DUNDEE Down Under Early Warning Experiment (MDA/DSTO term).0 S" Q& M- s" Y/ e) O7 i$ d) Q DURIP Defense University Research Instrumentation Program.1 \# s P0 i/ p* ] DUSD Deputy Under Secretary of Defense. ( C$ K+ O! g4 ~. ~DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). % n6 ~0 o9 I- w* DDVAL Demonstration Validation.0 O7 m5 A9 z. n! I# f% N" C DX The highest rating under the DPAS. It takes preference over all other rated and " ^' g: E' I2 L' ~not rated orders on a contractor’s production line. The BMD program carries a1 ^7 v4 x3 L1 h3 b n* P, o( Q “DX” rating. ( C# o$ y5 k' w- ^MDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87: [" R: V' i/ n- C" H; Y* e E East $ i7 r5 f7 ^0 ?+ [. n+ t0 WE2 I See Endo-Exoatmospheric Interceptor.$ ?9 {' R { O5 T" ^2 B E2SRD Effectively Two-System Requirement Document. 0 K9 R0 O* d7 G E- VE3 (1) Electromagnetic Environmental Effects. 4 [3 h& N2 P F(2) Electrical, Electronic, and Electromechanical.( A. X" B; C4 s; m) Q7 T E Spec Materiel Specification.& g9 }& l: y3 m) Z EA (1) Environmental Assessment.0 B+ X- e* X" _4 c# D% O (2) Engagement Authorization.0 g% V% V- {% M& x6 p0 _; c# l" ~: s7 s (3) Executing Agent. - g( p" J Q: a6 S0 Y5 v(4) Evolutionary Acquisition.7 }- W& `( C z! B, F (5) Environmental Analysis (environmental term). - ?) o! S) ]- @$ d Y(6) Executive Agent. $ [3 K# O8 }7 z8 i% S! [! PEAC Estimated Cost at Completion. 0 j- V4 I3 B! q& jEAD (1) Engineering Analysis and Design. (2) Extended air defense.' c5 J# u8 g. u! N EAD/D Engineering, Analysis, Design and Development. N$ g* s: V2 X3 n, y EADSIM Extended Air Defense Simulation.* V, \1 M4 ~- z- u* d EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing $ R2 U1 H1 ~3 X* Uusers to model military response to airborne and ballistic missile threats.( L' w. c3 Q: |2 M9 m EADTBP Extended Air Defense Test Bed Program.) D& E5 h6 N- T5 i& l. m. w4 k EAGLE Extended Airborne Global Launch Evaluator.$ l9 J& q: N+ M/ `3 b& L$ k EAM Emergency Action Message. & M+ {! ?: g+ E$ QEAR Export Administration Regulations. . R; j) e' i, N; f# e: Z, IEarly Operational ?/ q r2 N8 v4 u3 N7 r6 A+ O/ @ | Assessment 6 V% E7 |, y3 v0 D, g1 c) R* A* ]2 WAn operational assessment conducted prior to, or in support of, Milestone II. % M( u) R! G4 z b! D; QEarly User Test X6 t! n7 Y1 w M# i0 t(EUT)7 w* F% n5 J( B; Q# c6 y A test employing representative users to examine materiel concepts, training or8 {. I3 ~# D" ?& `( B h- k logistics planning, or inter-operability issues. EUT can be accomplished during8 ~" E6 p( O: T1 R DEM/VAL on brassboard configurations, experimental prototypes, or surrogates4 j2 C$ k$ _) m& y B to provide data leading to the decision to enter full-scale development. ) s1 D. J, B1 q6 K3 W3 HEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of # w& L' X% T# l4 v; msurveillance satellites and long range radar.2 t$ o5 W( ~% ^; U' F5 A ?5 V (2) Early notification of the launch or approach of unknown weapons or @4 c h8 A# \5 p) |' C0 H weapon carriers. & g! s8 y1 {& o8 ]) LEarth Limb The apparent outer edge of the earth as viewed from space." f2 G2 D' V( M$ ^ Eastern Test& j9 f+ O- c5 k9 s" w! t' d Range (ETR), |9 \3 T1 B& v' Q6 b& c8 v Beginning at Patrick AFB, FL, this range stretches halfway around the globe7 B% r! c9 ~3 b/ q1 t9 L! m where it meets the Western Test Range. An array of launch complexes, sensors,# R. [( z/ Z& `, T5 g7 m) e' c and tracking sites make up the Eastern Test Range. The ETR is now operated: X- I% k! y0 p; O% J0 e by AFSPACECOM as shown in WTR definition. ! h+ v9 x' U8 iMDA GLOSSARY, VER. 4.0 E+ O; n+ \+ p: R2 N2 q 88 ( [1 \9 U) F1 tEB (1) Electron Beam. (2) Enhanced Blast. , o7 T; @9 r- aEBB Electronic Bulletin Board.7 H' l3 Q4 m, e; m3 l2 |+ ~ EBCDIC Extended Binary Code Decimal Interchange Code.! i! A7 c( i! }: [: ]" U EBW Electron Beam Welding./ r4 m7 P& z* ]; M0 P2 f EC (1) Electronic Combat. 0 t9 k+ {! N$ g8 {/ J+ m( {$ ^" s Q(2) Error Control. 1 L, E$ g4 V8 U(3) OBSOLETE. European Community. Now known as the European Union" S8 D9 U3 e& U4 g (EU). - \8 p/ F" y0 {" a, Q9 BEC/EDI Electronic Commerce/Electronic Data Interchange 8 K- @# o+ q! U- U$ S0 d& dECAC Electromagnetic Compatibility Analysis Center.1 ]- D! T& O" a7 h, N% g ECB Engineering Change Board. % n+ E) S$ w1 m+ z- M* K9 g# eECC (1) Equipment Control Center. (2) Element Control Center (USAF term).5 q6 K& c% l: F' q ECCM Electronic Counter-Countermeasures. ( Y: L! v4 J% ]+ u V/ L4 yECDs Element Control Directives. + V$ x5 b7 J* dECLS ERINT Command and Launch System.7 h$ _0 s" d% I3 `8 K1 m: q ECM Electronic Countermeasures.% [8 @- W9 I2 j9 r+ G, _, d7 j ECN Engineering Change Notice. 0 D: v7 C0 p+ d3 m! c7 O( JECO Engagement Control Orders.; `8 }9 G2 X2 E: T* U ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. / Y) R- G- Z2 j- A# z' ^5 _ECPMO Electronic Commerce Program Management Office. 5 p3 Y U3 d- {8 J/ D mECS Engagement Control Station (PATRIOT). 9 X% M! v2 f8 D) `" S- zECU Environmental Control Unit. $ H( A6 v! h1 z6 fEDAC Error Detection and Correction! C A3 k+ `8 ?0 a EDGES Electronic Data/Guidelines for Element Survivability.. i# C+ a( Y i$ d; \ EDL Electrical Discharge Laser 1 R" h# d" m& k4 qEDM Engineering Development Model. , W. F { `4 REDP Engineering Development Process( l6 Z/ m1 _. S3 U: O) {6 Z EDR Embedded Data Recorder (PATRIOT). 0 l( H/ r& _/ O/ p+ S) p" [EDS Electronic Data Systems Corporation# [& a* a+ k1 M7 v4 ~ EDWA Engagement Determination and Weapons Assignment (PATRIOT).+ O' w( H) {9 ?5 z MDA GLOSSARY, VER. 4.0 E" M6 q4 D' G8 N c 89 ) m5 z4 Z, o P/ O0 e8 X# [ f3 lEDX Exoatmospheric Discrimination Experiment6 N$ C7 v# |! | EE (1) Electrical Engineering. (2) Engineering Estimate.+ k9 F9 H* [+ \9 f EED Electro-Explosive Device. `) }7 |2 V& x( W' g EEEV End-to-End Experimental Version. ) v; V, g! _1 W$ c V0 @EEFI Essential Elements of Friendly Information.4 l4 s& }& z# q$ k EEI Essential Elements of Information.6 c" N+ u. n O& y6 y' K1 ?4 d9 K EEIC Element of Expense Investment Code.) x/ `6 T% M6 L J EELV Evolved Expendable Launch Vehicle (USAF term)7 a4 u4 s5 ~* Z& b, a- Q% W6 y EEU Electronic Equipment Unit./ v: x- M1 A* y8 ^ EFEX Endo-Aeromechanics Flight Experiment.1 A' a7 j2 N0 p% [) A) v6 t9 T EFF Electronic Frontier Foundation. ]1 W+ P0 a k8 Z" x) ~: \ Effectivity A designation given to the BMDS configuration and demonstrated capability at 8 Y6 A+ Z9 E0 C' K' o2 fa point in time, becoming effective at each increment when an element or 6 G8 g" `9 Q2 z+ qcomponent is inserted into a particular Block.( v4 n- D* z4 C+ t1 Y( Z( _; g- y1 A% P Effective Damage That damage necessary to render a target element inoperative, unserviceable,+ F0 Y& u n( f/ f nonproductive, or uninhabitable. ; \% z$ D5 G, F" |Effluent Plume The pathway of movement of effluents through surface water or air.( Y2 s4 z- k# V8 j8 G EFP Explosively Formed Projectile. " v% j$ J' P- V" S- T) i6 m* VEGP End Game Processor. 7 u" _- @ q" ~EGTR Eglin [AFB] Gulf Test Range.* R& V" { d9 X) a/ Y, n+ r7 M EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). * B$ ~, M, V* J# gEHF Extremely High Frequency.' \7 G) s0 n- O" p' P* |; v# e+ t ehp Equivalent Horsepower.' a% t; y% y5 d3 M* o EIA (1) Environmental Impact Assessment. # S$ `3 g) a* E: d* c% s(2) Electronic Industries Association. ' o/ Y/ w. v+ ?3 K4 Q1 CEIAP Environmental Impact Analysis Process./ I) h7 L+ S1 H$ u4 N' V# {# h EIP Exoatmospheric Interceptor Propulsion. 1 p8 w% v7 F) ~$ e# Z( ^( H! NEIPC Electronic Information Privacy Center.# {4 r% Z4 Z: y EIPT (1) Element IPT. (2) Engineering IPT.* p: ~. G; n% R& j3 @ EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.4 O$ U6 {7 S$ V9 r8 r6 w EISA Extended Industry Standard Architecture (Telecomm/Computer term).3 O% e' ^' f8 E! |5 O* O: D }- [ MDA GLOSSARY, VER. 4.0 E 8 U! z8 T5 x% W _9 o2 c& L90" b( ?, O# \0 M6 H0 H- [ w EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle./ M9 K4 D9 b6 @% q4 M Elastic Range The stress range in which a material will recover its original form when the force; R& V2 M: x9 B (or loading) is removed. Elastic deformation refers to dimensional changes 5 y, H Q. i* k5 x Aoccurring within the elastic range. ' m* J, V7 S" v, T6 bElectro-Optics/ E$ |+ n) Z# {3 W& X- O Infrared (EO/IR) 5 v; V( W; i+ {6 Q {% ^* I6 n* yTechnologies/techniques employed by optical sensors in the wavelength # X5 N# K0 m5 H, X5 j" Fspectrum slightly longer than visible but shorter than radio.. I% j! N$ A' O Electromagnetic" S& E( S# b/ W( r% W& V Compatibility0 i) N- J" n- v) d4 ^ (EMC)7 P- g2 `4 b9 s j3 A A condition when all electromagnetic emissions from electronic, electro-magnetic,; O& [4 ]9 V( X4 d' \$ W and electro-optical components of a system interact without interfering with one# e+ g# f$ o; g" w3 b% Q: D% G1 ?0 q another. 9 z Y( A5 T8 I, `2 _) W8 MElectromagnetic0 @9 {; o! [* D" f Emanations( o4 w) ~; W0 E3 D Signals transmitted as radiation through the air, through a vacuum, or through* y0 ~/ b1 F. z! B0 y conductors. % S4 `5 {" M0 S# G$ p: jElectromagnetic6 r7 r9 W1 R$ z2 v2 ` Field (EMF): Y5 ~4 V6 d% X" Y& C- Z An electric or magnetic field or combination of the two, as in an electromagnetic1 v% x+ A2 L8 b: e wave. Created by electric charges in motion, having both electric and magnetic3 b5 U# Z! M! J6 A components oriented at right angles to one another and containing a definite 1 B/ \0 x' T# D0 o' M) }- Tamount of energy. ! _% m8 r3 V& V0 wElectromagnetic6 ^" s, W6 g& y Gun (EMG) ! O' S3 C3 W8 b/ R$ N- M8 yA gun in which the projectile is accelerated by electromagnetic forces rather than5 L: @3 A3 Y/ E by an explosion, as in a conventional gun. @8 p% b& H3 ~6 v! {0 l( i Electromagnetic# G) n3 \, u. {5 s Interference (EMI)) r1 w A, y/ R a1 k1 Z3 H' J, G! I! O Any electromagnetic disturbance that interrupts, obstructs, or otherwise/ j# w" n3 Y5 b! ?) `' B degrades or limits the effective performance of electronics/electrical equipment.+ W$ T1 s% k' B0 ?/ x/ _6 A It can be induced intentionally, as in some forms of electronic warfare, or 8 d9 o/ M7 X8 r0 ~0 tunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.: g. N7 M# {( q" r Electromagnetic6 S; I# W- K1 l& a9 c. a" |; j$ a# q2 b Pulse (EMP)+ P7 O3 d" o) @" N The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of 8 i% C3 N$ [0 Q" C jthe nuclear device or in a surrounding medium. The resulting electric and1 l! B* }, S! O magnetic fields may couple with electrical/electronic systems to produce! M" D! |' F! }% m damaging current and voltage surges. May also be caused by non-nuclear " f4 Q4 r! }/ }, U3 }- A/ mmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic4 c5 q$ a: N4 r5 i/ o Radiation (EMR) 5 a( Z/ y3 n) C9 a( Y(1) A form of propagated energy, arising from electric charges in motion that) L2 M1 P$ ]4 ]9 J1 e' _ produces a simultaneous wavelike variation of electric and magnetic ; a) A3 z& A, o) K* R: f2 Afields in space. The highest frequencies (or shortest wavelengths) of 1 C/ g8 {6 N. r* G% l: Bsuch radiation are possessed by gamma rays, which originate from 6 J' l7 X, q* M- p, j- }; Bprocesses within atomic nuclei. As one goes to lower frequencies, the ! h0 \$ j3 D1 Uelectromagnetic spectrum includes x-rays, ultraviolet light, visible light,3 u0 m/ M5 b: ]5 y infrared light, microwaves, and radio waves., y# y0 U& g' ?+ R (2) Radiation made up of oscillating electric and magnetic fields and+ N( c5 x/ t+ r: _& S propagated with the speed of light. Includes gamma radiation, X-rays, ) Y# T; H& O6 y* nultraviolet, visible, and infrared radiation, and radar and radio waves.; G! ]4 W# x- l+ j# G: N, x Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices; T/ C' H& t# W used in system/subsystem design, excluding employment in the RF spectrum. 3 K9 o. G w+ U8 g# b+ S) P9 WElectromagnetic% j: b# Z8 l6 w Spectrum + g6 B6 b9 Z" w% C. Z" x5 GThe range of frequencies of electromagnetic radiation from zero to infinity. It is: q! J! v+ Z. `* i- C; p, V divided into 26 alphabetically designated bands. 0 `0 [ W5 K9 c* AMDA GLOSSARY, VER. 4.0 E 2 w* w8 k# v# K3 G' S' i0 u3 f: ^91 ! B r# K% y! p! D$ M; XElectronic% q) h2 [ r a4 H# v/ D Counter-2 z, ~# U5 l: u. E9 w+ p" B Countermeasure- B8 a7 O8 v. Y/ z, i s (ECCM) ! ~ @, j) u2 }, V5 k t+ |- t8 w4 DThat division of electronic warfare involving actions taken to insure friendly) c0 R M, q1 t1 A! h' T effective use of the electromagnetic, optical, and acoustic spectra despite the , W9 W2 S3 F8 u |$ Y3 ?' S; p" |enemy’s use of electronic warfare to include high power microwave techniques.1 F. ?& _1 Q6 y4 X: g' K Electronic& X- r( s3 o& {; b4 q% S Countermeasure* D, @; y) t& Z$ L: `- i (ECM)0 K2 Y5 `6 W$ P That division of electronic warfare involving actions taken to prevent or reduce an ) V6 a$ J" o" V. q' a" u0 |, ?8 Genemy’s effective use of the electromagnetic spectrum. ! `$ w8 a+ ^0 {% X9 z2 wElectronic 0 f' v8 c/ X2 a4 P3 GIndustries ! @- i+ y$ U7 K j" w+ ~* r9 A gAssociation (EIA) % O1 K4 G" K2 |4 e N! O% |A standards organization specializing in the electrical and functional * @, S- H& Y2 A% ucharacteristics of interface equipment. / }9 ^. @! m$ ~' [9 f0 oElectronic. v* t. N: G. t Warfare (EW)7 C6 I% j1 L3 e$ X# n7 Y: U/ o Any military activity involving the use of electromagnetic and directed energy to4 X- O6 A+ W0 B) K% U3 K control the electromagnetic spectrum or to attack the enemy. The three major . q8 l8 q0 P n msubdivisions are: ' W4 Z" P/ E7 u/ k% [8 \# C•Electronic attack – Involves the use of electromagnetic or directed energy to . ^& R: S6 Q+ d5 S; X' fattack personnel, facilities, or equipment with the intent of degrading,2 R9 I) ]3 t+ U, n/ {* m, N9 k j( l neutralizing, or destroying enemy combat capability. Also known as EA.: k! E3 {; Y9 Q% I: p Includes: 1) actions taken to prevent or reduce an enemy’s effective use of( f2 y! ^& U$ [" \) @& ]- \9 c the electromagnetic spectrum, such as jamming and electromagnetic 7 @3 \8 |0 T( o1 Ideception, and 2) employment of weapons that use either electromagnetic or3 ^7 X0 c V1 k* M directed energy as their primary destructive mechanism (lasers, radio5 e5 F5 T, N* y0 ?' I1 A6 U frequency weapons, particle beams). 0 l* i ]" `/ s; F$ t: E6 W•Electronic protection -- Involves actions taken to protect personnel, facilities,7 V" I, I& Q9 j! G/ l0 Z9 m and equipment from any effects of friendly or enemy employment of 2 M5 e3 d& A" c! Gelectronic warfare that degrade, neutralize, or destroy friendly combat* [, z' o6 O ? capability. Also called EP. ; _9 n6 O3 P o- R•Electronic warfare support – Involves actions tasked by, or under direct8 e+ y3 }, E1 j9 w, z G5 N control of, an operational commander to search for, intercept, identify, and ' e! [; K. `5 |: E$ b% ?# _5 Wlocate sources of intentional and unintentional radiated electromagnetic 1 n' P! [2 i2 r0 Wenergy for the purpose of immediate threat recognition. Thus, electronic 8 } K% n- J9 Lwarfare support provides information required for immediate decisions # c9 k6 T8 S, [, \involving electronic warfare operations and other tactical actions such as6 T/ D) d1 o8 z+ B" Y/ C+ D threat avoidance, targeting, and homing. Also called ES.$ z: `2 |$ E$ Q# r2 h" c Electronic3 X: \/ P6 C/ u' W Warfare (EW)" Z! [1 I+ H; r, s Environments7 L: ?2 `. c* { ]& B6 T: j6 R Electronic warfare environments result from radar and communications jamming K5 A7 h! \# D& d and other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD0 H7 R7 F% n) ^$ } system.6 F/ i& b7 E: O" `! B3 C Electronics6 M# s! q) }* \- h# u1 A Intelligence # }8 B0 V4 s% o/ o- D& w(ELINT): ?& U' O% B x. S7 T Technical and geo-location intelligence derived from foreign non-communications3 |% r. b) _9 j4 D( z# R electromagnetic radiations emanating from other than nuclear detonations or # n. ]- `* B, v9 J/ w: e- \7 i! Nradioactive sources. . f! k/ U3 z1 }. d l" {Electronics' o9 _. i- M5 p5 v) l" v. U3 N, O) \ Security (ELSEC) 2 `! q% @5 A+ c& y! L$ H+ _The protection resulting from all measures designed to deny unauthorized 9 t0 h- D4 j2 A6 xpersons information of value that might be derived from their interception and 5 q2 [; @" _" ?+ I8 } G- qstudy of non-communications electromagnetic radiations, e.g. radar. - M; F" L8 L! ~# G# P( p& |Electro-Optics ; Z1 F4 s; f7 A7 y+ CInfrared (EO/IR) , }% f- E M, h/ _Technologies/techniques employed by optical sensors in the wavelength 4 n; ^+ L; U; U A d& t5 nspectrum slightly longer than visible but shorter than radio. - R, ?* R% ~& ZMDA GLOSSARY, VER. 4.0 E $ o% b' e. K( o4 Q% c6 q92, C4 ]4 F, |6 ?+ p% F4 }! V8 f Element A complete, integrated set of components capable of autonomously providing2 z# _; z' L; P& ?: o BMDS capability. P. V( {& q) m+ }' m5 A Element * e% Y. z! t$ u* f- n1 e' iCapability4 F. K' P6 t8 }. c& X Specification& L# N9 U' d) ^* E (ECS)0 F- Q5 g8 f! S8 u- U. w$ m A document that identifies the element-level BMDS capabilities and* n# O0 l$ _7 g1 E5 Z specifications necessary to achieve the system capabilities identified in the SCS.$ h- `, \8 X6 l4 \* o& d/ x; B The ECS further defines the SCS-apportioned mission/technical performance ; o0 T/ \+ w& ^, ~1 i3 Y' bcapabilities and allocates these capabilities to the element’s components. ! L* T+ k5 u8 Z+ AElement Control 4 u* ?5 t/ Q% k, a$ L' uDirectives (ECDs) / N5 F) K# C- }) YThe command and control data instructions to control the conduct of the 1 x3 Y, U8 }9 h2 g$ ?! B7 r+ `engagement. ECDs are developed by command and control software based* b, f7 T+ S3 c" `/ ^ upon variable parameter input by the operators (both pre-planned and real time), $ M/ I$ Q1 X* e3 r$ Mand operator defined rule sets embedded in the software. The individual battle0 C6 n, H1 y4 ^; S/ @' V) x management processors use these instructions to accomplish the assigned tasks' F. H+ t% _2 G U, ?- | from the operations order. ECDs are contained within a Task and represent the& Y& i! r4 r7 [! ~$ P4 C7 j7 O$ y, M form of parameter values that influence the resource management processes of! ]0 M: Z, [& ^) m* N7 u& ~2 e Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and 5 z, ~: [) n; R Z& \8 jCommunications Management (CM). There will be numerous ECDs per Task.4 O9 z. R# n( }& s. t Element& E5 p7 ]5 c% W! ^: c2 i Operations 4 x( Z; P% s5 n7 z% `" I zCenter (EOC), F' _! H' x9 h' u1 T An Air Force operations center, which operates and maintains a BMD weapon or( e6 M: L0 r& T: N% y( g sensor suite. (USSPACECOM). v6 L5 y e: Q ELF Extremely Low Frequency.0 p5 g* b& c$ v2 ?' ~: t2 m ELIAS Earth Limb Infrared Atomic Structure. - m8 K4 e: J) U* T" z% q+ V$ Y4 fELINFOSEC Electronic Information Security. 9 e3 {% S( r# D, O6 O+ p: SELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-3 01:23 , Processed in 0.051002 second(s), 10 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部