航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation# H0 O% Z C3 @; r3 O2 I" Y( m, D COMSEC Communications Security. 5 W- T& Y& {2 J$ \/ O8 C" m$ } uConcept$ }. G! N' d, m( }* O Exploration &5 j% p ?/ o- p2 p0 o4 f9 h3 ~ Definition, H2 G; Z" P& @8 P8 B! n7 R The initial phase (Phase 0) of the system acquisition process, beginning at ) M! V7 f$ r/ d$ ZMission Need Determination. During this phase, the acquisition strategy is + O" L; _+ f/ t! M: Kdeveloped, system alternatives are proposed and examined, and the system# A# _ Y+ i$ n( }# R) f7 ~ program requirements document is expanded to support subsequent phases.' U, j% k$ j u! u( L Concept of7 H$ |& b$ M+ d+ l: ~ Operations3 }' v; I5 {6 ], \2 c0 y (CONOPS) R+ E- b& ^0 @# U(1) A statement, in broad outline, of a commander’s outline or intent in regard to; k: R' D, R7 | an operation or series of operations. The concept is designed to give an overall 0 m8 I7 d) `5 }/ Vpicture of the operation. (MDA Lexicon) , B+ v# ` ^- K) j; Z& Z2 _. X& @* h+ y(2) A verbal or graphic statement, in broad outline, of a commander’s4 N, Z- q9 w! { assumptions or intent in regard to an operation or series of operations. The 7 J. W8 p* g* \. d5 A+ f! dconcept of operations frequently is embodied in campaign plans and operation& G; P, w. S( T/ a plans; in the later case, particularly when the plans cover a series of connected M! O5 L9 d2 K( u) I. v( j operations to be carried out simultaneously or in succession. The concept is # t, e6 T" |3 u$ T9 ?# E1 Udesigned to give an overall picture of the operation. It is included primarily for: u5 k" k* I, W4 L$ f6 c6 F* T# o additional clarity of purpose.) C3 z ^ D* K9 Y. y0 n. g Concept Plan An operation plan in concept format. Also called CONPLAN. |1 ~7 d6 D% Y" kConcurrency Part of an acquisition strategy which combines or overlaps two or more phases of 1 E* g4 d. n! L3 F/ athe acquisition process, or combines development T&E with operational T&E. 3 v. O7 |# @, QConcurrent2 ?: F+ e$ i) u# G. [$ |9 g. M Engineering 0 |+ D D& D! e# K6 @A systematic approach to the integrated, simultaneous design of products and ; u$ f2 o5 c3 M3 K) M" r3 mtheir related processes, including manufacture and support. This approach is ; o9 L3 r& \; @intended to cause developers, from the beginning, to consider all elements of( i6 c* l8 a3 {2 ? the system life cycle from requirements development through dispersal, including! A9 x- i* ~" X- ? cost, schedule, and performance. ^; T9 t! t+ |6 ]3 s# w( VCONEX CONOPS Exerciser. ! C8 w# `2 a: z, ]8 \+ uConfiguration A collection of an item’s descriptive and governing characteristics, which can be7 E5 ]: ~/ M$ T/ q! |0 S expressed in functional terms (i.e., what performance the item is expected to1 C* ?8 v" j6 @* `3 E achieve); and in physical terms (i.e., what the item should look like and consist of2 |9 u& D6 R6 D& ]3 y4 D* h when it is built).. c5 M6 e! |* O MDA GLOSSARY, VER. 4.0 C * `; ]* g& R7 x- q# c59 , M, m8 H; ~+ f6 e- k' `9 ]Configuration : U4 T# R- a3 ]/ j8 T5 ?5 }: S% `0 QAudit % a7 `+ C k+ m: h7 b7 C" h9 p/ POne of the Configuration Management tasks which includes a functional & l. \2 M8 h% P; Jconfiguration audit (FCA) to validate that the development of a configuration item0 F& q2 }7 a! S* Q has been completed satisfactorily and that the configuration item has achieved( D- m) Z# _0 ^0 J* }& M/ G- |8 E. t to specified performance and functional characteristics, and also includes a ' W" v" j' r8 I5 L( F) S. [physical configuration audit (PCA) to verify that the configuration item “As Built” . [# X& B; x: U8 g( i( zconforms to the technical documentation which defines the configuration item.* a$ K1 V! A5 {9 N Configuration2 H& j7 s% b2 f* Z Baseline % e/ o; m' I: S, d4 LThe configuration documentation formally designated by the Government at a 0 r, X, B1 P- b: Q% Yspecific time during a system’s or configuration item’s life cycle. Configuration 4 H2 ^: }5 f7 P: \0 W' y2 Xbaselines, plus approved changes from those baselines, constitute the current* p. v9 y+ F: d* u; j K configuration baselines, namely the functional, allocated, and product baselines.3 q- E& U# H1 r1 b- u% R' I Configuration1 S# U0 S% q/ O* r2 D$ S Control & D; l- `+ ]7 L8 k4 _. C$ [& ~' h6 yOne of the Configuration Management tasks that involves the systematic 8 l2 o6 e% C! A3 G4 C4 kevaluation, coordination, approval, or disapproval of proposed changes to the2 N: d. E+ u3 t8 V design and construction of a configuration item whose configuration has been # k) h" N X0 X- c3 r8 J7 sformally approved.# u* U% |# M% I' B1 i Configuration5 I) B9 h( U! | f Identification 1 D; t3 o/ d4 M bOne of the Configuration Management tasks, which require that for every& N9 M' r: I; y change that is made to an Automated Data processing (ADP) system, the design 1 b7 [* M! t5 M# w3 O+ p- E, mand requirements of the changed version of the system should be identified.8 ^1 }9 o& [. x9 m/ [ Configuration& j6 K4 y" J" |; t4 {1 K7 J Item (CI)4 R0 n# Q/ T' ]$ P( e" ? An aggregation of system elements that satisfies an end use function and is & K7 n9 M! k- f7 p; t7 Cdesignated by the Government for separate configuration management.- ], u' c$ T0 ` y n) I, s$ o Configuration items vary widely in complexity, size, and type. Any item required ! R+ k/ C7 Y) Dfor logistic support and designated for separate procurement is a configuration6 K( B- h6 N% Q- z item. Configuration items are traceable to the work breakdown structure (WBS).( r& }' l& c5 b3 z/ [2 K4 H Configuration % K" ~% [/ p, t; l( f: Q0 AManagement 6 w2 `. M# s/ \% Y y(CM)5 K4 H4 |1 U, j Z1 q) s9 @/ \ In computer modeling and simulation, a discipline applying technical and2 [6 X9 ^2 J( l: j3 }7 A& a administrative oversight and control to identify and document the functional# M4 f; y% ?6 L; [4 b9 i/ T: T requirements and capabilities of a model or simulation and its supporting 0 _' _! y0 u' Q4 z2 Wdatabases, control changes to those capabilities, and document and report the, F5 B6 ^1 _, n4 Z ^$ Z changes. See also Accreditation. - o. `. w. E) g9 gCONOPS Concept of Operations.: A' }( ~, a' N! H4 l9 W2 q) m CONPLAN Concept Plan S4 O& C1 d+ F J" RCONS Contracting Squadron. 1 C0 r- B# ~( D6 |: b( e/ }Consolidated ' j" L: x+ y, I$ O q5 z( b% G. e! yCommand Center + v: D& m5 G7 ^4 |2 \(CCC)4 R7 K. ?8 k: a9 ? A single command center from which USCINCSPACE/CINCNORAD can direct all * S) ]; ~" T) Hhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado $ t' V$ Y4 ]: R+ l% |7 T& N/ G. qSprings, CO. 3 M/ a3 a0 u# w O; a1 S) vConsolidated! A& ?: W# }( P. M# n& C4 r: ^ Intelligence / Z4 y+ Y7 p0 Q) qWatch (CIW) 0 |* E! F5 O4 a: }/ X% `A consolidation of intelligence watch functions within the Intelligence Operations 6 [% E3 k0 c+ rCenter (IOC) consisting of the USSPACECOM ITW Center, the NORAD9 A4 b, k8 \$ x$ X* x1 {, y; x; V* Q Aerospace Defense Intelligence Center (ADIC), and the Air Force Space 2 `! h/ r$ x* dCommand Space Intelligence Element (SIE).2 U( I* G9 e! r0 c Consolidated 6 \9 j7 h/ |6 }& o' VSpace1 M! f( Z+ C8 B Operations) Y0 M% f- M! y. j Center (CSOC) - D$ I! Y9 y: i' e% T7 W* p+ BSeries of centers at Falcon AFB, CO, which operationally control and maintain . O& r& @1 s. f; Aassigned DoD satellites. ( }- d# o" K; ?) M: ?( X/ E, g; bConsolidated 5 T, l5 c3 Q3 HSpace Test0 d- Y y3 y D+ [% n2 ~ Center (CSTC) ' s( _' T* c/ b& SSeries of centers at Onizuka AFB, CA (Sunnyvale), which support launch and / l) X _- W9 e3 d6 S6 @initial on-orbit checkout of operational satellites, operate R&D satellites, and9 Y6 a* D5 P) _# _1 B serves as a backup to CSOC for operational DoD satellites. 8 h9 H% V& O3 j: D5 bMDA GLOSSARY, VER. 4.0 C0 v% L1 z. ~0 c% k 60 , H4 F1 q7 l( N& vConstellation 0 N0 _6 \$ o# S Q: l8 J& Y( XSize (CSIZE)9 l J& s7 _" D' U The number of satellites of a particular system placed in orbit about the earth. 0 h3 B+ ^ F& cContact Fuse Device used to detonate warhead on physical contact with another object.6 U9 M$ ]' Q! C Contingency8 i- ~$ ?9 a6 d3 G Deployment Plan ! Q2 x" e* M. Y0 i1 a(CDP) 5 ]8 Y# b5 n( a, Q. t& j) y8 }5 ?1 {An executable plan designed to deploy an early missile defense capability and ^! S$ Y: ?4 a: z* P4 o reduce deployment time. The plan provides specific executable deployment 2 g; z/ r5 V$ X7 ^; o+ _options and describes activities required before and after a deployment decision. # |% F. ]/ Y, N1 u+ b; h% ]; XThe plan also allows decision makers to have oversight on technical progress,: p% Z( `/ B( B0 e X1 ^6 | cost, schedule, and risks associated with a deployment system. 6 M0 s& e" I+ ^% L0 RContinuity of7 G4 f4 B# h7 y8 V! ]3 o Command 4 k) U! R2 ~: V/ k' b0 U* \/ yThe degree or state of being continuous in the exercise of the authority vested ) }1 G H5 K! ~( A, h9 `, R0 min an individual of the armed forces for the direction, coordination, and control of( ~( Q+ Y: C+ N% `7 I( O/ h1 @ military forces. , `& t: e$ K% e: M4 a: tContinuity of# s5 G0 u; o" c; r! D Operations- |0 N6 m2 M9 F, V The degree or state of being continuous in the conduct of functions, tasks, or8 [; O. X4 D- f+ T duties necessary to accomplish a military action or mission in carrying out the % n+ Q& U: b6 onational military strategy. It includes the functions and duties of the commander, - M, |* s: L( Gas well as the supporting functions and duties performed by the staff and others ; ]! N* E# f7 n8 p' S$ iacting under the authority and direction of the commander. {; {$ Y3 N0 B" n9 T# {Contract" e* M: b% [6 {" M Administration; G* y; W! s/ c$ _% a' } Office (CAO) v' I* H. j2 f( RThe activity identified in the DoD Directory of Contract Administration Services7 o& o* c6 H9 ?' q3 S: I9 l' { Components assigned to perform contract administration responsibilities. It is a# Q1 N, E$ n3 |9 I' o l$ _9 G! x general term and includes Defense Contract Management Regions (DCMRs), . q+ E2 w' Y0 \Defense Contract Management Area Operations (DCMAOs), and Defense Plant0 b- [1 |2 D. E, P$ c Representative Offices (DPROs). (Defense Systems Management College & u( b& C) `& L0 |: A9 |) xGlossary) : H) D/ D' o! m- T# Q8 v; p8 KContract Data 5 v6 [0 x/ J1 m9 x$ l# rRequirements( |" V8 i4 h( D' m* l, _ List (CDRL)' O0 b* a+ ?& e S Document used to order (“buy”) and require delivery of data. Tells contractor 2 n3 n A: I. J2 I( k8 ^what data to deliver, when and how it will be accepted, where to look for# d5 M8 O! W! n4 b instructions, etc.0 y+ P) m+ d* t( f: T Contract $ @: L& d. \- N7 I! X/ VDefinition' f# ^) U8 D+ D- Z3 r A funded effort, normally by two or more competing contractors, to establish . |1 c0 L$ w" J0 x) u/ g4 { L. _specifications, to select technical approaches, to identify high-risk areas, and to . m& w- p. v& Emake cost and production time estimates for developing large weapons systems. . H" V, X- r5 r4 QContract Work Z8 F$ F: a t5 E- _ Breakdown ( ^2 L* u! d+ |! V: S* h1 r4 P5 AStructure . N% _! v; X0 H0 u3 WThe complete WBS for a contract developed and used by a contractor within the4 c9 |1 n8 F+ X0 Y. B, W) ? guidelines of MIL-STD 881A, and in accordance with the contract statement of ; K' w2 @3 r1 xwork.: m" q0 l: }. K; }* i) Z Contracting 1 X; a8 d- S( p" H0 vOfficer (CO)% W, ^" m- g/ G ]. R A person with the authority to enter into, administer, or terminate contracts and 8 z# E4 v3 |/ O9 d+ m2 Jmake related determinations and findings. The term includes any authorized ) g) w$ z \6 ?' E# jrepresentatives of the CO acting within the limits of their authority. A CO whose8 ?9 j' Y% B- E( b primary responsibility is to administer contracts is an Administrative Contracting . Z1 R) u5 v1 `. `. @; fOfficer. One whose primary responsibility is to terminate contracts and/or settle 5 q8 X) M; }% O( ]0 @# A# l' x$ ?terminated contracts is a Termination Contracting Officer. A single contracting6 ?. v5 y+ A( ]- h( P; r officer may be responsible for duties in any or all of these areas. % a! {! V' U- V0 NControl Authority that may be less than full command exercised by a commander over" g8 h1 \2 V9 [ part of the activities of subordinate or other organizations.3 e$ i. W2 s$ f' p Control) |' G# a) L# H2 v' | Abstraction ; L4 i* C/ C5 G) K(Software) The process of extracting the essential characteristics of control by 3 Q+ F) h3 w3 w8 Hdefining abstract mechanisms and their associated characteristics while% r% d5 B" Z7 n, w disregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C : ~7 ^) A; r4 L1 w b4 ?615 p: q1 a8 B# \7 ]3 U, ? B+ M6 n+ i) P Control and0 }7 s& [4 `) E$ A1 h% d, J: x Reporting Center 8 }: ]3 }1 J( \) i$ [An element of the US Air Force tactical air control system, subordinate to the 1 q/ s; |% f- E* {! Dtactical air control center, from which radar control and warning operations are, z; D% w( Q9 H. t! t: y4 a, v conducted within its area of responsibility.4 @) T7 L o3 `* H Control and# F. _/ D' T9 p Reporting Post / p+ v6 r; \. k: S7 X! c. ~An element of the US Air Force tactical air control system, subordinate to the ; d$ Z& {. j) r2 x' Dcontrol and reporting center, that provides radar control and surveillance within* H' q1 f" F! X' H. `' z+ P7 i its area of responsibility.; o( r9 N- ?; D Control Area A controlled airspace extending upwards from a specified limit above the Earth.3 Z& t6 \+ C1 v& ^8 O& K( } Controlled / @1 [1 h9 ?1 f/ z* I9 JEnvironment 1 K Q/ j4 B Q- u( gArea where entry into the radiation hazard area is controlled. & c/ _7 r7 z; c* Z9 wControl ( U1 z( F- h$ o/ k0 {Procedure . u/ g0 H7 _* N* A$ D9 m6 o: lThe means used to control the orderly communication of information between , A/ O) `" U0 z: dstations on a data link. Also called line discipline.# ?2 s6 L2 T' k" s, i Control Station The station on a network, which supervises the network control procedures such+ }: q5 S. {& \ z as polling, selecting, and recovery. It also is responsible for establishing order/ A: [5 `$ m: H7 x; l* Z on the line in the event of contention, or any other abnormal situation, arising% G9 b4 M" T. a8 N' } between any stations on the network. $ ^) P6 ~ X1 H" r( G& QControl Zone The space, expressed in feet or radius, that surrounds equipment that is used to 8 b, R+ ~1 j; Y* z: S- e/ M) x- F5 Gprocess sensitive defense information and that is under sufficient physical and 3 ~) L J! d' r( R2 X! ftechnical control to preclude an unauthorized entry or compromise. & N' v& n. T4 M T0 y' x' nCONUS Continental United States.$ |9 { L+ o* E% p Conventional Co- 9 u8 m3 _+ h. C# ?# G7 Q/ hProduction$ Y6 t; I" p$ n$ \+ k An effort between governments to produce the same end item, or components0 w, R& N: F, b4 t& P4 l# g of the same end item, in concert. : S f' T# _ @) HConventional4 F3 x6 I! e0 ^; O9 @ Weapon / V F5 V) G- c3 ~) |A weapon that is neither nuclear, biological, nor chemical.' {6 n9 V& ~6 h5 @% }/ P Coop Cooperative " [2 G; L0 ^" l- U) u0 _# j+ FCoordinated9 n( V/ r2 b+ t- {; c5 D" O Engagement * t; Z! G0 e7 Z; UPlanning/Actions - P2 D3 l( E' l8 W4 J; kNecessary coordination among engagement components to ensure maximum * n H6 m# L; S& ? }effectiveness of the SDS and resources are not wasted on targets already 3 g4 K+ s, c% f d5 R. Atargeted. 1 @6 f: L7 n% {+ j: c6 oCoordinating 6 M; D4 ?2 _; sAuthority6 b- J, G1 e9 Z, L A commander or individual assigned responsibility for coordinating specific ) z+ \9 o' Z: u, w! xfunctions of activities involving forces of two or more Services or two or more 7 d4 X1 Z5 S2 G& \' D) P8 U6 D( @* kforces of the same Service. The commander or individual has the authority to3 ]" b" q( i5 O3 {2 _, e require consultation between the agencies involved, but does not have the; `' d: _% Y3 E3 U2 h authority to compel agreement. In the event that essential agreement cannot be) D, ?; _- V$ h; e reached, the matter shall be referred to the appointing authority. + k7 n' p0 K. g7 tCOP Committee of Principals8 R! E5 ?/ T& q7 r+ t# N COR Contracting Officer’s Representative. Contracting Officer.* `' H* r) f# n! p: r/ f- Z# f CORBA Common Object Request Broker Architecture.1 W/ T9 b! @$ c CORM Commission on Roles and Missions. " _7 ~7 \5 k9 C- R0 v+ }( {2 L3 ?MDA GLOSSARY, VER. 4.0 C : _- Z5 f) N' j! x6 {( B62 " A/ @' J5 S1 n- |# g- m/ ?Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens, F' l' c v3 n) M E% \+ d perpendicular to one another, designed to act as a radar target or6 z, a5 f8 |' U7 h4 n* y marker.! ~# m* |4 T/ H: L. U/ ~- N. z9 E (2) In radar interpretation, an object that, by means of multiple reflections 1 e# y# `6 @+ g n- z& lfrom smooth surfaces, produces a radar return of greater magnitude than 3 w2 h1 d8 H# f& q4 amight be expected from the physical size of the object.* O5 R. ]0 j) n0 ^2 C0 P Corps SAM OBSOLETE. See Medium Extended Air Defense System. ) K& T9 w$ S# o) z/ hCorrelation (1) The process of relating observations or tracks from one set of data to6 v: t+ h4 e+ f observations or tracks from another set of data, i.e., collecting data from. b9 W. h5 @8 x3 V5 ~/ [) B different frames or sensors that presumably relate to the same target. (2) - l6 B" N; D9 F" p5 F% ]In air defense, the determination that an aircraft appearing on a. @9 [6 f) W6 ~! Y# x+ s4 p radarscope, on a plotting board, or visual is the same as that on which , L5 \7 Y7 e) Y/ f/ L6 l$ S+ Hinformation is being received form another source. (3) In intelligence , H1 a' U3 q6 |/ v, e, L6 Tusage, the process which associates and combines data on a single ! M j0 K; m; E& P, Y: D0 z' Ventity or subject from independent observations, in order to improve the ; \, n, _0 K8 ?7 Z% \+ Treliability or credibility or the information.# G1 M# {" a7 P COSEMS Evolving architecture operations support tool.' N3 T# a0 Z! _+ c, L6 p COSM Computer System Operator’s Manual+ C2 j& [; ]. y t" ? COSMIC NATO security category. 0 h3 Y0 K; x. k3 }* e6 jCost Analysis6 A6 ]& c& a9 z; _: y7 h4 @ Improvement . c+ m6 ~' Q3 ^$ C" N) Z) KGroup (CAIG) ' H/ D6 R: F4 q( @) P" tAn organization within the office of OSD Director, PA&E which advises the DAB: y0 ]4 M7 m/ ^+ r on all matters concerning the estimation, review, and presentation of cost * ]; \, G, I- a9 c8 K5 z: g) [analysis of future weapon systems. The CAIG also develops common cost4 W7 J/ I1 @' y0 Y! u0 ` estimating procedures for DoD./ A- v A Z# t/ q& _ Cost Analysis 6 G5 @% O/ p, [' f8 d( ?; O8 URequirements 2 ~0 l2 X$ }9 [2 h; F% d) oDocument% Q1 S7 _2 p, a& A. J (CARD) 8 t9 }7 l5 Q! D& DThe document describing the technical baseline, which is a subset of current ; j* b; c3 ~# S$ W( Usystem technical data and is used to generate the baseline cost estimate for an $ o+ A& O7 v" \$ }) F- NSDS element. It includes, but is not limited to, the element description, + t& t& t6 k" v4 l- tinterfaces, operational concept quantity requirements, manpower requirements, 0 d: F2 l$ J# I! Q. q1 K* Factivity rates, schedules, research and development-phasing plan, and facilities 9 A% q" S: d) B! l9 Qrequirements. ' d! ` e( V1 \& mCost and * q* [9 f( `2 e( P; A# OOperational ( v7 q( A* ]. y- o; O- EEffectiveness 2 O+ w# L2 w8 a; @# `Analysis (COEA) 0 B5 I2 i. ~ i) U, UAn analysis of the estimated costs and operational effectiveness of alternative ; H6 C3 J3 @8 m0 y; [* hmateriel systems to meet a mission need, and the associated program for . H# A4 w% i) G& m2 \; A5 i; K- J/ Aacquiring each alternative. ( Y/ `1 c) f4 t- Y3 c6 j- Z- kCost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk 6 O( l) p( P* z# O" M) Gdue to cost estimating errors and the statistical uncertainty in the estimate. % G- i' a6 y0 N0 T# V5 @; n( bSchedule/technical risk is risk due to inability to conquer the problems posed by- ]0 A A% D+ t+ R# _# p the intended design: G5 \1 C0 F+ G6 Y7 _+ s COTR Contracting Officer’s Technical Representative. See Contracting Officer.5 X ~/ k- v! }/ z9 I7 Q COTS Commercial Off-The-Shelf. 3 g9 E, V+ Z$ e% aCounterair A US Air Force term for air operations conducted to attain and maintain a desired, g9 B, T' P1 |3 F* O degree of air superiority by the destruction or neutralization or enemy forces.6 D) o$ L. e1 I Both air offensive and air defensive actions are involved. The former range; m0 K. m- [$ w$ z, M7 Q# i6 t throughout enemy territory and are generally conducted at the initiative of) E, w, S0 Y; a+ [ friendly forces. The latter are conducted near or over friendly territory and are" p; C9 g- o5 J: C) \, C2 u generally reactive to the initiative of the enemy air forces.+ g2 o$ L4 s$ M MDA GLOSSARY, VER. 4.0 C* B, b. I, Q( k 63 , F3 H7 J; d* D5 a' `9 W3 PCountercountermeasures 0 P# t, [( @0 d; l. K+ g(CCM) : `$ A- p2 c4 D3 Q4 p: ]Measures taken by the defense to defeat offensive countermeasures., |: U/ o: f3 W; ], g Counterforce The employment of strategic air and missile forces in an effort to destroy, or - B1 G4 ^6 m+ m( F3 `) |render impotent, selected military capabilities of an enemy force under any of the/ j* D' |) u) h) \! {' K- g1 U# G" N circumstances by which hostilities may be initiated. - ?$ T" C& y7 o: [Countermeasure A design or procedural measure taken against covert or overt attacks.+ N" R9 O7 _2 [8 M1 @9 ? Countermeasure 4 L5 v! F. K ~1 Y+ \s (CM) . ?& C- s9 ?* Y3 _7 NThat form of military science that by the employment of devices and/or 4 y1 K* ]4 ~/ m9 u9 Ktechniques has as its objective the impairment of the operational effectiveness of _. n# x/ l3 d enemy activity.2 K$ E8 P7 P2 Q- Y; U& D Countermeasure# O. M6 n% A! o* B: L: P4 C) A s Rejection ! `* T% }& D( V& _% O) _. b(Surveillance)7 |4 R ~( f, | d7 ?" X# R, { Improvement or rejection of an object signal in the presence of 9 B& U2 s6 d. @6 dcountermeasures.. B- @( k% ^0 s; u# ]; ~" P Course of Action& H) R7 H; I; q- } b% O4 N1 P% E (COA) ; x8 ] ]4 q! i(1) Any sequence of acts that an individual or unit may follow. (2) A possible % T, t1 f# m _plan open to an individual or command that would accomplish or is 7 J6 p# N9 x) H; E7 ?$ K8 srelated to the accomplishment of his mission. (3) The scheme adopted# x, n# Y/ G' m, F. u% O/ E to accomplish a job or mission. (4) A line of conduct in an engagement. ; o$ [) X2 ^7 w8 v& T7 K3 {(5) A plan to accomplish a mission. It describes the execution concept- ~+ R! s1 q( t M6 b1 W1 U/ y w for BMD of North America. It will specify the engagement priorities, u" q: [# V. ^ resource allocation and desired results by Area of Operation (AO). 0 m5 X2 X& t! k- X& A6 g(USSPACECOM) (6) The scheme adopted to accomplish a task or + `- B7 I; n1 l# V# hmission. It is a product of the Joint Operation Planning and Execution 1 o/ M- i5 t% `. Y6 z+ ~4 L7 TSystem concept development phase. The supported commander will) V5 D: V3 t# H- w" p include a recommended course of action in the commander’s estimate., V' b9 V8 y F, }& W The recommended course of action will include the concept of + R5 U) R, Q0 n$ r& e+ D( }* Ioperations, evaluation of supportability estimates of supporting & o4 V: _- i/ Y# B9 Rorganizations, and an integrated time-phased data base of combat, o) [) Q2 V9 |+ s0 wcombat support, and combat service support forces and sustainment. % P9 W. m+ Q/ @" s0 QRefinement of this database will be contingent on the time available for 7 z! W9 f( _- I4 ^, B p0 ^course of action development. When approved, the course of action % f' Q$ s: g7 S0 Dbecomes the basis for the development of an operation plan or 3 }! p: v$ A! C; _. Goperation order.1 k- S( V! L+ J Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, / [4 X4 m7 X' F. Aand other geographical presentation systems. (2) Cover or protection, as V Z: a1 l/ \+ J( [+ n the coverage of troops by supporting fire. (3) The extent to which . D8 ~9 y* r- q/ B, H& m' @+ lintelligence information is available in respect to any specified area of7 W. n3 @ O- y interest. (4) The summation of the geographical areas and volumes of 3 f" @/ o+ O$ h6 ^8 M; Aaerospace under surveillance.5 {1 j8 G' m" j* e Covert Timing0 T2 s: Y2 u# R1 A+ A7 C. a Channel& w: j+ W! {! F0 z A covert channel in which one process signals information to another by 2 ^* |$ \& I4 p8 d" g/ ]! r$ y! nmodulating its own use of system resources in such a way that this manipulation ' w: P3 F) E0 H2 [- Y( Raffects the real response time observed by the second process.( m" ~! M) Y- m* o CP Command Post. 4 D! a% _2 s# S5 X" ]CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach.: Q9 ^# r& P, z) B CPAF Cost Plus Award Fee.$ Z$ f0 _4 h3 z% G CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)" y) w& g. B. c5 `7 ^- ?- }! P MDA GLOSSARY, VER. 4.0 C ' {" v! N& C" _4 {8 B7 y0 M64' L, k5 l" }% n; T1 ?" S CPAR Cost Performance Assessment Report. . A' r3 e I, _6 x9 b' S5 w9 t; RCPAT Critical Process Assessment Tool & a2 V" [) q) ?CPB Charged Particle Beam. 6 U* R' g5 [$ K) I5 G1 F4 ~ XCPEV Communications/Processor [Network] Experimental Version. $ J$ K# z0 E- I/ h& f4 S) GCPFF Cost Plus Fixed Fee.8 Q. j0 D- q" |, b t4 q: U4 O CPIF Cost Plus Incentive Fee. ! @8 @. H M5 ^# w( v) ~) bCPIPT Cost-Performance Integrated Product (Process) Team.7 ?8 x e/ B2 i! R2 U( a( X& ] CPM (1) Critical Path Method. (2) Contractor Performance Measurement. 9 G9 ^& y# k9 Z- QCPP Critical Performance Parameter. , W3 V, s/ P# p" s2 \* _' ]; VCPR Cost Performance Report. ; R! l1 \, `: p: A( bCPR/NC Cost Performance Report/No Criteria (Contract management term). 9 h1 v9 V, q& A8 X+ T2 p( YCPS (1) Consolidated Program Summary. c$ k5 B* K0 W (2) Competitive Prototyping Strategy. & ~/ b$ K0 ? R' `3 _+ K& O! M(3) Current Program Status. * Q0 R0 F4 _/ t2 w0 U6 i- y3 ]CPU Central Processing Unit (TelComm/Computer term).: ?! d0 n1 J0 O0 ]! S4 c i CPX See Command Post Exercise.4 a2 z% X/ n1 ?; Y CQAE Chief/Contract Quality Assurance Evaluator. * z; R0 Y; }- i$ u* e2 v" TCR (1) Computer Resources. (2) Continuing Resolution (US Congress term). ) W' e0 ?; D$ R s! Q7 ECR-UAV Close Range Unmanned Aerial Vehicle.- S/ q5 |; c: v CRA (1) Coordinating Review Authority. (2) Command Relationships Agreement/ l: ], ]5 P5 @* o* N CRADA Cooperative Research and Development Agreement. ; K, z0 w7 j& i. R2 i" Y0 a4 oCRAM (1) Control Random Access Memory.! e3 d% ?7 S4 E+ ] (2) Cross-tie Random Access Memory (Computer term).: D v2 _/ l- X2 r/ Q- |' @ CRB Configuration Review Board. & J- B6 q! J# U7 T+ z- V) l4 RCRC Control and Reporting Center. 8 D; W' D d* C" XCRD (1) Capstone Requirements Document.5 j' M. \3 x% `. A% ], \% k% M# u (2) Component Requirements Document. 3 L$ T, e% A- v: ACRDA Cooperative Research and Development Agreement.& G" d. Z* U @. x CRG Communications Relay Groups (PATRIOT).6 \, p* u, C6 o7 B6 N' j, w& M; v CRI Classification, Recognition and Identification. / B0 D+ d7 ^0 V5 Y$ n4 ]CRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C + }- A/ T. B' d8 h o% F0 R65+ C1 h/ p; O' u5 P Critical Design 9 v# j% l+ ]8 {Review (CDR) 5 u9 I( t$ l1 v; g- dA review conducted to determine that the detailed design satisfies the2 v7 a K2 L6 h5 r: K performance and engineering requirements of the development specification; to/ o5 z3 Q' S. l# k establish the detailed design compatibility between the item and other items of , @. l7 _! }( x' U' Bequipment, facilities, computer programs, and personnel; to assess producibility 6 ~9 ^3 o& R( U. }and risk areas; and to review the preliminary product specifications. Conducted 4 Y+ E; ~+ M8 K1 ^: G, l! Q8 [2 xduring Phase I, Demonstration and Validation (for prototypes) and Phase II, / v: U$ p& v1 N9 K& XEngineering and Manufacturing Development. ' V4 u- |5 y* {* N, ]3 {Critical/ w; a: n0 W' ] Information [+ Z3 ^3 Y* z7 P1 B Specific facts about friendly intentions, capabilities, and activities vitally needed/ B$ w L- j) h2 F7 }- Y2 s by adversaries for them to plan and act effectively so as to guarantee failure or: D* B: ^2 j/ J$ c unacceptable consequences for friendly mission accomplishment. 7 \/ `& R; H1 W* h" f9 `Critical 3 ^' u( }( [% C& \Intelligence/ r3 }' n0 s, ` Parameter 1 W: B2 ]6 f) O: X. g4 C: ` yA threat capability or threshold established by the program, changes to which# ^( i$ x) e' Q1 a could critically impact on the effectiveness and survivability of the proposed5 e# ~0 ]5 ?' @, }9 g system. 8 v% }" @ E, b( n1 w8 @" ACritical Issues Those aspects of a system’s capability, either operational, technical, or other, + ^) L* H+ H# ~/ j& f/ j5 | wthat must be questioned before a system’s overall suitability can be known, and9 P) p4 [ d8 X* i( }( a which are of primary importance to the decision authority in reaching a decision- p" n) A) }8 U" { to allow the system to advance into the next phase of design, development, 1 ], b! g4 p* ~4 u/ A1 Pproduction, or post-production. / c$ L% ]% M; Z1 P) RCritical. Z! `! m( q' O, c6 R" Z" i5 ] Operational; i% |, n+ F2 E Issue: o/ O- P, d+ [ A key operational effectiveness or operational suitability issue that must be: t, p" B5 y- u- H8 S examined in operational test and evaluation to determine the system’s capability 4 k# R; \9 g$ s5 R6 O- q' qto perform its mission. A critical operational issue is normally phrased as a4 f5 h7 X/ H4 n question to be answered in evaluating a system’s operational effectiveness ; O6 \4 h1 _% s3 q0 @& Fand/or operational suitability.3 ?( X$ H. I6 X Critical Path3 L | H% l# u/ Q: Y Method , E% Y5 B( ^+ D. ?! _A technique that aids dependency of other activities and the time required to : q: a. P, @* A! \. Vcomplete. Activities, which when delayed have an impact on the total project ( ]/ s1 p# D% c, f U5 Y, l' Aschedule, are critical and are said to be on the critical path.5 f7 o4 f6 ~. H. \ Critical Risk The existence of a vulnerability that could cause exceptionally grave damage to) v* ^2 R- U9 x$ X( S: ?, ^ the viability or the operational effectiveness of the SDS.* T" a3 y4 U) F Critical Security # ]! H. f$ w( s5 U. R0 ]0 F+ q2 nRisk 9 t) x+ A( z: k$ H4 C0 wThe existence of a security vulnerability that, if exploited by an adversary, could ' p/ }+ t% G$ `- O: Kcause exceptionally grave damage to the viability of the BMD or the operational 2 b' k' V7 P0 g$ j B- reffectiveness of the SDS. Critical risks assume an adversary’s capability to& K4 I m& j: f: g; Q cause major system disruption or degradation (e.g., single point failure),) [7 o& v" A2 T2 ~ destruction of mission-critical components, or usurpation of system functions. . p$ _- e! O# u6 XCritical2 {2 F/ e% Z Z5 g' I6 ] Supporting 2 c, N7 Y( v3 z5 GTechnology& `9 a+ ?, [- Y {$ I A technology that program management personnel consider a critical part of the% m H& {( j P9 D8 } program being described. + e( G+ v: O5 U0 d! KCRLCMP Computer Resources Life-Cycle Management Plan.1 o: v8 e6 f h; I$ ^+ A CRM Computer Resources Management.7 A( \) ?# v. U) J& x- O& v4 | CRMP Computer Resources Management Plan. 6 b$ ]* C: e0 t# i! g" M$ DCRO Chemical Release Observation.& h& F: O: u0 i- u" G G) Y CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC- O2 ]: n1 c: R& s* O$ C6 K# ] term.) & ]. Q7 H" I& A5 o- i7 NMDA GLOSSARY, VER. 4.0 C / q) Z1 y) i7 S" D' e6 ^% z" C66 . u+ w5 I! q W9 QCRS (1) Computer Resources Support. (2) Congressional Research Service. (3) + i- r7 E* g* Q' N, P+ R6 X$ Y% H2 lContractor Reporting System.; N8 i2 R5 W4 Y$ _/ z- B CRT Cathode Ray Tube. 7 z( E# S5 Z- [ H7 UCRWG Computer Resource Working Group.3 u+ t: J# V. A Cryocoolers Cryogenic Coolers. ! X% k9 P" k) |Cryogenic Of or related to cryogens (substances which are used to obtain low 6 L9 P1 o, ~" Stemperatures). 7 o5 J% ~' g$ U# B6 R4 TCrypto A designation or marking which identifies classified operational keying material, % d* Z p* q9 R4 rand which indicates that this material requires special consideration with respect6 E- C6 g/ E# m7 @/ V to access, storage and handling. 2 F9 S! I. t: l9 Z! r) nCryptographic0 f+ y. t! g8 ^) k System1 ^- @+ {* s: }/ b% E( y0 t The documents, devices, equipment, and associated techniques that are used, J L3 S' ]8 L$ q as a unit to provide a single means of encryption (enciphering or encoding). % k6 V, G0 O5 B( DCryptology The science that deals with hidden, disguised, or encrypted communications. It& ?2 b; ]1 C; p5 l; T includes communications security and communications intelligence. 8 v) k1 d3 c9 L/ E( x1 c) {0 z8 _CS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start. * n- \6 c* s( s( j$ pCS/CSS Combat Support and Combat Service Support (USAF budget term).7 v6 X( b2 _6 c$ P) A& o" z CSA Chief of Staff of the Army.1 R9 s; h6 R, h8 J1 s) E CSAF Chief of Staff of the Air Force. ' S, g& e& _6 T Z, ]CSC Computer Software Component.7 [4 _1 n# k" k6 `! }3 f# _$ n CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)9 u, ]1 D% S: a' O CSCSC Cost/Schedule Control System Criteria.- T- j N3 R9 m3 e* |# f0 O# A CSD (1) Constant Speed Drive. (2) Critical System Demonstration. # M% @7 |- F) v- \4 `$ q9 nCSE Center for Security Evaluations (DCI). b4 R) {+ k" b6 l! m/ ~7 S$ c: s CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon& K+ e/ }" ^( ?9 W% ~ System, located in Cherry Hill, NJ. ( T* g' A" }/ [6 qCSF Consolidated Support Facility, Arlington, VA.9 ]/ V9 a. e6 q' [/ V4 W& N CSI (1) Critical Safety Item. (2) Critical Sustainability Item.5 t! P0 j. d) ? CSIP Current Systems Improvement Program. 7 t1 O7 y9 m/ z' v* v: R% dCSIZE Constellation Size.' s* k6 _9 s7 } CSL Computer Systems Laboratory.8 Y. _/ U9 g" L9 z' | CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. & j( U5 c* l5 s4 v5 U7 bCSNI Communications Shared Network Interface (NATO term). 1 [+ A, g3 j b+ m. w6 A; [MDA GLOSSARY, VER. 4.0 C* S, n3 |3 g/ n ~ 67 K: | ~6 X7 [, h' k8 DCSO Closely Spaced Objects. ! z. [" g1 b( f$ U& V9 }CSOC See Consolidated Space Operations Center. 3 `1 W# r) S+ s- M) SCSOM Computer System Operator’s Manual8 P2 Z( I0 }3 u' A% f% } CSOSS Combat System Operational System Sequencing 0 }$ j6 j( n' U. k0 S1 aCSP Communications Support Processor (numerous locations, including USAF Air; o1 B& D8 X. k( _/ J+ N: g Development Center, Rome, NY term). ( T! ^- U% j7 {. M% l5 ^( G$ C9 aCSRD Computer System Requirements Document.& X. ^! |5 _9 }* F* p- O J CSS (1) Cooperating Space System. (2) Communications System Segment. (3) / k/ u7 g1 n/ }: s) J# u# cContractor Support Services. (4) Common Sharing System. (5) Communications 2 S6 I- ?7 L: J# p: P! _Support System (Navy term). (6) Common Support System. (7) Combat Service - @/ ] j$ E3 n* U; s9 @Support.2 Z- K |% F3 T8 k* A CSSCS Combat Service Support Control System (USA term). , C0 k; V8 s! v8 xCSSPAB Computer System Security and Privacy Advisory Board. 1 c. \$ t8 H; N' a$ E; @CSSO Computer Systems Security Officer. & G' u7 x% C. j* U' }7 jCSSTSS Combat Service Support Training Simulation System (US Army term). ; q: p6 G! h4 r0 v2 X: ^; X gCSTC Consolidated Space Test Center., [- N1 p+ ?2 S+ W) n& t7 i CSTI Civil Space Technology Initiative.# Q% v# Y. s# O0 n; e CSU (1) Computer Software Unit. (2) Communications System Utilization.) e: Q8 i& l* {2 y CSUR Communications System Utilization Report. 2 ^ s2 o g& W9 |" E7 m! `CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry. 4 s7 o" \8 N$ i+ O* m6 R(4) Cryptologic Technician (Navy occupation specialty).; l0 p! E( `6 s9 s) J, V CTACS Contingency Theater Air Control System (JFACC term). + U9 k6 ?! i/ ~! VCTAPS Contingency Theater Automated Planning System (USAF). ' R0 J6 O6 d3 {1 L3 e O; d: iCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term].! } p5 M& L) B; f, N8 e: Y CTBM Conventionally-0armed TBM. * {- Q# o, K8 \" i5 W3 UCTC Combat Training Center, Ft. Leavenworth, KS.. C7 O' c9 R* A0 [3 x( r6 S CTCC Critical Technology Coordinating Committee.. e$ }4 n$ q0 M b/ r1 F; m1 C CTD Communications Test Driver. ) k$ H! T) t/ X, aCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment. 5 y9 l! t2 B* {* zCTEIP Central Test and Evaluation Investment Program. A DoD program for centrally & B/ }$ D8 ^; J& ?2 ?) Afunding selected test investments proposed by the Services and Defense + _0 |2 N6 a5 J1 R O$ jAgencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C6 y6 J6 F3 F; g. E 68 ! V: }* o( j% a' F: O+ [& I$ x. _CTF Controlled Test Flights.* d" o7 Q! W, ]0 [: o. i CTI Concept Technology Insertion. 4 d7 V6 k2 Z: F/ [! S9 J, wCTN CALS Test Network. ( E4 p3 k! E2 u3 OCTOC Corps Tactical Operations Center. + \8 g3 g7 A) q" x6 ?0 ~CTOL Conventional Takeoff/Landing aircraft.0 x2 V- ]/ t' I% E0 ~0 L CTP (1) Critical Technical Parameters.9 B( @( y8 X; C. q% b (2) Communication Tasking Plan. 5 m5 q# {6 \4 N) M8 o8 l$ v(3) Consolidated Targets Program. 4 p' \: W6 x b e# x# `; V1 gCTPE Central Tactical Processing Element./ U0 I, M0 F$ E CTPP Consolidated Targets Program Plan./ e# p" C" O2 ^4 `5 F0 ? CTR Cooperative Threat Reduction (Treaty negotiation term). : b8 |. L5 b+ DCTRS Centers |3 h& W" V* k& S' I CTS (1) Clear To Send (TelComm/Computer term).7 D7 o7 P) v( E6 R# H (2) Contact Test Set (USA IFTE term). $ w- x1 M5 u/ q+ C* A, }' V4 d. \CTSS Computer and Telecommunications Staff.) i# d- H2 k* b5 Z+ l$ D! b+ V CTT Commander’s Tactical Terminal (US Army). * j4 Y# a c& yCTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). * e# b- k2 w6 r. c# u" _& ECTV Control Test Vehicle(s). 7 X$ F6 P: Z- `( _1 b* xCUDIXS Common User Digital Information Exchange System. 8 E1 P8 }" r. S% D' ]# M( FCued Operation The directing of one sensor based upon the data received from another sensor.1 G# i( D! n# h; U Cueing Command The command within a tactic, which specifies the sensor element’s coverage2 e: ?" N( o6 q8 {1 i volume. 8 b9 L' Z/ l: B' R! N7 qCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage ; x( q% d/ z1 `" z7 r2 ^volume. ' |; X @/ o( W( ~9 iCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. K. l, b$ }; P3 C1 i( }. z& |3 DCV/BM Carrier Vehicle/Battle Management.* \3 o6 _- B6 t CVBG USN aircraft carrier battle group./ v' |) A* T) k CVHG Carrier, Aircraft (V/STOL), Guided missile.! J. z6 K+ |/ S& `; q' \5 | CVISC Combat Visual Information Support Center. ( l; i7 \ k& H& YCVL Copper Vapor Lasers. # J5 N* z8 v \& FCVN USN nuclear powered aircraft carrier. - k. B( _5 W' XMDA GLOSSARY, VER. 4.0 C 7 U# v3 z& m2 b+ }! S N# ^8 o69 4 O' _+ H- O% s* o4 J& i1 m/ ^CW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. 2 P( u. u- M& y$ \+ K" f; w4 yCWAR Continuous Wave Acquisition Cycle (Hawk). . z' L f6 V- q* i7 sCWBS Contract Work Breakdown Structure.0 b5 a' [5 G2 L# i4 n CWDD Continuous Wave Deuterium Demonstrator. 1 Q& K" J1 |% \) k4 _ S' gCWIPT Cost Working group integrated Product Team. * D2 N& B' U2 C7 R% GCY Calendar Year. $ \+ F; e( p% v& T; X/ VMDA GLOSSARY, VER. 4.0 D) O3 y# p1 ^% W0 n2 h4 e' C& x 71 H X2 x& Y5 x+ c9 s* j$ }D Deuterium " Z- e1 ]- _; F8 LD Spec Process specification. ; D; o! X# ~; XD Star Measure of infrared sensor sensitivity." A! m8 n6 N+ A. j( { D&D Design and Development * P L, h4 c7 O% z5 ZD&T Detection and Tracking. : L, G K" g0 ]+ {5 d% nD-IFOG Depolarized-Interferometric Fiber Optic Gyro.* a" u1 a7 ]* ^+ ]0 [' J D-Level Depot Level (ILS term).% R" q) c4 u" |) O" T; @3 z D/A Digital-to-Analog8 ?3 t- U; d [! @$ y D/V Demonstration and Validation./ X2 j( A" N: R+ T5 a) b D2 Projective (interceptor) in the Hyper-Velocity Gun program. W7 C) U% X' t* GDA (1) Department of the Army.* A4 W$ k. z1 R/ \( T" e (2) Department of Administration. Z7 v- u t% k# \* v" x- P (3) Decision Analysis. ; s# {( d, B( G8 _+ J* f/ [* w: y# T8 P(4) Developing Agency/Activity. 1 ^0 o3 Q0 c, u(5) Data Administrator. # P+ N) O( b0 Q( x: x(6) Direct Action. 8 Y6 L/ h% \# G2 C6 Q0 o(7) Data Adapter. , K0 i$ u9 n* l0 l: A4 `# vDAA Designated Approval Authority (DD 5000 term). + j9 A( D) G- | oDAASAT Direct Ascent Anti-Satellite. u% {1 w! H2 K- s DAB See Defense Acquisition Board. $ u3 S" `" ?. t! A e7 hDAC (1) Days After Contract [Award].1 R) V) I3 a- C+ P8 o (2) Department of the Army Civilian.' ?' K/ N0 [# e0 Q$ B E/ N9 i (3) Directed Attack Characterization. - Y7 O3 T. ]/ K- |0 {(4) Deploy ACCS Component. . T. ?7 A7 D$ R1 k+ e(5) Digital-to-Analog Converter.2 T) E, e! v$ ], l DACS Divert and Attitude Control System.; g. U ^ S2 h9 G1 [2 n9 L' f+ p DAD Defense Acquisition Deskbook. ' s2 {. o s3 y6 NDADS Distributed Air Defense Study (1993). : l% N: R! Y$ g' M8 xDAE Defense Acquisition Executive. 8 k9 U, f% K( _, t! U/ Q3 J* o1 u" aDAES Defense Acquisition Executive Summary. % ~1 J* j* m& h7 s1 u8 nDAGGR Depressed Altitude Guided Gun Round. 0 G6 Y+ N! R8 }( ]- O" Y, Z# p9 |DAHQ Department of the Army Headquarters.% ?) _; D9 n& m" P$ v5 ~ _ DAI Damage Assessment Indicator (targets).( @/ \ J+ C( O DAL Defended Asset List., l% Z) O# F3 y$ |0 ` MDA GLOSSARY, VER. 4.0 D 8 r' D& k+ x$ ~: c2 f) M5 r" u, n72 ) |' ^! n+ L# P- v+ A8 }$ M a0 ^DAMA Demand Assigned Multiple Access. + H G4 @2 v7 A! Q IDANASAT Direct Ascent Nuclear Anti-Satellite. ! k8 e4 J6 A7 T% DDAPR Director’s Annual Program Review (SDIO term)& W, y1 C! G/ @/ }' n9 C4 w/ v DARO Defense Aeronautical Reconnaissance Office (OSD). + ?; R. x! q$ W+ V4 s% T$ RDARP Defense Aeronautical Reconnaissance Program.$ H+ \' B. |4 e! d, y3 k" { DARPA Defense Advanced Research Projects Agency. See ARPA. ; @0 L0 B0 n T& X2 Y5 e/ pDART OBSOLETE. Defense Acquisition Review Team.9 s' S4 Y) z* [ DASA German Aerospace. Member of the MEADS Program Team. - ^) A3 l. H+ W: Q( b+ wDASC Deep Air Support Center (JFACC term).+ W4 }! f* o6 x% {' ] t5 y DASD OBSOLETE. Deputy Assistant Secretary of Defense. 7 T5 a- |6 A4 e% L/ J) R, QDASD (C3) Deputy/Assistant Secretary of Defense (C3) 2 u7 T. p' J, ]) FDASO Demonstration and Shakedown Operation.1 w$ c4 z, f" [) F+ J2 V Data Integrity The state that exists when computerized data is the same as that in the source $ n- T! s; @7 @documents and has not been exposed to accidental or malicious alteration or1 V- N" a8 { V5 @+ Y1 y9 p8 K4 I destruction. . {1 D/ a0 [% H8 X; m4 y& y* UDatalink (1) The means of connecting one location to another for the purpose of 2 u9 M9 e: J. m3 @4 Jtransmitting and receiving data.8 A+ R! ~1 D" I2 {( b1 u% R: d (2) A particular path between two nodes over which data is transmitted. It/ G7 g. ?' ~3 D- q includes not only the transmission medium, but also digital to analog0 |2 k: D! U$ l8 h converters, modems, transmission equipment, antennas, etc., associated" y) L1 }( T& R2 s2 t with this path. In the SDS backbone network, it was a path between two& [7 ]' D* |1 {2 b SDS elements. In space these datalinks were microwave or laser. On% f9 l' ]' n1 w' x7 ^4 B- o the ground, they could have been wire line, microwave, or optical fiber. 8 `4 Q( F( O, vDAU Defense Acquisition University, Ft. Belvoir, VA. + {% i" n, N9 ?& Y9 d9 bDAVID Development of Advanced Very long wavelength Infrared Detector (USAF 1 A# e, q* F3 y3 D* B& GPhillips Lab term). ! ~" W$ d! P' x# O d* @1 q0 _% D9 NDAWS Defense Automated Warning System. / g% I% K$ R1 Z6 V1 oDazzling The temporary blinding of a sensor by overloading it with an intense signal of ! O; M" H* O9 M6 \: s( G+ Gelectromagnetic radiation (e.g., from a laser or a nuclear explosion). . V& J& u% O nDB Bata Base : d8 J. T2 Y3 O- yDBME Database Management Environment (Computer term). ; P2 G* l6 [, bDBMS Database Management System.$ @. C! d3 g) p$ k+ h8 f2 [ DBOF Defense Business Operations Fund.8 s s5 \$ O4 s DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D* e, `7 T0 ~8 R; O& s7 r- S; u4 D8 c 73 # ^; _3 m2 ]8 E0 Y! N, eDbsm Decibels per square meter.$ O1 _, @9 q& U, } DBSM Database System Management. 9 o9 ~0 {/ Y% e5 ?- PDC (1) Disarmament Commission. (2) Direct Current.4 O( S& Z0 a1 D; k8 w+ }9 p DC-X Delta Clipper Experiment.4 k; Y7 f1 \# [+ q2 p$ D; Z DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications + j1 m/ h1 @+ Z _& u8 TAgency. (Now known as Defense Information Systems Agency (DISA)). 6 e# T$ ~$ {7 h7 |DCAA Defense Contract Audit Agency. ; j, \% C9 b V7 ZDCAS Defense Contract Administrative Services. 3 d' ] I+ J! G% i! jDCCO Defense Commercial Communications Office (of DISA).. T7 [1 Y+ S& {& V! i2 a6 U6 F: J2 s DCDS Distributed Computer Design/Development System.% s4 E+ V$ p; C5 e0 n& j DCE (1) Data Communications Equipment (TelComm/Computer term).* P @/ @# \6 ^ (2) Distributed Computer Environment., `$ c+ b* J1 C7 v) H DCEC Defense Communications Electronics Command.' \' `/ f: G% p DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange. " x( i' R2 \& P' R3 t% S, n" |DCINC Deputy Commander-in-Chief. ) F" u- o5 {! v; F$ W1 PDCM Defensive Counter Measures.& S5 z/ I" `; D' i' _" a DCMC Defense Contract Management Command & g4 ]; f% W( qDCN Document Change Notice. 2 A+ n$ O6 O7 gDCO Director of Combat Operations (JFACC term). - X' M# h1 Y, C/ ?DCP (1) Decision Coordination Paper (see ADM). . h% ~6 h0 \; Z* c+ s! v+ f# V(2) Director of Combat Plans (JFACC term). ) n: ]; t: p" C. Z; _1 M/ KDCPG Digital Clock Pulse Generator.$ o) W+ f, I) X& P' ^3 P* L DCS Deputy Chief of Staff. 4 T( @1 F: N3 l0 S; ?/ ~- sDCSOPS Deputy Chief of Staff for Operations and Plans (Army). J+ r" ]2 }; V6 q3 U/ U' X, ^ DCT Digital Communications Terminal/ E$ ^& t9 B8 G5 D6 ~1 t- T* w DCTN Defense Commercial Telecommunications Network. }( s# m! t. l' b JDD Variation of DoD. ; ]' Z. Y: q: PDDCI Deputy Director of Central Intelligence. 5 ]& }, y. L9 u! r& f$ R8 qDDEL Dwight David Eisenhower Library, Abilene, KN (army term). , X' M* X* w$ tDDG USN guided missile destroyer.: l" k* ]( K# p, | MDA GLOSSARY, VER. 4.0 D$ j, k$ t6 S; X% X* s! S 74" s" ^* H8 r5 n$ u7 M DDL Disclosure authority letter.! E8 m( `% U0 i, r/ L DDN Defense Data Network.. X: c# t1 h3 w4 a DDR&E Director, Defense Research and Engineering.- _6 }' W# G4 g; ^+ h% x4 } DDDR&E Deputy Director, Defense Research and Engineering.9 x- e( J7 Y0 I& o2 \) E6 T DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term). # w9 e6 e z3 L- e$ D! fDE (1) See Directed Energy. (2) Delay Equalizer.6 ]- n/ Y! x, O! l% j$ o" c( A DEBRA Debris, Radiance Model./ i. c D: Z8 p4 B" S5 H* V& x Decentralized: O" h5 g* D. C Control * n `* _" O0 T+ E" d6 qIn air defense, the normal mode whereby a higher echelon monitors unit actions, 8 D" E' C' y( L( G* L( @$ `$ Fmaking direct target assignments to units only when necessary to ensure proper. J& C. C7 S" t5 | fire distribution or to prevent engagement of friendly aircraft. . R& `5 Q' Y% h0 nDecentralized3 O! c; p2 k4 C Execution4 m' e4 n* e6 A$ h' D+ d The distributed and integrated implementation of USCINCSPACE direction by . `, q( o" X! s+ F" u8 o& ^7 Q- C$ vthe BMD forces. (AFSPACECOM)) ~" s& `" U, z$ S# n H8 F) e Decommissionin 0 X: x. n6 ?9 w7 bg7 u7 j4 }2 k2 U) j7 k The removal or the rendering useless of obsolete or no longer needed - ~. `: @$ r" _: g6 y! dcomponents of the BMD system from service.7 K+ C! ?& X) x; s2 T! h; q Decrement A directed funding level reduction for an acquisition program.4 \6 W/ R! j/ p# C, r DED Data Element Definition (Computer term). # O7 x( n8 f t6 Z- cDedicated Mode* |. n' f# }# S- m5 p of Operation& k! A: f- W* F6 C7 N3 J (ADP Security) % F& N: F& k. s1 ?1 p; `3 oA mode of operation where all users of the AIS possess the required personnel7 @# {% d/ ?2 R s security clearance or authorization, formal access approval (if required), and a6 r" r/ G' d( N" f, m Need-to-Know for all data included in the AIS.# Y8 R( O _# V5 M Deep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about6 y8 x _# k. R- Y. i& A 5,600 kilometers) above the earth’s surface. # Y- y0 I* v/ v/ N( A" B. GDef Definition. ; ~. b* q0 f# ]7 r) O0 {DEF (1) Defense. (2) Demilitarization Enterprise Fund. 6 E; Y' ~- N8 RDEFCON Defense Readiness Conditions. + Z1 Y& @" ?9 `Defended area 3 e9 L) p" i4 ]coverage ; |! u3 ~* o+ p' M3 j2 TDefended Asset : ]" e; J* B6 W$ H# wList (DAL)# n3 u% ?: R5 h9 U) K K The geographical region that the BMDS can protect from ballistic missile attacks) w. D. T0 x5 ~5 {, e with a specified level of probability of negation. May be specified for a particular ' z9 N: B2 h, Tthreat type, launch point(s), launch regions, raid size, etc. 0 E" V1 G" e+ b: H& `- I! y- eA ranked listing of facilities, forces, and national political items that require 2 `9 [. [# v# @4 `7 zprotection from attack or hostile surveillance. The list is compiled from Federal ' |4 C6 ^$ T7 E! ?( m6 fdepartments and agencies, Unified and Specified Commands, and the Armed' D B3 }) ~' Y; R7 D, r Services to ensure National Security Emergency Preparedness functions. 3 Q( D' S5 Z8 |: r% P6 y6 cMDA GLOSSARY, VER. 4.0 D . N1 b! K* P4 z3 I+ E75 " a. D) Y' M$ O: F! ^% }# kDefense; ?1 w o( D6 \( ]& W1 v Acquisition 1 _' F% K$ U$ t9 q; @Board (DAB) " K( I. z( {2 ~( ^8 L* i' nThe senior DoD acquisition review board chaired by the Under Secretary of - [) _' s3 v9 {. c& ]Defense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the& a6 e( Y2 c1 x( s. m) q Vice-Chair. Other members of the Board are the Deputy Under Secretary of 4 T9 B# S( L! O% h* ^' E! i% ?" Z" eDefense for Acquisition and Technology, Service Acquisition Executives of the4 |6 h+ m: Y6 e7 a/ s* W- ^/ a Army, Navy, and Air Force; the Director of Defense Research and Engineering; , Z; c- g6 N K4 k8 h+ |( h! K. g# Xthe Assistant Secretary of Defense for Program Analysis and Evaluation; the 7 G4 n$ E2 b5 t& r: k; A# B6 cComptroller of the Department of Defense; the Director of Operational Test and4 B$ ^9 j7 a+ A9 ]+ C Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the' M" t& `7 F/ g( j Defense Acquisition Board Executive Secretary. Other persons may attend at; i, Q! X) y2 X$ U the invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition , S: B5 _- m+ t, Z6 I6 C U0 `Board.”) . }" ?' u2 U. R' ZDefense ( x7 A0 Z+ r8 ~: b1 {2 WAcquisition - z# P) C/ ]) K# y# L' p2 w' NBoard Committee 9 t9 b+ \# B% Y0 ?Advisory review groups subordinate to the Defense Acquisition Board. The* r9 B6 w, s# P7 _6 [4 d& f Under Secretary of Defense for Acquisition determines the number of " v$ S- D8 o$ M. }8 eCommittees. The purpose of the Committee is to review DoD Component 0 U( T5 B, g1 `programs prior to a Defense Acquisition Board review in order to make an 9 ~, b+ l4 Y2 a7 v5 ~independent assessment and recommendation to the Board regarding the2 X; n/ d+ m( O2 A7 | program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense+ v1 K$ V, H2 _1 I+ p& h' X* e; T Acquisition " C }6 v! O/ O* z' F- dExecutive (DAE) 1 A, c4 a' f5 c0 P1 `4 X- p8 PThe principal advisor to the Secretary of Defense on all matters pertaining to the * q6 c' [ R7 [2 G8 ]; w/ K' u$ CDepartment of Defense Acquisition System. The USD (A) is the DAE and the . E+ `) A* S ~( r2 {- rDefense Procurement Executive (DoD Directive 5134.1)./ k& H; I4 L5 d& { Defense ( `$ p! }% s4 [2 yAcquisition $ I Q* K0 i }( X9 i8 l3 ZExecutive 6 [7 ?+ F! j! f% R! VSummary (DAES) ( N0 m4 d& d0 e. a8 C$ `$ \The DAE’s principal mechanism for tracking programs between milestone ( W6 x0 p6 \3 O4 A% Ureviews. Includes programs subject to the Selected Acquisition Report (SAR),( `$ [. }) W k6 i2 l: W7 q- L' T) P, j and any non-SAR programs subject to review by the Defense Acquisition Board. # [2 ]5 t! m# fDefense 1 C l" r, X. D; h* P: y2 lEmployment 0 C/ D$ g8 I# p# h1 wOption (DEO)' Y4 d( V' X X Engagement strategy provided to USSPACECOM component forces to achieve % }' e% x+ I; ?specific military objectives against a ballistic missile attack. It defines hostile $ S# b5 y- e+ v e9 wtarget priorities, provides assets to defend, and allocates SDS resources to be 3 b: w4 M2 i2 U+ r ~6 ]employed. A number of DEOs may reside in a particular Preplanned Response N B! {0 m( [; rOption (PRO). However, default DEOs (those believed to be best suited to' c I, _* d/ Z# }- h9 J# @ counter the threat initially) will be automatically processed and executed when, U' v, k) u. M3 D& }& u8 Q* o$ B, b Defense Activation Authority (DAA) is given by USCINCSPACE.7 i2 c$ f8 k9 G2 D9 V" | Defense 2 a- e8 |7 e7 E- a2 Z1 j5 ~$ FEnterprise- z( m& t: P A2 q4 D$ W Program (DEP) % |+ E+ S! l _1 e) R& a* CAn Acquisition program designed to streamline the acquisition process by waiver, U, ?2 y" l, h1 c4 P5 m7 C7 P of selected regulatory requirements. . b- C4 L, u, N& aDefense In-Depth Locating mutually supportive defense positions in such a manner as to absorb 8 @( E M- W) @4 \- y4 J8 `$ Wand progressively weaken an attack, prevent initial observations of the entire ! @# l( `2 e& y0 x5 Qposition by the enemy, and allow the commander to maneuver his reserve.# s; R# ?( s7 a/ q Defense' R' D1 G; X3 O* n& k8 i( V Meteorological M% R7 _, e& u2 Q' F% fSatellite Program 1 r. J- {0 r- G6 M. u(DMSP), h- G P; H8 Y! s% Q: z$ o Satellites designed to meet unique military requirements for weather information.# ^/ d# x/ a3 M1 n8 x Used to detect and observe developing cloud patterns and follow existing + ^0 s4 ?- s/ ~" U. w9 a R2 Oweather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions. 0 w V1 W; I2 g8 }9 K {Defense Planning * {- ]- Q- Y; cand Resources8 k/ N9 S4 w& v! f7 @2 f3 J% M6 b/ L Board (DPRB)) W/ P: c6 Y$ x, R9 W" n5 ?' C A board, chaired by the Deputy Secretary of Defense, established to facilitate " F7 a5 Y+ `) q5 idecision making during all phases of the planning, programming, and budgeting : T1 |$ o8 J+ dsystem process. Board members include the Secretaries of the Military : @$ Q1 ]" S: V. y& k# \Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of 0 u7 ~5 G& D* h. C ZDefense for Acquisition and Technology, and Policy, the Assistant Secretary of 7 W6 T$ `, J2 b4 H$ XDefense for Program Analysis and Evaluation, and the Comptroller of the 3 J- o$ r" l" f( r, W& kDepartment of Defense. : \$ V7 a" r v$ \' }MDA GLOSSARY, VER. 4.0 D 5 I8 m4 j( O+ ?- T3 i76& h. j) Z; f, ]& `# T Defense Planning. A7 d4 @9 D' b: E7 @* s6 U Guidance (DPG) % W# I% w& _, }) g) D; MDocument issued by SECDEF to DoD components providing strategic framework # I& |3 X# ]( Ofor developing the Service POMs. Result of planning effort by Joint Staff, OSD,: N% M9 d" Y8 i9 I% m& M and Services. In connection with two-year budget process, DPG is issued every " o4 t0 v4 Y1 _9 Y5 s$ \other (even) year. ( w- F# S$ k+ K0 X' P' Z" ]Defense Priority * d$ j9 b4 [2 ^! J, h3 d7 }and Allocation& m9 T6 Y5 `# m2 Z System (DPAS)" ^) y/ j( D6 M6 V& c5 d; F The implementation of a statutory requirement where contracts in support of / S+ L# q7 b0 lnational defense must be accepted and performed on a priority basis over all) c) ^, F) s7 O2 u4 F8 ]- \( ? other contracts, and which requires the allocation of materials and facilities in* g/ H- s* E* Q* L$ G such a manner as to promote the national defense. See “DO” and “DX.” ; l% D! _3 }9 G4 |Defense ! W5 Y( T/ C' x' E$ h( [Readiness , v) f) o1 R7 `- N, r# RConditions9 [, F+ y, k: }$ e% E& M (DEFCON) : S$ q% s* H L: I" JA uniform system of progressive alert postures for use between the Chairman of3 e/ Y' v0 W" A0 {1 ` the Joint Chiefs of Staff and the commanders of unified and specified commands # I% M7 i: i& W Vand for use by the Services. Defense readiness conditions are graduated to+ D _- D* _" c match situations of varying military severity (status of alert). Defense Readiness: ?+ G( K: ` P& b: I$ N- O6 a, O' W Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as : E- f, \! Q" g. P Eappropriate. - E m$ B7 @0 @( V. xDefense Satellite . [, H, h# m7 m$ a! d4 H9 A3 P: QCommunications% t0 M( \5 e4 R5 E7 w- ^& } Systems (DSCS)4 ^1 `& }: F/ b2 Z" l Advanced communications satellites in synchronous orbit around the earth.9 W5 C" J6 [% A# }/ a. @6 I Provides high-capacity, super high-frequency (SHF) secure voice and data links" @8 j- d* F* k) Q: I. Y for the Worldwide Military Command and Control System (WWMCCS). They * q3 l* s& W8 P' X( T1 E; Usupport terminal deployments for contingencies; restoration of disrupted service ; @7 G, C# E& w5 J$ s; j" ? Ooverseas; presidential travel; global connectivity for the Diplomatic ' V' a% q0 l' CTelecommunications Services; and transmission to the continental United States 6 l6 ` ]% J) \9 {' k+ w3 wof some surveillance, intelligence, and early warning data.' Z* n' g `' W0 i Defense Satellite . q9 M. ~; [, L) P# @(DSAT) Weapon( h+ X, ^' ?0 m9 F% j2 F" X' o A device that is intended to defend satellites by destroying attacking ASAT5 U# Y: D( ^7 m: G p* U- L* z weapons. 6 G. V l" z/ Q5 @4 s7 F; ADefense Support( O1 V2 P/ c/ K! A8 z8 \; J& v. n7 ]1 s Program (DSP) ( k) N- R: R( U8 g0 JA system of satellites in geo-stationary orbits, fixed and mobile ground8 _+ ]+ G: D( ]& X8 w, u processing stations, one multi-purpose facility, and a ground communications: \: [# }/ _6 b. s# n5 L network (GCN). DSP’s primary mission is to provide tactical warning and limited1 O7 m7 T1 G+ g$ O' G- Z4 ]( [: y% n attack assessment of a ballistic missile attack. 9 S3 Q7 e. M1 o/ vDefense 6 O7 W6 T' R3 a/ e* g; F; y( nSuppression3 l& W) j0 u8 D( {. w Temporary or transient degradation of the performance of a defensive system / g9 r9 L3 e: I; Z6 Pbelow the level needed to fulfill its mission objectives, by an opposing force.9 Z$ E6 I8 X( I* c' x (USSPACECOM). q' t- H6 f9 ]4 e2 R ? Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic$ b' k# m: h" x missile trajectory; i.e., boost, post-boost, midcourse, and terminal.4 ^- ?7 d, f: I/ Y3 k/ [ Defensive0 g1 A6 i+ }" P9 u& \0 W Counter : t; d, k8 ^8 KMeasures (DCM) $ ]+ i5 P( N' |. M5 B5 _% U! xActions taken to eliminate an ASAT attack.+ O) d. |+ p- m( d& N, z Defensive! l4 n# S$ i, b Technologies / t- U9 e* v( M- @Study Team/ ]# K: j7 M: R" {5 Q1 M' N- U& H) V. L (DTST) $ z, {$ A1 _# [+ K% i3 `A committee, generally known as the “Fletcher Panel” after its Chairman,; ^2 ~& K4 n% ?: [ i' d9 S appointed by (former) President Reagan to investigate the technologies of. U* e6 I' `% l& a. | potential BMD systems.: p9 x. l4 F/ Y8 W- i DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD.* E. [3 _ B3 e! @ DEIS Defense Enterprise Integration Services (ex-DTIS). , x/ C" h$ Q% H0 s) e- [3 aDEL Delivery. ; O! F0 `" n6 |, ]. n* wDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion! B% u9 x$ z2 q- L, B4 u/ `' f of shots about the aiming point. See also Circular Error Probable. " e4 m* o; j: }% B9 L7 H( {6 \MDA GLOSSARY, VER. 4.0 D , _% I/ H _( P- r8 w9 z* c( Q1 {770 P: r D6 ]/ m+ `! f3 I Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the( h H3 ?' c9 u% e maximum change in velocity, which a spacecraft could achieve in the absence of2 p. F" e5 C& J- T" Y a gravitational field. ! a$ ?, V, K# V8 V4 Z fDem/Val OBSOLETE. Demonstration and Validation (DD 5000 term).$ L) O5 v/ }7 ?1 A Demise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its $ \% b3 G/ ~" ~. F* qdesired function (matching RV characteristics, screening RV, etc.)+ p9 J6 T- t$ V C* `( f, l DEMO Demonstration. * T/ @% Q% J4 T5 W- EDemonstration$ C9 M" @4 M6 L Z) N and Validation. w: g& I" G; e: p" d (Dem/Val) c" B+ i* P9 o' G! F: r4 Z0 t* @The acquisition phase when major program characteristics and product designs0 S; v N# A3 L$ W8 T; d+ ?3 r" q are refined through extensive study and analysis, hardware development, test, 2 G! d, R/ W% v3 | y( iand evaluations. The objective is to validate the choice of alternatives and to5 K0 j. R1 e$ V1 ]& } provide the basis for determining whether or not to proceed into Engineering and 2 P% ^$ ~+ a# O; f$ ~* @# D' [Manufacturing Development (EMD). 3 O/ y0 G3 a; N7 j) V I3 qDenial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities. , c* l. e4 E1 C4 P$ K+ s2 FIt may include destruction, removal, contamination, or erection of obstructions. ; O5 i% q Q, M t( u% x& }9 D9 `* iDEO Defense Employment Option. 9 w+ K3 V3 R% ]5 R) t+ hDepartment of; _% x& m; {* n: s6 [9 v Defense. c* J( ]. h6 U, T/ |1 q6 ^ Acquisition 5 s, K7 w$ r# ^System : F' p/ K. j! |" g* LA single uniform system whereby all equipment, facilities, and services are! U' a: w6 |- u _' j. { planned, designed, developed, acquired, maintained, and disposed of within the8 j" t8 H. [& y+ L# |6 H- V Department of Defense. The system encompasses establishing and enforcing( M; Q7 h2 l& Q) Z* f8 W policies and practices that govern acquisitions, to include documenting mission / g. F" C: P2 _, P; ?7 D3 o9 z3 Aneeds and establishing performance goals and baselines; determining and% _! ~1 ?4 v" h4 S) u: M prioritizing resource requirements for acquisition programs; planning and& E+ x5 @! u2 A$ W! y. G executing acquisition programs; directing and controlling the acquisition review 3 j' B, t3 g5 _3 tprocess; developing and assessing logistics implications; contracting; monitoring, {- j& {% H, w5 P5 X the execution status of approved programs; and reporting to Congress. (See 2 e8 o) ?8 ^$ a0 J, x8 n/ vDoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”)# a" B) U+ ?: k2 t2 w Deployment (1) The placement of force elements in battle positions to obtain a higher; m: C5 @2 a- U0 e state of readiness. 5 v7 D4 m5 `/ m8 p% A0 l ^% ^(2) The movement required to place force elements in battle positions. ( `" ?9 M* S; Q4 p# N+ F+ _(3) Fielding the weapons system by placing it into operational use with units- N. V* I6 c I% Q: u6 J in the field/fleet. 2 W4 Z3 d5 A, X) w$ Y/ W(4) To arrange, place, or move strategically. ' @' z: K4 {- y7 \& S6 p6 T) l. {4 dDeployment " t# B$ R+ D, {- h( \( n! LPlanning" _0 J8 R ^5 F+ v* B$ Z (1) The development and maintenance of plans required to initially deploy,8 F N2 ^/ y7 C# o' |5 p; ?( S& D2 s maintain, and evolve the operational system in accordance with/ N g# a# Q1 s schedules and priorities. It includes factors such as launch facility 8 P- o* V' V4 P6 ?8 \/ ^; Wavailability and planning for the availability of other required elements- N( I* }' w/ H* ]8 F) f6 q% W such as trained personnel or units. In addition, it identifies the impact of % G) O0 b3 j' b; X6 U; Qdeployment on operational readiness and any testing constraints3 i' s6 a7 z0 ~ associated with deployment. 5 S' t* a9 {4 m9 a) n, [" Y(2) Encompasses all activities from origin or home station through % T. f G# Z/ p6 t" H" ]destination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding ' L8 ]; X, {4 c$ G8 \7 N u) xareas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment4 t# z( r" m2 ?8 O# B4 C' Z9 P Testing" q- n& X% O4 h6 ], A The testing and/or simulation of system assets in the physical and operational X" m. \6 h6 eenvironment in which they are expected to perform.+ m" l+ x2 n/ V5 l DepOpsDep Service Deputy Operations Deputies.. }+ B% P" b3 J! A- n' \) J; Q+ { MDA GLOSSARY, VER. 4.0 D' }5 V$ `/ f% a/ X7 s& | 78 d' y! q- u: ^0 p$ N; y/ uDepressed % l$ U% E% t% I0 i9 ATrajectory $ S4 e; c/ k5 q& n! ~Trajectory with an apogee below that of the minimum-energy trajectory.# h- T8 z6 s1 W DEPSCoR Defense Experimental Program to Stimulate Competitive Research.% r. o1 O3 V* w% r" x DEPSECDEF Deputy Secretary of Defense.8 w8 j, y2 s0 ^, l2 P DeSecState Deputy Secretary of State.9 U" t. b& U" T# S/ E* z! J+ s DERA Defense Evaluation and Research Agency. Consolidated research and$ |. a# V; s1 }. H- f development resources of the U.K. Ministry Defence. Headquartered in / u; I# b5 r, J. kFarnborough, England.- e8 [0 ~5 \" m- Z" O- ` Derivative* h+ B ^/ s' p2 x" |5 c. g* q Classification - i/ j8 h& @" d, N% E4 U& f8 ^( uA determination that information is in substance the same as information & |& l% p7 e/ E7 T7 D$ m% { Rcurrently classified and the application of the same classification marking. 6 Y# }0 U6 S8 @( @8 R8 C1 m2 uDES Data Encryption Standard.( f3 ?4 V: c# d: m q9 e! O, m DESC Defense Electronics Supply Center (DLA term). " `1 z# s$ d. ~1 p) }Design - |& m2 B6 E2 B! b! P3 eConstraints5 v+ F8 h2 a8 r: H' L Boundary conditions within which the developer must remain while allocating ' v: ~ Q3 H5 Zperformance requirements and/or synthesizing system elements.* N2 _& [# A. R Design & k8 a* K1 F0 l& Z) wParameters 2 n8 ]6 h9 h! S, ?3 aQualitative, quantitative, physical, and functional value characteristics that are 2 Q$ G. M( v6 Z( w- Yinputs to the design process, for use in design tradeoffs, risk analyses, and 5 y: F0 o1 K7 F2 C7 ^development of a system that is responsive to system requirements. 5 _& q( n4 O# m6 c: KDesign Phase A period of time in the software life cycle during which the designs for, o5 e2 L* W! m# W architecture, software components, interfaces, and data are created, $ F0 ], ?6 E# a+ {/ y- Ddocumented, and verified to satisfy requirements.! H# M$ i# @/ ]( q0 V Design-to-Cost . S* m# r" g# K! [(DTC) Goal ( H3 v; s3 X8 ~0 F! }% E1 w. |* mManagement concept wherein rigorous cost goals are established during / b/ r- I1 Y {( M0 J9 H7 Odevelopment, and the control of systems costs (acquisition, operating, and % v+ A- t. r e8 ]. A& E: zsupport) to these goals is achieved by practical tradeoffs between operational& A3 w' ~) L8 d# g4 q5 E capability, performance, costs, and schedule. Cost, as a key design parameter, / W2 A% _4 C1 a: s, B* e1 `is addressed on a continuing basis and as an inherent part of the development" z; k- R; h5 ]+ {0 o/ e and production process. A DTC goal should be in the form of average unit L5 q1 F6 d; L$ p6 m' Z flyaway cost. Also, DTC parameters for operation and support will be # M; A+ d1 B$ V7 C0 F. W7 W+ {- Dselected—parameters that are design-controllable, significantly affect O&S costs,6 K6 n1 a' o; G: L4 I0 T and can be measured during test and evaluation. Parameters may be " r4 g+ ?" g0 b! kexpressed in dollars or by other measurable factors, e.g., manpower, reliability, or 7 h* M7 [' h1 W: c4 O. v" L ?, \maintainability. Firm goals and thresholds will be established no later than entry) P$ u* l# N- j% F6 t: } into EMD (Milestone II). This is an in-house goal, almost contractual in nature,% B, I/ ~" Z+ k9 f8 y between the PM (Service) and the SECDEF. Allocations from this goal will , B o" K( u0 d+ G8 B; P7 S' Bbecome the contractual DTC goals for contractors supporting the program. F P0 w6 \5 k9 D Det Detachment.7 h& _' i2 S) I DETEC Defense Technology Evaluation Code. x. L0 G; Z% A. ? Detector A passive IR, visible, UV detector turns photons into an electrical signal. The 2 `7 H4 P. O. v6 dIFOV of the detector is its solid angular sub-tense. There is sometimes ; `8 ^4 H3 @- Y" x' b0 econfusion between the detector sub-tense (size) and the pixel (picture element5 H! J7 \9 m8 { size). They are the same for a staring sensor, but in a scanner it depends on8 Q7 e: U g3 b j" v4 r* t the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area.8 w, U: n8 [8 {0 Y2 n3 ?7 q! x MDA GLOSSARY, VER. 4.0 D ; ?6 O1 r" W$ |. x5 M79 ; b4 t* u6 h- hDEV ENV Development Environment.: r5 C5 S) t* j; n, K Development! u+ ~1 |- C( l" h) W Test (DT) * T+ B) e- R6 H8 M0 zTest conducted by the development test organization to achieve specified test / j/ t3 C" ]- m, ]6 dobjectives. It may be a complete test, a subtest, or a phase of a test. $ z- {# \- o; Q. t2 ^" n' cDevelopment ; j! a# t- Q4 X; Z2 D, MTest I (DT I) 2 K' i1 A& ?" ]A series of tests conducted during the demonstration and validation phase.( [0 |3 g6 J7 u$ R/ `4 Y Components, subsystems, or the total (or full) system are examined to determine; E7 f( ~. Z2 `3 @ whether the system is ready for EMD. State-of-the-art technology is addressed , j- }9 v* m; a. L: x( Sin DT I. * M7 N6 D8 e7 j3 v+ CDevelopment7 L5 @/ X4 _% d4 T- Z Test II (DT II)& G0 j) y' }5 Z7 e A series of tests, normally during EMD, which provide the technical data 8 ^- P6 n- S" l) nnecessary to assess whether the system is ready for low-rate initial or full ( L, c5 |7 a+ u/ ?( b7 D, `% sproduction. It measures the technical performance and safety characteristics of8 }' }: b) r2 Q9 j8 B the item and evaluates its associated tools, test equipment, training package, 4 a1 S0 N% c" E" q8 h" {and maintenance test package as described in the development plan. DT II 5 D/ r# G1 V6 _' g: M6 daddresses accomplishment of engineering design goals and the fulfillment of [2 q( Y V. x" U* m3 f! hcontract specifications. 1 G& n5 J" ], D2 U) L+ UDevelopment 5 h$ U) A7 H) O0 {' k2 F. CTest III (DT III): A- c' L" |1 W6 e0 d! C/ T Tests conducted during production.( J1 ~; F2 L6 Z. \8 A Development % ]1 X: [1 @+ }2 P; JTest and . W4 }% E2 m' _/ j: P: DEvaluation- S3 s0 {0 P9 D u$ r (DT&E) + P/ [+ N6 l, Z0 N! R' V/ B% @. B; VTest and evaluation conducted to measure progress, usually of. u' v% I2 o$ _* ?5 v7 k2 T; d+ K component/subsystems, and the proofing of manufacturing processes and( e5 K! a. j3 s+ `5 y4 S2 b' B9 w3 P controls and to assist the engineering design and development process and/ n' Y* d$ w1 |1 w3 }2 b verify attainment of technical performance specifications and objectives. Usually9 W- e& C- U& |1 e# U: Z, N1 d conducted under controlled or laboratory conditions. Can be conducted before) x; |& m0 b7 ~2 v' a6 A" y/ P or after production begins. " k3 o, e" P% \! }Development ' B% U: U) V! g; GTest (DT)7 }8 \& Z8 z/ q7 R Test conducted by the development test organization to achieve specified test # E. L* x4 X6 u! G: ~: }" j! Eobjectives. It may be a complete test, a subtest, or a phase of a test.8 B# C5 {4 D: t, {& e Deviation Criteria Limits established beyond which a Program Manager may not trade-off cost,, ^3 Y; J. S- U schedule, or performance without authorization from the milestone decision5 T$ }2 b5 i6 a) N authority. Acquisition Program Baseline (APB) thresholds represent these0 D% o8 Z" o5 n: l parameters. # H; R: x( z/ uDevolution of( v v+ F0 a6 ]" c. I" u; p Command4 t: F% ~+ x& }/ |# n s4 _) m( ^ Minimal essential operational capability to perform C2 provided in an orderly and 5 g" I+ e3 X! k3 B0 ]timely fashion to a duly authorized successor. ! t& f3 w+ n8 f# c6 b. `4 W7 pDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare. 0 y, [, c, E- xDEW/D Directed Energy Weapon/Discrimination. . A2 j$ B$ O' d. u/ \1 gDEWG, O Directed Energy Weapon Ground, Orbital / `% N( i G# z- n9 jDEWL Directed Energy Weapon, Laser (thermal or impulse).& f( D6 K. g h9 ] DEWP Directed Energy Weapon, Particle Beam (neutral or charged). ; P4 n3 R }: |DF-KBS Data Fusion Knowledge Based System.9 q+ ]$ A6 u: I# m% ] DF2 Deuterium Fluoride.6 d) `2 a) I: { DFAR Defense Federal Acquisition Regulation9 t! Z5 S% S* x7 |4 l DFARS Defense Federal Acquisition Regulation Supplement. 4 R- P r( Q( f. EMDA GLOSSARY, VER. 4.0 D, s* k/ k; H" _: L# m$ s+ k* ^ 805 z. C5 E( ~3 J$ W. H6 o, N DFAS Defense Financing and Accounting Service. I1 _- X% }. w9 x DG OBSOLETE. Defense Guidance. See Defense Planning Guidance. 8 l8 R$ P2 U2 P. WDGA Director General of Armaments (France). - L$ R& C- f& _. U8 LDGP Defense Group on Proliferation. 1 `( k: S3 V* u: E8 x' ZDI (1) Data Item. (2) Developmental Item.6 F$ G. \6 X" Z7 q: P2 w& C DIA Defense Intelligence Agency." @7 A1 b& }( S7 S DIAC Defense Intelligence Analysis Center.# f% S& X5 l& }* d2 I DIAM Defense Intelligence Agency Manual# m0 T7 k# |0 M) b' n, Y8 V Diameter (Optics) The unit of measure of the light gathering power of a lens. 4 H" B" A! E/ O: LDICE Digital Integrated Combat Evaluator.& I2 u5 N V+ Q [3 G+ ?) d DID Data Item Description. 7 [) u: _- O1 E4 X" [: O# ~5 N: KDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The - c! ]+ Z+ X. ~# f( d0 Jangle of spread, which cannot be eliminated by focusing, is proportional to the # ?# U+ C( i- zratio of the wavelength of radiation to the diameter of the aperture.5 u) X1 A7 Q! c: c; `7 A3 ` Digital. D. _3 ?! f, s Processing - {, L. [, f$ C0 [: ~) h" {The most familiar type of computing, in which problems are solved through the2 E/ Q m( B0 }4 k1 ]9 W- F- U mathematical manipulation of streams of bits. : Q6 ^6 O/ n! a* u0 `& cDII Defense Information Infrastructure ) e {, H8 R# v. I8 LDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to# d: K1 }& N+ v2 Z+ z q; D 12 km) between wake termination and de-sheathing. . j! ]6 o; v9 A+ ~DIPS Dynamic Isotope Power System (which provides up to 10 kW of power). 2 |2 ?+ x- ]6 cDIR Director.! C8 h" W1 E, ?: k0 e4 d8 i$ ` Direct Air 0 D* X2 z: E& [3 W/ x- g2 `Support Center $ S: K/ e# ]6 }, CA subordinate operational component of a tactical air control system designed# k) F. R& r0 t1 q$ A for control and direction of close air support and other tactical air support ) v0 z c3 k" soperations, and normally collocated with fire support coordination elements. ( l2 ~) k1 G* N* Z0 N: PDirect Cost Any cost that is specifically identified with a particular final cost objective. Is not: \3 w0 E5 q2 i( G8 h; o. V1 n2 A necessarily limited to items that are incorporated into the end product as labor or$ N f- T2 g. Z material. & d5 ~& h0 F7 E5 v: y; |Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing: j$ d1 L) w3 B& |- b6 r; b direct labor includes fabrication, assembly, inspection and test for constructing 6 V9 i! O9 p, e; \5 J, |" Ythe end product. Engineering direct labor consists of engineering labor such as: a6 y3 L9 F' R: T, u5 _: h, U reliability, quality assurance, test, design, etc., that is readily identified with the# k# L* T2 {3 B5 U+ ] end product. 7 T: a. ]! j6 A: zDirected Energy 5 j- a; p% ]0 o2 ]: N(DE), h, e$ J( _2 Q2 o) a+ v 1. Energy in the form of atomic particles, pellets, or focused electromagnetic 9 A: _2 ]0 N* hbeams that can be sent long distances at, or nearly at, the speed of% E/ ?! ?" q. B: k( b$ k light. $ r; K' `3 d. |9 R, B2. An umbrella term covering technologies that relate to the production of a4 R6 E2 T5 [# r; g1 v) m/ R beam of concentrated electromagnetic energy or atomic or subatomic particles. : L) |9 G H l2 T* Z0 S7 S/ ~MDA GLOSSARY, VER. 4.0 D! \7 a; s8 l- w+ ~0 C" T0 o 81# ^! n2 p) D: I3 c+ B Directed Energy 4 A8 m( U# @# d8 C; ^+ G7 JDevice7 h: i9 B g! a- m A system using directed energy primarily for a purpose other than as a weapon. * s& R6 N6 Z1 _3 m. FDirected energy devices may produce effects that could allow the device to be : f* T% ?# w% k0 K' X7 wused as a weapon against certain threats, for example, laser rangefinders. " X9 Y6 g. B8 j% L$ `4 X$ A3 lDirected Energy# L" Z# [$ H' |7 H5 s( b1 [- g Weapon (DEW) m" I/ _+ p2 E/ D5 j+ S A system using directed energy primarily as a direct means to damage or destroy" }, v& t1 @3 Z2 _$ h( [ enemy equipment, facilities, and personnel.. A9 ?. F- m/ W4 x: u2 M DIRLAUTH Direct Liaison Authorized. 9 A4 N. m$ e) s6 O1 vDIRNSA Director, National Security Agency./ A2 c# c1 D% L DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.8 w* \# Z0 C3 z+ ` DISA Defense Information Systems Agency, Washington, DC. (Formerly known as 5 L- f1 i; P- R' G/ b7 y' WDefense Communications Agency)." V9 i2 T" ]0 j" i" F, I9 x# y* T DISCO Defense Industrial Security Clearance Office5 u* d$ J" N4 ~1 h DISCOM Division Support Command (US Army term). ( l; G! C2 ?4 @* q5 Q6 IDiscretionary9 ^$ |5 Y1 H2 _3 L Judgment 0 M* n1 w! U2 \0 J1 Z$ u$ Q6 DThe authority given USCINCSPACE or his duly authorized representative to . [+ c& i& o" X: t+ @0 ` _perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination( I; I1 M' N7 q- Z. {& d DISN Defense Information System Network (DISA term).! U8 F1 M& K6 ?9 m% [6 b2 K DISSP Defense-wide Information Systems Security Program. p. B9 \- c1 S: y, z; Z DISUM Daily Intelligence Summary (JFACC term). ' ~# c1 ^4 s8 l2 A+ `& |DITDS Defense Intelligence Threat Data System.2 j4 z. R' a) V/ u# Z$ Q DITP Discriminating Interceptor Technology Program. The objective of DITP is the % v6 p& t. R1 J6 N" G$ jdevelopment of advanced interceptor seekers to counter advanced threats./ _" N8 t# R+ O5 G& R2 v, y2 ^8 t. I DITP will integrate passive and active sensors into an interceptor seeker that( \2 A/ C0 M2 \ O3 f* Z4 Z integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP + W4 w6 c4 G1 y: A! Lflight demonstrations will involve the tracking and interceptor on-board( G" o" O' n2 A; k' H( A, m discrimination of targets of opportunity while providing fusion processor data, g5 p- U9 j0 ^; i- R telemetry. (See also ASTP)./ g) f; y3 T/ ? DIVARTY Division Artillery (US Army term).. Z* U% R0 o8 [0 f DIW Defensive Information Warfare./ m2 @/ q, Z! Y, E DLA Defense Logistics Agency, Alexandria, VA.! {* C, ^ X4 A. a6 Z DLSC Defense Logistics Services Center (Battle Creek, MI). 6 c |& @& l1 f. r: r. L$ sDM Data Management& V1 w8 e5 G" }7 y. D C; D DMA Defense Mapping Agency, Fairfax, VA.2 L `/ p* k; D4 Y2 Q- P" t DME Distributed Management Environment. " T+ m1 k3 I% c4 _7 ^DMI Dual-Mode Interceptor. / Y. K; g* D* M3 O4 M$ I% rMDA GLOSSARY, VER. 4.0 D4 F' P: q# B6 }' n 82 2 k3 x+ G0 ?8 N, `0 r1 t; uDMRD Defense Management Review Decision. " a% N, g6 \) v0 {( X2 HDMS (1) Defense Message System.$ R" g' ^. h. n9 X (2) Dissimilar Mission Simulator.. k' d# w) [* z6 F( S DMSO Defense Modeling and Simulation Office (OSD). 5 C2 W+ p3 `! h' |7 l8 \DMSP Defense Meteorological Satellite Program. 8 P% _! J- j; e' L- XDMU Disk Memory Unit.. K8 z( c' v& F DNA Defense Nuclear Agency, Alexandria, VA. 2 t* e2 D" Q( zDNMS Distributed Network Management System./ `# |0 Q' E2 @; v' n7 w$ g DNSIX DoDIIS Network Security Information Exchange / g. C, q! A$ _6 UDNSO Defense Network Systems Organization.3 `5 @6 J z. i$ x0 b DO The lowest rating under the DPAS. All “DO” orders take preference over unrated ! `6 e7 R: l5 I# l Z& Horders to meet a required delivery date. , X5 F1 r6 K7 C) j: H- `Doc Document7 g# S% `4 N# I6 N5 O0 v DOCPREP Documentation Preparation.1 O- |& Y3 O8 z; q; l9 x Doctrine Fundamental principles by which the military forces or elements thereof guide; Q5 A! l) B, O. b, Q their actions in support of national objectives. It is authoritative but requires 5 o" e7 y: b. ?+ I' Mjudgment in the application. See also Combined Doctrine. 3 E0 }7 [ H- S* @; t! uDoD Department of Defense $ D0 N) q) Q% l2 P: e" JDoD Component * T# |( E/ o" q2 s4 ?% {. U6 XAcquisition$ p! q: L+ S2 |0 D+ S$ n' s5 N Executive3 C9 r( K; G. p4 p% W( l7 I A single official within a DoD Component who is responsible for all acquisition+ Q- N9 z. @- N% x functions within that Component. This includes Service Acquisition Executives5 U+ l4 D' V; j1 r* a2 R for the Military Departments and Acquisition Executives in other DoD) m3 K- s# Y8 I Components who have acquisition management responsibilities./ W+ A4 R8 b8 T4 o DoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,, z1 P" g( [1 e# i Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the 8 \& ~; T- N& @! I/ iDefense Agencies; and DoD Field Activities.6 Z! _4 J) b; Y% c DoDD DoD Directive. & X" h/ b3 l; u$ Z2 ?# j6 hDoD Directive# k5 _5 e8 ` F% O6 T9 F7 f 5000.1 0 N: ?+ s* X) v2 i& O0 ~“Defense Acquisition.” The principal DoD directive on acquisition. It establishes ) R+ {) U& B/ k" l( w" npolicies, practices and procedures of governing the acquisition of defense- @; i0 Y* {5 B7 g) g& r- s: g3 n acquisition programs. $ g$ Y4 u- J2 [. FDoDI DoD Instruction.; H1 e) L0 u2 B- F: y" h7 }8 a2 p; M DoD Instruction! r' U5 M+ K& k4 P9 H! e" D# i 5000.2) a/ x4 x* \6 p E5 Z “Defense Acquisition Management Policies and Procedures.” Implements DODD / Z+ m/ ^+ x! B6 v5000.1. % \, p3 o* g2 VDoDIIS DoD Intelligence Information System. ) j2 i7 a. w' oDoDISS DoD Index of Specifications and Standards. - J" v3 u6 j# |" YDoD-M DoD Manual. 0 a. J; B4 A/ \2 I7 \MDA GLOSSARY, VER. 4.0 D 1 ~# r6 u3 i; S; T8 u83' f6 ?3 L( l* I8 ^% P% ^ DoDR Department of Defense Regulation.7 n: x' t# L, E- ~5 S9 {: L DOD-STD Department of Defense Standard.4 ^& V1 H2 D) E, y' C DoE Department of Energy.1 @. S5 E% M% c" u DOF Degrees of Freedom. 1 Z7 a6 h9 ~- n8 r- u* ]Dog House Large Soviet A-frame radar used as a component of the Moscow ABM system 1 H3 s4 e( G! }having a detection range of approximately 3000 km. It is believed to provide $ E0 Q) y5 r5 U( h2 @; fbattle management for the totality of Moscow defenses. 2 i4 p6 F8 P" f$ H! _DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).! W9 _; a' V0 Q6 W DOPAA Description of Proposed Actions and Alternative (environmental term).8 n: ?6 _2 {9 d1 [- H+ I9 w, f Doppler Effect The phenomenon evidenced by the change in the observed frequency of a 2 ^+ F$ s3 I1 A5 H, k0 w! @sound or radio wave caused by a time rate of change in the effective length of. z, z* F+ j; T$ y4 v5 } the path of travel between the source and the point of observation.; Q* r2 Q% v9 E: _5 h( a DoS Department of State (US). ; H4 g; O L \4 ?: s! UDOS Disk Operating System (TelComm/Computer term). 4 z. N: r1 u9 a4 A$ z3 i5 ~DoT Department of Transportation [US]. ' N1 k& r; J/ g( E* i' T9 a( XDOT Designated Optical Tracker. # H8 k3 G# @: q# q7 _) P' lDOT&E Director, Operational Test & Evaluation. _5 F8 Y2 S0 Y U& h% N1 T9 J DOTH Defense of the Homeland. + Z/ @, p, z2 X2 i1 C0 LDown Select To reduce the number of contractors working on a program by eliminating one or) o# Z: V! q8 V* s more for the next phase.( J6 S2 ^$ ?. x! Z' u/ d, L DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning. ' ?; e0 Y9 h5 i: T3 lDPA Defense Production Act. / w% ^; m0 i4 J2 l/ bDPA&E Director, Program Analysis and Evaluation. 1 G+ {# H$ l; A l) g& z9 BDPAS Defense Priority and Allocation System.4 j- d# [) G; w DPAT Dynamic Program Analysis Tool.3 ^% G7 _7 Z% H- e+ f0 H! g' m" i DPB Defense Policy Board." v; b% K2 |: _) E6 i3 R/ l DPG Defense Planning Guidance.1 g2 }! l8 P8 A, V3 O1 _ DPM Deputy Program Manager. $ K& N9 ]4 g& W. X" b# i; T: U! z7 UDPML Deputy Program Manager for Logistics + o X/ Z* f+ ]DPP Distributed and Parallel Processing (Computer term)., n# N Z9 [; |$ M0 z( V8 B DPR Defense Performance Review.: \$ v9 J9 I4 R4 n7 i% H MDA GLOSSARY, VER. 4.0 D , A. E, Z9 Y2 I6 ^849 p! e+ c$ r0 P& |, t- R% e: A DPRB See Defense Planning and Resources Board. R7 E: W5 r/ j DPRK Democratic People’s Republic of Korea (North Korea). 6 g, I {$ L' b& nDPRO Defense Plant Representatives Office. b; _: _! l6 X) _6 q' F0 [% ` DPSSL Diode-Pumped Solid State Laser. # T H! \5 c( ]4 J. Y4 ~DR Deployment Review. & Q8 d! U5 Z$ p+ q# M! O& E- bDRAM Dynamic Random Access Memory. , q" }0 x' {3 X; sDraw-down Curve A method used to encapsulate the overall performance of a BMD system that 4 q+ T+ L3 F* X A! K* nplots the probability of survival on the vertical axis versus the number of attacking 9 }' S% l/ n) `! o: bRVs on the horizontal axis. Used in conjunction with attack price, they are the & m, v1 p4 U: t$ ]$ N: fmost important expressions of a BMD capability.5 G, ~2 d( [8 B+ j4 Q0 l) O4 B DRB Defense Resources Board.) i: W8 q" h% c! t DREN Defense Research and Engineering Network. ( z# J; c7 x. a8 ^DRFP Draft Request for Proposal. 7 r# L' g7 |7 e7 @Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from 4 V# R$ L1 h) p" _gravitational and atmospherically induced torques on the spinning projectile. : I+ c7 p6 ] K8 f9 E) B5 WDRM DAB Readiness Meeting (DD 5000.2 term). 1 Z H) a+ _1 iDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also " D7 o& i3 C0 o a8 A; G+ |Remotely Piloted Vehicle., ~# j' H2 l% C# t! M5 X DRP (1) Deployment Readiness Plan (US Army term). % F( I4 G; F" B- }$ E# }4 G( f% h- C(2) Deployment Readiness Program. . k$ f V5 r2 {4 T" v$ B0 @DRR Digital Receiver Replacement (USN term). $ w" t- L. }" {7 xDS Deep Space.8 @$ p$ h b0 B+ c- W6 X/ |" i DS-1 Category of telecommunications circuit capability. Y! _. _: Z' j+ T2 T/ c: B6 kDS-3 LAN Category of telecommunications circuit for a Local Area Network.' }* x* b; F: b8 q+ g F! E DSAA Defense Security Assistance Agency (OSD). 4 _7 d" a6 a" E6 d3 j( ?# \/ H. E1 ^ a8 _DSAT Defense Satellite Weapon.6 B" P& I1 }; H6 I# k( g9 B$ A DSB Defense Science Board. ) i6 I) ?4 C; Y" X8 |DSCS Defense Satellite Communications Systems." k; Z4 T( j& T1 p$ K DSCS-3 Defense Satellite Communications System Three. * T; t' j1 c% l2 _# yDSCSOC Defense Satellite Communications System Ops Center.$ l( J/ }$ t1 e; `( Q' p: W4 t, c DSI Defense Simulation Internet; h, d4 t' s' f! z' x8 q" B) E MDA GLOSSARY, VER. 4.0 D * \. H1 M# v) @( y+ n& o85! V$ s2 Y2 x1 [3 ] DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet + ~( c i& w H; m& R. aSystem. * u9 E2 G9 w0 ]8 WDSM Decision Support Matrix + `# c2 a; R& P2 m( @; ^, CDSMAC Digital Scene-Matching Area Correlation. $ M0 \+ A$ D4 BDSMC Defense Systems Management College. ' w, e) k% f" q: v RDSN (1) Defense Switched Network (formerly AUTOVON). - \% P9 o2 {8 H/ S(2) Deep Space Network (NASA term). + o! F8 N" q# Y8 ADSP (1) Defense Support Program. (2) Defense Standardization Program. 5 W ?3 C7 f8 J. U6 sDSPRTM Defense Support Program Real-Time Model.& _" h+ h; p/ h DSR Data Set Ready (TelComm/Computer term). ' w% {0 }+ s! N) }DSRCE Down Scooped Radio Control Equipment (TelComms term). & U" `& D5 l" h1 ~. Q$ _0 n/ QDSS (1) Defense Supply Service. (2) Digital Signature Standard.- ^2 t' M9 e' ]2 z DST Defense Suppression Threat. $ L' D. r* u6 XDSTAR Defense Strategic and Tactical Array Reproducibility., ?3 l4 h) r$ \/ x DSTO Defence Science Technology Organization (Australia). . ]! m, t: \) R- L8 `DSU Digital Service Unit (Telecomm/Computer term). ; t. X( N% l8 `& Q; y+ oDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to2 Y+ S: y1 }! L R5 S" u; G the DNA.! |- ?( Q1 b. C$ [) R. Q& ^; } DT (1) Discrimination Technique.4 w2 S& \( A7 o (2) Development Testing.2 N; \0 \4 v# \0 l( v (3) See Development Test I, II, III.8 f' e( d) M; B! z! Q) b+ S (4) Down Time (ILS term).3 f/ n5 M; k. B& m/ P& c (5) Depressed Trajectory.& F( Y g( p2 w2 n (6) Dedicated Target.# b G' ?1 v1 P, P- W5 {& \ DT&E Development Test and Evaluation. - U5 w3 i. A" E5 K4 U' x/ _: wDT/OA Development Test/Operational Assessment.# ? o. B5 z- F) H/ C5 m DT/OT Developmental Test/Operational Test. * o' y. P, H5 r- ?8 [: A8 U% FDTAP Defense Technology Area Plan.: ~4 {! P- ^( @$ M$ t) j: I& O DTC Design-to-Cost.5 a& a5 q" R1 I. ]( n( I( D DTD Digital Transfer Device (TelComm/Computer term). 8 [$ P' S7 I; r7 l1 C1 S( ^+ RDTE Data Terminal Equipment (TelComm/Computer term). & {" F* O& F5 X: n. BDTED Digital Terrain Elevation Data.( S8 l z! e) v% W9 N2 A; k, T1 ] DTIC Defense Technical Information Center, Alexandria, VA.5 e& \/ C) E5 G8 @+ Z, R MDA GLOSSARY, VER. 4.0 D ) f" b3 X2 j! M+ i( c' H5 Z( b86: r- N- h* g: u1 S. Q# w DTIS Defense Technical Information Services (now DEIS).& i8 `' }" O$ r2 R5 G% E, l2 V DTLCC Design to Life-Cycle Cost.$ @% u, w) k+ l# |4 S+ y DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL' k( U$ r, M$ g term)." K+ o* @. \% _: N) K) T& Z DTLS Descriptive Top-Level Specification.8 B6 {2 R6 U% h8 c( P, W DTMF Data Tone Multiple Frequency (TelComm/Computer term).' b8 G& D- R& G/ z! i S DTO Defense Technology Objectives.# d$ r T1 }* j% o* E DTOC Division Tactical Operations Center. . r5 F4 n2 [! d' o- v8 }+ B! ZDTR (1) Demonstration Test Round. (2) Development Test Round. 5 n8 ]; A. [8 H' [+ O; _& iDTRM Dual Thrust Rocket Motor. ! R$ H5 f( d" e0 rDTSA Defense Technology Security Administration. k! H9 G) u1 {7 c& |( F+ j+ F DTSE&E Director, Test Systems Engineering and Evaluation.: T2 t7 j( K g: q3 k! H DTST Defensive Technologies Study Team.- `7 V8 D* {" l1 e4 y' `0 V DTT Design-To Threat8 H C. Y6 X- j5 i) F8 _ DTWT Dual Traveling Wave Tube (Electronics Engineering term).( B& f/ Y# C) T: a DU Depleted Uranium. : i( ] _- A8 q" \; Q4 ^) c& yDUA Design Upgrade Assessment.2 o l; C( F# C" v5 G Dual Source Two contractors producing the same components or end items for the same ! y) S) P _+ G) A3 n) \program. ( V4 M# g& U$ `1 d% \DUNDEE Down Under Early Warning Experiment (MDA/DSTO term). * J6 E% v6 U6 ]& FDURIP Defense University Research Instrumentation Program. 5 `, c u1 Q4 y% }DUSD Deputy Under Secretary of Defense./ [2 c# Y: r! u$ o DUSD (ES) Deputy Under Secretary of Defense (Environmental Security). 6 o% f a. A f- ^+ ~' P: dDVAL Demonstration Validation./ I8 Z0 b- P# y; a; k DX The highest rating under the DPAS. It takes preference over all other rated and+ _. Q; R3 K: H" I; N! I not rated orders on a contractor’s production line. The BMD program carries a/ D( Y8 k% f( v/ B7 n% l “DX” rating. 5 `7 d7 T, O' e% q# OMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87 : f: w# B5 T" K2 \3 yE East5 q6 U0 e+ b; w7 n' B E2 I See Endo-Exoatmospheric Interceptor.7 r4 b" g. t! `5 d0 v% k E2SRD Effectively Two-System Requirement Document.# u- z( X7 U0 D; w& r E3 (1) Electromagnetic Environmental Effects. 4 x+ K' P# p0 u8 l! G9 }: `(2) Electrical, Electronic, and Electromechanical.3 m# o- ~: k6 N' Y- q E Spec Materiel Specification. 6 _, ?$ p' Z3 P! e2 A& B% ?EA (1) Environmental Assessment. 8 q5 B* Q- F$ Q" @# p* M9 z6 M. \(2) Engagement Authorization.1 c/ H' T/ z' f% S s( B- Y (3) Executing Agent.! }( o, r' r) D) d4 ` (4) Evolutionary Acquisition. , a% \/ [" x* v* O6 w% ~(5) Environmental Analysis (environmental term). G1 E+ z* K" T! a& E2 G$ `3 d (6) Executive Agent.7 R8 P& I) i* ?' m EAC Estimated Cost at Completion. 3 t: x, u9 m# {# Y! r. D5 gEAD (1) Engineering Analysis and Design. (2) Extended air defense. 2 Y% M8 R" x& y2 P CEAD/D Engineering, Analysis, Design and Development.! m: f$ P/ N1 F EADSIM Extended Air Defense Simulation. ) B. I/ q. L! y2 F# I* eEADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing' ^. |, C, m* C: v3 b% \+ Z Z% P users to model military response to airborne and ballistic missile threats. " L, x& q0 C1 D1 vEADTBP Extended Air Defense Test Bed Program. . o3 I5 {' N- H+ q: C6 kEAGLE Extended Airborne Global Launch Evaluator.2 g% u) [: l% _8 ^ EAM Emergency Action Message. 9 M) Y1 G, s8 Y" _ rEAR Export Administration Regulations. 7 q+ w1 {& O2 N1 `Early Operational * q* c8 O3 R4 {) t. _) rAssessment: B( n4 e+ D3 C, l0 l An operational assessment conducted prior to, or in support of, Milestone II. P) I$ P7 @' B' ~. gEarly User Test3 ?* `% g# ?. r4 R. F7 `9 m8 e# X7 w7 T (EUT) 4 j) A7 D5 f+ W* cA test employing representative users to examine materiel concepts, training or. J9 O, i+ a; O% h logistics planning, or inter-operability issues. EUT can be accomplished during 3 n2 H& z0 s- U$ K. X1 J( _$ uDEM/VAL on brassboard configurations, experimental prototypes, or surrogates5 D- G% {& B# O, L6 x/ e" b to provide data leading to the decision to enter full-scale development. 0 j. @# C+ L3 z3 T' X0 I) j* xEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of + T5 d8 O; j$ e' M0 qsurveillance satellites and long range radar.$ ?5 e9 C/ {% p8 r# f (2) Early notification of the launch or approach of unknown weapons or0 K Q& ^0 `+ V6 v* o weapon carriers. " o. {' A8 ^' o7 S1 d' FEarth Limb The apparent outer edge of the earth as viewed from space. `9 i0 i9 L9 jEastern Test+ R; {0 T% u! ~. Y Range (ETR)6 z9 W1 y L! V( ?' H Beginning at Patrick AFB, FL, this range stretches halfway around the globe $ D0 E4 m- \" [where it meets the Western Test Range. An array of launch complexes, sensors, $ n' G" {0 J; {. Qand tracking sites make up the Eastern Test Range. The ETR is now operated " k0 X7 V/ o1 M/ c( Eby AFSPACECOM as shown in WTR definition.5 h' x8 E4 t0 v$ y4 H MDA GLOSSARY, VER. 4.0 E( q3 G( N# ~, c* m 88 & _3 b+ |7 a9 Y; wEB (1) Electron Beam. (2) Enhanced Blast. - v- i9 y% x& _" l0 b3 g/ SEBB Electronic Bulletin Board. 6 H/ `& a! d* {8 I& h: ^' yEBCDIC Extended Binary Code Decimal Interchange Code.! b/ ? ~. `/ o s/ L, D3 s EBW Electron Beam Welding. + }1 C4 a8 \6 @5 U) \' YEC (1) Electronic Combat.! c- T7 f2 `+ Z* v2 Z1 M" n (2) Error Control. ' ?4 L9 f9 q% V) `$ Q(3) OBSOLETE. European Community. Now known as the European Union 7 g' X2 W8 [& L6 [# m! \/ }(EU).% r# E6 E9 ? _" v" c( V EC/EDI Electronic Commerce/Electronic Data Interchange2 }, N5 X: K6 y; ]& J8 { ECAC Electromagnetic Compatibility Analysis Center.& s: p. S5 L5 d; g, Y& a ECB Engineering Change Board. ; A2 a! ~# I/ v& N3 wECC (1) Equipment Control Center. (2) Element Control Center (USAF term).* G5 P5 Z) r; _8 a ECCM Electronic Counter-Countermeasures. 6 N+ S& a$ ?6 ?: Y- a! v* EECDs Element Control Directives. 9 R2 y0 R( u- p. J5 K& A; _5 GECLS ERINT Command and Launch System.$ G# l' Q' V- z' ~( P ECM Electronic Countermeasures.# T9 o1 u1 C! U* E ECN Engineering Change Notice. 2 j: Y0 ^# n7 m6 pECO Engagement Control Orders.* b! r2 l5 _- m ECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. ; S9 I: Z6 Z8 m! f# FECPMO Electronic Commerce Program Management Office. 8 d% \! D. p2 CECS Engagement Control Station (PATRIOT). 6 h0 r) ] S- Q9 kECU Environmental Control Unit. + y# f: K# Q& K& T2 l a$ QEDAC Error Detection and Correction ) R7 [' Z' {5 Z, rEDGES Electronic Data/Guidelines for Element Survivability. $ Q# J6 D) f u. i8 O8 t6 u7 PEDL Electrical Discharge Laser8 x m5 {$ V2 U EDM Engineering Development Model. % R! Z$ p9 `( m7 ?0 wEDP Engineering Development Process |2 l0 F% F3 d& x: |) gEDR Embedded Data Recorder (PATRIOT).6 x' R( j& T% c5 ]9 n1 T EDS Electronic Data Systems Corporation 8 w' d' B9 G8 Y* X6 r5 T$ ZEDWA Engagement Determination and Weapons Assignment (PATRIOT). $ {7 H9 ^$ p* _, s8 e; M# T$ W, nMDA GLOSSARY, VER. 4.0 E & d7 P5 A0 f' x89 ' W7 x) N; P3 X/ E( x7 B! b* K! _2 PEDX Exoatmospheric Discrimination Experiment# |) P/ ?1 @9 R5 [% c, B4 l2 H EE (1) Electrical Engineering. (2) Engineering Estimate.+ S! x: v- r- H: G( j) v L# T EED Electro-Explosive Device., r' @* o* e' u; _( A/ w# d3 M EEEV End-to-End Experimental Version.9 [5 g: Y. L2 u) W8 d* a EEFI Essential Elements of Friendly Information.7 Q( ^2 ]% Q% O- e EEI Essential Elements of Information.& ^% e0 Y; f8 |3 U8 U+ g EEIC Element of Expense Investment Code. ' Y V1 I( {, j/ H& _9 [# G3 _7 AEELV Evolved Expendable Launch Vehicle (USAF term) % s% L9 a E- \, `! bEEU Electronic Equipment Unit.2 m$ Z/ O/ x3 y EFEX Endo-Aeromechanics Flight Experiment. 0 L) Q( \' _6 }EFF Electronic Frontier Foundation. & E" J0 F, W8 o2 g# V0 E; C$ J2 PEffectivity A designation given to the BMDS configuration and demonstrated capability at \. n: j9 F( S- D a point in time, becoming effective at each increment when an element or, }6 s4 Y" b! \ component is inserted into a particular Block.& h$ Y' P/ `5 V# {$ ~" I Effective Damage That damage necessary to render a target element inoperative, unserviceable, ; z8 L$ N3 K9 Z- {& B7 Gnonproductive, or uninhabitable. 1 f# }4 F( ^4 Z) \8 I+ i" }# uEffluent Plume The pathway of movement of effluents through surface water or air.4 {: Y5 E% P% X4 L; ` EFP Explosively Formed Projectile. u5 w) ?, l5 p: \9 V* |EGP End Game Processor. " a X! m; S" u" D2 ~% u: Q: lEGTR Eglin [AFB] Gulf Test Range. 0 {3 I/ r; T# U/ q7 c6 K VEHC Enhance Hit Capability (USN term, related to SM2 Block IVA).0 |0 G; c9 n& F( P( i @: { F9 Z. z EHF Extremely High Frequency., j. w; O/ A& w2 b ehp Equivalent Horsepower.- J+ t1 K" R5 k EIA (1) Environmental Impact Assessment.$ b) d6 y6 N7 h( j (2) Electronic Industries Association.$ x& y8 w& Y7 m& q+ t EIAP Environmental Impact Analysis Process. 1 q9 w j( Q. |. V( O' wEIP Exoatmospheric Interceptor Propulsion.8 g! T; c, L+ b5 p; x/ n# [7 X5 q EIPC Electronic Information Privacy Center.7 Q/ k) h% N' e. z c! i EIPT (1) Element IPT. (2) Engineering IPT.6 l3 h# Q6 n6 t EIS (1) Environmental Impact Statement. (2) Explosive Initiation System.: e' e. E$ o& t# h- X. i7 V7 R EISA Extended Industry Standard Architecture (Telecomm/Computer term).8 U! @5 c7 V) g MDA GLOSSARY, VER. 4.0 E( g+ b9 K# x, _" S* t8 K' L 90+ ~" ]& J/ q2 l EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle.& q' P. h6 |) ~$ ^9 S Elastic Range The stress range in which a material will recover its original form when the force) `/ p2 v; v i# j* j: j) P (or loading) is removed. Elastic deformation refers to dimensional changes + D" L0 P( ]1 V& n+ k- M6 Uoccurring within the elastic range. " ?3 S; |* |; ]Electro-Optics+ B9 I d" n3 M& y) y Infrared (EO/IR) " s6 \' x, s, B" u4 zTechnologies/techniques employed by optical sensors in the wavelength ' B) q/ Y1 G- _6 H. [/ Gspectrum slightly longer than visible but shorter than radio.# O+ I$ d$ ~8 o) j# S! U Electromagnetic 8 G6 v$ L5 c# {# YCompatibility' E& f( [" Y* |2 T. Q( Q! T (EMC)* |. T" K: D) j) [6 p% V8 z A condition when all electromagnetic emissions from electronic, electro-magnetic,- O( ^1 W2 X# D& g and electro-optical components of a system interact without interfering with one 3 `$ t1 B# e4 @" u! Lanother. 5 ]4 w8 _# ]0 {& NElectromagnetic8 J; G( E& r; C7 N; o Emanations ) u2 E. k3 s9 s6 S6 H% KSignals transmitted as radiation through the air, through a vacuum, or through / J; C& ^9 `* ^( f0 V2 W+ z6 [conductors.& X" y" i( K8 D- F Electromagnetic: c, q4 i3 p8 ]. v/ G Field (EMF) ( R* o a: m- |& J3 PAn electric or magnetic field or combination of the two, as in an electromagnetic / V' M) g# u8 h' M* y# @wave. Created by electric charges in motion, having both electric and magnetic3 Y9 z0 p% ?: Z# A) {+ d components oriented at right angles to one another and containing a definite% X# m" ~5 X% i9 _' W! \6 Z amount of energy. " Y; h$ @. v1 E8 @7 u. u$ r$ iElectromagnetic 6 j5 ?( h. b& Y# {+ l% I3 a/ EGun (EMG) , m7 i q" ?* Q4 dA gun in which the projectile is accelerated by electromagnetic forces rather than ) x* `, H" Z& U0 u6 w! \3 g- ^' `' Gby an explosion, as in a conventional gun.) t8 [+ } f. M5 n: P$ U Electromagnetic 2 ]9 {2 q+ K% Q- sInterference (EMI): v6 y- E9 G' m7 W Any electromagnetic disturbance that interrupts, obstructs, or otherwise2 X5 `) ^4 I/ r0 T2 I% D degrades or limits the effective performance of electronics/electrical equipment.0 u# u K8 ?3 T/ j6 e" T# f It can be induced intentionally, as in some forms of electronic warfare, or 9 j; y @. r; y1 n# Kunintentionally, as a result of spurious emissions and responses, intermodulation products, and the like. % q( g, x! e% j0 ?, c! KElectromagnetic0 I% u, n! L) K! x3 y" | Pulse (EMP) 1 Q7 r# f9 i! O- x& R" R' vThe electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of 0 v! y3 b5 S5 v; rthe nuclear device or in a surrounding medium. The resulting electric and: U+ i4 j5 f. M4 {2 Z3 c6 T magnetic fields may couple with electrical/electronic systems to produce2 u& U* M, u4 z4 c8 ^* b damaging current and voltage surges. May also be caused by non-nuclear * K; b& M* D3 zmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic+ i. L: j7 Z0 O1 g* l) ` Radiation (EMR) 6 |2 `+ U0 @& n4 [8 o2 v(1) A form of propagated energy, arising from electric charges in motion that 2 Z4 M8 B& j+ j8 w' l6 nproduces a simultaneous wavelike variation of electric and magnetic 5 q# c9 f& P% v7 d1 @+ a3 dfields in space. The highest frequencies (or shortest wavelengths) of 9 V W0 b1 p7 O8 }' M+ Isuch radiation are possessed by gamma rays, which originate from & e9 R+ j2 U- X' f1 ?5 Lprocesses within atomic nuclei. As one goes to lower frequencies, the 2 [1 N6 O- q6 r! x8 M+ c/ ~electromagnetic spectrum includes x-rays, ultraviolet light, visible light, 7 @6 L6 _" |, P0 F" `; minfrared light, microwaves, and radio waves. ; q; P7 S4 e% t9 G4 ?(2) Radiation made up of oscillating electric and magnetic fields and2 a) F5 x' x9 {( H* G$ J" K propagated with the speed of light. Includes gamma radiation, X-rays, 1 c1 [) z' v; R: a( x4 z& _ultraviolet, visible, and infrared radiation, and radar and radio waves.( @, S9 Q9 c t; G0 N' z! @ Electromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices 4 Z) I( }7 H1 h1 n1 pused in system/subsystem design, excluding employment in the RF spectrum. 8 Q1 N. O: `+ |: z7 C: EElectromagnetic . ?8 M$ ]0 x5 L. m% USpectrum # r* M6 ]5 Y/ r" T) k* sThe range of frequencies of electromagnetic radiation from zero to infinity. It is 5 k7 X+ v% ^4 o9 o# {divided into 26 alphabetically designated bands. ( U2 ]/ e( s8 x4 o+ _MDA GLOSSARY, VER. 4.0 E ; M) `0 C. d1 E% r0 U0 f91 # G% Y; r! m# l& n+ H, WElectronic . \% l2 e6 R& R' L- B3 uCounter- 7 `& n% G7 w7 F# rCountermeasure: V) V" [: q' d. S s (ECCM) 6 g. L; `1 R) x' n4 Z8 I4 rThat division of electronic warfare involving actions taken to insure friendly d( a, u6 e; G/ S5 t/ H7 W! b2 H effective use of the electromagnetic, optical, and acoustic spectra despite the & m" V% _: f/ n, _8 E* t. xenemy’s use of electronic warfare to include high power microwave techniques. - X% K; h* @/ X, Y* DElectronic 7 W7 n. }& n6 C9 n" r/ O; T- TCountermeasure * V0 ^ q; v: B- k1 ~(ECM) 6 ]% S: X3 y' u' l9 X; aThat division of electronic warfare involving actions taken to prevent or reduce an 1 n+ }- C, f5 L7 ]- \6 T; Xenemy’s effective use of the electromagnetic spectrum. # y; p; I5 y6 K6 tElectronic5 ^" c* x* @. ^' Z! B) S d* m* E Industries, N2 u3 `) \ R Y' v5 a, F0 `9 n Association (EIA) 4 y* T1 ~! g# z3 a% vA standards organization specializing in the electrical and functional! m$ S8 B) k/ e3 n+ j characteristics of interface equipment.9 `! j5 q' M! b' s: ~ Electronic" j( k9 i) O$ E9 C3 S+ Y: H, N9 l Warfare (EW)7 c# {+ S* f. a' f Any military activity involving the use of electromagnetic and directed energy to* w4 C* @+ Q; o0 k control the electromagnetic spectrum or to attack the enemy. The three major 0 A! q" P0 [/ R2 D v5 Gsubdivisions are: * a. u8 J" A- a& _- [•Electronic attack – Involves the use of electromagnetic or directed energy to 4 ~9 s6 F7 g: J: q( x1 W6 i) B" v/ pattack personnel, facilities, or equipment with the intent of degrading, S. J, i8 q% Z/ T" O3 _neutralizing, or destroying enemy combat capability. Also known as EA. 0 i+ d' D3 W" l: }3 RIncludes: 1) actions taken to prevent or reduce an enemy’s effective use of / r' D) {, q6 f! dthe electromagnetic spectrum, such as jamming and electromagnetic 4 n0 R8 d9 ?7 R& p6 ideception, and 2) employment of weapons that use either electromagnetic or ; {9 G" o" p/ U5 B* z7 U. V1 h# Vdirected energy as their primary destructive mechanism (lasers, radio% p0 y3 u) K, J, T' X( i. M. V frequency weapons, particle beams). + f) z% P7 q( b- O•Electronic protection -- Involves actions taken to protect personnel, facilities, 5 F7 O/ E/ X, V" `# ]2 rand equipment from any effects of friendly or enemy employment of 4 [( J7 J% u, {$ N# }6 b$ I& ?electronic warfare that degrade, neutralize, or destroy friendly combat 5 S- ^9 b( o. K$ p0 Wcapability. Also called EP.* M: Q" U4 F" S" E( ] •Electronic warfare support – Involves actions tasked by, or under direct8 m" n* z1 Q {: e9 q: y& i control of, an operational commander to search for, intercept, identify, and 3 u0 _& d, I" [0 [' b2 m9 plocate sources of intentional and unintentional radiated electromagnetic6 [/ ]$ M6 j3 [3 t+ i energy for the purpose of immediate threat recognition. Thus, electronic ; y* S, ]4 o6 Fwarfare support provides information required for immediate decisions4 @) o% ]" ]+ G4 C- S involving electronic warfare operations and other tactical actions such as0 K3 x/ Y N1 q) g1 t" \7 B* |( x threat avoidance, targeting, and homing. Also called ES.% f/ a$ ^# Q: F% }9 M9 O Electronic ( E3 z& Q9 P U' ?/ ~Warfare (EW) W& ]0 `$ a! B- L; PEnvironments 5 ^$ H, ~: Z, TElectronic warfare environments result from radar and communications jamming : s& c; |1 E3 @& eand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD; l9 O0 G6 n4 E, b% H! S system.1 X2 T4 L9 c4 C Electronics7 K& t6 s/ |& P' Z Intelligence* r1 q) k: Z& g% K (ELINT)4 J4 K% X, ?9 e) X- Y Technical and geo-location intelligence derived from foreign non-communications4 _- N0 v2 V2 y- { electromagnetic radiations emanating from other than nuclear detonations or 4 B: [& T4 v0 X) r- H1 }radioactive sources.0 ?# y* H; A: _2 b2 y. \/ j Electronics + t1 C1 o$ o7 N6 R. QSecurity (ELSEC) ) D( A5 a" Z+ T9 C! W) F$ ^3 eThe protection resulting from all measures designed to deny unauthorized 6 @0 E" v1 P! l1 Z$ \# Zpersons information of value that might be derived from their interception and) l- Q! ]& J- _* i' H; b* Z# o study of non-communications electromagnetic radiations, e.g. radar. . V4 S& O0 k- b: `: T! FElectro-Optics$ j- N: e0 g$ ]8 v* V Infrared (EO/IR) $ X7 l- p! ~. _Technologies/techniques employed by optical sensors in the wavelength# L/ k5 E p4 ~2 v0 e2 R spectrum slightly longer than visible but shorter than radio. & S& g+ Y3 l9 w# v4 ~MDA GLOSSARY, VER. 4.0 E9 w- Y$ S# A; @' s; ?$ f4 ?/ ~. d8 J$ H 92 T) H, \# j9 u! Q6 E, ~ Element A complete, integrated set of components capable of autonomously providing ; U, v- n. b+ f/ L6 uBMDS capability. ) i- {- v* y U0 }) aElement * `% Y+ b& S& ?& |$ J5 C0 yCapability % \( |1 W) |6 p t3 F9 j) R) vSpecification6 o& T9 E3 K+ `4 @ (ECS)* r; @" `2 p; `# A; E% ?/ D. w7 X' @( i A document that identifies the element-level BMDS capabilities and$ J: Z: N/ p/ {( v specifications necessary to achieve the system capabilities identified in the SCS.6 t0 X! B+ W9 L The ECS further defines the SCS-apportioned mission/technical performance" m9 o* K2 ?# i! D5 k2 G capabilities and allocates these capabilities to the element’s components.6 ?% ] d/ S) a3 @4 M7 w Element Control9 e! m2 k+ Y3 d/ J8 ] Directives (ECDs) % q7 a+ N% E- D# g) e! G, jThe command and control data instructions to control the conduct of the$ x, C! Z- d/ k1 S. M engagement. ECDs are developed by command and control software based8 d+ ?9 c& H, Y Q upon variable parameter input by the operators (both pre-planned and real time), ; Z' k* b* Q6 g9 U* land operator defined rule sets embedded in the software. The individual battle ! I9 u) q8 _- U, b* p) s5 Smanagement processors use these instructions to accomplish the assigned tasks, O* p0 m. w8 e0 a$ v; H7 U$ x. Q- N from the operations order. ECDs are contained within a Task and represent the + R! @" a2 O' [# ~; u Vform of parameter values that influence the resource management processes of7 g% {2 |$ H1 a a$ r+ }& K Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and 4 p+ F. j- N, Q! i; P/ r% w2 dCommunications Management (CM). There will be numerous ECDs per Task.8 j% L% z2 D7 \: o, |& U9 F6 W! h Element1 [; n# e" t; r# M# e& U Operations - k/ a3 Q) S1 f( y hCenter (EOC) Q/ G* b$ u) F, {( } An Air Force operations center, which operates and maintains a BMD weapon or ; i6 A: p9 A& ~sensor suite. (USSPACECOM)7 S( A" j" T2 W: p! q1 K2 l) f3 p ELF Extremely Low Frequency.: ^0 K+ h1 A: Y. K) G ELIAS Earth Limb Infrared Atomic Structure.& ]* T0 G# z) r9 F, i2 x5 B ELINFOSEC Electronic Information Security. 1 S! s# ?6 F4 @/ y0 l4 L UELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2026-2-13 01:21 , Processed in 0.051003 second(s), 10 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部