航空论坛_航空翻译_民航英语翻译_飞行翻译

 找回密码
 注册
搜索
楼主: 帅哥
打印 上一主题 下一主题

航空缩略语词典 [复制链接]

Rank: 9Rank: 9Rank: 9

31#
发表于 2008-12-25 20:02:37 |只看该作者
COMSAT Communications Satellite Corporation& D* \5 G- R, L COMSEC Communications Security. 1 B3 \8 b3 a. w/ F mConcept 7 T" i9 A2 _( X D( l+ ZExploration &. Y/ e* W% F. a8 G Definition # a. ^0 \- m% V: I3 cThe initial phase (Phase 0) of the system acquisition process, beginning at1 R4 {* \5 c5 r Mission Need Determination. During this phase, the acquisition strategy is : x4 K; u: J! o" Fdeveloped, system alternatives are proposed and examined, and the system& n& U+ N8 X4 O1 g8 A9 I8 U program requirements document is expanded to support subsequent phases.$ W) q+ ]9 f2 G! S+ x, ^ Concept of/ @9 |: `' z- M Operations ' ?4 }& s. \4 V5 h r(CONOPS)( B9 Y2 f% W% t5 c: y8 P (1) A statement, in broad outline, of a commander’s outline or intent in regard to4 n% q: l( H' {- e an operation or series of operations. The concept is designed to give an overall ; {, W2 V& v( y0 qpicture of the operation. (MDA Lexicon) & R5 o2 G2 \( z0 z(2) A verbal or graphic statement, in broad outline, of a commander’s : S! r0 R) f, Jassumptions or intent in regard to an operation or series of operations. The 7 c4 |8 W% |0 @' mconcept of operations frequently is embodied in campaign plans and operation 2 p/ y' i; v. z* ^# ^plans; in the later case, particularly when the plans cover a series of connected & k5 l. c( N; w- Q1 Y( u7 j) w( Foperations to be carried out simultaneously or in succession. The concept is- A0 y; z, w8 t- [, b5 I designed to give an overall picture of the operation. It is included primarily for) A4 p* V. z5 Q7 H3 ^$ M additional clarity of purpose." }1 N' d- `. R$ e+ m+ C! S9 r Concept Plan An operation plan in concept format. Also called CONPLAN.9 U& I& L8 ]# R( B Concurrency Part of an acquisition strategy which combines or overlaps two or more phases of ' `6 N/ x3 o$ ]+ O' _; r" u) Lthe acquisition process, or combines development T&E with operational T&E. , F3 r S& {. o% M# FConcurrent; J }. D _$ S' [ Engineering # ~! m6 q/ `# N0 _A systematic approach to the integrated, simultaneous design of products and1 Q4 n* i" [/ P1 Z8 T their related processes, including manufacture and support. This approach is4 i# U6 R( c4 G( [) C. n( h intended to cause developers, from the beginning, to consider all elements of" w T( N6 {8 x the system life cycle from requirements development through dispersal, including0 O9 U7 U* Q5 w% d$ o cost, schedule, and performance. 5 M% `1 b; h+ l P3 o( u4 `CONEX CONOPS Exerciser. 9 W. K" u# a" y' |1 t# X9 RConfiguration A collection of an item’s descriptive and governing characteristics, which can be , Y( B) s+ j E% oexpressed in functional terms (i.e., what performance the item is expected to , ~( w& J7 J2 m( bachieve); and in physical terms (i.e., what the item should look like and consist of2 a1 o, d% Y7 m* ]: e5 [ when it is built). , x) l B6 d' L( w; TMDA GLOSSARY, VER. 4.0 C! I" I/ U' y) N. y9 f$ I+ P4 o 59 3 L- O8 K1 O% d1 SConfiguration% D, \& Z! w* O" _4 D4 m. W Audit- j+ L! o: H' g* i1 t7 C One of the Configuration Management tasks which includes a functional* `: t' e3 w2 n5 B( L+ ]' p0 P configuration audit (FCA) to validate that the development of a configuration item7 Z7 ]( S2 ?* T has been completed satisfactorily and that the configuration item has achieved! q- N, q3 `* N" R3 B8 } to specified performance and functional characteristics, and also includes a ( S& [! K4 ]' v$ y, D3 K1 K) m7 C6 Cphysical configuration audit (PCA) to verify that the configuration item “As Built”; d; S" S- i" {4 x6 j; i conforms to the technical documentation which defines the configuration item.4 H3 _' M& H" Z f# ?& E; G! P Configuration # k' z/ d- z$ ?4 L8 @Baseline; q9 l0 B" v& r6 g8 Z1 x The configuration documentation formally designated by the Government at a1 z" q. L6 C# [/ h specific time during a system’s or configuration item’s life cycle. Configuration 1 |' w2 U2 S. a; h' Ubaselines, plus approved changes from those baselines, constitute the current * B% b+ y1 V( J) e; ]configuration baselines, namely the functional, allocated, and product baselines. : q3 G4 i* z9 C* n; GConfiguration9 K1 K! c, P; D% H Control . }7 `# h* u2 _7 R' J" UOne of the Configuration Management tasks that involves the systematic$ _- J- b r n# ` evaluation, coordination, approval, or disapproval of proposed changes to the & k+ m$ f& A5 P! Edesign and construction of a configuration item whose configuration has been / Q0 b# u) H. B% Xformally approved. + u, B( S# e( w5 l" t( cConfiguration# z& n; k3 u: U: O% c7 u# D3 l Identification # W9 E, U( U' E# COne of the Configuration Management tasks, which require that for every : |, V% i& e0 X8 _% {change that is made to an Automated Data processing (ADP) system, the design 2 g7 m) L. r8 v% q# ?9 Eand requirements of the changed version of the system should be identified.3 c9 a6 N3 Z' T1 B6 _ Configuration4 L T1 j+ M6 l3 U) N, C! j Item (CI) w) p" q" g+ E5 v0 R8 rAn aggregation of system elements that satisfies an end use function and is9 h( Q; @" ?7 e* @ designated by the Government for separate configuration management. G6 P; M2 _8 S2 S K5 o Configuration items vary widely in complexity, size, and type. Any item required9 V/ ]1 `$ k$ R/ p for logistic support and designated for separate procurement is a configuration5 H5 i- r" Z8 v" E item. Configuration items are traceable to the work breakdown structure (WBS). ' j* u* J6 g, C! ?8 N6 @) [Configuration k+ ]# L9 ?# X Management7 {4 c& d1 s9 e6 K6 u* v5 j5 _ (CM)# S8 a) z% e0 _5 Q0 G In computer modeling and simulation, a discipline applying technical and2 ^9 R d5 r0 L# w% v( h8 F administrative oversight and control to identify and document the functional) n( s, `- H( P/ X1 a( s7 Q3 T requirements and capabilities of a model or simulation and its supporting% Y8 ? e/ k: l# I0 {8 f6 L0 z databases, control changes to those capabilities, and document and report the k+ F# m3 ?1 S, Q7 g1 _ w changes. See also Accreditation.+ S" M7 x. f4 ^2 Q7 _; m CONOPS Concept of Operations. 3 L7 o- ^. C9 N, CCONPLAN Concept Plan 3 N4 C4 E5 |% K9 K- I9 l [3 @CONS Contracting Squadron.4 M! P t5 D+ u, e* { Consolidated , N T' K# B2 \1 \. S2 v( SCommand Center% V$ H/ f d) B* q& e% H. }( a4 } (CCC) + X m6 ~, m; ]. DA single command center from which USCINCSPACE/CINCNORAD can direct all & l# F9 H T- ]5 S! V7 U. jhis assigned missions, to include BMD. (USSPACECOM) Located in Colorado. F' P g8 K' [1 U2 L Springs, CO. " x& }' C( s* X7 {Consolidated' u8 }4 c6 A& H) Y Intelligence / x2 B2 {9 x2 M- L ~3 F; j! q* b# @Watch (CIW) * \" o+ N7 G1 ^' o" x8 u, C7 QA consolidation of intelligence watch functions within the Intelligence Operations9 p# i6 L1 J$ t% L+ u Center (IOC) consisting of the USSPACECOM ITW Center, the NORAD! A8 c: j$ _! `1 T1 H8 c Aerospace Defense Intelligence Center (ADIC), and the Air Force Space. q6 M1 e% o) J3 Q6 o2 \( y Command Space Intelligence Element (SIE).! V, d% o) Q+ k% f* P4 \9 a Consolidated% j1 r3 n% h7 x4 P) I( O6 D( b& s- E Space' G9 m( T, h' J Operations8 d, A# S9 a. O5 M; }) w Center (CSOC)+ p- a" o! b7 s. g5 P Series of centers at Falcon AFB, CO, which operationally control and maintain) t; ~7 S, k9 e& z% f assigned DoD satellites. 7 K6 S6 U+ M8 yConsolidated 2 j9 {9 \& C1 `. N" c! h, sSpace Test ) W8 K3 c* Y6 T3 DCenter (CSTC)' U6 n2 u3 [( o/ K Series of centers at Onizuka AFB, CA (Sunnyvale), which support launch and: V2 K |6 h- B initial on-orbit checkout of operational satellites, operate R&D satellites, and+ `& D4 I# ?' c! `# s. y serves as a backup to CSOC for operational DoD satellites.6 z( Z2 n& M1 f$ [3 r MDA GLOSSARY, VER. 4.0 C8 E$ g) q# k* h: V$ V- c% o 60, ~* b# G" w( m' p4 F Constellation! S) A2 }7 A7 Z# z* t) {4 S Size (CSIZE)2 }+ l8 o" N% Q The number of satellites of a particular system placed in orbit about the earth.% i: j3 s0 `& V7 j% m Contact Fuse Device used to detonate warhead on physical contact with another object. 3 y& k6 i9 `# b/ `+ S; EContingency2 s6 f# K) ^* n! E& S7 ~4 k, f4 ` Deployment Plan 6 ?1 y4 |6 k% `( f(CDP) 8 D* B0 ^- K' r4 r( LAn executable plan designed to deploy an early missile defense capability and" w2 c+ x- ^, j reduce deployment time. The plan provides specific executable deployment% Y6 m" j j) D) ~ options and describes activities required before and after a deployment decision.2 N( N3 \3 v( w) s The plan also allows decision makers to have oversight on technical progress,& F6 Y2 S9 w% y1 b cost, schedule, and risks associated with a deployment system. ' |3 z- k) B! l& q( P: e6 oContinuity of' K* B' g! _, u6 c* e Command & p* {, @; f) v0 ]+ M2 aThe degree or state of being continuous in the exercise of the authority vested% W$ S' T6 `( C% g8 r+ ]' m# Q in an individual of the armed forces for the direction, coordination, and control of7 m0 L1 }, G' _ military forces.' H6 t t# ]8 z$ r) y Continuity of 5 X1 _: b7 |' W" W. xOperations . R' a6 O, D$ ^- |9 nThe degree or state of being continuous in the conduct of functions, tasks, or5 `+ G/ W6 ^: x( u1 [3 L- x duties necessary to accomplish a military action or mission in carrying out the% Y" `/ K) I$ u: V) M national military strategy. It includes the functions and duties of the commander,6 v9 S* l. i8 V1 S# V as well as the supporting functions and duties performed by the staff and others( ?8 d5 }; x V8 U1 t acting under the authority and direction of the commander. * N) w, M( ]3 j* ~, uContract 9 T. X7 m$ i+ I& K) k3 GAdministration, I9 ^% h) l$ y( |) A Office (CAO) . }3 y+ d' z* N" F; @, }2 ]The activity identified in the DoD Directory of Contract Administration Services 0 R8 N6 i* u# Y3 c8 q) XComponents assigned to perform contract administration responsibilities. It is a, R) t- Q/ ~% ?+ u2 w* G3 o general term and includes Defense Contract Management Regions (DCMRs),9 I Z8 i( u8 n. ]. p% }5 G Defense Contract Management Area Operations (DCMAOs), and Defense Plant6 s3 s7 T( u9 \0 c Representative Offices (DPROs). (Defense Systems Management College9 q3 m2 x( [! W4 c Glossary)2 s& l& n) b, u* h1 ~5 j; y9 \; D& x Contract Data $ z) s3 |% ^$ r! F7 iRequirements % \4 y* w& O- O% v9 h: \8 B( l' _- R8 nList (CDRL) 4 t( p4 |& Y$ G& vDocument used to order (“buy”) and require delivery of data. Tells contractor& I# y0 P, l& p- `$ D3 C- n what data to deliver, when and how it will be accepted, where to look for 0 s* @& u4 _5 \! H8 _1 qinstructions, etc. 7 a3 z6 G. t0 ]) o0 c- n- LContract P' W6 ~7 I, k; {* e6 g8 vDefinition, W6 V V0 o6 G8 J0 {+ [5 Y7 b! j7 A A funded effort, normally by two or more competing contractors, to establish2 S! \ j8 M( s8 x2 |( E specifications, to select technical approaches, to identify high-risk areas, and to 3 }* ?' J$ H/ C M5 L. y( t' Lmake cost and production time estimates for developing large weapons systems.6 _6 y% l* Q* g$ l+ q Contract Work% Y y9 a. I1 c1 B! g Breakdown $ \( {' h# o Z8 R! r# ZStructure! ]4 S8 B$ v. r& C- ?# q The complete WBS for a contract developed and used by a contractor within the7 a: v( r& }3 {$ G/ r guidelines of MIL-STD 881A, and in accordance with the contract statement of6 X6 U6 B% P- a; N& |4 J work. " i: { F- f1 ]3 N3 kContracting 6 B$ g, W- y/ z. C& \3 D. gOfficer (CO) & Z; n/ r2 d6 O% sA person with the authority to enter into, administer, or terminate contracts and . \4 r0 B' J- i/ `$ M/ @make related determinations and findings. The term includes any authorized * S' H& w9 i4 Drepresentatives of the CO acting within the limits of their authority. A CO whose / n/ u ]3 d7 ~* k, T# i4 vprimary responsibility is to administer contracts is an Administrative Contracting4 K# q, s- V+ F2 N! E" n/ a Officer. One whose primary responsibility is to terminate contracts and/or settle 4 `5 r' h1 R% k* I0 z5 c: kterminated contracts is a Termination Contracting Officer. A single contracting * K" T/ H" H. h3 c5 I! v; Hofficer may be responsible for duties in any or all of these areas.1 l8 T9 n0 ?$ ^) y! Z9 m7 i Control Authority that may be less than full command exercised by a commander over E; R; X+ R: zpart of the activities of subordinate or other organizations.! E8 V4 ~# s! X& K Control1 x1 P' T- s a Abstraction, J# _% Q9 w" H: m (Software) The process of extracting the essential characteristics of control by1 x$ Y/ x: z$ h( a, d defining abstract mechanisms and their associated characteristics while ! f* [0 X& p8 e0 P6 S T8 Ddisregarding low-level details and the entities to be controlled.

使用道具 举报

Rank: 9Rank: 9Rank: 9

32#
发表于 2008-12-25 20:02:52 |只看该作者
MDA GLOSSARY, VER. 4.0 C+ f; |. ]0 [- l. D4 g$ p) c 61- ^4 T. k- g1 u Control and1 J. j0 {! o0 w( l# A) r Reporting Center3 q& o' f- w0 a( Y( e2 k. a An element of the US Air Force tactical air control system, subordinate to the 5 y1 ?3 {5 Z2 \! t, Ttactical air control center, from which radar control and warning operations are 1 g; L7 z: y7 m( l, [conducted within its area of responsibility.: w6 t; c b' u& R9 L Control and # R% o# p' W( `1 _+ v1 J% gReporting Post" _; R% A* _8 Z- d% B5 q- O2 d An element of the US Air Force tactical air control system, subordinate to the / E5 W8 S) l2 V! H( @/ Vcontrol and reporting center, that provides radar control and surveillance within 3 a+ y6 x; v Nits area of responsibility. 6 a( y* ?3 ~ \Control Area A controlled airspace extending upwards from a specified limit above the Earth. a5 r& B8 l0 |3 j- ?& _7 q Controlled ) g9 `% H, T8 v- O' xEnvironment& T; @" J: k8 y0 A& x3 K Area where entry into the radiation hazard area is controlled.) W$ d( U7 L- `1 w Control! d9 }, [) |1 i& C1 P& c; _7 j% ] Procedure' S& |6 k* H9 h4 v1 ` The means used to control the orderly communication of information between' K+ \/ n& x: T$ V: Z stations on a data link. Also called line discipline. ; a2 Q: N8 L+ v- m3 o# |) KControl Station The station on a network, which supervises the network control procedures such / u& k! } @. a3 A2 E6 Ias polling, selecting, and recovery. It also is responsible for establishing order $ G, Y( _4 O6 c+ F0 W2 con the line in the event of contention, or any other abnormal situation, arising & Z1 j: S! V! ^& j, [between any stations on the network.+ [ \0 b4 B, i( K1 C3 c n# a Control Zone The space, expressed in feet or radius, that surrounds equipment that is used to * z9 T: x0 T$ v V9 X5 uprocess sensitive defense information and that is under sufficient physical and 5 W) D1 S1 w; P; J, Jtechnical control to preclude an unauthorized entry or compromise. 7 P0 j# R# L) }1 n$ RCONUS Continental United States. 7 C5 O& h( }3 r/ w8 {8 c: \Conventional Co-0 h7 C0 z2 g" H1 G& U8 G3 x! m2 R4 i Production; h, P- N4 {5 J An effort between governments to produce the same end item, or components( b8 }* c% t4 q' n5 Y of the same end item, in concert.* q4 d) \6 Y% o; U r1 O. c) d0 C Conventional5 l; c7 q+ C& {' w- u$ b0 { f$ e Weapon' k5 c$ c( M7 {5 ` A weapon that is neither nuclear, biological, nor chemical. ; D- F+ G/ D3 {- gCoop Cooperative+ u: M. W- P: V) P% `( Y Coordinated ! b9 n% b. i- ZEngagement 2 ~8 o3 U# \ ]1 {, t: }( `% t! {; dPlanning/Actions # E8 Q. O, Y+ ` S0 }! y! KNecessary coordination among engagement components to ensure maximum; X0 F4 p0 l7 n& @* F effectiveness of the SDS and resources are not wasted on targets already 0 |' |. M- j- P% i0 o1 Ltargeted. 7 m+ Z+ g' v. s% Y% h) F ?- \Coordinating 9 k* W* T2 R/ S* I- MAuthority ' G. I6 M- }0 A7 w0 c, v& }A commander or individual assigned responsibility for coordinating specific & B' C+ w" ]1 c3 a0 T& @functions of activities involving forces of two or more Services or two or more0 t" H& T3 k# b/ E& v forces of the same Service. The commander or individual has the authority to- Y6 W$ F4 |8 h5 e1 O require consultation between the agencies involved, but does not have the1 H8 Z7 c* ]+ t& Y5 G. m! g% m, ^ authority to compel agreement. In the event that essential agreement cannot be% h% [! D2 t- {" m+ I9 T reached, the matter shall be referred to the appointing authority.& S) x9 \0 `' {% ^ COP Committee of Principals1 C. s; ^4 y3 X5 Q# O! r' g COR Contracting Officer’s Representative. Contracting Officer. ! \' a; i3 M4 K+ HCORBA Common Object Request Broker Architecture., N8 b9 @* [) e% ]; y CORM Commission on Roles and Missions. % n% @, T+ Z8 M3 S0 IMDA GLOSSARY, VER. 4.0 C' U# ?) C/ b6 o) i 620 f3 O+ x- R, V$ O1 o, n Corner Reflector (1) A device, normally consisting of three metallic surfaces or screens: o, Q- e& t$ S. Z5 Q- x2 K perpendicular to one another, designed to act as a radar target or + d/ e u& N* T3 r0 O& r4 |marker. & Y9 m& C6 H" `2 O(2) In radar interpretation, an object that, by means of multiple reflections . K* v+ I5 \, Q7 s3 y1 \. t% |from smooth surfaces, produces a radar return of greater magnitude than V% W( r; D7 j/ I might be expected from the physical size of the object. : h% N& [8 i$ k, z! C' i# d( aCorps SAM OBSOLETE. See Medium Extended Air Defense System.0 j) j6 L0 n5 N8 Y9 Q3 } Correlation (1) The process of relating observations or tracks from one set of data to7 I! d& [; d. g) C9 i& q4 I observations or tracks from another set of data, i.e., collecting data from . a( t% m& r3 r0 t4 x3 Gdifferent frames or sensors that presumably relate to the same target. (2)' W% d5 @' G! M- k$ ]6 S In air defense, the determination that an aircraft appearing on a5 L n- ]/ i/ f* G radarscope, on a plotting board, or visual is the same as that on which7 u3 R6 ~* Y& |8 |9 i5 w# s4 l information is being received form another source. (3) In intelligence- W& u! z( m% {1 n5 v$ o usage, the process which associates and combines data on a single7 V2 q- l" j [6 W. t( B5 G4 q entity or subject from independent observations, in order to improve the- C/ S w) F* z reliability or credibility or the information. 5 y, p& \- z3 PCOSEMS Evolving architecture operations support tool. . T D: Y: _1 D/ ], SCOSM Computer System Operator’s Manual3 w( S x3 [) t. q4 W0 Y) F COSMIC NATO security category. ! D5 ~3 S7 d) r( i7 D, f6 OCost Analysis 4 z8 L* y5 [ f2 _$ _Improvement , r7 p; s3 ?7 h# T& x& iGroup (CAIG) ' `( v2 F* d, u UAn organization within the office of OSD Director, PA&E which advises the DAB & f0 `- j# C! z" i x$ D& hon all matters concerning the estimation, review, and presentation of cost ) L! Q4 b; \# `7 e9 @7 V7 J2 Fanalysis of future weapon systems. The CAIG also develops common cost/ U4 O4 P, R4 W estimating procedures for DoD. - j/ V2 i$ t) n5 _( B$ P, oCost Analysis7 w, D0 w$ t$ ? Requirements% S. L$ m. M4 E' i: R; Q Document & p' m' {; _* ?$ M6 H3 Q(CARD); X: V! H/ {5 S' q0 \' H$ T The document describing the technical baseline, which is a subset of current9 l- z; I" Q8 l: [3 e, d B system technical data and is used to generate the baseline cost estimate for an % j r0 p% b% u# ~SDS element. It includes, but is not limited to, the element description,2 l9 M# h$ f/ h4 A interfaces, operational concept quantity requirements, manpower requirements,; V1 M! O. U' T n activity rates, schedules, research and development-phasing plan, and facilities/ [0 O" O6 \$ m+ b& X) f9 r requirements. " I. n' |7 a, y. G6 q7 SCost and, p- T' @3 ~2 l6 b* g+ n4 w Operational7 S0 L/ }& H: h+ C' {( _0 C Effectiveness# B% G% ~; L" {+ U Analysis (COEA)& j3 [3 g& @* q# K8 Z5 D4 H, M+ S An analysis of the estimated costs and operational effectiveness of alternative ( K# h( b, W3 M5 |materiel systems to meet a mission need, and the associated program for- Z9 x1 N) z: u% X# n acquiring each alternative.; ~( p, ~$ S& ] \8 P5 e Cost Risk Cost estimating risk and schedule/technical risk. Cost estimating risk is the risk . r) g0 f. R$ ?due to cost estimating errors and the statistical uncertainty in the estimate.* ~' H, l0 S1 ~* ` Schedule/technical risk is risk due to inability to conquer the problems posed by ! ]/ S- N. g0 |the intended design + N' s1 f9 o; @) l, ACOTR Contracting Officer’s Technical Representative. See Contracting Officer. 4 W! B' g: Y, ICOTS Commercial Off-The-Shelf. ; P9 [( f6 Y4 h( @ `1 k5 u9 N3 ECounterair A US Air Force term for air operations conducted to attain and maintain a desired & f, l7 {, V5 O, Z# Ndegree of air superiority by the destruction or neutralization or enemy forces.# b5 Z/ \& ^" g4 h; N$ ] Both air offensive and air defensive actions are involved. The former range1 r" B1 V9 z# b4 } throughout enemy territory and are generally conducted at the initiative of & A% Z/ k' V! Jfriendly forces. The latter are conducted near or over friendly territory and are ; H& \4 |- u7 t. o6 H. z9 F# i. Mgenerally reactive to the initiative of the enemy air forces.6 O; P1 g: U2 ^; \% {6 k) \ MDA GLOSSARY, VER. 4.0 C # ]( s$ P- ~* b3 e63 ; v8 U" F. T! i/ ~# kCountercountermeasures ! P. D' t- D' n- [( R(CCM) 3 \- {- |- q* E3 GMeasures taken by the defense to defeat offensive countermeasures.7 ?" P; d& L7 g+ u Counterforce The employment of strategic air and missile forces in an effort to destroy, or ) L; @. ]: t3 ]+ U, k6 S' u: _render impotent, selected military capabilities of an enemy force under any of the ) G' @9 X$ D! v; U8 u1 ycircumstances by which hostilities may be initiated. Y% Z' w+ K9 Z0 \4 sCountermeasure A design or procedural measure taken against covert or overt attacks.: H6 W* s; o; q Countermeasure $ X! i# `7 h) U! r. T+ ~% \! d' qs (CM)( z+ s4 Q# s. B5 S c! i% E: P# e That form of military science that by the employment of devices and/or/ L% g, |- L$ C: p4 L2 y+ r6 V techniques has as its objective the impairment of the operational effectiveness of3 B6 W; p: ]% }$ h enemy activity. $ I. z2 c; ?" B; |# {( n* yCountermeasure 1 n1 A& R1 M3 v$ _4 Ys Rejection - B: Z# M) R J(Surveillance) * S4 ~0 D4 i( H, HImprovement or rejection of an object signal in the presence of2 D) A, D+ a+ G; {3 [* b countermeasures. 5 u) J- A2 W6 C9 }; K+ OCourse of Action3 Y9 O0 _ N q (COA)! Z5 |% {/ Q' Y( M' M& B (1) Any sequence of acts that an individual or unit may follow. (2) A possible . D3 q+ M9 J9 f$ K( Kplan open to an individual or command that would accomplish or is$ A) u! f/ ]* g5 z related to the accomplishment of his mission. (3) The scheme adopted / t# b! a- M% c" h2 Cto accomplish a job or mission. (4) A line of conduct in an engagement. ( S) n) {- }* o) ^(5) A plan to accomplish a mission. It describes the execution concept4 F( z; [& ~" j; m; { for BMD of North America. It will specify the engagement priorities, q; {8 n7 v% T" Nresource allocation and desired results by Area of Operation (AO).6 P* M1 k4 C8 ?0 I (USSPACECOM) (6) The scheme adopted to accomplish a task or8 d9 f4 J1 j# a1 G mission. It is a product of the Joint Operation Planning and Execution" q8 o; t) B8 v {! o# f System concept development phase. The supported commander will' v: f; q6 s- z) }- X include a recommended course of action in the commander’s estimate.1 y# w" @% g& @' C: z. W, l0 M: M The recommended course of action will include the concept of 5 X; x4 \0 ]2 o. `operations, evaluation of supportability estimates of supporting: Z/ X" @9 W5 w% i" B4 K! t organizations, and an integrated time-phased data base of combat, 6 W/ C% ?0 r! Tcombat support, and combat service support forces and sustainment.( r( `& s6 q1 L Refinement of this database will be contingent on the time available for5 c9 k! X( f6 `3 e2 t course of action development. When approved, the course of action # S7 v+ A& e6 r" V$ l7 A2 N! B: Vbecomes the basis for the development of an operation plan or2 V' v) f9 v8 B" k. L& ~: i" R* \ operation order.. I' }' |: G0 Z! M' g7 K9 Z Coverage (1) The ground area represented on imagery, photomaps, mosaics, maps, : [! d3 i/ ]6 Q; H% V. c. Q' dand other geographical presentation systems. (2) Cover or protection, as / w) s2 ?" f1 x, Qthe coverage of troops by supporting fire. (3) The extent to which# n5 ?8 @$ g8 K/ O$ }, G intelligence information is available in respect to any specified area of, J: c/ e& H- ~& m' q1 j E# a interest. (4) The summation of the geographical areas and volumes of / t5 t2 R1 w6 P7 A7 c( K$ p7 @" Q9 maerospace under surveillance.8 o& ~( X1 [* J& q+ T0 n Covert Timing( V! w) y3 ~ n! K# o Channel 5 B3 s& M1 s' |" B8 ^$ @8 Q9 pA covert channel in which one process signals information to another by+ Q& ^) m" C6 p* y+ d# Q; ^ modulating its own use of system resources in such a way that this manipulation# E d3 f) m) N- S$ @ affects the real response time observed by the second process. % b9 V2 S0 _( g" m5 W2 J" ECP Command Post.7 H+ K( }" Y3 ~* q. @ J CPA (1) Chairman’s Program Assessment. (2) Closest Point of Approach. , J4 L& s8 c7 O9 F0 T" R8 uCPAF Cost Plus Award Fee.& T% t2 X' c% { CPAM Chief of Naval Operations Program Assessment Memorandum (Navy)/ ^: E6 j& n P+ t9 E9 P: V MDA GLOSSARY, VER. 4.0 C 1 H2 D! D) [ _' y( q640 C) Q! K; ~6 E1 n1 O9 V: C* R% T CPAR Cost Performance Assessment Report. + w# t5 ^, L* q; e% v" zCPAT Critical Process Assessment Tool 2 ?8 d$ `6 L4 W& C! `CPB Charged Particle Beam. * \9 k5 f9 h# A& b, I% W1 xCPEV Communications/Processor [Network] Experimental Version. 5 F; A Q/ b6 [: O! a7 ~CPFF Cost Plus Fixed Fee. $ k/ U; S$ I9 z) m! E. xCPIF Cost Plus Incentive Fee. # Y% P4 X/ |4 @CPIPT Cost-Performance Integrated Product (Process) Team.7 I2 W* P; D9 e CPM (1) Critical Path Method. (2) Contractor Performance Measurement. 0 S' b9 ~5 `( iCPP Critical Performance Parameter. ' j! o' {. ]% D2 ^# nCPR Cost Performance Report.* {. f7 S+ V, [; p9 @ CPR/NC Cost Performance Report/No Criteria (Contract management term). 4 X8 \0 X" g9 X2 U kCPS (1) Consolidated Program Summary. # u( c. y0 R; q& b- j(2) Competitive Prototyping Strategy. . b8 v \. ^- C! w2 y3 i% a7 h! ~(3) Current Program Status. f" j, x) l: t1 \5 y$ y; K CPU Central Processing Unit (TelComm/Computer term)., A/ H8 Q0 _, p3 F4 D( S$ o CPX See Command Post Exercise. : R s8 @+ F1 b* I$ ^5 oCQAE Chief/Contract Quality Assurance Evaluator.' T6 c8 B6 W% L4 Q' d% e CR (1) Computer Resources. (2) Continuing Resolution (US Congress term). - I$ C9 m* S7 ?" n# ^CR-UAV Close Range Unmanned Aerial Vehicle. ( d0 h! L" p$ c9 {. P$ k; j6 vCRA (1) Coordinating Review Authority. (2) Command Relationships Agreement " l" K* z" z2 gCRADA Cooperative Research and Development Agreement. ' Z$ ?9 y- b: X0 LCRAM (1) Control Random Access Memory.1 i" ], _0 l5 S3 L (2) Cross-tie Random Access Memory (Computer term).' E6 U3 }, n" Z$ k5 d CRB Configuration Review Board.9 Y2 F q ~1 ^5 A' r) |& ]5 ]1 a+ e CRC Control and Reporting Center." \6 [ {! o6 P2 } CRD (1) Capstone Requirements Document.5 y8 h5 D: d5 S+ y) A" o2 a (2) Component Requirements Document. + D+ z# U; @0 t5 s! aCRDA Cooperative Research and Development Agreement.5 I. {% V- N- X8 c4 g, o* ] CRG Communications Relay Groups (PATRIOT). 2 @5 _* T+ U. `4 ZCRI Classification, Recognition and Identification. 9 v, V& Y4 J" W$ \3 K5 KCRISD Computer Resources Integrated Support Document

使用道具 举报

Rank: 9Rank: 9Rank: 9

33#
发表于 2008-12-25 20:03:12 |只看该作者
MDA GLOSSARY, VER. 4.0 C 3 r& J9 u, ?! d65 7 i, y6 p3 J; D& f" t; GCritical Design$ `2 |6 a6 Z, D: d7 C Review (CDR) 4 U% Z- \* W7 U* i' T. o5 RA review conducted to determine that the detailed design satisfies the 4 L7 i# w) R: E) N% l& v) Uperformance and engineering requirements of the development specification; to" I) }. q! e$ ]2 `( _! q- H establish the detailed design compatibility between the item and other items of9 a9 a' b6 M9 F$ f Z equipment, facilities, computer programs, and personnel; to assess producibility l" D2 N( ?! l( @% V and risk areas; and to review the preliminary product specifications. Conducted8 }. o$ R* a, ^, R1 { during Phase I, Demonstration and Validation (for prototypes) and Phase II, # r# W& x9 i* \7 Y, l' a5 r- e3 [Engineering and Manufacturing Development.2 @, E% Q, U. `% V* l Critical 4 g) W3 o0 W& R, QInformation - N: Y7 T. u: ?6 LSpecific facts about friendly intentions, capabilities, and activities vitally needed $ Z4 k0 s: N, ]* Q& qby adversaries for them to plan and act effectively so as to guarantee failure or" @) n0 e; }# |' b8 B4 S; r: ` unacceptable consequences for friendly mission accomplishment.* T% P( h( X) j Critical; M% W! P% Y( g( F* \ Intelligence 2 ~- F5 q4 U) s, Z0 cParameter & x- L2 e# y8 d* S( E+ d- S) I; sA threat capability or threshold established by the program, changes to which 5 F5 j( F" z* U% F3 @( W# ecould critically impact on the effectiveness and survivability of the proposed; S9 A0 R9 D( L# Y2 t" [7 @ system.& m& A0 ~" R, ?8 n) x Critical Issues Those aspects of a system’s capability, either operational, technical, or other,# Q/ x; S \, f1 z, S. l/ y that must be questioned before a system’s overall suitability can be known, and 8 l2 a; s: Y/ a/ v E! Nwhich are of primary importance to the decision authority in reaching a decision . t% G) Z! ` J& a8 Cto allow the system to advance into the next phase of design, development,8 O* l8 Z2 B6 o- d! L' H production, or post-production." f5 \; F3 Z# H: Z9 q Critical 4 U0 M- G5 k" e& NOperational ; R# F9 }' o Z8 S# ?+ IIssue6 c5 {* T/ e5 w9 e& \. M A key operational effectiveness or operational suitability issue that must be : q% n' w# M8 y9 m* q& X! L4 zexamined in operational test and evaluation to determine the system’s capability' t% g7 E: y7 G6 C( Y2 I5 v to perform its mission. A critical operational issue is normally phrased as a' G5 Z' }3 E# [& {6 ]! `' Y question to be answered in evaluating a system’s operational effectiveness & X: K1 o' F: s6 a5 Vand/or operational suitability." }$ B& h" B( S( C: }2 \ Critical Path , j+ N* F' I0 V# aMethod ; X. v2 \ n3 g' [$ J* f/ P8 aA technique that aids dependency of other activities and the time required to ; ~1 ^$ u- j$ W+ w1 Ycomplete. Activities, which when delayed have an impact on the total project6 e' L6 d6 E+ H- T" k. n schedule, are critical and are said to be on the critical path. 2 K l! Q7 f zCritical Risk The existence of a vulnerability that could cause exceptionally grave damage to) a. {' D/ \% Q; R2 y the viability or the operational effectiveness of the SDS. $ b9 y w8 d( u" r! a; v% c, l) J) fCritical Security 1 c5 p- d9 @$ Z, @. B+ VRisk $ a% Z+ p* C. t, ?8 J+ ]The existence of a security vulnerability that, if exploited by an adversary, could" K6 L$ S; T5 {2 p2 Q cause exceptionally grave damage to the viability of the BMD or the operational9 e9 e" g6 V$ \9 [; l7 r effectiveness of the SDS. Critical risks assume an adversary’s capability to t3 j6 F, b; I/ R- W) hcause major system disruption or degradation (e.g., single point failure),, w! K1 C$ M e( M* _; O; N2 l destruction of mission-critical components, or usurpation of system functions. & g2 }- t7 ^$ J. f+ J G a3 xCritical6 s& h6 y! x* o Supporting( K/ r" \' F& D Technology+ `$ i! _& J8 [, M' E, R& c A technology that program management personnel consider a critical part of the% x+ B$ |1 ?2 D. i. r. ~ program being described.6 \" B. T c$ K, _& Z9 W% w5 j CRLCMP Computer Resources Life-Cycle Management Plan.0 y1 e* U! v7 X7 j, E% w& X5 q CRM Computer Resources Management. . A( [5 V! {! }CRMP Computer Resources Management Plan. 8 a% {6 i3 h) S" q* kCRO Chemical Release Observation.: s$ }0 n0 z3 Z' s* u/ U+ {( ~ CRP (1) Command and Reporting Post. (2) Control and Reporting Point (JFACC% Z( n5 S5 }8 D5 ^+ }1 N+ M term.) + e1 V4 E j% ?: kMDA GLOSSARY, VER. 4.0 C ' Y) Z/ @+ b6 g: i2 ]. A; a66' F6 q0 Q; m! x; X) A- C9 W2 }# J/ b& ~ CRS (1) Computer Resources Support. (2) Congressional Research Service. (3). z) v) K& G" V6 O Contractor Reporting System. 9 o8 g v+ J# I6 t; ?6 k) ]CRT Cathode Ray Tube. & }3 q1 ^8 Y2 ]CRWG Computer Resource Working Group.* D7 b- U3 m; B) D* F Cryocoolers Cryogenic Coolers.; h }4 R* |0 l0 N$ h0 y Cryogenic Of or related to cryogens (substances which are used to obtain low5 n4 f8 B) u( ]# q& W' u temperatures).; i* m/ t7 t7 ?% Y9 n2 | Crypto A designation or marking which identifies classified operational keying material, z. Z' N* m8 E) c8 s5 x0 Rand which indicates that this material requires special consideration with respect " u M! J' L3 ~& r' {to access, storage and handling.5 T4 y v; H# F: G. x0 M Cryptographic' \. l5 S! Z8 X: k, t System 7 S) {3 K' K1 S1 M. O. UThe documents, devices, equipment, and associated techniques that are used. e5 p+ A( u6 @) G! K) X as a unit to provide a single means of encryption (enciphering or encoding). 4 S( N' q7 G% t4 L4 _Cryptology The science that deals with hidden, disguised, or encrypted communications. It% Q9 _8 t4 |/ C% ?; Z includes communications security and communications intelligence. m5 r+ f4 Q4 e7 K) t; wCS (1) OBSOLETE. See Corps SAM. (2) Contracting Specialist. (3) Contract Start.( J8 s8 [: v( ]* i CS/CSS Combat Support and Combat Service Support (USAF budget term)., u' O9 w- @: m9 d CSA Chief of Staff of the Army.5 O% N( ~2 F6 r' P) H' Q CSAF Chief of Staff of the Air Force. 4 X2 T; S* q) I; J" FCSC Computer Software Component.% B6 `+ ]" f- Y$ Q3 r CSCE OBSOLETE – Conference on Security and Cooperation in Europe. (See OSCE)/ w% U- s- [" A' O0 H CSCSC Cost/Schedule Control System Criteria. " x/ I% ]1 Y3 T! H) U) }CSD (1) Constant Speed Drive. (2) Critical System Demonstration. . j8 c+ q( N' F7 ?* X; i LCSE Center for Security Evaluations (DCI). : f* Q, r% N( _CSEDS Combat System Engineering Development Site, supporting the AEGIS Weapon \7 V) I( l# @System, located in Cherry Hill, NJ.3 O2 W# N" W: `0 ?& u' ?- j CSF Consolidated Support Facility, Arlington, VA. # @' [+ J/ S( I# x# _7 M3 WCSI (1) Critical Safety Item. (2) Critical Sustainability Item. 6 i M, Z) Q) _# L$ m3 K/ Z, vCSIP Current Systems Improvement Program.) U1 _2 [6 B9 a$ y9 t. { CSIZE Constellation Size.$ o2 S: e" `* j6 \3 z; @- ] CSL Computer Systems Laboratory.( _) P) Z9 z3 L. Y. Z CSM (1) Core Support Module (*C2E term). (2) Communications Support Model. ' g( q! s- ], t) g5 v% \CSNI Communications Shared Network Interface (NATO term).) k4 ]* u" r3 ^! Z3 n" G9 q2 |( a8 C MDA GLOSSARY, VER. 4.0 C; R4 |' L! g' _2 x m; M7 G 675 u* t( t% X" v& L% L# V2 V) P CSO Closely Spaced Objects.1 f! k, e- J1 t# m. V3 i: W CSOC See Consolidated Space Operations Center., ^* F1 {' c/ Y2 C CSOM Computer System Operator’s Manual 7 A6 R( ~. b7 m1 FCSOSS Combat System Operational System Sequencing 4 c! n7 K% q+ T- R/ Y2 F' o! d% \' YCSP Communications Support Processor (numerous locations, including USAF Air " S, D# c2 o; U6 U2 pDevelopment Center, Rome, NY term)., @) z, S7 e+ C% @$ y" N CSRD Computer System Requirements Document. 1 j0 Q! x4 b0 i% sCSS (1) Cooperating Space System. (2) Communications System Segment. (3) + }& Y& S9 T" T9 [! _2 YContractor Support Services. (4) Common Sharing System. (5) Communications % J" I5 N( n' L* p3 z9 NSupport System (Navy term). (6) Common Support System. (7) Combat Service% ]9 _5 H& L0 A9 ]* }* d" I Support. 5 n1 H6 L' B0 U8 q7 G4 v! ECSSCS Combat Service Support Control System (USA term).0 r1 e1 d. b. J& _9 O CSSPAB Computer System Security and Privacy Advisory Board. 7 C6 Z/ a. \& h5 kCSSO Computer Systems Security Officer./ l# J4 |+ E( Q% ?9 R9 O+ h; M CSSTSS Combat Service Support Training Simulation System (US Army term).0 i5 P8 l3 i! S: |5 X, x CSTC Consolidated Space Test Center.2 n+ ]# B* c* u5 b CSTI Civil Space Technology Initiative.. ~. `4 ?% Y' ]* h% b; _/ Y CSU (1) Computer Software Unit. (2) Communications System Utilization. / |& d6 u* m' d) kCSUR Communications System Utilization Report.7 T) s9 x1 a k8 Y- Z CT (1) Counter-terrorism. (2) Communications Terminal. (3) Control Telemetry.2 P' L; G8 V: a1 z; J2 e1 b: I3 x (4) Cryptologic Technician (Navy occupation specialty). - f9 z9 ?5 o+ w# W" }CTACS Contingency Theater Air Control System (JFACC term)., k1 Z3 m/ v* u2 H CTAPS Contingency Theater Automated Planning System (USAF). % E9 a+ n" r3 L! aCTB (1) Communications Test Bed. (2) Comprehensive Test Ban [Treaty term].2 ^' j9 t/ T$ x$ S- m* \ CTBM Conventionally-0armed TBM. ! Q5 d. V% [" k/ g! ?, I3 PCTC Combat Training Center, Ft. Leavenworth, KS.1 V2 t7 L d$ @+ `- Z CTCC Critical Technology Coordinating Committee. / p! M$ v8 N3 ]CTD Communications Test Driver. 9 g! P" @! k5 K3 I, @$ M$ O8 kCTE (1) Center for Test and Evaluation (JIEO term) (2) Common Test Environment.8 N) b) [# K6 V( U4 B, t$ i CTEIP Central Test and Evaluation Investment Program. A DoD program for centrally & R) K* v( u! R2 B( j4 Zfunding selected test investments proposed by the Services and Defense8 U: O3 I& _1 F o' K; y Agencies (including MDA).

使用道具 举报

Rank: 9Rank: 9Rank: 9

34#
发表于 2008-12-25 20:03:26 |只看该作者
MDA GLOSSARY, VER. 4.0 C) @8 a( v/ H2 V; U, {7 z) [. b 683 B% f/ K- B d) l CTF Controlled Test Flights.% j% q' q. B8 V) Q9 Q CTI Concept Technology Insertion." q8 G& u) y, s3 z! m8 F CTN CALS Test Network. # D2 A% I+ ?4 C) X4 I4 {CTOC Corps Tactical Operations Center. 1 J& O! i7 ^. ~$ e& e( k0 o7 P- CCTOL Conventional Takeoff/Landing aircraft.. G3 Z1 }+ ~- v i' s3 ^' B- b* Z CTP (1) Critical Technical Parameters. 4 k+ d: h! h0 B! D6 N5 E: V( i- ?(2) Communication Tasking Plan.) f6 X9 Q/ f! x2 w' x" S" B3 V (3) Consolidated Targets Program.5 O$ K# e9 z0 t% ~ CTPE Central Tactical Processing Element. 7 n2 _8 ^) @7 D m. oCTPP Consolidated Targets Program Plan. ) b7 h; G+ q7 j, M: S: rCTR Cooperative Threat Reduction (Treaty negotiation term). 8 V- n5 U2 P9 o, H' e8 aCTRS Centers 8 G3 l. V3 I6 l3 u- a2 w9 JCTS (1) Clear To Send (TelComm/Computer term). # t3 ?! Y w; [1 T5 a a/ n(2) Contact Test Set (USA IFTE term). 9 {- L; K. T/ KCTSS Computer and Telecommunications Staff. * h) X% D3 E8 A1 Q9 y6 bCTT Commander’s Tactical Terminal (US Army). + r) k+ c- h/ A, D/ O- A) E* _CTT-H/R Commander’s Tactical Terminal –Hybrid Receiver (USA term). " Y7 U# K6 O* q0 BCTV Control Test Vehicle(s). * o h0 x" w2 P p/ QCUDIXS Common User Digital Information Exchange System.: }4 s" x: S" y8 x Cued Operation The directing of one sensor based upon the data received from another sensor. $ _" ?+ M0 b& x7 pCueing Command The command within a tactic, which specifies the sensor element’s coverage 5 w5 f! F/ x' e9 _! yvolume. ( T" T! m# ~: t' x: t% gCueing Data Cueing data is a subset of object tracks within a sensor element’s coverage * q( v4 O9 s/ o0 s# |& C4 avolume. 0 H: s% A2 i. b/ g3 oCV (1) Carrier Vehicle. (2) USN Aircraft Carrier. (3) Curriculum Vitae. / D( }; y% r8 @$ E$ z& hCV/BM Carrier Vehicle/Battle Management. / v' }( o% J8 c0 ?; d$ Z: T& l; ECVBG USN aircraft carrier battle group./ V, {; U& R8 h/ ?) N0 _6 t CVHG Carrier, Aircraft (V/STOL), Guided missile., R5 h- o. @$ E( ` P& [ CVISC Combat Visual Information Support Center. 0 y) g4 R9 A0 O+ j+ @, V; hCVL Copper Vapor Lasers.8 ^9 W3 y& E# d, q: c CVN USN nuclear powered aircraft carrier. % T& ]# O1 b# G2 D: b' A6 A+ ^MDA GLOSSARY, VER. 4.0 C( u4 i& ^: [3 [$ n8 Z 69 ( d) V) {- w4 m5 |( H# QCW (1) Continuous Wave. (2) Chemical Weapon/Warfare. (3) Carrier Wave. " `. y8 k/ o8 c; O! XCWAR Continuous Wave Acquisition Cycle (Hawk). 3 A k8 i" Q9 k1 U( gCWBS Contract Work Breakdown Structure. ' `* A! i4 U* I7 P2 E5 e) [) @CWDD Continuous Wave Deuterium Demonstrator." _- n8 B. ], b CWIPT Cost Working group integrated Product Team. ( y' i4 L3 ?4 X$ WCY Calendar Year.: `( h- C! D' z MDA GLOSSARY, VER. 4.0 D ; M% e" h8 @* i3 O- C: D711 G% y; ?/ p- k D Deuterium5 R# Z! P; s6 y7 u- }2 V D Spec Process specification. - n& r \' j& j, c$ R7 e" XD Star Measure of infrared sensor sensitivity. 1 w* [: q# Q. L8 U. [D&D Design and Development ) e7 |6 Q$ H0 r/ H; xD&T Detection and Tracking.1 @; m' P1 M: M/ |: t, \8 T D-IFOG Depolarized-Interferometric Fiber Optic Gyro. / {9 J9 E6 l7 O& {3 oD-Level Depot Level (ILS term).3 N8 Q' z& R* Q' M; f+ e D/A Digital-to-Analog: L$ y$ W5 h k t6 U& _ D/V Demonstration and Validation. 9 ~/ O$ ^) D$ i7 j3 ?0 Z" I! D0 iD2 Projective (interceptor) in the Hyper-Velocity Gun program. ( N3 H+ P, g* @- H1 LDA (1) Department of the Army. ! a0 T p$ G2 h g8 Z; o f# h(2) Department of Administration.1 J5 C7 Y6 Q9 ^$ }8 }$ y$ ^ (3) Decision Analysis. 2 R$ q* p, b$ X" l0 M(4) Developing Agency/Activity./ i- M) ~! ?6 O1 J (5) Data Administrator.6 G* }' F- W' z (6) Direct Action.1 q2 z7 v' |5 Q' x! C% K' s z (7) Data Adapter.8 ` C1 c. O* U4 N: o' m" l | DAA Designated Approval Authority (DD 5000 term).- V$ a9 q1 b2 | DAASAT Direct Ascent Anti-Satellite.+ \+ i9 `" U2 P/ n5 v DAB See Defense Acquisition Board. % j( B b( P% V3 SDAC (1) Days After Contract [Award]. * l9 O6 ]2 ?) V! _0 i0 V( `2 `0 T% S(2) Department of the Army Civilian. 3 u# s( P+ H* I& e) r6 g(3) Directed Attack Characterization.4 ^; y9 ^" T) z- R (4) Deploy ACCS Component. " P3 p' h3 H/ v(5) Digital-to-Analog Converter.7 {. I( B: Y5 W$ ]8 K+ g% z ~ DACS Divert and Attitude Control System. 2 [/ }2 L9 J. |DAD Defense Acquisition Deskbook. # E; x8 G6 B# e. X) bDADS Distributed Air Defense Study (1993). 0 U4 i& _& N2 m: B$ V6 FDAE Defense Acquisition Executive.) p8 y6 K2 X/ M( v+ s e& _- Q. i DAES Defense Acquisition Executive Summary. 9 h) J2 F+ v5 W' W! \& u: ?; qDAGGR Depressed Altitude Guided Gun Round. y. E* G" p1 I. ]8 b9 } DAHQ Department of the Army Headquarters.7 a: Z: K0 n3 a @ DAI Damage Assessment Indicator (targets). 9 G! y9 R( Y& b+ w! wDAL Defended Asset List. ( ^, t- I. z9 e; J$ ZMDA GLOSSARY, VER. 4.0 D0 O- O0 D( q; N) F 72! T0 Y( H7 K; Q DAMA Demand Assigned Multiple Access.: D/ [6 e0 r' v" a6 Y0 }5 J DANASAT Direct Ascent Nuclear Anti-Satellite. 7 q4 ?' f( y& _; h8 s" YDAPR Director’s Annual Program Review (SDIO term)9 W3 h( U& m) f- A DARO Defense Aeronautical Reconnaissance Office (OSD).' }9 r! @# j. K K" \% k5 _ DARP Defense Aeronautical Reconnaissance Program. 6 ? y. s3 x- FDARPA Defense Advanced Research Projects Agency. See ARPA. : T4 m* j* q3 i$ P/ zDART OBSOLETE. Defense Acquisition Review Team. : ^2 R5 @5 F: c$ J2 N: _DASA German Aerospace. Member of the MEADS Program Team.& a% C6 G% s# W& J0 [ DASC Deep Air Support Center (JFACC term).% `0 K- E7 N, w DASD OBSOLETE. Deputy Assistant Secretary of Defense. # u2 s" b7 I, k" ~DASD (C3) Deputy/Assistant Secretary of Defense (C3), `- q) h$ y/ w DASO Demonstration and Shakedown Operation.6 P. E. Z" f. X% Z Data Integrity The state that exists when computerized data is the same as that in the source : X6 f! }4 N ydocuments and has not been exposed to accidental or malicious alteration or " Y4 N8 S) D* E! ?+ C" Vdestruction. ; L6 y. z$ G( J- y! t) k* \Datalink (1) The means of connecting one location to another for the purpose of & t! x9 O# G' [, K1 V$ ~+ vtransmitting and receiving data.# T# `) d7 q; R0 S" L" I (2) A particular path between two nodes over which data is transmitted. It 6 |5 p, F4 ^6 tincludes not only the transmission medium, but also digital to analog, R l5 u. D) ` y( \ converters, modems, transmission equipment, antennas, etc., associated5 h5 Z5 ?. D4 v7 c O- ^ with this path. In the SDS backbone network, it was a path between two* M6 p1 N* u: Q1 I# [ SDS elements. In space these datalinks were microwave or laser. On" o; a2 V( Z( J! v0 F the ground, they could have been wire line, microwave, or optical fiber.9 M) F6 V6 ]# B# F0 S! y DAU Defense Acquisition University, Ft. Belvoir, VA., x# @" ~ A' V+ D DAVID Development of Advanced Very long wavelength Infrared Detector (USAF6 _; [2 E$ P8 z" }/ F' E Phillips Lab term).8 r! ^! a: t7 F! m: B DAWS Defense Automated Warning System. % p! N8 W+ R& r: mDazzling The temporary blinding of a sensor by overloading it with an intense signal of% x$ C, |% S E5 D# W7 S( N# V electromagnetic radiation (e.g., from a laser or a nuclear explosion).0 ~& {0 c8 U: Q, y. G) K# O DB Bata Base ; H7 O# d9 j/ t) }" Z4 _& KDBME Database Management Environment (Computer term)., F) }4 X8 Y" q# m; t DBMS Database Management System.* z# C% Y, _: p3 S/ P8 Z4 O DBOF Defense Business Operations Fund., C" y9 A6 c/ O' k6 z" E2 q$ d DBS Direct Broadcast Satellite.

使用道具 举报

Rank: 9Rank: 9Rank: 9

35#
发表于 2008-12-25 20:03:49 |只看该作者
MDA GLOSSARY, VER. 4.0 D 3 s" X; V' K9 B3 P* P& k) @' O73 . H! I) \8 P! O( b2 a/ G6 pDbsm Decibels per square meter., ?( H0 j/ ]7 w0 p7 W DBSM Database System Management.4 S" \# h! m) x# t6 l DC (1) Disarmament Commission. (2) Direct Current.6 I( ^1 i, t& O! k2 v2 Y# X DC-X Delta Clipper Experiment.! `5 ]+ |7 ~! d# B- ?0 f" m B DCA (1) Defensive Counter Air. (2) OBSOLETE. Defense Communications% o" V/ j I& ^8 B+ [9 N Agency. (Now known as Defense Information Systems Agency (DISA)). : k0 ~2 F5 A; q4 T6 B! ZDCAA Defense Contract Audit Agency. " h/ m1 q9 a8 H- T& l6 [DCAS Defense Contract Administrative Services. 7 j4 T6 T2 |0 b, M g s1 M- DDCCO Defense Commercial Communications Office (of DISA). 5 p5 H1 }% Z+ x& Q- QDCDS Distributed Computer Design/Development System." U: @" x+ ^8 t0 ? DCE (1) Data Communications Equipment (TelComm/Computer term). & _) N$ L' D6 d" U(2) Distributed Computer Environment. + C/ }$ s% ~; WDCEC Defense Communications Electronics Command.! p% M5 \% P+ O8 i0 a DCI (1) Director of Central Intelligence. (2) Dual Channel Interchange.% m* ^1 {/ v% |5 _7 h+ y# @ DCINC Deputy Commander-in-Chief. * Y. n: C- c3 Y* l2 PDCM Defensive Counter Measures. * z7 `: B! C( F: j/ F3 NDCMC Defense Contract Management Command 5 C( P& p6 M3 H% Z, h5 pDCN Document Change Notice./ h5 X- l) h6 ^" F! w DCO Director of Combat Operations (JFACC term).& m% ^9 M3 I, s+ P6 s. m! p DCP (1) Decision Coordination Paper (see ADM).5 q2 c3 M$ }: G (2) Director of Combat Plans (JFACC term). ( n( |4 J* s- ]7 ]+ B/ e4 kDCPG Digital Clock Pulse Generator.* D% S6 f# S* _9 @ e7 ^# z DCS Deputy Chief of Staff. ' z/ N, P* b4 B# CDCSOPS Deputy Chief of Staff for Operations and Plans (Army). / z" |) V) N" I) o; t& ~6 f8 a# zDCT Digital Communications Terminal+ }) ]& [+ d% O& i DCTN Defense Commercial Telecommunications Network. . D- t4 [. @* y7 D) E& j3 `DD Variation of DoD.$ u' U+ t5 h8 G/ M7 [+ H DDCI Deputy Director of Central Intelligence.' n% ^! N; o2 N+ j# P2 i% C DDEL Dwight David Eisenhower Library, Abilene, KN (army term). * R1 h, }4 T0 i+ sDDG USN guided missile destroyer.0 z5 q1 S* I) D% N MDA GLOSSARY, VER. 4.0 D/ s# Y2 a9 i, x3 v r: m2 l# s 74- I# G7 t" C% Y0 r$ U- m8 t& z DDL Disclosure authority letter.4 ]2 ], g" k# C2 s, @& F6 V DDN Defense Data Network. # l& W2 E6 c1 W2 d7 n7 YDDR&E Director, Defense Research and Engineering.+ v$ ~. x7 I; i$ M1 v1 B DDDR&E Deputy Director, Defense Research and Engineering. 4 T) ~/ w( C/ R/ M: Y% f0 Y3 @DDS Data phone Digital Service (AT&T service) (Telecomm/Computer term).( n5 q: h5 r7 Q0 k* [ DE (1) See Directed Energy. (2) Delay Equalizer./ P0 C o4 j" G7 D DEBRA Debris, Radiance Model. / ~5 S" Y2 W, ^) A- aDecentralized - C; i4 G- `0 \4 s5 u8 |Control/ `/ Z! @6 m4 K9 g2 a6 _ In air defense, the normal mode whereby a higher echelon monitors unit actions, F R5 W+ Q" j) T, d5 Imaking direct target assignments to units only when necessary to ensure proper# B1 y3 t" W* _; O/ f* ~ fire distribution or to prevent engagement of friendly aircraft.& s9 o2 T' t5 {7 q Decentralized * s, h. }' ]6 G2 ?Execution/ ^7 L" B. y. r0 j7 u The distributed and integrated implementation of USCINCSPACE direction by) s$ ]: p% ^) F+ {3 {- H1 Q the BMD forces. (AFSPACECOM) ) ~' {2 B5 G) ~) PDecommissionin ; k$ t; R3 i( X% |0 M1 X, G# r! V I/ ~7 mg" A: m4 [7 F* O. W, f- ] The removal or the rendering useless of obsolete or no longer needed 9 h- ~* c1 G$ H& M e8 W( }components of the BMD system from service.$ |7 U ?1 \; N0 d, l8 T8 {7 d Decrement A directed funding level reduction for an acquisition program.! U; R0 l( X) p DED Data Element Definition (Computer term)." \; K$ p7 f# [1 N& i9 M) |; r& h Dedicated Mode - G7 ^8 I ~. \9 n2 P8 X* Z; `2 Tof Operation, ]6 v" B; ?0 c0 F6 |- f* k (ADP Security) & {0 x4 S: ^2 a/ \/ M1 B# SA mode of operation where all users of the AIS possess the required personnel 2 C$ w0 J) k# r2 c5 X ? I$ Nsecurity clearance or authorization, formal access approval (if required), and a8 [. @6 ~; G. W9 n. [ Need-to-Know for all data included in the AIS. 1 P8 z5 b: K" o, nDeep Space (DS) The region of outer space at altitudes greater than 3,000 nautical miles (about% Y+ q) H# _9 A v8 K# Q 5,600 kilometers) above the earth’s surface.0 x: F6 r) n- q6 o6 y Def Definition.2 k9 G9 j% C! q DEF (1) Defense. (2) Demilitarization Enterprise Fund.5 `8 V- o- V( m4 e( ` DEFCON Defense Readiness Conditions.6 [7 O9 h( V9 p# m" i Defended area 7 X3 G' @' M, qcoverage2 K! \, |# Q/ J) f& ^ Defended Asset " N, I5 h( k# }3 S# EList (DAL) $ _7 c; g. w* m8 _" r2 X9 RThe geographical region that the BMDS can protect from ballistic missile attacks ( P( w! d. I" ]0 F2 o! T, nwith a specified level of probability of negation. May be specified for a particular 7 P f5 s1 k% v9 Vthreat type, launch point(s), launch regions, raid size, etc.7 W& C$ T4 _. U; Q) u2 h A ranked listing of facilities, forces, and national political items that require 0 }5 e7 q) A; n( d: }. kprotection from attack or hostile surveillance. The list is compiled from Federal3 q$ r/ |* D4 t- C5 l6 r departments and agencies, Unified and Specified Commands, and the Armed9 u5 ^: h2 c# L: A Services to ensure National Security Emergency Preparedness functions. 4 r. l. K9 a R) e M8 v) hMDA GLOSSARY, VER. 4.0 D& X: T0 k3 m' ~; c2 f 75 3 k7 b! C% q/ r8 E3 @: e% L" |, KDefense + j/ d9 a2 g4 d# F0 n- rAcquisition( M8 `5 p& _9 I, F- G( r Board (DAB) & ^7 G7 Y7 c3 X. i& j% @/ YThe senior DoD acquisition review board chaired by the Under Secretary of 9 N9 O& o5 @; ], k7 aDefense for Acquisition. The Vice Chairman of the Joint Chiefs of Staff is the / z* T2 c& N- @% bVice-Chair. Other members of the Board are the Deputy Under Secretary of 9 ~3 @( J. j. _; f- z" q4 nDefense for Acquisition and Technology, Service Acquisition Executives of the* f+ }. q- c. j6 G9 S Army, Navy, and Air Force; the Director of Defense Research and Engineering; % O1 u( R# {( |$ ithe Assistant Secretary of Defense for Program Analysis and Evaluation; the 3 ~" v4 Z ?' @5 x, s7 y- zComptroller of the Department of Defense; the Director of Operational Test and4 s. m6 S' a& g% D( H Evaluation; the appropriate Defense Acquisition Board Committee Chair; and the1 S" u: G. @3 E) h8 ?' G Defense Acquisition Board Executive Secretary. Other persons may attend at 9 A I) H' c" `1 j j- P3 x: R5 fthe invitation of the Chair. (See DoD Directive 5000.49, “Defense Acquisition, i6 y, K: z8 R' \ k Board.”), J2 o% ?5 _* y Defense5 \3 L0 q" A& S+ H7 A Acquisition ; R& }! u$ U* Q) r4 fBoard Committee ' @% ^, D# u# z; p2 hAdvisory review groups subordinate to the Defense Acquisition Board. The # M$ o9 r9 E$ P% k$ yUnder Secretary of Defense for Acquisition determines the number of& R/ J: I5 L5 A, V! X% O9 ] Committees. The purpose of the Committee is to review DoD Component : y5 |0 N' d: N: D z4 lprograms prior to a Defense Acquisition Board review in order to make an5 t' U) l& C# Z7 V1 g: r independent assessment and recommendation to the Board regarding the7 D2 P- Y8 Y' L9 N S6 W program. (See DoD Directive 5000.49, “Defense Acquisition Board.”)

使用道具 举报

Rank: 9Rank: 9Rank: 9

36#
发表于 2008-12-25 20:04:03 |只看该作者
Defense8 M5 A, H$ W( x2 f$ L1 j: ?1 _4 b Acquisition( }2 y5 R3 @9 I- r% _/ J& r Executive (DAE)6 S, G3 y! F' w The principal advisor to the Secretary of Defense on all matters pertaining to the9 ?0 z1 O% f4 a/ l Department of Defense Acquisition System. The USD (A) is the DAE and the" k3 E9 Z) w$ \4 _6 g# K1 g Defense Procurement Executive (DoD Directive 5134.1). 1 M. K2 a& Z5 o% F! j, R* P% R# n9 O2 G; CDefense 2 n1 ]/ C- f+ S0 k. u& y' N& aAcquisition) {6 \- V5 h% D8 X: G" X" @ Executive ; Y0 h+ W/ f6 a9 MSummary (DAES)3 s2 [5 @' q( `8 E The DAE’s principal mechanism for tracking programs between milestone + F3 T. H k' S6 p( |1 Oreviews. Includes programs subject to the Selected Acquisition Report (SAR),2 W& e8 s( E8 L5 B8 i$ ?4 T and any non-SAR programs subject to review by the Defense Acquisition Board.. {8 M* c' f6 ~$ | Defense * T! B) ?- k) I6 F. z" U% hEmployment) f7 `: ?+ V. G0 { Option (DEO)8 P; e$ n4 f3 {: ?7 q0 `7 b Engagement strategy provided to USSPACECOM component forces to achieve) F' E3 o% D: r" ~0 H V9 k specific military objectives against a ballistic missile attack. It defines hostile ) S4 ?6 w/ m& m K/ W; mtarget priorities, provides assets to defend, and allocates SDS resources to be( X) v4 l5 z! E employed. A number of DEOs may reside in a particular Preplanned Response 8 J/ \# m1 W4 J( H+ ^Option (PRO). However, default DEOs (those believed to be best suited to 4 n6 Y- s1 Z+ B0 Y6 v/ R+ x! b2 x! qcounter the threat initially) will be automatically processed and executed when9 i& ~3 N, t) O* X/ @ Defense Activation Authority (DAA) is given by USCINCSPACE.5 f9 K1 F' n; A- w4 ` Defense9 V' R. v7 n/ l, [# F) J! u( r Enterprise1 C8 \$ ^% |+ R1 V/ ^ `2 l Program (DEP) / e I& R' h! \. L5 C3 wAn Acquisition program designed to streamline the acquisition process by waiver & R4 @' M |& o( Mof selected regulatory requirements.; I% M8 y/ v' P0 e B' c+ ? Defense In-Depth Locating mutually supportive defense positions in such a manner as to absorb % p& C* k8 {0 U5 H: A9 H5 _and progressively weaken an attack, prevent initial observations of the entire # g$ c- K# W8 n" Nposition by the enemy, and allow the commander to maneuver his reserve.- N4 u& b- U$ q. T Defense9 W! K) l. N |( B% d3 } Meteorological; F" H/ A. u7 s" ^# }8 b. D5 j$ d" O Satellite Program ' q& N$ A, b- E- { j- ](DMSP) " |+ p, i: ~$ JSatellites designed to meet unique military requirements for weather information. + }8 F" e5 A6 k! `+ p9 BUsed to detect and observe developing cloud patterns and follow existing* N c, C& |& e( @/ i: S+ {4 H weather systems. Visible and infrared imagery are used to form threedimensional cloud-plural analyses of various weather conditions.2 j X F) j- p Defense Planning! A0 f0 f# p P. v and Resources. Y" \+ a% w9 Q. D) l" c, m; N Board (DPRB)! [) w& i2 [8 S! N" C# {0 v A board, chaired by the Deputy Secretary of Defense, established to facilitate. N) H( M/ s- t6 d& L decision making during all phases of the planning, programming, and budgeting5 x Z4 O% W% H% O) B8 D, k) T system process. Board members include the Secretaries of the Military$ L# B* r5 Z% [! \! V$ _$ j Departments, the Chairman of the Joint Chiefs of Staff, the Under Secretaries of 8 N4 m4 g# A, Q/ Y8 `5 f8 ?Defense for Acquisition and Technology, and Policy, the Assistant Secretary of . m0 |' a( w" Z% a2 cDefense for Program Analysis and Evaluation, and the Comptroller of the : W; s# }7 v$ \% j3 t: y, HDepartment of Defense.$ P5 Z9 F% V3 X2 D. B* ?) N MDA GLOSSARY, VER. 4.0 D% \4 Y2 C' l: D 76 0 [4 B; u4 G4 l% N" w% ~; A& w9 R$ jDefense Planning 9 J3 U$ q5 Q [; k b7 oGuidance (DPG) R- ]' K9 @8 |* [. M Document issued by SECDEF to DoD components providing strategic framework& I/ b' `9 u7 d" z1 J! L for developing the Service POMs. Result of planning effort by Joint Staff, OSD,& E4 }6 w- k ^7 T1 s1 H and Services. In connection with two-year budget process, DPG is issued every ) v( z8 g3 } a' L1 k! _' ~other (even) year. Q0 n4 s* H; f5 _' u l8 h8 t Defense Priority9 u- Z0 s' b- {( l and Allocation& r6 i" z4 I6 b. L( A1 K! |! E System (DPAS) 1 M/ A( t Q" I8 W0 N9 ~4 c; {The implementation of a statutory requirement where contracts in support of x }$ S4 Q5 A- v, `# ?, Anational defense must be accepted and performed on a priority basis over all . s, @2 W2 {7 b& A# Vother contracts, and which requires the allocation of materials and facilities in# I2 B( f" Z- e: [ such a manner as to promote the national defense. See “DO” and “DX.” $ K2 S/ H& V: n8 ?8 T0 [Defense 7 _: a7 o5 y7 w% b% h6 H6 @Readiness ) E8 H3 @7 t+ i3 ~' m7 v$ r0 B4 O# OConditions6 v4 y; ^3 S, `6 F (DEFCON) % W& g8 l$ [- Y" J* a' t$ EA uniform system of progressive alert postures for use between the Chairman of 8 D2 F1 x3 T0 O- qthe Joint Chiefs of Staff and the commanders of unified and specified commands % s+ v; E. `/ Q4 U0 ~5 v9 A# B9 ]# s8 dand for use by the Services. Defense readiness conditions are graduated to ( g: f& X8 F& F9 Cmatch situations of varying military severity (status of alert). Defense Readiness- J. u* V6 R6 N ~ Conditions are identified by the short title DEFCON (5), (4), (3), (2), and (1), as) J7 g% [3 R+ X E% d appropriate.& `! d9 X, C9 g0 O* o }) q Defense Satellite: ^0 V5 ]# L. c6 j6 Q3 Y Communications - f# |7 s; {" G7 h# jSystems (DSCS)( f6 k" u) y- N6 Y Y" o: p5 P Advanced communications satellites in synchronous orbit around the earth." H" n+ H" m4 H3 J- t Provides high-capacity, super high-frequency (SHF) secure voice and data links 8 x- x) O! z0 Yfor the Worldwide Military Command and Control System (WWMCCS). They5 |; t' O" M" @* @2 X2 u- s6 K support terminal deployments for contingencies; restoration of disrupted service 4 h: i9 r$ v E( k/ [8 goverseas; presidential travel; global connectivity for the Diplomatic! }& y, S: v, v0 d) r4 L$ ` Telecommunications Services; and transmission to the continental United States$ V4 O! _: N* w' C, W of some surveillance, intelligence, and early warning data.: ~5 ^( F) I9 U1 M Y Defense Satellite - X1 S% i2 |2 b# ~; M( ?& m x7 l3 M(DSAT) Weapon( g# `3 m3 P/ X( ] A device that is intended to defend satellites by destroying attacking ASAT e0 \* u0 i4 w' f2 ], qweapons. Y# P# Q0 l N. fDefense Support& O& _: }: d- v' S7 Q) {( a) Y& O Program (DSP)" d1 i- x( t8 m0 z: r2 Y- d A system of satellites in geo-stationary orbits, fixed and mobile ground & I4 ~$ M2 T0 Z; j( ` Q: {& Zprocessing stations, one multi-purpose facility, and a ground communications ! F% ~( ~( A) z6 L9 H/ U Znetwork (GCN). DSP’s primary mission is to provide tactical warning and limited P2 |, n, [1 d" Aattack assessment of a ballistic missile attack. ( m0 x/ ^! o. W1 qDefense 9 I- A7 n9 Z2 D6 aSuppression' X4 ~) k& t% H/ k! H6 l% U6 m Temporary or transient degradation of the performance of a defensive system$ _+ v/ c9 y( q4 r5 R1 } l below the level needed to fulfill its mission objectives, by an opposing force.! f5 ?, E8 T5 s$ E; x2 { (USSPACECOM)" n$ P0 x0 ?! o Defense Tier The arranging of a defensive system to correlate with the phases of a ballistic 2 z4 h9 ?& A: q, Y2 u8 ?$ [8 C, H' lmissile trajectory; i.e., boost, post-boost, midcourse, and terminal.6 M5 j; e9 q. {. ]+ p+ X: x% k Defensive 8 T1 t: z3 o$ z0 v2 T. d# bCounter 2 `" Q" o5 L- X9 ]Measures (DCM), M; i' D' z/ G- g Actions taken to eliminate an ASAT attack. 1 `6 t1 o* z5 n' QDefensive1 {9 }* \. P; p0 { S7 s* v y Technologies7 Q) h7 B2 P4 a% r. E Study Team( _: W. F. G3 ? (DTST) + w1 l3 r! d6 R2 c3 S0 B" R* q' mA committee, generally known as the “Fletcher Panel” after its Chairman,+ N/ e% ~" d8 v! ~7 _ appointed by (former) President Reagan to investigate the technologies of . P8 ~' ]+ Y, t8 qpotential BMD systems.2 _: o B+ z$ i B DEFSMAC Defense Special Missiles and Astronautics Center, Ft. Meade, MD., w' {0 i* g2 D0 R; i8 Q4 F: Y DEIS Defense Enterprise Integration Services (ex-DTIS).8 _/ O9 M2 ?, E2 V1 _ a8 o DEL Delivery. / ]: x: L1 M, l; z5 Q$ BDelivery Error The inaccuracy associated with a given weapon system resulting in a dispersion1 o/ `( y* d0 a% P of shots about the aiming point. See also Circular Error Probable.6 L- J' H, g5 S MDA GLOSSARY, VER. 4.0 D" |4 @2 t% e+ V5 [1 ?4 Q! v& M 770 h( }9 q. Q+ t4 ~: v Delta-V A numerical index of the maneuverability of a satellite or rocket. It is the : `6 J2 Y: D7 X7 b* Omaximum change in velocity, which a spacecraft could achieve in the absence of2 N$ E0 `: F' G9 I+ U7 R a gravitational field.+ ~$ `. s+ c6 N8 } ]% R' h Dem/Val OBSOLETE. Demonstration and Validation (DD 5000 term). ; f5 w( r; H1 ]4 SDemise Altitude Altitude at which object of interest (decoy, chaff, etc.) no longer performs its& _+ Q5 p ?+ o, r0 d& V F) |: ` desired function (matching RV characteristics, screening RV, etc.) 2 {+ O1 \4 }* @) D- V' MDEMO Demonstration. 4 | a% C' L' A. Z7 I/ dDemonstration , C: C' y* m5 xand Validation2 u# C! ^6 E. S+ Z (Dem/Val)3 v d& M) b; Y The acquisition phase when major program characteristics and product designs8 d8 B! c: m+ P- ^ are refined through extensive study and analysis, hardware development, test, G9 C% S) F& U( V) rand evaluations. The objective is to validate the choice of alternatives and to : z; C1 R* r) {6 oprovide the basis for determining whether or not to proceed into Engineering and 7 s& L# Y0 B- F, n5 LManufacturing Development (EMD).5 V( A; c9 @, S# Y Denial Measure An action to hinder or deny the enemy the use of space, personnel, or facilities." N7 ~; X1 r- y4 P5 V' }4 l It may include destruction, removal, contamination, or erection of obstructions.7 T7 G( k* l b( b( a) q DEO Defense Employment Option. 8 f- p7 [& S& q1 P; W, s& V# q2 ?Department of ( d9 X: m9 z7 C) VDefense/ ?. s+ }' e/ W4 G2 M Acquisition; Z; T5 u* Z: t$ I: x6 t2 ~3 Y- ` System 8 Y9 @! i- h6 c1 t! J3 @A single uniform system whereby all equipment, facilities, and services are! E; ~ g8 X! A9 o4 \$ ^: g planned, designed, developed, acquired, maintained, and disposed of within the $ Z( ]/ q- ~) g0 o) u) i4 `Department of Defense. The system encompasses establishing and enforcing- D# L1 y& q& f) a; H% R2 M policies and practices that govern acquisitions, to include documenting mission . `5 F' L/ h; h$ h" m6 dneeds and establishing performance goals and baselines; determining and1 n4 w+ Q+ s( x. l& f% b prioritizing resource requirements for acquisition programs; planning and0 c& q; E9 [) W executing acquisition programs; directing and controlling the acquisition review $ l g) e8 a% hprocess; developing and assessing logistics implications; contracting; monitoring) x2 }0 x* W$ N7 w9 D8 ^3 O1 k' ~ the execution status of approved programs; and reporting to Congress. (See" o& B& t5 W! J, V0 k9 L% a DoD Directive 5134.1, “Under Secretary of Defense (Acquisition).”) ) j+ r/ S: a1 ^5 G( i: s$ v1 JDeployment (1) The placement of force elements in battle positions to obtain a higher M# t; w: q9 z# ~state of readiness. & r% Q1 S) C5 n, r& q0 S8 D! {(2) The movement required to place force elements in battle positions.; L% F* f: V( D% x$ B% V (3) Fielding the weapons system by placing it into operational use with units ! `- R4 y8 a7 @9 T* Win the field/fleet.- P* l# N" V. u; F. _. f1 q (4) To arrange, place, or move strategically." v1 U; d" N0 Y& l" [ Deployment 3 j* g+ E) A* F( Q! C5 mPlanning " y) D8 \2 I b; z, C: Y' I" C(1) The development and maintenance of plans required to initially deploy,0 L7 A5 n; h8 }7 o maintain, and evolve the operational system in accordance with 3 R, f& B* F1 Uschedules and priorities. It includes factors such as launch facility, c1 F% P0 o+ \' H1 |+ S' f* \ availability and planning for the availability of other required elements 7 J: P1 A9 x: z9 r4 v: q7 psuch as trained personnel or units. In addition, it identifies the impact of & ?% n- T( M: x- k( D; tdeployment on operational readiness and any testing constraints & S3 a4 h& e; Y& f/ G- }- passociated with deployment. # J# }* a q$ {6 t(2) Encompasses all activities from origin or home station through 0 b% V# d1 t% `2 odestination, specifically including intra-continental United States, intertheater, and intra-theater movement legs, staging areas, and holding9 h7 _' p- F; g areas.

使用道具 举报

Rank: 9Rank: 9Rank: 9

37#
发表于 2008-12-25 20:04:19 |只看该作者
Deployment+ t' Q ]* D& [* j# v Testing ! U- O0 e8 W { r8 VThe testing and/or simulation of system assets in the physical and operational5 H J3 L% z [( q; W K environment in which they are expected to perform.+ j, x7 M! Q9 ^4 B. q: Z DepOpsDep Service Deputy Operations Deputies.1 J, Z" Q1 _1 j; [$ P5 Y- K( v MDA GLOSSARY, VER. 4.0 D - j2 @- M" G5 Q# k7 Q8 X' S78 ; N8 N6 Z( Z/ _3 X% f( g1 U5 lDepressed 1 y& i9 c0 f$ cTrajectory / x6 q& U0 l, A: g$ W4 E2 }' ^1 UTrajectory with an apogee below that of the minimum-energy trajectory.; E; J, f* E9 M0 [: [# E7 | DEPSCoR Defense Experimental Program to Stimulate Competitive Research. 4 V& Z4 O6 ~: F7 G$ m' tDEPSECDEF Deputy Secretary of Defense. % t. A# Q# k$ n: K# P& fDeSecState Deputy Secretary of State.. K) J! c% h; C+ R0 y DERA Defense Evaluation and Research Agency. Consolidated research and! W, M: p$ \' \( P* q: P development resources of the U.K. Ministry Defence. Headquartered in: |0 x( R; r6 S1 n9 @6 p- |: E Farnborough, England. + B. _! L6 C' l% _( i0 o+ _Derivative0 Q I$ O0 B2 d Classification ; r4 \9 b8 [0 R- C/ C& K; _A determination that information is in substance the same as information" {$ r+ V: R8 W. j0 Q' B1 U currently classified and the application of the same classification marking. 0 `0 d" A o/ x1 K* aDES Data Encryption Standard.+ `2 U! v" d" e. K6 L DESC Defense Electronics Supply Center (DLA term).- ~1 }3 C1 i+ h, d, Q4 x* Z; n Design! J" [0 Y A; G4 \+ r2 p) N Constraints ) F! o6 L: _+ U% V3 D* T5 ` z) bBoundary conditions within which the developer must remain while allocating : t" w2 E) f& U, H; ]performance requirements and/or synthesizing system elements.4 @; C% y$ `& j) c6 x, B5 _; L0 n5 P Design, a, @! t9 ^, k( O; m Parameters% m9 R9 _) D2 i- `- r: J* N* y Qualitative, quantitative, physical, and functional value characteristics that are0 x) x0 [) s$ Z* ]" w: z/ Q inputs to the design process, for use in design tradeoffs, risk analyses, and5 N. k7 w- A2 ^! D development of a system that is responsive to system requirements. # j* S6 v I' Z9 g& C9 v9 MDesign Phase A period of time in the software life cycle during which the designs for , L# i% l3 J: [7 X" Karchitecture, software components, interfaces, and data are created,8 Q$ @( z% Y; w# Z documented, and verified to satisfy requirements. " a& s8 I2 ?& K" V7 |" ADesign-to-Cost* \, ]/ L# l7 v# p (DTC) Goal. n" Z0 z. s5 X Management concept wherein rigorous cost goals are established during * f4 V8 [# c) T7 Vdevelopment, and the control of systems costs (acquisition, operating, and 0 [# R1 g( O* i- {; Q' msupport) to these goals is achieved by practical tradeoffs between operational: l2 \2 M& b" H$ Z' b capability, performance, costs, and schedule. Cost, as a key design parameter,( b+ j+ Y \, \& ]! {; K is addressed on a continuing basis and as an inherent part of the development. w) [& ^7 R1 H$ B, F and production process. A DTC goal should be in the form of average unit+ X3 ^/ v: ^5 k( E1 p2 Q flyaway cost. Also, DTC parameters for operation and support will be + a+ [/ e! P! p+ J/ g* N& v4 rselected—parameters that are design-controllable, significantly affect O&S costs,# { l& ~, M c* A. {* { and can be measured during test and evaluation. Parameters may be: P( f8 V0 e. g# o0 M$ J expressed in dollars or by other measurable factors, e.g., manpower, reliability, or 9 h% W; w, t/ Q1 w. Gmaintainability. Firm goals and thresholds will be established no later than entry* J1 Q1 h+ z$ @) H6 U into EMD (Milestone II). This is an in-house goal, almost contractual in nature, ' `! b0 m3 E$ v5 o* K1 d2 Mbetween the PM (Service) and the SECDEF. Allocations from this goal will 7 [# u+ D' v( R5 g& rbecome the contractual DTC goals for contractors supporting the program.5 b9 }2 K4 W* B# n8 [5 ?' \2 Y Det Detachment. ; S1 g, ~- w4 |/ q- s7 ^6 G) Z" pDETEC Defense Technology Evaluation Code. ' g* q! }/ _6 m; l+ B4 S9 o& B0 VDetector A passive IR, visible, UV detector turns photons into an electrical signal. The5 p8 X0 }3 `( y3 Y5 _) Y IFOV of the detector is its solid angular sub-tense. There is sometimes* F8 ]% S. ?- A. R/ X: m, q confusion between the detector sub-tense (size) and the pixel (picture element9 A6 u6 ~" m& v1 k { size). They are the same for a staring sensor, but in a scanner it depends on 5 c: V t. [, g( N' b" F7 C9 q! }the array offset and number of samples per dwell. A pixel area is often only onesixth or one-eighth of a detector angular area. ! y) y" q/ N- n2 [1 T- LMDA GLOSSARY, VER. 4.0 D * v2 N. z8 m2 E3 e- d& ^9 V% i( j79# t% d& t! N- Q* q9 K DEV ENV Development Environment.. E% P2 v% q! T% C Development9 L% z, W# V% P; V; ?# D Test (DT) + X! `" Q2 i7 D. s9 i0 bTest conducted by the development test organization to achieve specified test( ^; Y& S2 K7 M, j1 t9 W1 G0 E2 ` objectives. It may be a complete test, a subtest, or a phase of a test.2 W8 Q# j# R8 j- \/ I' C Development6 o6 Q7 K& W N6 V! P, m5 F" d% g Test I (DT I): D1 G F! T8 E# V A series of tests conducted during the demonstration and validation phase.1 Y7 ~; R) R% T M& `- j Components, subsystems, or the total (or full) system are examined to determine9 ~" I! \! a4 }# i6 d/ U" o whether the system is ready for EMD. State-of-the-art technology is addressed0 h4 |1 H! `: Q2 V( {- X in DT I.1 K( v/ I5 w2 F/ X! Y+ X Development " }6 c+ M. {" DTest II (DT II) ( L; h' q& J; }A series of tests, normally during EMD, which provide the technical data- X/ |9 x7 f8 _7 u b+ ~3 K! f necessary to assess whether the system is ready for low-rate initial or full 4 r. X- a" C/ }production. It measures the technical performance and safety characteristics of# w- K N9 Q* C4 w5 @, Z the item and evaluates its associated tools, test equipment, training package, s0 q1 `8 m7 ?0 G, ?3 e: l and maintenance test package as described in the development plan. DT II+ s) ]8 A( l/ E' |2 G- [ G* U3 O addresses accomplishment of engineering design goals and the fulfillment of * u/ C$ w7 j v- Dcontract specifications.7 ?. z0 N8 T. g) |5 L7 ~ Development) _; j2 ^8 M% h Test III (DT III)! ]& n1 d7 n3 K r+ R8 E Tests conducted during production.* K; F1 F* V' ?5 g. w1 m2 d Development1 T+ L: i( V* ^6 I$ w; J Test and- ~6 W/ s- Y& x% K1 G/ A1 z Evaluation4 g5 E( v0 {- u1 T: B9 W7 ^ (DT&E) % a0 F' x. h. GTest and evaluation conducted to measure progress, usually of " A$ P8 N2 G. Pcomponent/subsystems, and the proofing of manufacturing processes and & _1 P4 W$ K3 S# Y7 r' zcontrols and to assist the engineering design and development process and9 w, P1 n: y+ y' P verify attainment of technical performance specifications and objectives. Usually% Q7 U- X( M) B& | conducted under controlled or laboratory conditions. Can be conducted before , |/ ^, m" X1 Q/ }. O R Cor after production begins. / ~3 U! p* {2 C' q. z# y8 i( o7 RDevelopment; K+ e8 o, ]2 E; V* R Test (DT) - o. F+ T/ @8 U/ FTest conducted by the development test organization to achieve specified test+ _3 g" K5 B" e0 n: R$ f" ~ objectives. It may be a complete test, a subtest, or a phase of a test. ( V; H/ F+ \% P/ y! i* vDeviation Criteria Limits established beyond which a Program Manager may not trade-off cost,5 x$ s- U8 I* O$ E7 u* K& L schedule, or performance without authorization from the milestone decision8 ~2 M8 _+ l* W& E: j" F: q5 D; L* [; K authority. Acquisition Program Baseline (APB) thresholds represent these # L$ u0 P) \2 n2 I0 K2 [8 ]parameters. * E$ z6 f6 N1 K% LDevolution of ! n6 t$ b7 k2 J# r" |Command7 _& v( x5 l* r1 L' x Minimal essential operational capability to perform C2 provided in an orderly and# H1 W9 I; h( {) I timely fashion to a duly authorized successor. , X0 ~0 ~4 s4 b. p K' E. YDEW (1) Directed Energy Weapon. (2) Directed Energy Warfare.5 M% t6 y$ r+ C DEW/D Directed Energy Weapon/Discrimination. 9 u5 X" J& O9 N# x$ H8 Z* NDEWG, O Directed Energy Weapon Ground, Orbital # r' [- T+ x2 r! T. f" R" qDEWL Directed Energy Weapon, Laser (thermal or impulse)., ~. _* U0 F- z4 h DEWP Directed Energy Weapon, Particle Beam (neutral or charged).) y3 t1 y* O2 d; Y# ] DF-KBS Data Fusion Knowledge Based System.* b7 P, L) c7 u2 s L DF2 Deuterium Fluoride. - Z/ o% f2 O: z) CDFAR Defense Federal Acquisition Regulation' Q1 j4 k: E& G6 d DFARS Defense Federal Acquisition Regulation Supplement.2 U/ Y9 z. s( r& l! R9 v: R MDA GLOSSARY, VER. 4.0 D " ?& _% i9 W5 B3 v& u* ?& I- {" R80 9 H9 Z% |' ?3 q( PDFAS Defense Financing and Accounting Service. " |! `4 Z0 R) W& ADG OBSOLETE. Defense Guidance. See Defense Planning Guidance. % m0 H! Y( H; D. k" J6 DDGA Director General of Armaments (France). 6 _. c+ ]9 E4 p, l3 v7 S0 B) CDGP Defense Group on Proliferation. % c% |2 A7 C t3 z5 ]9 ^0 @6 u# yDI (1) Data Item. (2) Developmental Item.$ v. U& P$ k) { DIA Defense Intelligence Agency.$ |" C8 }) o" F: T+ \ DIAC Defense Intelligence Analysis Center. 1 d( Y: F9 U) w& B$ pDIAM Defense Intelligence Agency Manual 0 ~+ l. Y& S6 y) E5 E5 wDiameter (Optics) The unit of measure of the light gathering power of a lens. D& u" l8 a5 c DICE Digital Integrated Combat Evaluator. ; P. I$ ~: m' h* r KDID Data Item Description. + S+ L8 k, {+ m' I: ^6 QDiffraction The spreading out of electromagnetic radiation as it leaves an aperture. The/ v7 a2 t$ c3 S) V& q angle of spread, which cannot be eliminated by focusing, is proportional to the # E8 [% S7 g3 J% J; y( Rratio of the wavelength of radiation to the diameter of the aperture.3 P, z7 n/ g) U4 x Digital7 G, M0 R8 Z) k$ n Processing4 o7 E$ H2 ]& b1 q7 v3 r The most familiar type of computing, in which problems are solved through the 9 W2 E- N2 o1 jmathematical manipulation of streams of bits.& j/ }( M# ?; a5 [3 I DII Defense Information Infrastructure * B1 ~; n. u. ]6 NDip A period of significantly decreased RCS signatures of an RV at low altitude (6 to. T6 T0 r7 @2 V4 y) |; i 12 km) between wake termination and de-sheathing. ( d/ k# B) x3 X5 PDIPS Dynamic Isotope Power System (which provides up to 10 kW of power). ) t# q o! k+ T K4 |! |DIR Director. * o- ~& |1 z* w' U6 eDirect Air/ ?8 d; W% `( c' m0 ?$ J2 g Support Center " l8 K! Q7 A+ U9 f/ M* @A subordinate operational component of a tactical air control system designed3 Z5 ?1 O# z5 f) M# a for control and direction of close air support and other tactical air support 3 d- A& o) O( p! B+ Moperations, and normally collocated with fire support coordination elements.2 R6 p5 g8 ]4 Z( p4 @ Direct Cost Any cost that is specifically identified with a particular final cost objective. Is not% P) b' t6 _4 n. r necessarily limited to items that are incorporated into the end product as labor or& B. n, _ I: k6 u4 ] material.( Z, N- [( D8 _. C* M7 f Direct Labor Labor specifically identified with a particular final cost objective. Manufacturing ( l' {5 \. D Y1 r/ ^1 C6 Y: Rdirect labor includes fabrication, assembly, inspection and test for constructing 3 q& t" B+ k) M; o% R' ithe end product. Engineering direct labor consists of engineering labor such as8 C' _2 {3 y. M+ F. Z reliability, quality assurance, test, design, etc., that is readily identified with the ) r) b3 [; Z3 f" Tend product. + V+ s! m. p4 j; u1 f& E2 T" B% HDirected Energy 1 T. p( k1 l( e(DE) $ ~/ |8 |. Y1 J/ q1 P1. Energy in the form of atomic particles, pellets, or focused electromagnetic. l2 {0 X+ x. F' J beams that can be sent long distances at, or nearly at, the speed of3 A' E" e2 B% c' x! |: b7 l light.' c0 A+ l G$ q1 a! a$ y5 i7 E 2. An umbrella term covering technologies that relate to the production of a 3 Z& X% p. N: k/ ~# a Tbeam of concentrated electromagnetic energy or atomic or subatomic particles. 0 O4 M4 x" i: qMDA GLOSSARY, VER. 4.0 D : |% O9 F- s/ p: J& s7 p" b81 " O+ }* N& z. [- D4 X" WDirected Energy $ L u% }9 m, }4 v& `: g, H# \. rDevice 9 L4 \9 m X# k/ ~" yA system using directed energy primarily for a purpose other than as a weapon.- `3 P" U1 s! O8 U2 ^* ~) c Directed energy devices may produce effects that could allow the device to be4 e4 z, H; r7 E+ S8 y7 {) T' O; V used as a weapon against certain threats, for example, laser rangefinders. 1 P2 a1 P+ { [0 k8 `Directed Energy- r/ l" y3 u$ q; W8 `6 q Weapon (DEW)9 S* c4 @" m" H A system using directed energy primarily as a direct means to damage or destroy+ D, m: w% W7 E7 B m- v( ` { enemy equipment, facilities, and personnel.9 n0 e# c# o7 c$ N: Q. F1 h! B* ^ DIRLAUTH Direct Liaison Authorized. 0 [- `- r2 L: k8 g0 | ODIRNSA Director, National Security Agency.$ U& B3 Q( \9 ~1 ~5 J) O DIS (1) Distributed Interactive Simulation. (2) Defense Investigative Service.1 W. W" T. w: ?2 g* u DISA Defense Information Systems Agency, Washington, DC. (Formerly known as3 p6 w) F' g7 w: I) t9 \ Defense Communications Agency).* N5 D9 [8 R' w M. F DISCO Defense Industrial Security Clearance Office9 c/ y3 B) l0 [: p DISCOM Division Support Command (US Army term)." W/ [4 U& [4 k$ Y Discretionary 6 d) Y, u2 a" _ j6 aJudgment ! _$ u( E8 O% E/ u2 S4 p4 e W/ q4 b/ sThe authority given USCINCSPACE or his duly authorized representative to+ X: h- V6 s$ b! o2 c/ V perform actions not covered by the ROE.

使用道具 举报

Rank: 9Rank: 9Rank: 9

38#
发表于 2008-12-25 20:04:40 |只看该作者
DISCRIM Discrimination 1 {+ }: W% c+ W9 R) _! j* mDISN Defense Information System Network (DISA term). $ F+ N6 ~5 H6 v$ ZDISSP Defense-wide Information Systems Security Program. - {, ?0 X; E" f' n( i. ^DISUM Daily Intelligence Summary (JFACC term). 8 d9 o% D% B1 _, }% BDITDS Defense Intelligence Threat Data System.9 O7 n$ }3 @" T9 b- [1 \3 k `$ A DITP Discriminating Interceptor Technology Program. The objective of DITP is the3 I$ [1 Q- R4 U y. h* X6 }1 m2 z development of advanced interceptor seekers to counter advanced threats.# D! y% S( b' v2 M3 G: E" O+ u DITP will integrate passive and active sensors into an interceptor seeker that- A* d" K I& p- H* c, F integrates data fusion processors, multicolor infrared sensors, and LADAR. DTP% n- t5 {# Q t: y0 i flight demonstrations will involve the tracking and interceptor on-board0 E& _3 \) p# S( x/ i4 _& K discrimination of targets of opportunity while providing fusion processor data! X! P. W9 W' S" v4 o4 W; C telemetry. (See also ASTP).8 ]2 [& x7 `( _# b DIVARTY Division Artillery (US Army term).: N1 B. Z: x+ s: d$ g& t DIW Defensive Information Warfare.+ L+ r- b; [( A7 M DLA Defense Logistics Agency, Alexandria, VA. & {3 Y% X0 L1 ?& n8 q" O) WDLSC Defense Logistics Services Center (Battle Creek, MI).7 |8 r3 R8 J- L- A DM Data Management2 \5 T7 Z" m, p0 D6 K DMA Defense Mapping Agency, Fairfax, VA. ( w& t4 G1 g W: CDME Distributed Management Environment. & Y$ P/ }+ |. e& CDMI Dual-Mode Interceptor.8 v# U! t7 {) `" z2 d4 W1 b% K MDA GLOSSARY, VER. 4.0 D & H1 y7 A9 ~0 z2 v7 n82 - P* Y1 ^: O( Q9 k8 }DMRD Defense Management Review Decision.1 y% e3 }* A% m# y( I DMS (1) Defense Message System. + `, a Y9 l: r* s(2) Dissimilar Mission Simulator.5 ?8 K/ d( h+ X- Y" a1 r DMSO Defense Modeling and Simulation Office (OSD).' Y( z0 Z9 q. D2 u6 a8 S5 A* l DMSP Defense Meteorological Satellite Program. r q$ i* x' ]1 l2 a1 u DMU Disk Memory Unit.9 Y1 K: J: J- [- S5 g; J( l0 M DNA Defense Nuclear Agency, Alexandria, VA.% ?- C1 U/ f* V3 D- J8 o6 b DNMS Distributed Network Management System.7 [2 Y; K5 `9 c$ v, Z0 d( q# x9 @ DNSIX DoDIIS Network Security Information Exchange0 x! ^& o; k; W0 ~- s DNSO Defense Network Systems Organization.: b# T% i K& a- v! { DO The lowest rating under the DPAS. All “DO” orders take preference over unrated2 P! |, W, `0 Y orders to meet a required delivery date. $ l/ @! A' N, P! x, @% |0 k fDoc Document. A" c) E- G, q5 M DOCPREP Documentation Preparation.1 z! o# N/ L+ x6 R0 ~8 \, J Doctrine Fundamental principles by which the military forces or elements thereof guide 9 s2 L q2 m4 a; u0 Z# s, Y) Stheir actions in support of national objectives. It is authoritative but requires$ I$ g5 f0 K, m* o6 X# x" ^ judgment in the application. See also Combined Doctrine. 9 p6 U1 v; O+ L, V1 n2 D7 M# ~DoD Department of Defense 8 b& V& L4 g* C8 z+ ~DoD Component2 s; m2 q2 Q; E0 J3 T, Z9 ~4 x Z Acquisition 1 f, n; ^& n/ L& N2 H1 p9 m, GExecutive% w9 q/ P- G+ `! P A single official within a DoD Component who is responsible for all acquisition & S5 o! r! p2 _/ e3 Bfunctions within that Component. This includes Service Acquisition Executives7 e$ y; j% i, H& d1 T. q) V! J for the Military Departments and Acquisition Executives in other DoD - b8 W, f4 e4 U6 `5 M; A* g( R% ?Components who have acquisition management responsibilities. ' Q; o. q+ ^/ K) \* v) V; ~. @( R. LDoD Components The Office of the Secretary of Defense; the Military Departments; the Chairman,- G! K# t2 k3 F5 M% l- I Joint Chiefs of Staff and Joint Staff; the Unified and Specified Commands; the % r4 m# G1 T7 w) m) JDefense Agencies; and DoD Field Activities. / o) `7 y: g: _* L ^) [DoDD DoD Directive. ' Q- e8 i( X8 ]" eDoD Directive : B' ~ `1 v" l# c& o( S* P5000.1$ q7 U/ U; K; B, O6 h$ J “Defense Acquisition.” The principal DoD directive on acquisition. It establishes ) R' \- ?' Q: n, k; Epolicies, practices and procedures of governing the acquisition of defense 5 W1 A7 m5 t* ?: uacquisition programs. 3 Y6 t5 X O* X6 a# V* TDoDI DoD Instruction.7 A# d( F8 ^1 C8 `1 v: \- N$ H1 @7 S DoD Instruction 3 G2 m- v9 o! ]- {5000.23 G) M% W3 }0 x+ L “Defense Acquisition Management Policies and Procedures.” Implements DODD ! F# Z2 J0 r& F5 U5000.1. 8 F# O" _# S& i' ?) h" k' w& QDoDIIS DoD Intelligence Information System.* [: Y6 v5 A; b; A2 O& b/ J DoDISS DoD Index of Specifications and Standards. ) G# _( l1 f, R/ b! O$ t4 m" N1 WDoD-M DoD Manual. & {: n* }/ {( p7 p% FMDA GLOSSARY, VER. 4.0 D C) G* C& M) \; s: M D f6 z! l; V 83 # ~- }0 T7 C& z( Q2 o" C8 p+ BDoDR Department of Defense Regulation. " v$ w: u3 M' lDOD-STD Department of Defense Standard. 8 c0 r) ^% j/ m% RDoE Department of Energy.5 i# C- @/ ~0 k- \& y1 w+ X7 A1 H DOF Degrees of Freedom. + ], A4 h* C# e' iDog House Large Soviet A-frame radar used as a component of the Moscow ABM system , ?& j T+ a: D3 _1 O7 n- R3 Phaving a detection range of approximately 3000 km. It is believed to provide+ ^' d, f9 t, K7 [: z7 @ battle management for the totality of Moscow defenses.: a0 n' Z2 M, u G" J DOP (1) Degree of Protection. (2) Depot Overhaul Point (ILS term).6 E$ i9 w4 a# ^ ?. ^% D DOPAA Description of Proposed Actions and Alternative (environmental term).8 i! Z+ U9 q. S+ w' e! D: p' w Doppler Effect The phenomenon evidenced by the change in the observed frequency of a 1 w& Z5 ~0 \0 |. W2 ^# usound or radio wave caused by a time rate of change in the effective length of. ^0 x! R1 s8 i: f the path of travel between the source and the point of observation.+ {8 L) o9 u3 Q' Q) T# u# t DoS Department of State (US).# z& X0 _/ H/ z DOS Disk Operating System (TelComm/Computer term).2 }+ u6 t& {% T DoT Department of Transportation [US].) i2 {' m7 p4 o6 V i DOT Designated Optical Tracker. . b, V8 P/ ]' j: y7 y( Y9 G1 J! iDOT&E Director, Operational Test & Evaluation.; h) J @: I5 c DOTH Defense of the Homeland.* X9 y' g" `/ r Down Select To reduce the number of contractors working on a program by eliminating one or+ L- Q; A$ S* H& Z3 ^9 F- V9 } more for the next phase. + b. a5 |+ ]8 G3 [DP (1) Data Processor. (2) Decision Point. (3) Deployment Planning.9 c+ j, \6 V3 ] DPA Defense Production Act.% J9 V1 h( {+ m% S" z+ O. e4 B. o4 I DPA&E Director, Program Analysis and Evaluation. 8 l+ L/ Q, z; C0 IDPAS Defense Priority and Allocation System.: C; C" e d' I% I DPAT Dynamic Program Analysis Tool.. d! ~6 V4 Q) O% ^' v. M: _2 _ H3 \ DPB Defense Policy Board. . P/ `, F+ d+ \$ s- P2 A% zDPG Defense Planning Guidance.1 c& s4 k! Q. R7 l3 `2 ` DPM Deputy Program Manager. & c! F: F" ?3 nDPML Deputy Program Manager for Logistics : \4 S5 B5 h K6 ^3 n; qDPP Distributed and Parallel Processing (Computer term).1 z- v2 u7 F' A, n6 V( [ DPR Defense Performance Review. 0 A. ]- U; f0 r1 E& M. vMDA GLOSSARY, VER. 4.0 D5 P* `1 y) _% X+ R9 I 84& U0 C! h! n8 M& Q) @, V* }6 P DPRB See Defense Planning and Resources Board.( O" x( x) e- P2 I, [9 | DPRK Democratic People’s Republic of Korea (North Korea). 8 E E; }* J% Q. Q7 FDPRO Defense Plant Representatives Office.1 E& R+ G0 [- p( k DPSSL Diode-Pumped Solid State Laser. : D1 r3 K) ?- p+ _9 QDR Deployment Review. ! }) F% x5 |9 w# p; fDRAM Dynamic Random Access Memory.! ~) _& T* c( x- C; Z4 {2 j Draw-down Curve A method used to encapsulate the overall performance of a BMD system that ; Q$ G" V, U6 W( ]2 |2 Aplots the probability of survival on the vertical axis versus the number of attacking$ x: k1 Q* Z% T9 L! P9 J$ h7 F RVs on the horizontal axis. Used in conjunction with attack price, they are the6 J1 d* C% b; U9 b9 z most important expressions of a BMD capability. / L5 n5 S; i! @3 E' |0 ?DRB Defense Resources Board.% y+ @; F/ F/ X! f( Y DREN Defense Research and Engineering Network.7 z* r1 _3 k) }0 N DRFP Draft Request for Proposal. & U/ `1 ?5 b' n" j4 k* l+ ?Drift In ballistics, a shift in projectile direction due to gyroscopic action that results from& r& d* D+ V+ o0 r& l gravitational and atmospherically induced torques on the spinning projectile.6 J x/ L. r; F, v4 R$ U DRM DAB Readiness Meeting (DD 5000.2 term). 1 a: ?" |* Y* g2 B: D7 t1 iDrone A land, sea, or air vehicle that is remotely or automatically controlled. See also 1 p# _1 |4 j. {$ S, ERemotely Piloted Vehicle.# F; p8 F; u+ K2 v DRP (1) Deployment Readiness Plan (US Army term). 2 g0 z% r6 H$ x; T% m! P8 L(2) Deployment Readiness Program. d4 u/ l' A/ _, t- l9 D. f DRR Digital Receiver Replacement (USN term).5 f2 J: ]4 t* e/ } DS Deep Space.9 G9 R M! n: q- F$ k DS-1 Category of telecommunications circuit capability.! ]2 o7 m6 J) L/ \; T DS-3 LAN Category of telecommunications circuit for a Local Area Network.% K3 P& E& I$ J$ V DSAA Defense Security Assistance Agency (OSD).( T. r6 s- W' x DSAT Defense Satellite Weapon. 9 i3 u% w2 z8 aDSB Defense Science Board. / ~( E0 n) K) k+ B$ g! XDSCS Defense Satellite Communications Systems. , k& W% T+ ^* a( L4 J eDSCS-3 Defense Satellite Communications System Three. " G; n! S6 `" F" f# ]6 q" a0 CDSCSOC Defense Satellite Communications System Ops Center.9 I) F) L- g# L1 w DSI Defense Simulation Internet s' @' ?+ Z! `% G4 Z# o3 N1 vMDA GLOSSARY, VER. 4.0 D . x# w; m5 m# d2 v/ l85! \- H' G( r3 \& G6 Q$ ~$ l7 I DSIS (1) Defense Special Intelligence System. (2) Defense Simulation Internet1 S7 j# L0 a( k3 m3 G System. ' y/ j, K. j: C& }: i7 sDSM Decision Support Matrix 2 d! O: ]/ g' x1 W) [+ f5 DDSMAC Digital Scene-Matching Area Correlation.* @% u. D/ [4 S( I) @2 J/ C4 a DSMC Defense Systems Management College.. `& V6 J! t0 g; ^ _1 C DSN (1) Defense Switched Network (formerly AUTOVON).8 e6 s2 w3 o. l; J% l a% F (2) Deep Space Network (NASA term). 3 `2 w s# o) FDSP (1) Defense Support Program. (2) Defense Standardization Program. 0 h! w" y! S9 t6 P/ T% @DSPRTM Defense Support Program Real-Time Model.3 F1 D/ {! r j DSR Data Set Ready (TelComm/Computer term). / I2 E) v: ]8 b7 v- jDSRCE Down Scooped Radio Control Equipment (TelComms term). ( V7 w+ x7 j5 o( M" K% bDSS (1) Defense Supply Service. (2) Digital Signature Standard. ' \) f( i: I, X4 T( ?4 e0 tDST Defense Suppression Threat.0 B( ^1 X. D) X) }0 k' C! _; H1 c4 K DSTAR Defense Strategic and Tactical Array Reproducibility. 9 Y0 j; B" N* h( P, b: DDSTO Defence Science Technology Organization (Australia). % k/ M% y& r- r2 e6 QDSU Digital Service Unit (Telecomm/Computer term). 5 d! w) p/ u3 B, mDSWA Defense Special Weapons Agency, Alexandria, VA. DSWA is the successor to3 ~( ?5 {$ X) M5 G$ u the DNA.0 v: G9 u$ C+ }/ q DT (1) Discrimination Technique. 6 A- Q4 }% ^* e(2) Development Testing.- @3 |- J w7 I C' x5 Y/ y (3) See Development Test I, II, III. ' U- {+ V' w6 o6 Y' Z+ f(4) Down Time (ILS term). ' r5 z3 ]8 H, k3 Y/ ?(5) Depressed Trajectory.8 m X: K* z+ V( K (6) Dedicated Target. 1 \& I: U3 s& z- d7 `1 d2 @8 xDT&E Development Test and Evaluation.5 p2 v+ N& ~2 Q1 P/ N DT/OA Development Test/Operational Assessment.' i( c4 f2 d( f" N DT/OT Developmental Test/Operational Test.9 I4 e; b" q0 ?1 ^1 }- @3 u DTAP Defense Technology Area Plan. 9 a' Y2 Z* _- x( hDTC Design-to-Cost.4 t6 S3 I$ U1 M e+ L7 n. z: \ DTD Digital Transfer Device (TelComm/Computer term).. [/ o+ D3 h# z! G DTE Data Terminal Equipment (TelComm/Computer term). . R& r2 t; K0 x/ I: o# eDTED Digital Terrain Elevation Data.: g+ ~* R9 V2 G5 p DTIC Defense Technical Information Center, Alexandria, VA.5 j6 U# G# \$ D MDA GLOSSARY, VER. 4.0 D5 q" g. S- d8 D! G7 L7 n 86 1 Q* ^" |% F/ K( j! iDTIS Defense Technical Information Services (now DEIS). # ]9 N. G2 L; J7 {9 T0 {7 ~DTLCC Design to Life-Cycle Cost. 9 w! R- N( {3 K5 d. I5 l, }DTLOMS Doctrine, Training, Leadership, Organization, Material, and Soldiers (USA BCBL 7 c3 V2 H; `0 Nterm).5 R5 F9 k: p' D9 b3 [ DTLS Descriptive Top-Level Specification. & q: @" J) @/ _( r# {& h2 E6 _DTMF Data Tone Multiple Frequency (TelComm/Computer term). & ^( v" _1 ^: u4 v6 N8 KDTO Defense Technology Objectives. ' o# _3 }( [: ~& M6 K; UDTOC Division Tactical Operations Center. + Q2 s: N$ b6 F* S/ ?DTR (1) Demonstration Test Round. (2) Development Test Round. % J1 f" U- n" v( KDTRM Dual Thrust Rocket Motor." u7 z, R; ]$ ~" w* K2 D DTSA Defense Technology Security Administration. ^. q5 ]$ b. oDTSE&E Director, Test Systems Engineering and Evaluation.! _4 k3 J4 g+ P2 p DTST Defensive Technologies Study Team. 3 S6 i! s5 _/ ?8 p# Y' d( \4 @DTT Design-To Threat ! E4 Y. b2 U/ d/ h: }# n( dDTWT Dual Traveling Wave Tube (Electronics Engineering term). 7 ]8 A+ x3 T6 V% ?" U4 x! QDU Depleted Uranium.9 \6 a& _7 ~" R6 M; N# u5 c# G6 U DUA Design Upgrade Assessment. + c3 A& c$ Q% |Dual Source Two contractors producing the same components or end items for the same, E0 m# n7 f% \/ i4 j5 J+ E* j program. $ ^ ~& }, H2 C/ W" mDUNDEE Down Under Early Warning Experiment (MDA/DSTO term). W0 u: ^3 V3 p$ V DURIP Defense University Research Instrumentation Program. }4 U% r4 j ?( i! n* b+ n5 b/ H' P DUSD Deputy Under Secretary of Defense. : ]/ T* C, T5 } YDUSD (ES) Deputy Under Secretary of Defense (Environmental Security). 6 @$ v& j2 T! pDVAL Demonstration Validation. 4 k( ?$ R- z5 g- b$ T* P8 ~DX The highest rating under the DPAS. It takes preference over all other rated and & n' |' k- p- _8 P: j% r* |4 Lnot rated orders on a contractor’s production line. The BMD program carries a * D6 h2 w7 Y1 y5 a# D3 R4 T“DX” rating. 0 N5 O: {$ e2 j& iMDA GLOSSARY, VER. 4.0 E

使用道具 举报

Rank: 9Rank: 9Rank: 9

39#
发表于 2008-12-25 20:04:59 |只看该作者
87# S. H7 I) z3 \, U, c1 I. v E East 6 I; Q0 o) t/ V+ iE2 I See Endo-Exoatmospheric Interceptor. . U- g& g, C+ x' ZE2SRD Effectively Two-System Requirement Document.& H' K, I% Q0 Z& Q E3 (1) Electromagnetic Environmental Effects.: E$ V1 [( ^* o) u+ k; ~/ J (2) Electrical, Electronic, and Electromechanical. " u3 X: u a* r3 \E Spec Materiel Specification.5 z) _1 g6 ]) O4 E$ j( l EA (1) Environmental Assessment.$ Z' e. m- ~3 `4 G2 C/ y (2) Engagement Authorization.( j+ ` t2 b. x' [! R, L (3) Executing Agent." O& h. Y( q! [0 n* P8 n/ R7 n (4) Evolutionary Acquisition. 7 `7 R" K, z9 w' |6 Z2 f(5) Environmental Analysis (environmental term)., L% ]5 a6 t& t# T (6) Executive Agent. 7 L# I. F5 c4 Q. T6 FEAC Estimated Cost at Completion. 9 q0 _# C/ Q; i6 s% w ~# ]EAD (1) Engineering Analysis and Design. (2) Extended air defense.. A7 U8 H1 h1 t3 { EAD/D Engineering, Analysis, Design and Development. $ e. `, W1 g0 U$ z; b* Q$ J( s8 SEADSIM Extended Air Defense Simulation.$ o: m$ D: I5 n EADTB Extended Air Defense Test Bed. An object-oriented simulation tool allowing ! s/ d* f8 J/ ausers to model military response to airborne and ballistic missile threats.9 R% ~- | x" Q# Q9 ^ u3 m EADTBP Extended Air Defense Test Bed Program.1 R( a0 I6 p% m1 S EAGLE Extended Airborne Global Launch Evaluator." a( @% g6 `1 } EAM Emergency Action Message. # [8 j U, C( lEAR Export Administration Regulations. + [$ K( S6 y9 T! X3 m& ZEarly Operational( V/ L4 k+ `. e1 w6 A3 H9 L Assessment 5 H5 b8 L f& _1 Y' @1 |An operational assessment conducted prior to, or in support of, Milestone II. $ }5 Z& T9 P1 p" c5 U5 ZEarly User Test& n3 }: |2 k1 ~% `; Q (EUT) ; T% C1 t( k3 ~- w. nA test employing representative users to examine materiel concepts, training or3 t1 E9 k% G3 A5 v logistics planning, or inter-operability issues. EUT can be accomplished during 5 L9 ]5 ]; K$ U$ L* p: i- |DEM/VAL on brassboard configurations, experimental prototypes, or surrogates( k% f0 Q; Q; f to provide data leading to the decision to enter full-scale development. 1 Y' {4 Y! I1 }* W5 |: o$ pEarly Warning (1) Early detection of an enemy ballistic missile launch, usually by means of 7 C' V E. @# ^# q p7 b7 ~2 Jsurveillance satellites and long range radar. 8 @/ Z/ l; u2 L' z+ j3 n/ \(2) Early notification of the launch or approach of unknown weapons or . J- B6 o. J; z$ D- C- xweapon carriers. 1 d! K' L! r* R" Z+ l, aEarth Limb The apparent outer edge of the earth as viewed from space.7 x Z% k6 K5 M9 A# t2 B$ g6 t Eastern Test 0 ]/ w" y5 j7 f$ rRange (ETR) ' K1 V" y# |6 C" a) M) l8 ABeginning at Patrick AFB, FL, this range stretches halfway around the globe + O4 x8 x9 N0 m. X: owhere it meets the Western Test Range. An array of launch complexes, sensors,! R7 B- g8 t# Q( K# I( u and tracking sites make up the Eastern Test Range. The ETR is now operated( B5 u( @7 I; s+ ^0 O$ b& M by AFSPACECOM as shown in WTR definition.3 N" N# {* k: H4 m7 R8 q MDA GLOSSARY, VER. 4.0 E( b" c) A/ X& s 885 h2 h+ Y& B; r) b EB (1) Electron Beam. (2) Enhanced Blast.2 Y$ y& x. o' U6 h+ H EBB Electronic Bulletin Board.% ~, R! ]8 E' J" j3 P1 ~ EBCDIC Extended Binary Code Decimal Interchange Code.; \. Y3 L# ~: t' X8 p EBW Electron Beam Welding.2 p/ s1 l8 u, V+ Z/ b2 D4 L) l6 w EC (1) Electronic Combat.* ` o* s. e# w6 c( y0 @, N W (2) Error Control.3 f! B1 f1 ?! |1 F+ u# q0 B3 D (3) OBSOLETE. European Community. Now known as the European Union ! y2 N! l( m9 E2 C- o) E(EU).1 v& n X4 g/ s3 | L EC/EDI Electronic Commerce/Electronic Data Interchange4 ~3 p$ K1 E& T' M- M! V9 T6 y8 f ECAC Electromagnetic Compatibility Analysis Center. 7 m" X8 ?& b: c7 jECB Engineering Change Board.& g% n, h: B- y1 ?9 F* S ECC (1) Equipment Control Center. (2) Element Control Center (USAF term).! t9 u3 m8 Y0 F! T+ h; z. a ECCM Electronic Counter-Countermeasures. 4 v* B* e- a E* F+ Z+ Y$ h9 zECDs Element Control Directives.0 q- O7 w9 s6 H9 s ECLS ERINT Command and Launch System.0 _7 {( D( U- t: C) [% a* u8 a7 Y( z1 R ECM Electronic Countermeasures.! u7 P* a5 S$ r3 K' ^$ A ECN Engineering Change Notice. m" O! C1 Q( w$ L6 }( I& L ECO Engagement Control Orders. ) `! D0 D' f. s4 r+ Q MECP (1) Engineering Change Proposal. (2) Emergency Command Precedence. & q; g* @( ?& Z8 v/ U; ^( UECPMO Electronic Commerce Program Management Office. + |9 j8 k6 [+ g1 d/ l- @ECS Engagement Control Station (PATRIOT). 0 G% p1 E) M7 R' O. e, t3 q* xECU Environmental Control Unit. % _) X5 Z& p7 y; f9 x# |EDAC Error Detection and Correction4 K% V. l; O/ G) K' g EDGES Electronic Data/Guidelines for Element Survivability. : w |5 t% E* z9 ?EDL Electrical Discharge Laser ; M3 c& t J# D1 \7 L& {) gEDM Engineering Development Model.2 m1 B3 R1 ~( d n EDP Engineering Development Process) x1 z; X5 M, [4 |: t EDR Embedded Data Recorder (PATRIOT)./ ]) ]1 l% f# m9 F# V, K EDS Electronic Data Systems Corporation e0 U F/ i% P/ [4 AEDWA Engagement Determination and Weapons Assignment (PATRIOT). O: V6 q( p( o" G MDA GLOSSARY, VER. 4.0 E # K1 P/ W; G2 n- ]& M1 O2 p89 , w7 A2 E9 W/ m; K3 LEDX Exoatmospheric Discrimination Experiment ! v5 |! u1 _* s% x" e* C4 k$ T# TEE (1) Electrical Engineering. (2) Engineering Estimate. ) k$ Q) Z# D5 y# R& d6 J' z i: t% q! g, ^EED Electro-Explosive Device.; y; I! A3 D/ M0 X# x5 Z- a: F9 ? EEEV End-to-End Experimental Version./ ?* `. G3 R5 \/ W; U9 N. {. a, y EEFI Essential Elements of Friendly Information. 3 S4 P$ i+ R9 I3 S6 }, DEEI Essential Elements of Information. & `0 L: r: g8 H# F, DEEIC Element of Expense Investment Code.# s5 P, b6 y3 M+ W. E( S EELV Evolved Expendable Launch Vehicle (USAF term)4 x$ {3 }0 \( { EEU Electronic Equipment Unit.0 J0 e$ J# ^% b8 @3 B7 \ EFEX Endo-Aeromechanics Flight Experiment.2 r. u8 V& G0 k' \ EFF Electronic Frontier Foundation. 4 o6 Z- G7 ^4 o; J- @& Z0 P: IEffectivity A designation given to the BMDS configuration and demonstrated capability at" G3 {/ Q% ], j# Z# r( _ a point in time, becoming effective at each increment when an element or 5 A1 ]$ _" b! |0 ?) zcomponent is inserted into a particular Block.: U J9 G3 D& }3 U8 G: Q Effective Damage That damage necessary to render a target element inoperative, unserviceable,2 s! [% W& N% R" A: h! d. i nonproductive, or uninhabitable. s9 J% S" {6 V5 gEffluent Plume The pathway of movement of effluents through surface water or air. # A) C% `% e0 y9 S0 c% @, M- QEFP Explosively Formed Projectile. / r A. p5 }5 GEGP End Game Processor. 5 P U( j+ u/ YEGTR Eglin [AFB] Gulf Test Range.# v2 ]3 n, [' ~; V$ T5 J EHC Enhance Hit Capability (USN term, related to SM2 Block IVA). - r( k- N' t+ T9 @; `EHF Extremely High Frequency.& o9 z- }) F3 |; P) ] ehp Equivalent Horsepower.9 k. G3 X5 S' f! h EIA (1) Environmental Impact Assessment. " l3 D8 I H1 e6 `& I2 K8 @" X(2) Electronic Industries Association. $ }$ b1 L2 N1 U) J" J% @; }EIAP Environmental Impact Analysis Process. & f4 }2 \! f0 l6 B$ s) T: l" s, dEIP Exoatmospheric Interceptor Propulsion. ; D7 |0 f3 Y; X3 G. eEIPC Electronic Information Privacy Center. 9 @0 s" d; g' }6 @$ C; h4 t, a- fEIPT (1) Element IPT. (2) Engineering IPT. 1 ~8 L7 ^0 Y$ S8 d" w, W- lEIS (1) Environmental Impact Statement. (2) Explosive Initiation System. U% x1 Y# V; a1 ?4 r9 z7 P EISA Extended Industry Standard Architecture (Telecomm/Computer term). $ q8 R; v F% y/ a6 b$ g u8 Y" FMDA GLOSSARY, VER. 4.0 E # y+ }' h' p4 L( g90 1 O, k7 P# T9 g5 T6 ]EKV (1) Electromagnetic Kill Vehicle. (2) Exoatmospheric Kill Vehicle. % O; O c: H+ F* P# C) {& @( `$ lElastic Range The stress range in which a material will recover its original form when the force 5 x- ~5 y; T4 Q/ p4 ~/ ~. T O/ N(or loading) is removed. Elastic deformation refers to dimensional changes % S( U# y/ s1 b& U/ ioccurring within the elastic range. 8 }7 U# e9 w& a$ s: aElectro-Optics- \* E2 \' R5 [ Infrared (EO/IR) ( T9 n- {& x- i1 _% j; uTechnologies/techniques employed by optical sensors in the wavelength4 u: p0 p% h7 m3 ` spectrum slightly longer than visible but shorter than radio. / M' G' Q# L2 \3 b9 k0 zElectromagnetic 7 F+ S _4 d" Y) v+ SCompatibility . e$ y9 C. a2 e& t2 T1 e; x(EMC)" w5 W* ?* i% L' V5 X. E A condition when all electromagnetic emissions from electronic, electro-magnetic,1 F- g0 L% N* T+ H1 _3 i and electro-optical components of a system interact without interfering with one( C( H z3 I0 X another. " `. B- R. L) ]/ H& T" D1 SElectromagnetic % {9 T3 z/ Q" ^+ p% JEmanations S% `% ~0 w& X. x) q, dSignals transmitted as radiation through the air, through a vacuum, or through A8 f0 ~" g& m1 H6 x conductors. + n5 E5 t# K: Q! R. S5 x6 y" D7 nElectromagnetic $ C' r, C6 |# t, [% @- _Field (EMF) , b: J" p# G' }; {( sAn electric or magnetic field or combination of the two, as in an electromagnetic) D* r/ g" o5 v6 C wave. Created by electric charges in motion, having both electric and magnetic . F3 u! E2 ]8 S) Zcomponents oriented at right angles to one another and containing a definite ( G& w; j5 d; U2 ^' R( S) W3 X. S* Pamount of energy.: P' _0 S H9 z Electromagnetic , w& g4 E# u) j4 ZGun (EMG)5 }6 {3 S( o! i/ ]) i! \ A gun in which the projectile is accelerated by electromagnetic forces rather than 6 W; ^3 A$ K5 t( s8 ]1 P3 Uby an explosion, as in a conventional gun.7 D) h' D$ ]' E4 z6 S7 r. ^ ~ Electromagnetic 1 F% Y+ Y4 M( [8 T$ ZInterference (EMI) . m; p1 @ v' p6 C5 AAny electromagnetic disturbance that interrupts, obstructs, or otherwise ) c, J4 f- ~8 Zdegrades or limits the effective performance of electronics/electrical equipment.1 o+ D; }* ?( F) N; K" Z It can be induced intentionally, as in some forms of electronic warfare, or7 I: R$ u' O! d- T. [+ C unintentionally, as a result of spurious emissions and responses, intermodulation products, and the like.) m& \' g& _! ` Electromagnetic: ^; r5 M/ \+ Y# c* [& J2 j, L Pulse (EMP)6 t- k/ v# d3 {5 @4 B2 [$ f1 ] The electromagnetic radiation from a nuclear explosion caused by Comptonrecoil electrons and photoelectrons from photons scattered in the materials of $ H/ {6 @* [/ V# A, G* Ethe nuclear device or in a surrounding medium. The resulting electric and/ l; b z- N1 _# X magnetic fields may couple with electrical/electronic systems to produce , y9 F3 l( N' M% H3 Wdamaging current and voltage surges. May also be caused by non-nuclear 1 j" |) w: d% G! Gmeans.

使用道具 举报

Rank: 9Rank: 9Rank: 9

40#
发表于 2008-12-25 20:05:12 |只看该作者
Electromagnetic 9 r# c9 O) ^: w/ m* _& H+ N7 sRadiation (EMR)9 T: Q8 i3 V- ~4 ?2 l0 l, s2 l( Z (1) A form of propagated energy, arising from electric charges in motion that( c1 E+ ]' l( G& n U produces a simultaneous wavelike variation of electric and magnetic8 |+ H. Z5 _2 j# {& | fields in space. The highest frequencies (or shortest wavelengths) of! Q9 K" V9 }& i) f) T1 J: t such radiation are possessed by gamma rays, which originate from 2 O6 t. P q0 u+ \7 H7 O9 f! x( vprocesses within atomic nuclei. As one goes to lower frequencies, the & f6 K5 c2 |/ t: q$ m eelectromagnetic spectrum includes x-rays, ultraviolet light, visible light, " S8 |$ X1 g$ B* i) Linfrared light, microwaves, and radio waves. ]# [% C6 h$ M. t) L) ] (2) Radiation made up of oscillating electric and magnetic fields and 7 _$ D3 K+ p! G/ E# b9 cpropagated with the speed of light. Includes gamma radiation, X-rays, # L, [8 ^- E4 }* {2 t* P |ultraviolet, visible, and infrared radiation, and radar and radio waves. + g0 X' h" [. o* C3 S% x) jElectromagnetics Application of electrical, electronic, and magnetic phenomena to develop devices 5 ^3 @' a$ E- l2 @used in system/subsystem design, excluding employment in the RF spectrum. . r/ Y6 E7 s# c3 GElectromagnetic 9 s8 R3 b4 p o) x. v7 kSpectrum * ~9 O1 ]& [4 S) [4 s' y; U; CThe range of frequencies of electromagnetic radiation from zero to infinity. It is # G8 ]: F: _+ w1 z9 p. d, u9 bdivided into 26 alphabetically designated bands.+ o! I O1 v" Q" _$ O! @/ H MDA GLOSSARY, VER. 4.0 E 7 r- O2 L4 J9 V% E0 c1 D' h91- i6 ]0 h0 }& W2 h2 R# f Electronic & p$ y* |( M# X1 ^! wCounter- + G) j, Z7 n& A3 J& lCountermeasure; ` k6 a. d2 F' v s (ECCM) 6 r( B6 R# a) s+ k3 S/ D! yThat division of electronic warfare involving actions taken to insure friendly- ^' z7 u& B" v( \, y effective use of the electromagnetic, optical, and acoustic spectra despite the 4 R% F1 g. O! m' zenemy’s use of electronic warfare to include high power microwave techniques./ N$ L; A. [( h Electronic ( }0 r) n8 w/ H9 T8 S' B5 eCountermeasure+ z3 S2 y9 s" { (ECM) ( o+ u1 B8 S+ D2 T/ fThat division of electronic warfare involving actions taken to prevent or reduce an 9 |" a9 `" b' _- Nenemy’s effective use of the electromagnetic spectrum. $ @# {0 [, e) c$ y4 uElectronic: c9 H E% K' v' l3 X Industries 2 Q4 W1 _3 M1 O& O0 g* K. J) g4 yAssociation (EIA) , h* {8 L. ]. C7 E( HA standards organization specializing in the electrical and functional + A ^6 w2 L8 p2 y3 l; Mcharacteristics of interface equipment. & U1 l1 ^* _/ T/ e$ T- i7 U% Q7 D+ sElectronic; w o8 I* U: G+ b# I1 t Warfare (EW) 2 I/ f) ^4 R3 {# E' @Any military activity involving the use of electromagnetic and directed energy to 6 s- a: { \$ U" I( C5 ?5 ycontrol the electromagnetic spectrum or to attack the enemy. The three major C8 A; J1 |4 H5 \% t' H8 \subdivisions are: 2 ^) M$ p/ k2 M8 l•Electronic attack – Involves the use of electromagnetic or directed energy to9 S% P, A# J& M5 Q) ? attack personnel, facilities, or equipment with the intent of degrading, ) F5 q% A3 M0 ]neutralizing, or destroying enemy combat capability. Also known as EA.' ^/ r6 A g5 i, }4 F, o5 U Includes: 1) actions taken to prevent or reduce an enemy’s effective use of 2 K3 f" ^! X% y# B. Q& x% l) {the electromagnetic spectrum, such as jamming and electromagnetic0 W1 e7 t0 ~( ?8 z( W$ l! |& [ deception, and 2) employment of weapons that use either electromagnetic or8 a. q5 ?3 f* J: h directed energy as their primary destructive mechanism (lasers, radio 3 ^- d1 W& @! H5 j. D& Hfrequency weapons, particle beams). d; K6 e4 C, s) X* b•Electronic protection -- Involves actions taken to protect personnel, facilities, ! \, ?3 p3 d+ C) ]8 jand equipment from any effects of friendly or enemy employment of% c( [9 f+ U9 S+ I" p* h electronic warfare that degrade, neutralize, or destroy friendly combat4 _, a7 C1 Y4 I3 N- N) ^) D M capability. Also called EP. @8 I, h9 ^8 D+ Y •Electronic warfare support – Involves actions tasked by, or under direct( I5 C X+ H0 {6 C/ [+ R control of, an operational commander to search for, intercept, identify, and1 m. H. P& {, L# H" c) Q+ k locate sources of intentional and unintentional radiated electromagnetic y) b% K& j. j. X; Z) ]8 {5 U energy for the purpose of immediate threat recognition. Thus, electronic 4 p' |7 k0 J$ \warfare support provides information required for immediate decisions ( J1 x$ d) w3 qinvolving electronic warfare operations and other tactical actions such as " n- r# g5 d/ \ X$ Sthreat avoidance, targeting, and homing. Also called ES.$ y' w& z X' r+ |# o! D Electronic) ^. X( e* s5 F& | Warfare (EW) 1 D: Y! |! b1 U& l, eEnvironments ( u5 n" [' H8 o% jElectronic warfare environments result from radar and communications jamming 0 l5 q) c5 J% p q0 y2 J5 V( t2 oand other related electromagnetic countermeasures and countercountermeasures. Currently, radar jamming is the sole EW threat for the NMD( K/ Q7 b/ O: m8 h" s: ] system.( q G+ s. J/ Z3 X: q& T' Z b0 p Electronics1 n% \0 c( @1 n6 x Intelligence# Z: u8 r9 V; P. ]" v (ELINT) 0 P% s& ?4 N1 R' s) \4 JTechnical and geo-location intelligence derived from foreign non-communications 5 _8 G" }; G0 Relectromagnetic radiations emanating from other than nuclear detonations or ( k! Y& A. s9 ~' s4 _- cradioactive sources. # t" I N7 T& ~7 f* JElectronics 9 w6 f5 B0 E/ r9 L! s3 k8 h* @) oSecurity (ELSEC)8 ?5 b, }0 \! P+ x3 M& D" Z1 ]% {8 b The protection resulting from all measures designed to deny unauthorized . ~5 ^0 x; k) `3 ?persons information of value that might be derived from their interception and/ d: ?8 H# S. l" n5 y study of non-communications electromagnetic radiations, e.g. radar. $ D1 d' P5 s/ w9 E3 h9 sElectro-Optics: u0 }, P8 Q. W: ? Infrared (EO/IR), M; y% i/ B0 V2 N' A N4 e. \ Technologies/techniques employed by optical sensors in the wavelength" |( x' s: I) d3 X4 F6 N! W spectrum slightly longer than visible but shorter than radio./ [# ~4 C; \2 v: k MDA GLOSSARY, VER. 4.0 E 2 H! [9 Z) Q1 _! \( Z; e92 % R2 i# |2 ?- M- J8 ]Element A complete, integrated set of components capable of autonomously providing % \0 C& r% p2 }9 ` YBMDS capability. ' }+ f3 a& Q) LElement7 ^+ b2 _5 F$ s, W$ ~8 b! {5 a Capability# A" H/ V& @4 t# L- u Specification! S; l/ U; g, H( F' V8 g e (ECS); B" n9 m0 i7 o& S A document that identifies the element-level BMDS capabilities and . T& k' y: Q4 k8 _# g+ g0 ~specifications necessary to achieve the system capabilities identified in the SCS.0 `! q2 k! G/ a4 k0 o) a8 P The ECS further defines the SCS-apportioned mission/technical performance" }/ H8 A8 o+ R* x0 x6 Q& b3 N capabilities and allocates these capabilities to the element’s components.9 a, w o# ^0 g: V# ` Element Control 6 S+ A6 c# [: v8 kDirectives (ECDs). f. k$ P( l8 b( Y; w2 c The command and control data instructions to control the conduct of the/ c- Q) d) o7 m5 l# l4 i, R" Z7 q engagement. ECDs are developed by command and control software based 3 z; a5 v5 U y$ r( s' l- oupon variable parameter input by the operators (both pre-planned and real time), : U# U/ C- N. f; A3 Y: [and operator defined rule sets embedded in the software. The individual battle b9 M; D+ [* A2 c9 Q! n6 Z" D management processors use these instructions to accomplish the assigned tasks 4 {1 e4 l; a2 ]/ c: H- Z6 [from the operations order. ECDs are contained within a Task and represent the $ f) {& W6 C1 P3 q- V% e4 Jform of parameter values that influence the resource management processes of1 W. i4 k, j% l1 f Weapon Target Assignment (WTA), Sensor Resource Management (SRM), and * s. c) i& u8 f lCommunications Management (CM). There will be numerous ECDs per Task.; K. ]! k# d2 @( c4 M Element" {1 m; O V/ y$ l6 M- g Operations3 p; l+ J1 y" `- M Center (EOC) ( H' u! e4 c( t o: g/ S0 j, _An Air Force operations center, which operates and maintains a BMD weapon or " @2 ~, J; h0 O: F6 Esensor suite. (USSPACECOM)3 I& U' _0 u8 Q ELF Extremely Low Frequency. 4 ~7 m4 `) N- M" CELIAS Earth Limb Infrared Atomic Structure." Y* z: w. V( w6 u6 e H) K5 G ELINFOSEC Electronic Information Security. 6 [. N, M7 k$ K9 V3 tELINT Electronics Intelligence.

使用道具 举报

您需要登录后才可以回帖 登录 | 注册


Archiver|航空论坛 ( 渝ICP备10008336号 )

GMT+8, 2025-4-4 06:06 , Processed in 0.046800 second(s), 9 queries .

Powered by Discuz! X2

© 2001-2011 MinHang.CC.

回顶部