Page | Edit date | Member | Size |
---|---|---|---|
5-1-5. HOLDING PATTERN SURVEILLANCE | MJ | 60 bytes | |
5-1-4. MERGING TARGET PROCEDURES | MJ | 60 bytes | |
5-1-3. ELECTRONIC ATTACK (EA) ACTIVITY | MJ | 60 bytes | |
5-1-2. ATC SURVEILLANCE SOURCE USE | MJ | 60 bytes | |
5-1-1. PRESENTATION AND EQUIPMENT PERFORMANCE | MJ | 60 bytes | |
Section 14. Standard Terminal Automation Replacement System (STARS) - Terminal | MJ | 60 bytes | |
Section 13. Automation - En Route | MJ | 60 bytes | |
Section 12. PAR Approaches - Terminal | MJ | 60 bytes | |
Section 11. Surveillance Approaches - Terminal | MJ | 60 bytes | |
Section 10. Radar Approaches - Terminal | MJ | 60 bytes |