Abstract:? DESCRIPTION (provided by applicant): The incidence and prevalence of both alcoholic and non-alcoholic liver diseases is increasing. The population presenting with Metabolic Syndrome, a key risk factor for NAFLD-NASH-liver fibrosis is ballooning. Leftuntreated, liver fibrosis can progress to… more
Abstract:Human land-use decisions can adversely affect the vitality and diversity of natural communities. However, well-designed regional development plans can mitigate or even reverse biodiversity losses. This project aims to develop methods and software for evaluating the effects of human landusedecisions… more
Abstract:Secure Decisions is developing a software assurance risk management technology called "Code Ray" to: (1) Improve the speed, accuracy and confidence in detection of vulnerabilities by cross-mapping and normalizing the output of hybrid application security testing (HAST) techniques -- dynamic analysis… more
Abstract:Under our Phase II SBIR we developed a compelling new technology for software assurance called Code Dx. We used initial feedback from government
agencies and industry experts, collected during beta testing and Version 1.0 evaluations, to produce Version 1.1 which is technically mature and ready
Abstract:ABSTRACT: AIS proposes Split-Cloud for Enabling Trust (SCEnT), a Phase I SBIR effort to determine the feasibility of providing trust in a shared/public cloud environment. Current options for providing networked applications require making significant trade-offs: either the cost of private in-house… more
Abstract:ABSTRACT: Cloud users should have the ability to fight-through attacks and protect sensitive data on cloud infrastructure that they may or may not physically control. The user must be able to deploy these defenses themselves, without any support from the cloud provider. This will ensure that the… more
Abstract:ABSTRACT: This effort will establish the capability to apply security patches to virtual machines (VMs) running operating systems that are misconfigured or malfunctioning. Application of the patches will be minimally dependent on the VM host, protected from interference by other processes, and… more
Abstract:ABSTRACT: Assured Information Security, Inc. (AIS) proposes Endpoint-Operated Link-assured Security (EOLuS), an effort to develop a product with the capability for realizing continuous end-to-end trust (EtET) in a dynamic network a network in which every client would verify and monitor the… more
Abstract:ABSTRACT: To maintain superiority in the cyber domain, the Air Force is preparing the next generation of cyber warriors. Running trainees through realistic exercises on cyber ranges is a highly effective method for preparing warfighters for cyber operations. However, training platforms and cyber… more
Abstract:JTRS tactical networks that employ mobile ad hoc networking (MANET) protocols, while providing new network centric capabilities for the warfighter, also present challenges for real-time cyber defense and cyber situational awareness. The JPEO JTRS therefore identified the need to protect tactical… more
Abstract:ABSTRACT: Cloud computing is an attractive platform architecture for many IT applications, particularly because of its support for elastic scaling in response to changing loads. However, adoption of cloud computing is hampered by reduced computing efficiency, higher management cost, and greater… more
Abstract:ABSTRACT: Most cross-domain information flows require some human intervention to ensure that the requirements for releasability are met. Such intervention is expensive and slow, and can form a bottleneck in operations. Unfortunately, fully automated sharing of information across security domain… more
Abstract:First Responders need to leverage automated (M2M machine-to-machine), mobile connectivity at an incident site. With connectivity automated
through M2M network technology, responders would have much improved situational awareness, and can effectively focus their complete attention on the necessary… more
Abstract:a novel family of proximity switchs is proposed based on EM technology field perturbation.This technology enables the proximity switch to be low cost, light weight, highly accurate and meets all MIL_PRF_24711B requirements. The proposed switch can be used in new NAVY vessel design as well as… more
Abstract:DESCRIPTION (provided by applicant): Babesia microti, the primary etiologic agent of human babesiosis, is a tick borne eukaryotic apicomplexan pathogen that is an increasing threat to the US public health. Although B. microti is primarily a tick borne pathogen, it can be transmitted by transfusion… more
Abstract:One of the major benefits of tactical cloud computing is improved net-centric capabilities and operations with the objective of information dominance. The reassign-able pools of computing resources and efficient information across operational boundaries can produce a more accurate and up to date… more
Abstract:Our objective is to develop an innovative cognitive knowledge-aided information processing framework to take very high rate intelligence data streams over wide areas and autonomously highlight Areas-of-Interest (AOIs) and targets for the image analyst without a priori knowledge of the area or… more
Abstract:DESCRIPTION (provided by applicant): The goal of this project is address a large unmet medical need by providing more kidneys for transplant. For the gt400,000 patients with end-stage renal disease in the U.S. the pool of cadaveric kidneys has remained stagnant over the past decade. As a result, the… more
Abstract:DESCRIPTION (provided by applicant): The focus of this project is a novel immunomodifying therapy that provides protection from early allograft rejection in the absence of the standard toxic systemic immunosuppressive drug regimens. This novel therapy is anano-barrier membrane called NB-LVF4… more
Abstract:There is a pressing need for designing new devices facilitating the development of paradigm changing, minimally invasive, approaches to treat diseased tissues in situ. Additionally, there is a growing number of studies showing that combinatorial approachesare providing a path for personalization of… more
Abstract:DESCRIPTION (provided by applicant): Inflammatory Bowel Disease (IBD), which includes ulcerative colitis and Crohn's disease, is one of the five most prevalent gastrointestinal diseases in the USA. The overall cost exceeds 1.7 billion, affecting as manyas 1.4 million individuals in the USA… more
Abstract:ABSTRACT: The overall objective is to enable users on-the-move to reliably and securely send and receive information, targeted for recipients'geographic locations, filtered on their credentials, made persistently available if so designated, and tailored for their devices, facilitating their… more
Abstract:DESCRIPTION (provided by applicant): Nearly 25 percent of death and disease, worldwide, is linked to environmental factors (WHO, 2006); therefore, it is critical that the general public has basic understanding of how the environment affects their health and how they might protect themselves against… more
Abstract:DESCRIPTION (provided by applicant): This Lab to Marketplace SBIR Phase I Phase II Fast Track Application has as its long- term objective to establish ultrasound as a safe, effective, and non-invasive method for assessing fracture risk, an important component in clinical management of osteoporosis.… more
Abstract:Diamond Visionics proposes a solution to decouple rendering channels from simulators and displays by developing a novel architecture consisting of both hardware and software. Modern video processing and networking techniques will be utilized such that any display in the system can be connected to… more
There are several categories such as “By Agency”, “By Year”, “By State” etc.
Select a checkbox within a category to refine your search results.
Each of your selections is listed in the “Narrow Search Filters” bar. You can uncheck these selections to remove them.
Search for Either Criteria
When you select multiple values within a category, the results will include values that match either of the selections.
For example, selecting “2005” and “2007” in the “By Year” category will display results that include either 2005 OR 2007 in the results.
Narrowing the Search Results
You can refine your search results across categories. To narrow down your results, select multiple values across different categories. The results will only include values that match the selections across the categories.
For example, selecting “2005” in the “By Year” category and “NASA” in the “By Agency” category will only display the results that contain both “2005” AND “NASA” in the results.