You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Cyber-Physical Trust Anchors with Definable Costs and Security

    SBC: REFINED IMAGING, LLC            Topic: 3

    A cyber-physical trust anchor is an essential component of a secure additive manufacturing supply chain. Customer discussions show a strong need for low-cost trust anchors as well as high-security, more costly trust anchors. The concept underlying our trust anchor enables implementations that can be described as good, better, best. The two physical-digital components are first embedded digital cod ...

    SBIR Phase I 2022 Department of CommerceNational Institute of Standards and Technology
  2. Raw Data Generation Tool for X-ray Security Imaging Systems

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0141003

    The X-ray intensity as measured by detectors depends on all aspects of the imaging system ranging from the source spectrum to various scatter events during the photon transport. The proposed simulator models the entire X-ray detection process from photon generation to various scatter events to the eventual detection of transmitted/scattered photons. In particular, the simulator models the two impo ...

    SBIR Phase I 2014 Department of Homeland Security
  3. Bulk Currency Vapor detection in Confined Spaces

    SBC: NEVADA NANOTECH SYSTEMS, INC.            Topic: HSB0132001

    The proposed goal of Nevada Nanotech Systems Inc for the Phase II program is to adapt a commercially available gas chromatograph-mass spectrometer instrument for the problem of detecting U.S. currency via unique vapor signature in confined spaces and then field test three prototype units, operated by government personnel, during a 6-month field test. After this test, we will provide detailed docu ...

    SBIR Phase II 2014 Department of Homeland Security
  4. Automatic Threat Recognition Algorithm for Volumetric CT Data

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0122002

    For Phase II work, we propose to complete the development of the DICOS compliant ATR algorithm whose feasibility has been demonstrated by results of Phase I work. Important project milestones for the first base year of Phase II are as follows: (1) implementation of the DICOS standard including network protocol, (2) improvement of the proposed ATR algorithm in terms of explosive detection performan ...

    SBIR Phase II 2013 Department of Homeland Security
  5. Bulk Currency Vapor detection in Confined Spaces

    SBC: NEVADA NANOTECH SYSTEMS, INC.            Topic: HSB0132001

    The proposed goal of Nevada Nanotech Systems Inc for the Phase I program is to select a practical technological solution and develop a Con-Ops for the problem of detecting U.S. currency via unique vapor signature(s) in confined spaces for three related, though unique, application scenarios (bags, vehicles, and shipping containers). Nevada Nano will document a matrix of technical and operational re ...

    SBIR Phase I 2013 Department of Homeland Security
  6. Automatic Threat Recognition Algorithm for Volumetric CT Data

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0122002

    This Phase I proposal describes the development of an Automatic Threat Recognition (ATR) algorithm for volumetric CT data. Our ATR algorithm consists of four stages: (1) preprocessing of CT data, (2) object segmentation of preprocessed CT data, (3) post-processing of segmentation results, and (4) explosive detection from the segmented objects. The ATR algorithm will be made computationally efficie ...

    SBIR Phase I 2012 Department of Homeland Security
  7. Image Quality Assessment Toolkit for X-ray Imaging Systems

    SBC: Telesecurity Sciences, Inc.            Topic: HSB0122003

    This Phase I proposal describes (1) an automated image quality assessment (IQA) software to objectively quantify image quality of airport security X-ray imaging systems for both checked and carry-on baggage and (2) a design for a novel test phantom specialized for security CT scanners. For fixed images, automated algorithms will measure the Modulation Transfer Function (MTF) and Contrast-to-Noise ...

    SBIR Phase I 2012 Department of Homeland Security
  8. Open Architecture for Spatial Information Services (OASIS)

    SBC: SEV1TECH, LLC            Topic: HSB0101003

    The numerous management tools currently employed for disaster response presents a barrier when attempting to share information across boundaries. This impediment is due to the different reporting formats, data storages, or incompatibility of software being deployed. Geocent proposes implementing multiple GIS open standards serves as the backbone for exchanging critical information to facilitate in ...

    SBIR Phase I 2010 Department of Homeland Security
  9. See-Thru-Eye

    SBC: TECHNOLOGY INTERNATIONAL INCORPORATED OF VIRGINIA            Topic: HSB041007

    This Phase I SBIR research effort involves a feasibility study and an in-depth investigation into technologies that would be applied in ship compartment inspection to ensure full space accountability. A trade study will identify the most promising technology to develop and design a handheld, man-portable See-Thru-Eye capable of penetrating a host of barriers of different thicknesses and constructi ...

    SBIR Phase I 2004 Department of Homeland Security
  10. Crypto-Secure Remote Terminal Unit for New and Retrofit Supervisory Control and Data Acquisition

    SBC: RIGHT STUFF OF TAHOE INC            Topic: N/A

    We propose to develop an integrated Cryptography Module (CM) and RTU (CMRTU) for SCADA applications. When used in CM mode, our CMRTU will be easily retrofitted into existing SCADA networks. When used in advanced RTU mode (where higher bandwidth connections are available), our CMRTU will provide both a secure gateway function and secure Internet protocols for interaction with either central monitor ...

    SBIR Phase I 2004 Department of Homeland Security
US Flag An Official Website of the United States Government