You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Integrated In-process Strategy for Material and Process Specification Optimization

    SBC: RELIACOAT TECHNOLOGIES, LLC            Topic: AF141208

    ABSTRACT: The thermal spray process has many inherent complexities within each sub-process including feedstock manufacturing, component surface preparation and masking, torch parameter selection, robot trajectory and laboratory coating evaluation. Each sub-process is governed by rigid specifications that provide thermal spray applicators with procedural and process guidelines throughout the appl ...

    SBIR Phase I 2015 Department of DefenseAir Force
  2. Cryogenic-Vacuum Compatible Infrared Scene Projection System (CVC IRSP) Based on the Digital Micromirror Device

    SBC: OPTICAL SCIENCES CORPORATION            Topic: AF083255

    ABSTRACT: This document presents Optical Sciences Corporation's SBIR technology transition proposal to complete development of an advanced Cryogenic-Vacuum Compatible Infrared Scene Projector (CVC IRSP) for Wide Field-of-View (WFOV) space sensor testing and to integrate the CVC IRSP into a government owned space simulation chamber. The CVC IRSP will be capable of projecting complex scenes w ...

    SBIR Phase II 2015 Department of DefenseAir Force
  3. EOLuS

    SBC: ASSURED INFORMATION SECURITY, INC.            Topic: AF131055

    ABSTRACT: Assured Information Security, Inc. (AIS) proposes Endpoint-Operated Link-assured Security (EOLuS), an effort to develop a product with the capability for realizing continuous end-to-end trust (EtET) in a dynamic network a network in which every client would verify and monitor the trustworthiness of its peers prior to communicating sensitive information. After the successful completion ...

    SBIR Phase II 2015 Department of DefenseAir Force
  4. Validation of Automatic Ground Moving Target Indicator Exploitation Algorithms

    SBC: BLACK RIVER SYSTEMS COMPANY, INC.            Topic: AF131038

    ABSTRACT:The overall goal is to develop an evaluation systembased on real Mission dataof Ground Moving Target Indicator (GMTI) exploitation algorithms.Real-world Mission data is identified by analysts, who in the standard course of doing their job, fulfill Request for Information (RFI) Essential Elements of Information (EEI) responses.Our objectives are to provide the capability to evaluate a wide ...

    SBIR Phase II 2015 Department of DefenseAir Force
  5. DocMark: A Rule-based and Probabilistic Document Marking System

    SBC: ATC-NY INC            Topic: AF131052

    ABSTRACT: In order to prevent loss of sensitive data, organizations need to be able to tag data with classification and releasability metadata. Currently classification is a manual and labor-intensive process, which slows the dissemination of sharable data. ATC-NY will develop DocMark, a product to automatically determine classification and dissemination metadata and record it in standard forma ...

    SBIR Phase II 2015 Department of DefenseAir Force
  6. Bearing Analytical Software Development and Validation Phase II

    SBC: Pradeep K Gupta Inc            Topic: AF131163

    ABSTRACT: With the objective of developing validated bearing performance software, this proposed development focuses on several technical areas. First, the generalized life models developed in Phase I shall be extended to include elastic property variation with depth for improved modeling of case hardened materials such as M50 NiL. In addition rolling elements shall be modeled as separate element ...

    SBIR Phase II 2015 Department of DefenseAir Force
  7. Physics and Physiology Based Human Body Model of Blast Injury and Protection

    SBC: CFD RESEARCH CORPORATION            Topic: DHP13010

    The vast majority of injuries in recent military conflicts have been inflicted by improvised explosive devices (IEDs) causing brain, extremities and genital-urinary injuries. Advanced computational models of IED blast physics and human body injury biomech

    SBIR Phase II 2015 Department of DefenseDefense Health Agency
  8. Ultra-Scalable Nonvolatile Graphene Memory

    SBC: Harper Laboratories            Topic: AF131082

    ABSTRACT:Nonvolatile memory (NVM) technologies are a critical component of modern satellites.These NVM chipsets perform tasks ranging from storing mission-critical boot code to large multi-gigabyte mission data recorders.This requirement for high-density NVM has shifted focus on to commercial CMOS FLASH.FLASH technologies are capable of high-density devices, compared to resistive or phase-change t ...

    SBIR Phase II 2015 Department of DefenseAir Force
  9. WhyViz: Transforming Cyber Data into Human-Centered Visualizations

    SBC: APPLIED VISIONS, INC.            Topic: AF151015

    ABSTRACT:Cyber operators mentally integrate numerous data sources, many whose native format is difficult to comprehend. Visualizations can help, but the raw data must first be transformed. Designing effective visualizations is also difficult because there is a dearth of empirical research on how various visualizations affect the cyber operators performance. Secure Decisions proposes to systematica ...

    SBIR Phase I 2015 Department of DefenseAir Force
  10. Virtual Trusted Platform Module (vTPM)

    SBC: GRAMMATECH INC            Topic: AF151033

    ABSTRACT:Trusted platform module(TPM) devices provide the core root of trust for modern computer systems. These devices are used for secure, trusted, and measured boot approaches as well as to secure data for user applications such as Microsoft's Bitlocker technology. However, more and more systems are now virtualized in the cloud. Currently hypervisor technologies either do not provide guests wit ...

    SBIR Phase I 2015 Department of DefenseAir Force
US Flag An Official Website of the United States Government