You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Materials Ontology Design and Development (MODD)

    SBC: DECISIVE ANALYTICS CORPORATION            Topic: OSD13C02

    Semantically Linked Data is widely seen as a revolutionary approach for maximizing the usefulness of existing and future information. In the materials domain, semantically linked materials data holds considerable promise with the ability to facilitate materials research and product development, improve communication, and open up avenues for new types of materials informatics. But realizing the pro ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  2. Advanced Verification Toolset for Learning-Based UAS Operating in Uncertain Environments

    SBC: AURORA FLIGHT SCIENCES CORPORATION            Topic: OSD13HS2

    This effort proposes to develop a toolset to evaluate the effectiveness of a safety-controller that monitors a learning-based autonomous control system. The traditional use of deterministic verification techniques for real-time monitoring is not feasible in the presence of uncertainty. This effort would advance the recommended verification techniques to include non-deterministic approaches. The ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  3. Virtual Verification Test Bed for Robust Autonomous Software Operation in Complex, Unknown Environments

    SBC: SOAR TECHNOLOGY INC            Topic: OSD13HS2

    Unmanned Autonomous Systems (UAS) are complex systems that exhibit a broad array of behaviors in a wide range of missions and environments. They can change their behaviors over time so the UAS rigorously tested at the range is not the same as the one operating in the field. Current testing methods are inadequate to verify that they are safe to operate in close proximity with humans. Testing Robust ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  4. Combined Approaches for Verification and Validation of Run Time Protected Systems

    SBC: BARRON ASSOCIATES, INC.            Topic: OSD13HS2

    Barron Associates has assembled a team of researchers that include Dr. Sayan Mitra of the University of Illinois and Dr. Ufuk Topcu of the University of Pennsylvania. They will spearhead three complimentary investigations into the development of verification and validation (V & V) approaches for adaptive systems protected by run time assurance (RTA) mechanisms. Two of these approaches involve us ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  5. ViA-ML: A Machine Learning backed Visualization Assistant

    SBC: SCIENTIFIC SYSTEMS CO INC            Topic: OSD13LD1

    With the proliferation of cheap sensors, reduction in storage costs and the ubiquity of communication networks, Cyber-Physical Systems are collecting and storing data at an unprecedented rate. Analysis of such large databases is necessary to find relevant information and improve the efficiency of the Cyber Physical System. The goal of an analysis tool, simply put is to find the most interesting in ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  6. Improved Turbo/Superchargers for UAS/UGS Application

    SBC: BAKER ENGINEERING, LLC            Topic: OSD13PR5

    Baker Engineering Inc. (BEI) proposes an advanced, electrically-assisted turbocharger to meet the needs identified in this solicitation. BEI"s solution provides a lightweight, durable, self-lubricated turbocharger that will set new standards in performance on heavy fuel engines in the 50-150 Hp class. An electrically-assisted turbocharger offers supercharger characteristics to a turbocharged eng ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  7. Operators Context and Trust in Automation Visualization (OCTAV) Tool

    SBC: PACIFIC SCIENCE & ENGINEERING GROUP, INC.            Topic: OSD13HS5

    Pacific Science & Engineering Group (PSE) proposes to design, develop, and demonstrate a prototype human-autonomous system tool & #208;Operators Context and Trust in Automation Visualization (OCTAV) & #208; that will support improved transparency, trust, and human-machine team performance. OCTAV will automatically monitor human and autonomous system team context and task, visualize context-based s ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  8. A Hybrid Systems Approach to Intelligent Information Management in Human-Automation Interaction

    SBC: OPTIMAL SYNTHESIS INC.            Topic: OSD13HS5

    A formal approach to the management of information involved in human-automation interactions is proposed. The mathematical formalism is enabled by employing the notion of hybrid systems. The information management involves ensuring correct information flow and shared cognition between human operators and machines. It is envisioned that the proposed algorithms will formalize the analysis of human-a ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  9. Biometrics for Human-machine Team Feedback in Autonomous Systems

    SBC: TIAX LLC            Topic: OSD141AU1

    Use of Google Glass and add-ons to monitor warfighter state.

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  10. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: ZEPHYR SOFTWARE LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government