You are here
Award Data
The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
-
Test Methodology and Equipment for Radiation Hardened Interceptors
SBC: Analytical Services, Inc. Topic: MDA08009The Radiation Test Environment Simulation Toolkit (RadTEST) is capable of flowing down radiation environment requirements to the development of test plans, post-test analysis, and test reports. It''s capabilities include: --Access to RadCat Parts and Materials Database --Test Facility Catalog with Radiation Spectra --Interface with Radiation Transport Codes --Electronic Test Plan Generation --Ele ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Innovative, High Performance, and Radiation Hardened Interceptor Software Defined Radio
SBC: Amtec Corporation Topic: MDA08037Software defined radios (SDRs) provide a means to achieve enhanced capability, integrated into a cost-effective and growth-oriented architecture fully backward compatible with legacy BMDS elements. As demonstrated through the results of the Phase I SBIR program, implementing a SDR architecture is not without challenge due to the potential computing performance and radiation hardness limitations o ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Advanced Architecture and Process Techniques for High-Density, Radiation-Hardened Non-Volatile Memory
SBC: Amtec Corporation Topic: MDA08023For mission critical data storage on systems operating in natural space and nuclear weapons environments, the use of radiation hardened (RH) non-volatile memory (NVM) is imperative. Today's complex computer controlled electronic systems use NVM to store critical data for proper operation. This typically includes configuration parameters which allow the system to return to a known configuration a ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Passive Range Estimation from Angle-only Sensor Data (Acq Pointing & Tracking)
SBC: APPLIED MATHEMATICS, INC. Topic: MDA08050We propose to adapt angle-only passive ranging methods developed for submarine warfare to the problem of range estimation for missiles using current electro-optical sensor systems in order to provide fire control quality tracking at or near threat burnout to support early intercept. Three methods will be developed: parallax or triangulation ranging; angle rate ranging; and tracker/filter algorith ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Unified Methodology for Simulation of Continuum and Rarefied Flows
SBC: COMPUTATIONAL SCIENCES LLC Topic: MDA08034We propose to develop stand-alone computational modules for seamlessly extending the validity of continuum CFD codes into transitional and rarefied flow regimes. The modules will be designed for implementation in to existing legacy codes for use in the characterization of high altitude plume flows. The approach is based on a novel, regularized set of Navier-Stokes equations (RNS) that is extended ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Ballistic Missile Defense Anti-Tamper Penalty and Response Capabilities
SBC: Pikewerks Corporation Topic: MDA08043Tamper-resistant systems play a key role in preventing and/or delaying the exploitation of critical technologies in U.S. weapons systems. The main focus of this effort is to identify methods for responding to tamper events and to develop innovative response techniques to protect CPI from exploitation, reverse engineering, and compromise. This proposal’s solution is applicable to a wide range of ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Electro Optic Avionic Advanced Guidance, Navigation and Control (GNC) Algorithm Development to Enhance the Lethality of Interceptors Against Maneuveri
SBC: POLARIS SENSOR TECHNOLOGIES INC Topic: MDA08T003This Phase II effort will further develop a technique to improve current seeker discrimination and tracking capabilities using a unique particle filter algorithm (PFA) approach. The advancement represents a significant upgrade to current and future seekers facing advanced threats in stressing environments. Quantifiable improvements over many facets of the current approach have been realized during ...
STTR Phase II 2010 Department of DefenseMissile Defense Agency -
AT Power Solutions Capacitive Fabric
SBC: Radiance Technologies, Inc. Topic: MDA08041The MDA Director issued a directive necessitating the protection of Critical Program Information (CPI) from unintentional transfer and the policy for the implementation of anti-tamper (AT) technology on MDA acquisition and associated technology programs. AT technology consists of engineering activities that prevent and/or delay exploitation of critical technologies in U.S. weapons systems. The pur ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Safety Technologies for Liquid Hypergolic Propulsion Systems
SBC: Radiance Technologies, Inc. Topic: MDA08046Hypergolic fuels are the propellant of choice for high performance missile systems. As the demand for them increases, so does the need for assuring the safety of personnel and equipment in their vicinity. These fuels tend to be corrosive, toxic, and present fire hazards if leaks occur. The ultimate objective in this research is to develop a sensor technology which will facilitate safer storage ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency -
Structured Application Protection Process (SAPP)
SBC: SENTAR, INC. Topic: MDA08042The Structured Application Protection Process (SAPP) system concept classifies software applications into domains. Each domain class represents different operational aspects of software – such as real-time response, data management, computationally-intensive, and user interactive – to correlate a likelihood of vulnerabilities with an application software type. A threat model is used to corre ...
SBIR Phase II 2010 Department of DefenseMissile Defense Agency