You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Ruggedization of Commercial-Grade Handheld Electronics for First Responders

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: HSB0122004

    Ruggedized electronics can be costly; utilizing commercial-grade hand-held computing/communication device and combining with well-designed case can provide ruggedization (impact, temperature, moisture) and extend capabilities such as integrated inclusion of smartcard/CAC readers, biometrics, and advanced barcode scanners. This program will determine the requirements for ruggedizing a device and us ...

    SBIR Phase I 2012 Department of Homeland Security
  2. Non-Destructive Test Method for Rapid Determination of the Chemical Composition of Concrete in Field

    SBC: METNA CO            Topic: 122FH2

    While thorough assessment of concrete chemistry is vital to evaluating the health of (transportation) infrastructure systems, the costly and time-consuming nature of available chemical analysis methods limit their applications. A nondestructive test method will be developed for thorough evaluation of concrete chemistry and deterioration conditions at different depths. An analytical chemistry metho ...

    SBIR Phase I 2012 Department of Transportation
  3. IP Hopper (for Moving Target Defense)

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: HSB0121002

    The IP Hopper is a moving target defense system that will use available network data and hopping algorithms to allow for constant IP address changing of both source and destination IP addresses. The use of "hopping" IP addresses will severely diminish an attacker's ability to attack any one target within a network. Utilizing IPv6 the IP Hopper will allow up to 340 undecillion (3.4 x 10 to the 38 ...

    SBIR Phase I 2012 Department of Homeland Security
  4. COTS MMW Radar for Tracking Persons within a Security Perimeter

    SBC: PSQUAREDT LLC            Topic: HSB0121005

    The implications of the proposed investigations are that radar systems already implemented for the automotive industry can be exploited, adapted and optimized for this application. These radar systems are inexpensive, of small size, employ advanced processing techniques which allow the tracking of threat targets, transmit low average power (10 milliwatts) and are proven to be people safe. We will ...

    SBIR Phase I 2012 Department of Homeland Security
  5. Improved Transit Rider Experience

    SBC: MERCURY DATA SYSTEMS, INC.            Topic: 121FT1

    We propose to develop an advanced navigation solution for public transportation passengers that will guide them from their origin to single or multiple destination points and across multiple modes of transportation. Passengers will simply need to enter their destination (and optionally a starting point) and the system will select optimal and alternative routes. The navigation software will run on ...

    SBIR Phase I 2012 Department of Transportation
  6. Radiological Source Surveillance With V-RADS Video-Centric Radiatiion Detection

    SBC: ADVANCED FUEL RESEARCH, INC.            Topic: N/A

    Radiological sources are in everyday use in numerous industries. Illicit removal of this material from storage could result in construction of a Radiological Dispersal Device or "Dirty Bomb." A pervasive means of securing radiological materials and identifying breaches in security is required. Ideally, existing passive surveillance technology would be used, thereby enabling rapid and cost effectiv ...

    SBIR Phase II 2008 Department of Homeland Security
  7. Belt Shift Interlock Delay/Deaccelerator with Learning Curve Software to increase Seatbelt Usage on commercial Vehicles

    SBC: The Tenik Group Inc.            Topic: 07FM1

    Various methods for increasing seat belt usage have been investigated over the last several years including visual and audible warnings currently installed in today's vehicles. In spite of these attempts, FMCSA research has shown that drivers of about 59% of commercial motor vehicles (those weighing over 10,000 pounds or more that operate in interstate commerce) buckle their safety belts as compa ...

    SBIR Phase I 2008 Department of Transportation
  8. DGPS-Based Trilateration Positioning Receiver

    SBC: Swaszek Peter            Topic: 07FH1

    Positioning and navigation have become a mainstay of everyday life in the U.S.; applications of interest include navigation of vehicles of all kinds, infrastructure mapping, and safety of life systems. Many of these recent applications have become possible through the GPS. With the recognized vulnerabilities of GPS, it is evident that equivalent backup systems must be developed. One possible so ...

    SBIR Phase I 2008 Department of Transportation
  9. 3WEAVE Fabric Composite and Sandwich Core Panels for Blast Protection

    SBC: 3TEX, Inc.            Topic: N/A

    The new material technology is based on 3D weaving for the reinforcement of buildings against both bomb blast and mitigation of the damage caused by flying objects. Four alternatives will be considered for the Phase I work dry 3D fabric, solid composite, sandwich core structures, and combination of these.

    SBIR Phase I 2008 Department of Homeland Security
  10. Comms Linking System

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: N/A

    numbers and provide automated notification to investigative agents, (d) Graphical interface and statistical (weighted) search methodology, (e) Delinking (i.e. disallowed links) by end user agents, (f) Support for storage and indexing of stored voice associated with telephone information, and (g) Graphical, report information and export facilities. We propose to develop systems that Link a suspect ...

    SBIR Phase I 2008 Department of Homeland Security
US Flag An Official Website of the United States Government