You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Thunderlane

    SBC: ASSURED INFORMATION SECURITY, INC.            Topic: AF16AT11

    AIS proposes the Thunderlane effort to define a new operating system model that radically dissolves the boundary between hypervisor and operating system, and leverages state-of-the-art software diversity techniques. In concert, these capabilities provide unparalleled resistance against reverse-engineering, and ensure the reliability and security of application and system software. The Thunderlane ...

    STTR Phase I 2016 Department of DefenseAir Force
  2. Active Control of a Scramjet Engine

    SBC: Innoveering, LLC            Topic: AF15AT19

    In this effort, Innoveering will integrate and test a closed-loop active control system for scramjet isolator shock system positioning. The approach is to control the fuel flow to the engine to position the shock train leading edge at a specified location in the isolator. The control system includes three basic elements: a shock position sensing system based, a fast response fuel valve that adjust ...

    STTR Phase II 2016 Department of DefenseAir Force
  3. High Quality/Low Dimension Data for Sensor Integration

    SBC: ANDRO COMPUTATIONAL SOLUTIONS LLC            Topic: AF15AT16

    Novel algorithms were developed for ecient multi-sensor fusion of correlated high-dimensional data to support target detection. In our compressive sensing framework, high-dimensional data is compressed using low dimensional random projection matrices. When the high-dimensional data exhibits low-dimensional structures, this scheme is capable of capturing all the significant informative with fewer r ...

    STTR Phase II 2016 Department of DefenseAir Force
  4. Fusion of Multiple Motion Information Sources

    SBC: BLACK RIVER SYSTEMS COMPANY, INC.            Topic: AF161056

    Our approach addresses the four Vs of big data and the four pillars, or principles, of ABI, and includes multi-INT data association and fusion, inclusive of objects and activities characterized from FMV streams.To address velocity and veracity associated with of multi-INT data sources we propose to develop a scalable graph-based analytic approach which will perform near real-time analysis of multi ...

    SBIR Phase I 2016 Department of DefenseAir Force
  5. Anti-Fragility Workstation for Resiliency (AWARE)

    SBC: ASSURED INFORMATION SECURITY, INC.            Topic: AF161060

    AIS proposes the AWARE effort to research, design and prototype a system that will actually improve, rather than degrade, as faults or perturbations are experienced. Todays computer systems and mission assurance approaches are largely built on a foundation of static configurations and require manual upgrades or lengthy software development phases to increase the security or stability of a system. ...

    SBIR Phase I 2016 Department of DefenseAir Force
  6. Assessing and Projecting Situations and Impacts in Space (APSIS)

    SBC: XANALYTIX SYSTEMS LLC            Topic: AF161063

    The primary objective of this effort is to develop a framework for providing enhanced space situational awareness (SSA) through the ability to project and visualize threats to blue space assets, and assess the impact of those threats to the assets and the missions they support. The Assessing and Projecting Situations In Space (APSIS) framework leverages a domain agnostic TRL 6 capability for reduc ...

    SBIR Phase I 2016 Department of DefenseAir Force
  7. Embedded Computing Cyber Testing and Assessment Methods

    SBC: GRAMMATECH INC            Topic: AF161079

    ABSTRACT: Embedded systems vastly outnumber conventional computing platforms such as enterprise servers and personal computers. Many applications of embedded systems are critical to national security and personal safety. However, the level of security provided by the embedded systems is embarrassingly low: researchers successfully compromised embedded systems that control cars, medical devices, vo ...

    SBIR Phase I 2016 Department of DefenseAir Force
  8. Low Signal to Noise Ratio Radar Technology Investigation

    SBC: ARTEMIS, INC.            Topic: AF161103

    ABSTRACT: ARTEMIS Inc. proposes to develop a low Size, Weight, and Power (SWaP) radar sensor that can be produced at low-cost and provide high range and Doppler resolution with multi-mode capabilities, including SAR, GMTI, and HRR.The radar seeker will need to search, detect, and track multiple targets, obtain high probability of detection (Pd) and low probability of false-alarm (Pfa), while maint ...

    SBIR Phase I 2016 Department of DefenseAir Force
  9. Advanced Learning Cyber-Health-monitoring of Electromagnetic Interference for Infomations Systems Tool-suite (ALCHEMIST)

    SBC: ASSURED INFORMATION SECURITY, INC.            Topic: AF151010

    The ALCHEMIST effort will expand upon the work performed under the Phase I CHEMIST effort by improving the software framework and fabricating the EMI detection sensor. Specifically, the effort will focus on develop new sensing capabilities, improving usability of the interface, the development of more reliable anomaly detection techniques, and the integration of the EMI detection sensor. ALCHEMIST ...

    SBIR Phase II 2016 Department of DefenseAir Force
  10. Swarm

    SBC: ATC-NY INC            Topic: AF151038

    System reconnaissance is the typical first step in a targeted attack; the attacker must learn the services available, software used, and operating system configuration in order to determine how to best infiltrate a given system.Reconnaissance is then best thwarted by providing false or non-reusable information to an attacker.Based on a successful SBIR Phase I prototype, ATC-NY will design and buil ...

    SBIR Phase II 2016 Department of DefenseAir Force
US Flag An Official Website of the United States Government