You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. S3: A Game Based 3rd Grade Math Curriculum

    SBC: Virtual Learning Technologies (Sokikom)            Topic: N/A

    Purpose: Children who do not learn foundational mathematical concepts during elementary school generally get further behind in math as their math deficiencies compound over time. Through a prior IES SBIR Fast-Track award, the project team developed a series of supplemental math games designed to provide elementary students with engaging, adaptive, and personalized or team-based learning opportunit ...

    SBIR Phase II 2014 Department of Education
  2. Landing Zones Identification (LZI)

    SBC: AMERICAN GNC CORPORATION            Topic: OSD12AU3

    Small Unmanned Air Systems (SUAS) are currently used by the U.S military for a wide variety of critical missions; however, there remains much research and work to enhance autonomy in these platforms. One capability specified by the U.S. Office of the Secr

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  3. Human-Centric Training and Assessment System for Cyber Situational Awareness

    SBC: Scalable Network Technologies, Inc.            Topic: OSD12T08

    The goal of the proposed work is to develop a human-centric training and assessment system for cyber situation awareness. The envisioned system will enable instructors to define training goals, design lesson plans, assign students roles in teams, and observe students performance, record events and interactions for scoring. The instructor/students can place tags (time or event) to roll back or repl ...

    STTR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  4. VisualAnalytix: Identification and Visualization of Interactions and their Consequences within Complex Systems

    SBC: INTELLIGENT SYSTEMS TECHNOLOGY, INC.            Topic: OSD12ER1

    Complex systems are inherently difficult to analyze because of the hidden interactions and dependencies among components. These interactions and dependencies often produce unpredictable, potentially detrimental overall system behaviors (outcomes). Traditi

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  5. First-principles-based framework for discovery and design of sustainable non-rare-earth high-temperature alloy systems

    SBC: CFD RESEARCH CORPORATION            Topic: OSD12T06

    The aim of this STTR program is to develop protocols to discover rare-earth-free/rare-earth-lean magnetic alloys for replacing rare earth (RE) -based alloys for reducing the dependence of supply from China. The development of non-RE high temperature magnetic materials is very challenging. In Phase I, CFDRC in collaboration with its university partner has demonstrated a proof-of-concept computation ...

    STTR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  6. Event Attribute Recognition and Labeling (EARL)

    SBC: DECISIVE ANALYTICS CORPORATION            Topic: OSD12LD5

    Existing information extraction technology can only partially address the problem of exploiting unreadably-large amounts text. When discussion of events is limited to simple, past-tense, factual descriptions of events, current NLP-based systems can ident

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  7. Active Software Defense to Reduce Threat Capability Effectiveness

    SBC: Power Fingerprinting, Inc            Topic: OSD11IA6

    In order to better protect critical infrastructure from cyber attacks, perimeter and passive defenses must be complemented with an active defense mechanism which elevates the risks, or costs, a potential attacker will face. The effectiveness of an active defense mechanism, however, is ultimately limited by its ability to detect threats fast, accurately, and reliably. For this Phase II project, we ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  8. Fusing Uncertain and Heterogeneous Information Making Sense of the Battlefield

    SBC: TOYON RESEARCH CORPORATION            Topic: OSD12LD2

    Decision analysts are faced with an ever-increasing amount of information from a large number of sensors and other data sets. This information can include radar, wide-area motion imagery (WAMI), electronic support measures, and other sensors or information available to the analyst. Analysts are therefore faced with the tasks of scouring an overwhelmingly large amount of data for the information of ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  9. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: ZEPHYR SOFTWARE LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  10. Decision Support for Anomaly Detection and Recovery for Unmanned System (ADRUS)

    SBC: KNEXUS RESEARCH LLC            Topic: OSD12AU1

    Deployment of unmanned systems continues to expand across a wide range of missions; for example, logistics and resupply missions, force application and protection, and improving battlespace awareness. Presently these unmanned systems run at the lowest of four possible levels of autonomy, that is, in a teleoperated mode, and each system typically requires multiple operators. To address this proble ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government