You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Vehicle Intelligent Performance Enabled Retrofit (VIPER)

    SBC: 21ST CENTURY SYSTEMS, INC.            Topic: OSD07E10

    The United States has a mechanized military that relies heavily on fuel availability. Delivering large quantities of fuel is a logistical burden. Besides the cost of the fuel itself, we must transport it, store it, and protect it. Fuel convoys are large targets moving along predicable paths. They expose soldiers and contractors to great dangers, and are a favorite target for terrorist attacks. ...

    SBIR Phase I 2008 Department of DefenseArmy
  2. Spotter: Exploiting Large-Format Imagery via Foveated Visual Search

    SBC: DEUMBRA, INC.            Topic: AF073076

    The proposed Spotter effort develops the algorithms necessary to exploit large format (LF) imagery in an operational environment with layered sensor platforms by cueing high-resolution sensors in order to reduce downstream data volume. In order to support analysts conducting intelligence, surveillance, and reconnaissance missions, image exploitation workstations must have automatic target recogni ...

    SBIR Phase I 2008 Department of DefenseAir Force
  3. Impact Modeling and Prediction of Attacks on Cyber Targets (IMPACT)

    SBC: DEUMBRA, INC.            Topic: OSD06IA3

    Cyber networks are a critical part of the nation’s security. Not only do cyber networks protect critical and sensitive information, they also enable vital functions both in the U.S. and abroad, in the military as well as in the commercial realm and are therefore a valuable target for international and domestic adversaries. Systems administrators and analysts are faced with a near-impossible tas ...

    SBIR Phase II 2008 Department of DefenseAir Force
  4. Global Information Grid Automated Document Classification and Summarization System

    SBC: DEUMBRA, INC.            Topic: OSD07I08

    The Department of Defense (DoD) requires an automated process to aid the timely dissemination of information to those with need to know without exposing secure information. Though security requirements often take a higher priority than users’ need for information, it is also imperative that actionable intelligence be received by warfighters, analysts, and agents who actively prevent security thr ...

    SBIR Phase II 2008 Department of DefenseAir Force
  5. Exploitation of Network-Based Information

    SBC: DEUMBRA, INC.            Topic: N08081

    The transition of Department of Defense (DoD) infrastructure to a Net-centric Enterprise Services (NCES) architecture on a Global Information Grid (GID) is dramatically increasing the connectedness between military, civilian, and intelligence personnel and the networks they employ. With the continued adoption of networked technologies by the DoD and adversaries, it is imperative to simultaneously ...

    SBIR Phase I 2008 Department of DefenseNavy
  6. Rapid Identification of Asymmetric Threat Networks from Large Amounts of Unstructured Data

    SBC: DEUMBRA, INC.            Topic: N08084

    21st Century Technologies (21CT) proposes PRESAGE, a fast, mobile, and robust computational tool for automated analysis of extremely large sets of unstructured information to assist commanders in proactively responding to asymmetric threats. Understanding and influencing the sympathies of the populace is an important tool in counter-operations against asymmetric threat. Yet, strong indications of ...

    SBIR Phase I 2008 Department of DefenseNavy
  7. Human and Unmanned Teams for Tracking Elusive Dismounts (HUNTED)

    SBC: DEUMBRA, INC.            Topic: OSD06UM2

    21st Century Technologies, Inc. (21CT) presents the Human and Unmanned Teaming for Tracking Elusive Dismounts (HUNTED) effort. HUNTED gives small units direct control over a coordinated team of two or more unmanned systems (UMS) to perform superior search, detection, and tracking of elusive pedestrian targets in an urban environment. Our novel approach combines 3D environment knowledge with a uniq ...

    SBIR Phase II 2008 Department of DefenseAir Force
  8. Theory and Application of Foveated Acquisition and Tracking (TAFAT)

    SBC: DEUMBRA, INC.            Topic: AF071155

    Foveated imagery is ubiquitous in nature, and foveating sensors offer the potential for superior performance in artificial vision systems. However, technical and user acceptance barriers caused in part by a lack of mature theory currently hinder the exploitation of foveated imagery on the battlefield. Our TAFAT Phase 1 experiments conclusively demonstrated that under reasonable assumptions and wit ...

    SBIR Phase II 2008 Department of DefenseAir Force
  9. SENTRY: IED COUNTERMEASURE SIMULATION & PREDICTION TOOL

    SBC: DEUMBRA, INC.            Topic: N07080

    According to the Iraq Study Group, US Forces must continue to support Iraq to prevent the government from falling and being influenced by neighboring countries (Syria and Iran) and to prevent a propaganda coupe for Al Qaeda and the spread of radical Islam. Our soldiers, marines, and sailors are regularly subject to IED attacks by Shi’a militia, Sunni insurgents, and Al Qaeda. Improvised explosi ...

    SBIR Phase II 2008 Department of DefenseNavy
  10. AALF: Adjustable Adaptive Language speech Filter

    SBC: DEUMBRA, INC.            Topic: AF071079

    The ability to efficiently process intelligence data is critical to fighting the global war on terror. A major source of this data is recorded speech. Therefore, the performance of speech processing applications (speech recognition and speaker identification applications, for example) depends on pre-processing to find the regions in the recording where speech is present. Although current method ...

    SBIR Phase II 2008 Department of DefenseAir Force
US Flag An Official Website of the United States Government