You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY20 is not expected to be complete until September, 2021.

  1. A Semantic Technology for Materials Design and Development

    SBC: RJ Lee Group, Inc.            Topic: OSD13C02

    Development of semantic technologies to support materials design and development. This project is intended to start constructing the building blocks for 1. Common Vocabulary Development, 2. Annotation, exposure, and discovery of existing published material properties and processes using standard and existing technologies, and 3. New ways to share and discover materials and processes.

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  2. Materials Ontology Design and Development (MODD)

    SBC: DECISIVE ANALYTICS CORPORATION            Topic: OSD13C02

    Semantically Linked Data is widely seen as a revolutionary approach for maximizing the usefulness of existing and future information. In the materials domain, semantically linked materials data holds considerable promise with the ability to facilitate materials research and product development, improve communication, and open up avenues for new types of materials informatics. But realizing the pro ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  3. Advanced Verification Toolset for Learning-Based UAS Operating in Uncertain Environments

    SBC: AURORA FLIGHT SCIENCES CORPORATION            Topic: OSD13HS2

    This effort proposes to develop a toolset to evaluate the effectiveness of a safety-controller that monitors a learning-based autonomous control system. The traditional use of deterministic verification techniques for real-time monitoring is not feasible in the presence of uncertainty. This effort would advance the recommended verification techniques to include non-deterministic approaches. The ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  4. Combined Approaches for Verification and Validation of Run Time Protected Systems

    SBC: BARRON ASSOCIATES, INC.            Topic: OSD13HS2

    Barron Associates has assembled a team of researchers that include Dr. Sayan Mitra of the University of Illinois and Dr. Ufuk Topcu of the University of Pennsylvania. They will spearhead three complimentary investigations into the development of verification and validation (V & V) approaches for adaptive systems protected by run time assurance (RTA) mechanisms. Two of these approaches involve us ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  5. A Design Automation Tool for Integrated Nanophotonics based on Compact Modeling and Model Order Reduction

    SBC: CFD Research Corporation            Topic: OSD13C05

    Existing physics-based device simulation tools are prohibitively expensive computationally, and therefore ill-suited for parametric analysis and design optimization of photonic integrated circuits (PIC). The proposed effort aims to develop and demonstrate an innovative, easy-to-use simulation tool for accurate, fast circuit/system analysis of PICs. The salient aspects of the proposed solution are: ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  6. Operators Context and Trust in Automation Visualization (OCTAV) Tool

    SBC: PACIFIC SCIENCE & ENGINEERING GROUP, INC.            Topic: OSD13HS5

    Pacific Science & Engineering Group (PSE) proposes to design, develop, and demonstrate a prototype human-autonomous system tool & #208;Operators Context and Trust in Automation Visualization (OCTAV) & #208; that will support improved transparency, trust, and human-machine team performance. OCTAV will automatically monitor human and autonomous system team context and task, visualize context-based s ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  7. A Hybrid Systems Approach to Intelligent Information Management in Human-Automation Interaction

    SBC: OPTIMAL SYNTHESIS INC.            Topic: OSD13HS5

    A formal approach to the management of information involved in human-automation interactions is proposed. The mathematical formalism is enabled by employing the notion of hybrid systems. The information management involves ensuring correct information flow and shared cognition between human operators and machines. It is envisioned that the proposed algorithms will formalize the analysis of human-a ...

    SBIR Phase I 2014 Department of DefenseOffice of the Secretary of Defense
  8. Human-Centric Training and Assessment System for Cyber Situational Awareness

    SBC: Scalable Network Technologies, Inc.            Topic: OSD12T08

    The goal of the proposed work is to develop a human-centric training and assessment system for cyber situation awareness. The envisioned system will enable instructors to define training goals, design lesson plans, assign students roles in teams, and observe students performance, record events and interactions for scoring. The instructor/students can place tags (time or event) to roll back or repl ...

    STTR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  9. First-principles-based framework for discovery and design of sustainable non-rare-earth high-temperature alloy systems

    SBC: CFD Research Corporation            Topic: OSD12T06

    The aim of this STTR program is to develop protocols to discover rare-earth-free/rare-earth-lean magnetic alloys for replacing rare earth (RE) -based alloys for reducing the dependence of supply from China. The development of non-RE high temperature magnetic materials is very challenging. In Phase I, CFDRC in collaboration with its university partner has demonstrated a proof-of-concept computation ...

    STTR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
  10. Preventing Program Hijacking via Static and Dynamic Analyses

    SBC: Zephyr Software, LLC            Topic: OSD11IA5

    To hijack the execution of a program, an attacker must overwrite the value of a return address or a function pointer (broadly defined). To prevent program hijacking, our product will provide a layered defense of these two targets, including deterministic and randomization defenses, with the ability in many cases to continue execution after a hijacking attempt is prevented. Our product toolkit incl ...

    SBIR Phase II 2014 Department of DefenseOffice of the Secretary of Defense
US Flag An Official Website of the United States Government