You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. CZT Surveillance Camera

    SBC: Aguila Technologies, Inc.            Topic: HSB071008

    The improved surveillance of radioactive sources used in hospitals, research centers, food irradiations plants and other fully legal and sanctioned industries is paramount to interrupt the terrorism value chain. This value chain relies on stealing radioactive sources from the legitimate before mentioned institutions to build radiological dispersal devices (RRD). Nowadays, radioactive sources are s ...

    SBIR Phase I 2007 Department of Homeland Security
  2. BioPhalanx, a hand portable discrete monolithic microarray biothreat detector

    SBC: ARCXIS BIOTECHNOLOGIES            Topic: N/A

    The focus of this proposal is to develop BioPhalanx a rapid, hand portable, robust detection system for multiplexed detection of bio-threats, in harsh environments. We have developed a new method of detection called Combinatorial Probe Analysis (CPA), which provides an exponential increase in detection reliability. This type of analysis will greatly reduce false positives and false negatives; in a ...

    SBIR Phase I 2005 Department of Homeland Security
  3. MACE- Malicious Application Code Elimination

    SBC: AVENDA SYSTEMS            Topic: HSB042002

    The IDS/IDP market will gain considerable traction as more organizations protect each application server instead of relying on network security. Proactive security as embodied in intrusion prevention will take a larger share of the market than reactive security as represented by intrusion detection. Avenda Systems proposes a solution called MACE (Malicious Application Code Elimination). It is a pr ...

    SBIR Phase I 2004 Department of Homeland Security
  4. Network-centric Inter-channel Fusion for Multi-media Surveillance

    SBC: Broadata Communications, Inc.            Topic: N/A

    The Department of Homeland Security is seeking innovative highly-scalable information processing technologies to manage multimedia surveillance information networks. To address this need, Broadata Communications Inc. (BCI) proposes a highly innovative Network-centric Inter-channel Fusion (NIF) system solution. The NIF system is leveraged on a unique network-centric signal processing technique to a ...

    SBIR Phase I 2006 Department of Homeland Security
  5. Carbon Nanotube Materials for Improved Chemiresistors

    SBC: Carbon Solutions Inc            Topic: N/A

    We propose to develop a novel class of sensor materials based on chemically functionalized single-walled carbon nanotubes (SWNTs). The proposed materials will be utilized in chemiresistor microarrays for improved detection of small molecule gases with reduced signal drift and extended lifetime. In addition, through chemical functionalization of the SWNTs their sensor properties can be tailored for ...

    SBIR Phase I 2007 Department of Homeland Security
  6. Efficient Digitization of Nuclear Fireball Film

    SBC: CARPENTER RESEARCH CORP.            Topic: N/A

    The objectives of the proposed work are to develop the technical feasibility and detailed requirements for new methods and technology to decrease, substantially, the cost and time required to digitize and store high-speed, high-resolution film without sacrificing the spatial and grayscale depth of the original film. The work will be aimed at improvements that would make it practical to digitize a ...

    SBIR Phase I 1998 Department of DefenseNational Geospatial-Intelligence Agency
  7. Realistic and Adaptive Interactive Learning Systems (RAILS)

    SBC: SPECTRAL LABS INCORPORATED            Topic: N/A

    The Next Generation computer based PRND Training Application sought by DNDO requires seamless coordination of First Responder Training expertise, Video Simulation capability, Radiation Physics principles and PRND Equipment familiarity. Spectral Labs Inc. (SLI) proposes an innovative approach that brings all of these elements together to develop simulation software that provides physically realisti ...

    SBIR Phase I 2009 Department of Homeland Security
  8. Next Generation IED Diagnostic Imaging System (NG-IDIS)

    SBC: SPECTRAL LABS INCORPORATED            Topic: N/A

    Spectral Labs Incorporated (SLI) proposes to conduct a study and perform analysis in order to identify technologies showing promise for breakthroughs in IED imaging in order to produce a Next Generation IED Diagnostic Imaging System (NG-IDIS). A key improvement in such a system would be to obviate the need for bomb technicians to approach the target multiple times to retrieve film or imaging plate ...

    SBIR Phase I 2009 Department of Homeland Security
  9. Modulated Microwave Vehicle Stopping

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: N/A

    Stopping vehicles, which are potential car bomb threats or are simply fleeing a crime scene at high speed allows military and law enforcement personnel added effectiveness. Furthermore, the current option of high-speed pursuit adds almost as much danger as might be avoided if the assailant is subdued. For this reason, many local police forces operating on a purely civilian mandate have stopped aut ...

    SBIR Phase I 2005 Department of Homeland Security
  10. HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: N/A

    Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can mo ...

    SBIR Phase I 2005 Department of Homeland Security
US Flag An Official Website of the United States Government