You are here
The Award database is continually updated throughout the year. As a result, data for FY23 is not expected to be complete until September, 2024.
Download all SBIR.gov award data either with award abstracts (290MB)
or without award abstracts (65MB).
A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.
The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.
SBC: QUALTECH SYSTEMS INC Topic: N06T007
This proposal is a joint effort between Qualtech Systems, Incorporated (QSI), the Institute for Software Integrated Systems at Vanderbilt University (VU), and Hamilton Sundstrand (HS) in Rockford, IL. QSI and VU have the combined knowledge and experience in successful development of a novel solution to aircraft system and subsystem prognostics and maintenance tools and have developed state-of-the- ...STTR Phase I 2006 Department of DefenseNavy
SBC: SIGNATURE RESEARCH, INC. Topic: 1
Signature Research, Inc. (SGR) and Michigan Technological University (MTU) propose a Phase I STTR effort to develop a learning algorithm which exploits the spatio-spectral characteristics inherent within IR imagery and motion imagery.Our archive of modelled and labeled data sets will allow our team to thoroughly capture the variable elements that will drive machine learning performance.The overall ...STTR Phase I 2018 Department of DefenseNational Geospatial-Intelligence Agency
A lightweight infrastructure for detection and mitigation of insider threats in distributed environmentsSBC: SCIENTIFIC SYSTEMS CO INC Topic: MDA06T009
The insider threat remains one of the most difficult to detect -- left alone to mitigate -- threats against information systems. The overall objective of the effort (Phase I and Phase II) is to produce and prototype a Distributed Insider Threat Detection System (DITDS) for distributed environments, capable of identifying and quantifying emerging insider threats against the network, allowing for t ...STTR Phase I 2006 Department of DefenseMissile Defense Agency
SBC: Intelligent Automation, Inc. Topic: A06T018
We propose a comprehensive and innovative approach for analysis and visualization of large, complex, multi-step cyber attack graphs. First, we select the radial space-filling hierarchy visualization module for large complex multi-step cyber attack graph due to its strengths in space efficiency and ease of interpretation. Once an attack is correlated, the attack notification service retrieves the ...STTR Phase I 2006 Department of DefenseArmy
An Integrated Materials Informatics/Sequential Learning Framework to Predict the Effects of Defects in Metals Additive ManufacturingSBC: Citrine Informatics, Inc. Topic: N18AT013
In this project, Citrine Informatics and the ADAPT Center at the Colorado School of Mines propose to build an informatics-driven system to understand the effects of defects in additive manufactured parts. The entire history of each sample will be captured on this system; from specific printing parameters and details of precursor materials through to part characterizations and performance measureme ...STTR Phase I 2018 Department of DefenseNavy
SBC: Intelligent Automation, Inc. Topic: N06T036
Wireless Sensor Networks (WSNs) have demonstrated their effectiveness in threat detection and localization. However, there are two critical issues related to signal processing in WSNs. First, energy-efficiency, memory-consumption, bandwidth-utilization, and computation-complexity are of main concern. Second, the application environments contain highly colored noise, multi-path echoes, and simult ...STTR Phase I 2006 Department of DefenseNavy
SBC: Irvine Sensors Corporation Topic: OSD06NC2
Irvine Sensors Corporation (ISC) together with North Carolina State University propose to develop a novel behavioral technique that is capable of detecting network based intrusions, and can then be used to identify signatures for an Intrusion Prevent Engine (IPE). The behavioral technique proposed detects attacks embedded in different network layers using assertions that can be dynamically updated ...STTR Phase I 2006 Department of DefenseArmy
SBC: COMPUTATIONAL SIMULATION SOFTWARE, LLC Topic: N06T018
Traditional finite element methods require conversion of a CAD model into an alternate geometric representation called the finite element mesh. Tools like Cubit, developed at Sandia National Laboratories, have greatly reduced the time to mesh. However, it is still expensive to produce a complete analysis and difficult to have that analysis affect the design cycle in a timely manner. Our studies ...STTR Phase I 2006 Department of DefenseNavy
SBC: MATHEMATICAL SYSTEMS & SOLUTIONS, INC. Topic: N06T018
The present text proposes the development of a computational infrastructure to enable rapid creation of high-quality conforming finite-element computational models---compatible with all existing finite-element simulation tools. The specific proofs-of-concept to be pursued in the Phase I will revolve around generation of tetrahedral meshes, but extensions to other types of finite-element types (e.g ...STTR Phase I 2006 Department of DefenseNavy
SBC: Techno-Sciences, LLC Topic: AF06T016
Techno-Sciences, Inc. (TSi), in collaboration with the Smart Structures Laboratory of the Alfred Gessow Rotorcraft Center at the University of Maryland (UMD), propose to develop a high-fidelity fluid-structure interaction model that is uniquely suited to morphing wing aeroelastic and response prediction. We propose to produce a flapping wing fluid-structure interaction (FWFSI) analysis method to ...STTR Phase I 2006 Department of DefenseAir Force