You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Improving Uncertainty Estimation with Neural Graphical Models

    SBC: MAYACHITRA, INC.            Topic: NGA181005

    Building interpretable, composable autonomous systems requires consideration of uncertainties in the decisions and detections theygenerate. Human analysts need accurate absolute measures of probability to determine how to interpret and use the sometimes noisy resultsof machine learning systems; and composable autonomous systems need to be able to propagate uncertainties so that later reasoningsyst ...

    SBIR Phase I 2018 Department of DefenseNational Geospatial-Intelligence Agency
  2. Channel to Droplet Sample Extraction and Purification Using Electrowetting Device

    SBC: Core MicroSolutions, Inc.            Topic: HSB051001

    To develop advanced ¿channel-to-droplet¿ sample extraction and purification functions on a compact cartridge that is free of sensitive and complex microfluidic components, Core Microsolutions (CMSS) and Professor Sung Cho of the University of Pittsburgh propose to integrate Electrowetting-on-Dielectric (EWOD) droplet handling and in-droplet concentration capabilities with well proven channel-bas ...

    SBIR Phase I 2005 Department of Homeland Security
  3. RF Sensing of Personnel in Wooded Areas

    SBC: TrellisWare Technologies, Inc.            Topic: HSB0131001

    Perhaps because it is the world's longest undefended border, smuggling is endemic across the our northern frontier with Canada. Since a 5,525 mile border cannot be effectively patrolled on foot, the Department of Homeland Security (DHS) must rely on technology to detect and track smugglers. Radio tomographic imaging (RTI) is an emerging device-free passive (DfP) localization technology that could ...

    SBIR Phase I 2013 Department of Homeland Security
  4. Multi-Function Wand Prototype Development

    SBC: SPECTRAL LABS INCORPORATED            Topic: HSB0102008

    This SLI proposal for development of a Multisensor Wand, which we designated the Multi-Function Wand (MFW), describes a carefully planned program to reach the overarching objective of providing a sound design concept that will address the vital need for a Handheld Multisensor tool to improve the checkpoint screener`s ability to quickly make a judgment call on whether someone is concealing illicit ...

    SBIR Phase I 2010 Department of Homeland Security
  5. Ruggedization of Commercial-Grade Handheld Electronics for First Responders

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: HSB0122004

    Ruggedized electronics can be costly; utilizing commercial-grade hand-held computing/communication device and combining with well-designed case can provide ruggedization (impact, temperature, moisture) and extend capabilities such as integrated inclusion of smartcard/CAC readers, biometrics, and advanced barcode scanners. This program will determine the requirements for ruggedizing a device and us ...

    SBIR Phase I 2012 Department of Homeland Security
  6. Marine Asset Tag Tracking System (MATTS)

    SBC: INFORMATION SYSTEMS LABORATORIES INC            Topic: N/A

    The objective is to demonstrate by analysis and modeling that a MARINE ASSET TAG TRACKING SYSTEM (MATTS) is feasible and capable of satisfying key detection and security-related requirements in a marine shipping environment. ISL¿s unique approach couples proven features of conventional Local Transmit/Receive Network (LTRN) architectures with innovative tag technologies to address the most difficu ...

    SBIR Phase I 2004 Department of Homeland Security
  7. Distributed Temperature Sensing for Automatic Blast Detection

    SBC: INTELLIGENT FIBER OPTIC SYSTEMS CORP            Topic: HSB071002

    Fires in tunnels, whether resulting from collisions, bombs, or other sources, are extremely hazardous. Authorities need immediate notification of the problem to provide quick assistance to passengers and prevent additional collisions. One solution is to place temperature sensors along the length of the tunnel; these sensors can be used to detect blasts and issue an alarm. Placing sensors in a tunn ...

    SBIR Phase I 2007 Department of Homeland Security
  8. Graphical Methods for Discovering Structure and Context in Large Datasets

    SBC: MAYACHITRA, INC.            Topic: NGA203005

    The ubiquity of image sensors for data collection creates a glut of data, which leads to bottlenecks in the processing capabilities of modern systems. In order to process this data, meticulously labeled datasets are required and that must be reviewed by humans in order to guarantee state-of-the-art performance. In this effort we endeavor to create a system that can automatically exploit salient in ...

    SBIR Phase I 2022 Department of DefenseNational Geospatial-Intelligence Agency
  9. MACE- Malicious Application Code Elimination

    SBC: AVENDA SYSTEMS            Topic: HSB042002

    The IDS/IDP market will gain considerable traction as more organizations protect each application server instead of relying on network security. Proactive security as embodied in intrusion prevention will take a larger share of the market than reactive security as represented by intrusion detection. Avenda Systems proposes a solution called MACE (Malicious Application Code Elimination). It is a pr ...

    SBIR Phase I 2004 Department of Homeland Security
  10. HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: N/A

    Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can mo ...

    SBIR Phase I 2005 Department of Homeland Security
US Flag An Official Website of the United States Government