You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Vapor/Particle Collector/Concentrator for Explosives Trace Detection

    SBC: SYAGEN TECHNOLOGY INC            Topic: N/A

    In this Phase I project, Syagen will demonstrate the feasibility for a vapor/particle sampler for explosives de-tection consisting of a collection probe and a concentrator. We will demonstrate the interface of the sampler to mass spectrometry (MS), however, it can also be used for ion mobility spectrometry (IMS), gas chromatography (GC), and essentially all forms of optical spectroscopies that mea ...

    SBIR Phase I 2006 Department of Homeland Security
  2. X-ray Simulation Platform for Explosive Detection Equipment

    SBC: TRIPLE RING TECHNOLOGIES INC            Topic: HSB0141003

    Computer simulations have the potential to improve the development x-ray-based explosive detection equipment. Despite the number of available simulation tools, no existing tool meets the needs of the explosive detection community. This is due to (1) the flexibility required to model the range of objects, physical processes, and system geometries used in explosive detection, and (2) the usability ...

    SBIR Phase I 2014 Department of Homeland Security
  3. Detection & Containment of Computer Epidemics Through Correlation of Communication Anomalies

    SBC: Cs3, Inc.            Topic: HSB042002

    This Phase I SBIR project investigates the detection and mitigation of fast-spreading computer infections that we call network epidemics. We wish to avoid packet payload inspection for several reasons. For one, increasing use of encrypted communication makes it impossible to interpret the payload. Further, payload anomaly analysis introduces delays that can be unacceptable when stopping fast-sprea ...

    SBIR Phase I 2004 Department of Homeland Security
  4. A Multiphysics Approach to Radio Frequency Modeling of Ablators in Ionized Hypersonic Flow

    SBC: ATA ENGINEERING, INC.            Topic: NGA203002

    ATA Engineering, Inc., (ATA) proposes to develop and demonstrate a multiphysics framework for the radar cross-section (RCS) analysis of an ablating hypersonic vehicle in an ionized plasma flow field. ATA has developed a software toolset, known as the Multiphysics Engine, capable of modeling many of these hypersonic phenomena. It couples state-of-the-art solvers for CFD (Loci/CHEM), ablation (CHAR) ...

    SBIR Phase I 2021 Department of DefenseNational Geospatial-Intelligence Agency
  5. Standoff Explosive Particle Spectrometer (SEPS)

    SBC: SPECTRAL LABS INCORPORATED            Topic: HSB0112004

    US Government Agencies have recognized the need for checkpoint inspection technology at airports to deter the transporting of destructive weapons or illegal materials into or within the United States since the early 1970s. Since 9/11 the Government has been vigorously supporting development and deployment of ever improving policies and technologies to provide an ever-present, yet non invasive, saf ...

    SBIR Phase I 2011 Department of Homeland Security
  6. HARDWARE-ASSISTED SYSTEM SECURITY MONITOR

    SBC: CYBERNET SYSTEMS CORPORATION            Topic: N/A

    Rootkits are Trojan horses installed by an intruder that mask changes that have been made in a system after attack. They replace or modify intrusion or other system status detecting applications so that they report a properly functioning system to a systems administrator, when in fact, the system has been compromised. Our solution to this requires designing a Linux based PC add on card that can mo ...

    SBIR Phase I 2005 Department of Homeland Security
  7. MACE- Malicious Application Code Elimination

    SBC: AVENDA SYSTEMS            Topic: HSB042002

    The IDS/IDP market will gain considerable traction as more organizations protect each application server instead of relying on network security. Proactive security as embodied in intrusion prevention will take a larger share of the market than reactive security as represented by intrusion detection. Avenda Systems proposes a solution called MACE (Malicious Application Code Elimination). It is a pr ...

    SBIR Phase I 2004 Department of Homeland Security
  8. Graphical Methods for Discovering Structure and Context in Large Datasets

    SBC: MAYACHITRA, INC.            Topic: NGA203005

    The ubiquity of image sensors for data collection creates a glut of data, which leads to bottlenecks in the processing capabilities of modern systems. In order to process this data, meticulously labeled datasets are required and that must be reviewed by humans in order to guarantee state-of-the-art performance. In this effort we endeavor to create a system that can automatically exploit salient in ...

    SBIR Phase I 2022 Department of DefenseNational Geospatial-Intelligence Agency
  9. Distributed Temperature Sensing for Automatic Blast Detection

    SBC: INTELLIGENT FIBER OPTIC SYSTEMS CORP            Topic: HSB071002

    Fires in tunnels, whether resulting from collisions, bombs, or other sources, are extremely hazardous. Authorities need immediate notification of the problem to provide quick assistance to passengers and prevent additional collisions. One solution is to place temperature sensors along the length of the tunnel; these sensors can be used to detect blasts and issue an alarm. Placing sensors in a tunn ...

    SBIR Phase I 2007 Department of Homeland Security
  10. Marine Asset Tag Tracking System (MATTS)

    SBC: INFORMATION SYSTEMS LABORATORIES INC            Topic: N/A

    The objective is to demonstrate by analysis and modeling that a MARINE ASSET TAG TRACKING SYSTEM (MATTS) is feasible and capable of satisfying key detection and security-related requirements in a marine shipping environment. ISL¿s unique approach couples proven features of conventional Local Transmit/Receive Network (LTRN) architectures with innovative tag technologies to address the most difficu ...

    SBIR Phase I 2004 Department of Homeland Security
US Flag An Official Website of the United States Government