You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Managed Information Delivery to Multiple Devices

    SBC: VISION SYSTEMS & TECHNOLOGY, INC.            Topic: AF071064

    We propose an innovative approach to meet the Air Force’s objective of seamlessly delivering information and alerts to the warfighter that accommodates multiple devices, connections, formats, and protocols. In particular, we propose to develop a system that can securely deliver and manage critical information flow to multiple devices utilizing different connections and protocols. We will demon ...

    SBIR Phase I 2007 Department of DefenseAir Force
  2. Multiple Independent Levels of Security/Safety Tools and Processes

    SBC: WW TECHNOLOGY GROUP, INC            Topic: AF071060

    The innovations offered by the WWTG are grounded in our novel work in developing a model-based approach that integrates views and tools for certifying MILS-based systems. Specific advancements are realized through representations of diverse, yet coordinated, behaviors affecting MILS policies and certification as executable models to produce high fidelity, repeatable and readily communicated artif ...

    SBIR Phase I 2007 Department of DefenseAir Force
  3. Steganography for Tamper-Resistant Software (STARS)

    SBC: ARCHITECTURE TECHNOLOGY INC            Topic: OSD06I13

    The DoD has valuable and sensitive software which it must protect from use, exploitation, or attack by other countries or organizations. Anti-tamper technologies protect these assets by increasing the costs associated with extracting this information by enemy forces. A variety of techniques have been and are being developed to address specific aspects of anti-tamper protection. These techniques fr ...

    SBIR Phase I 2007 Department of DefenseAir Force
  4. Medical Operations Simulator for Monitoring and Assessing the Readiness of Trainees (MOSMART)

    SBC: ARCHITECTURE TECHNOLOGY INC            Topic: OSD06H04

    Medical Support Operations personnel need specialized training to prepare for stressful operations. Often, though, these operations do not follow the scripted training and require contingency plans that are more dynamically robust. Thus, a training tool is necessary to allow the medical support operations trainees to employ contingency plans on-the-fly in an environment that can be modified to a ...

    SBIR Phase I 2007 Department of DefenseAir Force
  5. 6-Synch

    SBC: ARCHITECTURE TECHNOLOGY INC            Topic: AF071349

    This proposed SBIR effort will develop 6-Synch, a tool for monitoring NCW assets, based on agents that are “Network Health” aware, and act appropriately given the “Health” of their links. 6-Synch utilizes routing protocol derived network connectivity information for the placement of the agents. Intelligent agents will be dynamically and optimally placed in the network based on the curren ...

    SBIR Phase I 2007 Department of DefenseAir Force
  6. Commodity Auxiliary Processors for Enhanced Software Tamper Protection (CAPESTAR)

    SBC: ARCHITECTURE TECHNOLOGY INC            Topic: OSD06I10

    Software plays an ever-increasing role in modern weapons systems. The consequences of enemies capturing and reverse engineering the software in these systems pose a real risk for the DoD. Anti-tamper technologies protect these assets by increasing the costs associated with extraction of this information by enemy forces. “Out-of-band” protection measures (involving trusted hardware modules) a ...

    SBIR Phase I 2007 Department of DefenseAir Force
  7. UNOBTRUSIVE REAL-TIME MONITORING OF PILOT MENTAL STATUS: DEVELOPMENT OF A TEST-BED SYSTEM

    SBC: Ard Corp.            Topic: N/A

    THE REAL-TIME DETERMINATION OF PILOT MENTAL STATUS IS A CRITICAL FEATURE OF THE WORKLOAD MONITORING AND MINDWARE SUBSYSTEMS THAT HAVE BEEN ENVISIONED FOR FUTURE FIGHTER AIRCRAFT, INCLUDING THE VIRTUALWORLD SUPER-COCKPIT. RECENT LABORATORY AND SIMULATOR STUDIES, SOME CONDUCTED BY ARD, HAVE SUGGESTED THE VALUE OF VARIOUS BEHAVIORAL AND PHYSIOLOGICAL INDICES FOR REFLECTING OPERATIONALLY RELEVANT MENT ...

    SBIR Phase I 1988 Department of DefenseAir Force
  8. RAREFIELD GAS FLOW EFFECTS ON HYPERSONIC VEHICLES

    SBC: ASTROX CORP            Topic: N/A

    BASED UPON A PRELIMINARY LITERATURE SEARCH, SEVERAL POSSIBLE AREAS FOR FUTURE RESEARCH WERE IDENTIFIED. FIRST, THERE APPEARS TO BE NO PUBLISHED IDENTIFICATION OF THE RAREFIELD FLOW REGIMES, AND CRUCIAL RAREFIELD FLIGHT REGIMES, FOR VARIOUS VEHICLES IN DESIRED HIGH ALTITUDE MANEUVERS. SECOND, IT SEEMS CLEAR THAT CONTINUUM ANALYSES HAVE SHORTCOMINGS IN CERTAIN FLIGHT REGIMES AND RAREFIELD FLOW ANALY ...

    SBIR Phase I 1988 Department of DefenseAir Force
  9. THE USE OF NEURAL NETWORKS FOR TARGET IDENTIFICATION

    SBC: ATLANTIC AEROSPACE ELECTRONICS CORP.            Topic: N/A

    A RECENT SURVEY OF NEURAL NETWORK TECHNOLOGY BY ATLANTIC AEROSPACE PERSONNEL HAS IDENTIFIED THE NECESSITY OF USING A NUMBER OF NETWORK LAYERS TO ADDRESS TYPICAL PROBLEMS IN TARGET IDENTIFICATION. IN ADDITION TO UPDATING THIS SURVEY, THIS EFFORT WILL DEVELOP AND DEMONSTRATE A NEURAL NETWORK APPROACH TO TARGET RECOGNITION BASED ON A NEW CLASS OF DISTRIBUTED, ITERATIVE IMAGE OPERATORS MODELED AFTER T ...

    SBIR Phase I 1988 Department of DefenseAir Force
  10. SYSTEM IDENTIFICATION AND FILTERING OF NONLINEAR CONTROLLED MARKOV PROCESSES BY CANONICAL VARIATE ANALYSIS

    SBC: Business & Technological Syste            Topic: N/A

    CURRENT METHODS FOR SYSTEM IDENTIFICATION FOR NONLINEAR MARKOV PROCESSES ARE RESTRICTED TO VERY SPECIAL FORMS OR PROVIDE POOR APPROXIMATIONS TO OPTIMAL PROCEDURES. THE OBJECTIVE OF THE PHASE I RESEARCH IS TO DEMONSTRATE THE TECHNICAL FEASIBILITY OF USING STATE AFFINE MARKOV PROCESSES AND CANONICAL VARIATE ANALYSIS (CVA) FOR OBTAINING APPROXIMATIONS TO OPTIMAL NONLINEAR PROCEDURES FOR SYSTEM IDENTI ...

    SBIR Phase I 1988 Department of DefenseAir Force
US Flag An Official Website of the United States Government