NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Documentation on using the Messaging Workbench (MWB) tool to edit the profile created for the NCPDP SCRIPT Implementation Guide: Version 10.6 NEWRX New Prescription and RXHRES Prescription History Response message structures.
In this paper, efficient deployment algorithms are proposed for a mobile sensor network to improve coverage. The proposed algorithms calculate the position of the sensors iteratively based on the existing coverage holes in the target field. The
The methodology described in this document was produced and developed by Lantana Consulting Group for the National Institute of Standards and Technology (NIST). It is part of a series of suitability analsyses on four healthcare standards performed under
This document supplements information about templated CDA in the context of the Healthcare Information Technology (HIT) Standards Analysis Project carried out by Lantana Consulting Group for the National Institute of Standards and Technology (NIST).
Larry Goldberg, Bettijoyce B. Lide, Svetlana Z. Lowry, Holly Massett, Whitney Quesenbery, Ben Schneiderman
People arrive at health applications with expectations from the rest of their lives and those expectations are rapidly rising. Beyond basic access to their own health records and to their healthcare providers, consumers expect their health information to
Healthcare and health information technology professionals are entrusted with patient data which, because of its personal nature, requires protection to ensure its confidentiality. To provide this protection, these professionals frequently look to commonly
Michael C. Gibbons, Svetlana Z. Lowry, Matthew T. Quinn
HITECH Act's provisions to drive adoption and meaningful use of Electronic Health Records (EHRs) holds great promise in supporting improvements in the quality, efficiency and effectiveness of care delivery. Replacing paper-based processes with electronic
Efficient transceiver design in body area networks requires in-depth understanding of the propagation channel which in this case involves the human body. Several studies have been done to characterize RF propagation on the body surface and determine the
Charles D. Fenimore, Samuel Armato, Denise Aberle, Matthew Brown, Claudia Henschke, Michael McNitt-Gray, Heber MacMahon, Geoffrey McLennan, Charles R. Meyer, Anthony P. Reeves, David F. Yankelevitz
The development of computer-aided diagnostic (CAD) methods for lung nodule detection, classification, and quantitative assessment can be facilitated through a well-characterized repository of computed tomography scans. The Lung Image Database Consortium
Usability has been a topic of considerable interest in the health IT community. This document provides NIST guidance for those developing electronic health record (EHR) applications that need to know more about processes of user-centered design (UCD). An
On July 13, 2010, 27 roundtable discussion participants and more than 100 other attendees gathered at the National Institute of Standards and Technology (NIST) for a full-day workshop on Usability in Health IT: Technical Strategy, Research, and
This document provides a template for the modified version of Software engineering Software product Quality Requirements and Evaluation(SQuaRE) Common Industry Format (CIF) for usability test reports (ISO/IEC 25062:2006(E)), the Common Industry Format (CIF
Matthew A. Scholl, Kevin M. Stine, Kenneth Lin, Daniel Steinberg
The purpose of this publication is to provide a systematic approach to designing a technical security architecture for the exchange of health information that leverages common government and commercial practices and that demonstrates how these practices
The1IEEE 802.15.3 is an emerging technology for high data rate wireless multimedia applications in Wireless Personal Area Networks (WPAN). In this paper, a discrete event simulation model has been implemented using OPNET2 Modeler to simulate the essential
Nathalie Yarkony, Kamran Sayrafian, Antonio Possolo
Energy Harvesting (EH) refers to the process of capturing and storing energy from external sources or ambient environment. Kinetic energy harvested from the human body motion seems to be one of the most convenient and attractive solution for wearable
Charles D. Fenimore, Michael McNitt-Gray, Luc Bidaut, Samuel G. Armato, Charles R. Meyer, Marios A. Gavrielides, Geoffrey McLennan, Nicholas Petrick, Binsheng Zhao, Anthony P. Reeves, Reinhard R. Beichel, Grace Kim
Rationale and Objectives: This manuscript describes issues and methods that are specific to the measurement of change in tumor volume as measured from CT images and how these would relate to the establishment of CT tumor volumetrics as a biomarker of
Charles D. Fenimore, Charles R. Meyer, Samuel G. Armato, Geoffrey McLennan, Luc Bidaut, Daniel P. Barboriak, Marios A. Gavrielides, Nicholas Petrick, Edward F. Jackson, Michael McNitt-Gray, Paul E. Kinahan, Binsheng Zhao
Rationale and Objectives Early detection of tumor response to therapy is a key goal. Finding measurement algorithms capable of early detection of tumor response could individualize therapy treatment as well as reduce the cost of bringing new drugs to
Kamran Sayrafian, Wen-Bin Yang, John G. Hagedorn, Judith E. Terrill, Kamya Yazdandoost
Knowledge of the propagation media is a key step toward a successful transceiver design. Such information is typically gathered by conducting physical experiments, measuring and processing the corresponding data to obtain channel characteristics. In case
Matthew A. Scholl, Kevin Stine, Joan Hash, Pauline Bowen, L A. Johnson, Carla Dancy Smith, Daniel Steinberg
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing
This ITL Bulletin helps to educate readers about the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out in the Security Rule. This publication is also designed to direct readers to helpful information in other
The goal of this document is to help W3C editors write better specifications, by making a specification easier to interpret without ambiguity and clearer as to what is required in order to conform. It focuses on how to define and specify conformance. It
This paper was inspired by preliminary discussions between NIST and members of the healthcare community who are impacted by the use of emerging information technology. Topics of discussion included the current state of standards work in the healthcare