This paper investigates the potential for utilizing artificial intelligence (AI) to improve water distribution management in Saudi Arabia. With increasing population and water scarcity, there is a need for more efficient water management. The paper reviews successful applications of AI and internet of things (IoT) in water distribution in other countries, in order to identify best practices that could be applied in Saudi Arabia. Challenges such as lack of infrastructure, data, human capabilities, and regulations are discussed. Findings indicate that AI and IoT can reduce water waste, leaks, and costs, but an adequate infrastructure and vision are needed.
{"title":"The Use of Artificial Intelligence in Water Management Projects in the Kingdom of Saudi Arabia","authors":"Sultan Ghadeer Alghadeer","doi":"10.58425/ajt.v2i1.208","DOIUrl":"https://doi.org/10.58425/ajt.v2i1.208","url":null,"abstract":"This paper investigates the potential for utilizing artificial intelligence (AI) to improve water distribution management in Saudi Arabia. With increasing population and water scarcity, there is a need for more efficient water management. The paper reviews successful applications of AI and internet of things (IoT) in water distribution in other countries, in order to identify best practices that could be applied in Saudi Arabia. Challenges such as lack of infrastructure, data, human capabilities, and regulations are discussed. Findings indicate that AI and IoT can reduce water waste, leaks, and costs, but an adequate infrastructure and vision are needed.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136113555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim: AI systems can be complex and opaque, making it challenging to understand how they make decisions. This raises concerns about fairness and accountability, as individuals may not understand the factors that influence the decisions made by AI systems. The aim of this study was to examine the ethical considerations surrounding the development and use of AI. Methods: The study adopted a desktop research design. Relevant books reference and journal articles for the study were identified using Google Scholar. The inclusion criteria entailed materials that were related to the ethics of artificial intelligence. Results: The study found out that bias, privacy, accountability and transparency are the main ethical concerns that surround the development and use of AI technology in developed countries. Additionally, the studies emphasized the need for collaboration between stakeholders, including policymakers, researchers, and local communities, to ensure that ethical guidelines are developed and implemented. In African countries, the studies highlighted the need for a nuanced understanding of the cultural, political, and economic context of the region when considering ethical AI. Issues related to bias, data privacy, and the impact of AI on the labor market were identified as important ethical considerations in the region. Conclusion: This study emphasizes the need for a human-centered approach that prioritizes the needs and values of local communities, as well as greater engagement with local stakeholders in the development of ethical guidelines. Recommendation: The study recommend development and implementation of ethical guidelines for AI. Policymakers, developers, and researchers should work together to develop and implement ethical guidelines for AI systems. These guidelines should address issues related to bias, transparency, accountability, and privacy, and should be grounded in a commitment to promoting human well-being and social good.
{"title":"The Ethics of Artificial Intelligence: Examining the Ethical Considerations Surrounding the Development and Use of AI","authors":"Aisha Zahid Huriye","doi":"10.58425/ajt.v2i1.142","DOIUrl":"https://doi.org/10.58425/ajt.v2i1.142","url":null,"abstract":"Aim: AI systems can be complex and opaque, making it challenging to understand how they make decisions. This raises concerns about fairness and accountability, as individuals may not understand the factors that influence the decisions made by AI systems. The aim of this study was to examine the ethical considerations surrounding the development and use of AI. \u0000Methods: The study adopted a desktop research design. Relevant books reference and journal articles for the study were identified using Google Scholar. The inclusion criteria entailed materials that were related to the ethics of artificial intelligence. \u0000Results: The study found out that bias, privacy, accountability and transparency are the main ethical concerns that surround the development and use of AI technology in developed countries. Additionally, the studies emphasized the need for collaboration between stakeholders, including policymakers, researchers, and local communities, to ensure that ethical guidelines are developed and implemented. In African countries, the studies highlighted the need for a nuanced understanding of the cultural, political, and economic context of the region when considering ethical AI. Issues related to bias, data privacy, and the impact of AI on the labor market were identified as important ethical considerations in the region. \u0000Conclusion: This study emphasizes the need for a human-centered approach that prioritizes the needs and values of local communities, as well as greater engagement with local stakeholders in the development of ethical guidelines. \u0000Recommendation: The study recommend development and implementation of ethical guidelines for AI. Policymakers, developers, and researchers should work together to develop and implement ethical guidelines for AI systems. These guidelines should address issues related to bias, transparency, accountability, and privacy, and should be grounded in a commitment to promoting human well-being and social good.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"1999 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89944694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aim: The main objective of this research project is to design and implement a functional secure virtual private network over the internet considering that use of traditional fixed telephones lines is not cost effective and it is unsecured especially in the context of Cameroon. Methods: In the VPN, internet is used as the data pipelined replacing the traditional data lines. This approach was deployed through simulation with CISCO Packet Tracer. Results: Simulation results showed that the system can provide a secured, reliable and cost effective transmission system over the Internet for organizations in Cameroon. As such, VPNs form an integral part of remote business communications across the internet due to the inherent risks that exist when sending private information over a public network. Conclusion: VPNs not only prevent unethical use of private business correspondence by unauthorized parties but they also play an important role in reducing the environmental impact of business travel. Recommendations: This study recommend an organization which considers security as its top priority to embrace the rather expensive solution of implementing an email/Web/DNS/FTP server at each site rather than using only a single email/web/DNS/FTP server for the entire intranet. This will reduce the amount of information that organization sends across the Internet and increase information access speeds. Home users or small office can equally be installed with an email/web/DNS/FTP server. Also, in the remote access case, a company can outsource the installation and management of their remote access VPN server to the ISP. Moreover, just using IPSec for remote access users is not enough. Remote access IPSec VPN implementation should always be associated with a tunneling protocol such as PPTP.
{"title":"Design and Implementation of a Secure Virtual Private Network Over an Open Network (Internet)","authors":"S. Forbacha, Mbuya Josiah Anyam Agwu","doi":"10.58425/ajt.v2i1.134","DOIUrl":"https://doi.org/10.58425/ajt.v2i1.134","url":null,"abstract":"Aim: The main objective of this research project is to design and implement a functional secure virtual private network over the internet considering that use of traditional fixed telephones lines is not cost effective and it is unsecured especially in the context of Cameroon. \u0000Methods: In the VPN, internet is used as the data pipelined replacing the traditional data lines. This approach was deployed through simulation with CISCO Packet Tracer. \u0000Results: Simulation results showed that the system can provide a secured, reliable and cost effective transmission system over the Internet for organizations in Cameroon. As such, VPNs form an integral part of remote business communications across the internet due to the inherent risks that exist when sending private information over a public network. \u0000Conclusion: VPNs not only prevent unethical use of private business correspondence by unauthorized parties but they also play an important role in reducing the environmental impact of business travel. \u0000Recommendations: This study recommend an organization which considers security as its top priority to embrace the rather expensive solution of implementing an email/Web/DNS/FTP server at each site rather than using only a single email/web/DNS/FTP server for the entire intranet. This will reduce the amount of information that organization sends across the Internet and increase information access speeds. Home users or small office can equally be installed with an email/web/DNS/FTP server. Also, in the remote access case, a company can outsource the installation and management of their remote access VPN server to the ISP. Moreover, just using IPSec for remote access users is not enough. Remote access IPSec VPN implementation should always be associated with a tunneling protocol such as PPTP.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77975070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: The purpose of this study was to investigate the role of Information and Communication Technology (ICT) in creating competitive advantage in selected hotels in Johannesburg. Methodology: Descriptive research design was adopted by the study while stratified random sampling was used to stratify the 104 respondents into 4 categories which included: Operations, reservations, Marketing and ICT managers. Questionnaires were used to collect primary data while descriptive statistics were used to analyze the data. Findings: The results showed that there was significant uptake of ICT in all categories of the hotels. Conclusion: The study concluded that organizational, environmental and technological innovation factors significantly influenced ICT uptake of Johannesburg Hotels. Recommendation: The study recommends engagement in online marketing and diversification of the types of online marketing in order to optimize on visibility, enhance marketing funnel and ultimately increase profitability.
{"title":"Effects of ICT in Hotel Industry in South Africa","authors":"Caleb Siyabonga Kungawo","doi":"10.58425/ajt.v1i1.67","DOIUrl":"https://doi.org/10.58425/ajt.v1i1.67","url":null,"abstract":"Purpose: The purpose of this study was to investigate the role of Information and Communication Technology (ICT) in creating competitive advantage in selected hotels in Johannesburg. \u0000Methodology: Descriptive research design was adopted by the study while stratified random sampling was used to stratify the 104 respondents into 4 categories which included: Operations, reservations, Marketing and ICT managers. Questionnaires were used to collect primary data while descriptive statistics were used to analyze the data. \u0000Findings: The results showed that there was significant uptake of ICT in all categories of the hotels. \u0000Conclusion: The study concluded that organizational, environmental and technological innovation factors significantly influenced ICT uptake of Johannesburg Hotels. \u0000Recommendation: The study recommends engagement in online marketing and diversification of the types of online marketing in order to optimize on visibility, enhance marketing funnel and ultimately increase profitability.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"18 sup79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81326458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: The purpose of this study was to investigate the use of mobile phones by police officers in crime prevention in Lagos city. Methodology: This study employed random stratified sampling procedure. Questionnaires were used for data collection for both qualitative and quantitative data. Qualitative data was coded and analyzed thematically after interpretation of theme while descriptive data was analyzed using descriptive statistics by use of Statistical Package for Social Sciences (SPSS version 20.0). Findings: Mobile phone was found to be an effective tool in prevention of crime in Lagos City. Mobile phone uses such as Facebook, WhatsApp, Twitter, emails and short text messages were found through adapted technology acceptance model (TAM) as to effectively contribute to crime prevention based on respondents’ perspective. Conclusion: The study concludes that police effort to use mobile technology was found to have significant effects on crime prevention. Recommendation: The study recommends development of customized police mobile phone applications and enhancements.
目的:本研究的目的是调查拉各斯市警察在预防犯罪中使用手机的情况。方法:本研究采用随机分层抽样方法。采用问卷调查的方式收集定性和定量数据。定性数据经主题解释后进行主题编码分析,描述性数据使用社会科学统计软件包(SPSS version 20.0)进行描述性统计分析。调查结果:在拉各斯市,手机被发现是预防犯罪的有效工具。根据受访者的观点,透过适应科技接受模式(TAM)发现,使用Facebook、WhatsApp、Twitter、电邮及短讯等流动电话,能有效地预防罪案。结论:该研究得出结论,警方努力使用移动技术被发现对预防犯罪有显著影响。建议:该研究建议开发定制的警察手机应用程序和增强功能。
{"title":"Use of Mobile Phones in Nigeria to Prevent Crime","authors":"Esther Addana Sade, Edwin Abiodun","doi":"10.58425/ajt.v1i1.68","DOIUrl":"https://doi.org/10.58425/ajt.v1i1.68","url":null,"abstract":"Purpose: The purpose of this study was to investigate the use of mobile phones by police officers in crime prevention in Lagos city. \u0000Methodology: This study employed random stratified sampling procedure. Questionnaires were used for data collection for both qualitative and quantitative data. Qualitative data was coded and analyzed thematically after interpretation of theme while descriptive data was analyzed using descriptive statistics by use of Statistical Package for Social Sciences (SPSS version 20.0). \u0000Findings: Mobile phone was found to be an effective tool in prevention of crime in Lagos City. Mobile phone uses such as Facebook, WhatsApp, Twitter, emails and short text messages were found through adapted technology acceptance model (TAM) as to effectively contribute to crime prevention based on respondents’ perspective. \u0000Conclusion: The study concludes that police effort to use mobile technology was found to have significant effects on crime prevention. \u0000Recommendation: The study recommends development of customized police mobile phone applications and enhancements.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"77 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87873762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: The purpose of this study was to investigate the difficulties facing secondary school teachers and students in the use of teaching technologies. Methodology: This was a descriptive survey design. Data was collected using questionnaires, interview schedules and observation schedules. The obtained data were analyzed systematically using descriptive statistics and presented with the help of frequency tables, graphs and percentages. Findings: The results of the study established that most of the teaching technologies were available but inadequate in terms of quantity. Not all the teaching technologies were easily accessible for both teachers and students for teaching and learning processes. Conclusion: The study concluded that the use of teaching technologies was influenced by their availability, how the technology will enhance learning, knowledge and skills on use, syllabus requirement, accessibility and administration among others. Recommendation: The study recommends the Ministry of Education, Science and Technology should organize seminars, workshops and any other in-service courses frequently to familiarize and sensitize with a wide range of teaching technologies and their potentials. This could trigger teachers’ creativity and innovation in the use of teaching technologies in teaching and learning process.
{"title":"Difficulties that Teachers Face when Incorporating Teaching Technologies in Secondary Schools in Madingou District, Congo","authors":"Adrien Lukunga Ahadi, Gloria Chéckina Bolokwa","doi":"10.58425/ajt.v1i1.66","DOIUrl":"https://doi.org/10.58425/ajt.v1i1.66","url":null,"abstract":"Purpose: The purpose of this study was to investigate the difficulties facing secondary school teachers and students in the use of teaching technologies. \u0000Methodology: This was a descriptive survey design. Data was collected using questionnaires, interview schedules and observation schedules. The obtained data were analyzed systematically using descriptive statistics and presented with the help of frequency tables, graphs and percentages. \u0000Findings: The results of the study established that most of the teaching technologies were available but inadequate in terms of quantity. Not all the teaching technologies were easily accessible for both teachers and students for teaching and learning processes. \u0000Conclusion: The study concluded that the use of teaching technologies was influenced by their availability, how the technology will enhance learning, knowledge and skills on use, syllabus requirement, accessibility and administration among others. \u0000Recommendation: The study recommends the Ministry of Education, Science and Technology should organize seminars, workshops and any other in-service courses frequently to familiarize and sensitize with a wide range of teaching technologies and their potentials. This could trigger teachers’ creativity and innovation in the use of teaching technologies in teaching and learning process. ","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79554892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: The purpose of this study was to investigate the implications of internet advances and the competitive strategies adopted by travel agencies in Cairo City. Methodology: The study used a conceptual framework and Diffusion of Innovation Theory in order to relate theory to practice. A mixed approach was used, which incorporated survey design, analytical design and concurrent transformative strategy. The research used census to include all the Egyptian Travel Agents Association (ETTA) in Cairo and purposive approach to select the respondents. Findings: The results of the study established that travel agencies in Cairo are mainly family and independent businesses. Conclusion: The study concluded that there exists a relationship between the internet advances and the strategies adopted by the Travel Agencies, the perceived internet benefits and the strategies adopted. Recommendation: The study recommends the government of Egypt to provide the necessary enabling environment to enhance travel agencies adopt the dynamic ICT advances and the best strategies in the global value chain.
{"title":"Advancement of the Internet in Egypt and its Effect in Tourism Firms","authors":"M. Akila, Angela Bahiti","doi":"10.58425/ajt.v1i1.58","DOIUrl":"https://doi.org/10.58425/ajt.v1i1.58","url":null,"abstract":"Purpose: The purpose of this study was to investigate the implications of internet advances and the competitive strategies adopted by travel agencies in Cairo City. \u0000Methodology: The study used a conceptual framework and Diffusion of Innovation Theory in order to relate theory to practice. A mixed approach was used, which incorporated survey design, analytical design and concurrent transformative strategy. The research used census to include all the Egyptian Travel Agents Association (ETTA) in Cairo and purposive approach to select the respondents. \u0000Findings: The results of the study established that travel agencies in Cairo are mainly family and independent businesses. \u0000Conclusion: The study concluded that there exists a relationship between the internet advances and the strategies adopted by the Travel Agencies, the perceived internet benefits and the strategies adopted. \u0000Recommendation: The study recommends the government of Egypt to provide the necessary enabling environment to enhance travel agencies adopt the dynamic ICT advances and the best strategies in the global value chain. ","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81768128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Purpose: The purpose of this study was to investigate the involvements of technological growths on performance of police officers and suggest the best ways to enhance technology use in the Ghana Police Service. Methodology: The study adopted a descriptive research design survey. The sampling techniques used were simple random sampling. Raw data from respondents was obtained using questionnaires, interviews and focused group discussions. The qualitative data was analyzed thematically and by looking for patterns. They were presented in the form of narrative and verbatim quotations. Quantitative data was analyzed using descriptive statistics includes percentages and means. They were presented in tables, graphs and pie charts. Findings: The results of the study established that the performance of police officers has greatly improved due to growth of technology. The study established that there was use of technology in Ghana police service though not very much advanced. Conclusion: The study concluded that Globalization and new technologies have facilitated certain cyber-criminal operations, thereby placing an additional burden on law enforcement agencies. Recommendation: The study recommends the government of Ghana should increase the allocation of funds to the National Police Service for the acquisition of updated equipment, to provide training at appropriate levels in forensic techniques and in technological skills for policy makers and law enforcement and investigative personnel, introduce appropriate procedural and substantive laws to deal with crimes committed in an electronic environment and raise public awareness, on the appropriate use of the internet.
{"title":"Involvement of Technological Growth on Policing Performance in Ghana","authors":"Maureen Okafor, Esther Abenaa Obika","doi":"10.58425/ajt.v1i1.59","DOIUrl":"https://doi.org/10.58425/ajt.v1i1.59","url":null,"abstract":"Purpose: The purpose of this study was to investigate the involvements of technological growths on performance of police officers and suggest the best ways to enhance technology use in the Ghana Police Service. \u0000Methodology: The study adopted a descriptive research design survey. The sampling techniques used were simple random sampling. Raw data from respondents was obtained using questionnaires, interviews and focused group discussions. The qualitative data was analyzed thematically and by looking for patterns. They were presented in the form of narrative and verbatim quotations. Quantitative data was analyzed using descriptive statistics includes percentages and means. They were presented in tables, graphs and pie charts. \u0000Findings: The results of the study established that the performance of police officers has greatly improved due to growth of technology. The study established that there was use of technology in Ghana police service though not very much advanced. \u0000Conclusion: The study concluded that Globalization and new technologies have facilitated certain cyber-criminal operations, thereby placing an additional burden on law enforcement agencies. \u0000Recommendation: The study recommends the government of Ghana should increase the allocation of funds to the National Police Service for the acquisition of updated equipment, to provide training at appropriate levels in forensic techniques and in technological skills for policy makers and law enforcement and investigative personnel, introduce appropriate procedural and substantive laws to deal with crimes committed in an electronic environment and raise public awareness, on the appropriate use of the internet.","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84688865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-10DOI: 10.1080/00029238.1980.11080009
G. Chatrian, E. Lettich, P. L. Nelson, R. Miller, R. McKenzie, R. Mills
{"title":"Computer Assisted Quantitative Electroretinography I: A Standardized Method","authors":"G. Chatrian, E. Lettich, P. L. Nelson, R. Miller, R. McKenzie, R. Mills","doi":"10.1080/00029238.1980.11080009","DOIUrl":"https://doi.org/10.1080/00029238.1980.11080009","url":null,"abstract":"","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"1 1","pages":"57-77"},"PeriodicalIF":0.0,"publicationDate":"2015-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82182404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-10DOI: 10.1080/00029238.1980.11080010
G. Chatrian, P. L. Nelson, E. Lettich, R. Miller, R. McKenzie, R. Mills
{"title":"Computer Assisted Quantitative Electroretinography II: Separation of Rod and Cone Components of the Electroretinogram in Congenital Achromatopsia and Congenital Nyctalopia","authors":"G. Chatrian, P. L. Nelson, E. Lettich, R. Miller, R. McKenzie, R. Mills","doi":"10.1080/00029238.1980.11080010","DOIUrl":"https://doi.org/10.1080/00029238.1980.11080010","url":null,"abstract":"","PeriodicalId":7480,"journal":{"name":"American Journal of Electroneurodiagnostic Technology","volume":"25 1","pages":"79-88"},"PeriodicalIF":0.0,"publicationDate":"2015-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81652949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}