Skip to main content
. 2014 Sep-Oct;58(5):629–636. doi: 10.4103/0019-5049.144674

Table 2.

Comparison of two commonly used protocols

graphic file with name IJA-58-629-g002.jpg