Skip to main content
. 2017 Sep 18;4:23. doi: 10.1186/s40658-017-0190-7

Fig. 1.

Fig. 1

Steps ensuring data integrity