Skip to main content
. 2018 Jun 12;9:2201. doi: 10.1038/s41467-018-04423-1

Fig. 6.

Fig. 6

Schematic flow diagram of the Storage Security Calculator program. The program relies on 26 input parameters, each are called in at least one of the models. These parameters are listed in Table 3, along with the values applied. Discussion of how the values were derived is provided in the Supplementary Information Section 2