Skip to main content
. 2018 Aug 3;18:260. doi: 10.1186/s12887-018-1218-4

Fig. 1.

Fig. 1

Schematic overview of the mailing and anonymity procedure