fig3

Innovative use of forensic STRs for authentication of human cell lines stored over 34 years

Figure 3. Comparative analysis of authentication results using different algorithms. (A) Scores obtained from the different algorithms; (B) Authentication outcomes produced by different algorithms; (C) Intersection of authentication results derived from different scoring methods under the same criterion. ns indicates no significant difference.

Journal of Translational Genetics and Genomics
ISSN 2578-5281 (Online)
Follow Us

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/