Fig. 5From: Computational identification of harmful mutation regions to the activity of transposable elementsThe flow chart of the computational methodBack to article page