Fig. 7From: Transient ischemic attack analysis through non-contact approachesPrecision comparison of two algorithmsBack to article page