The largest database of trusted experimental protocols

2 protocols using anti ifnγ pe cf594

1

Phenotyping Myeloid-Derived Suppressor Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
M-MDSC and G-MDSC were phenotyped using flow cytometry. Tumor was cut into small fragments followed by digestion with tumor disassociation kit for 30 min (Miltenyi Biotec, USA), and then filtered by 70 µm cell strainers. Mononuclear cells was enriched by subjecting the single cell suspension to percoll gradient. Briefly, 70% percoll (4 ml) was added to the centrifuge tube, 30% percoll (4 ml) was carefully layered, and then tumor suspension (4 ml) was carefully layered on the top. After centrifuging at 1500 rpm for 15 mins, the buffy coat layer in the middle was collected and washed with PBS, followed by staining with anti-CD4 FITC, anti-CD8 Percp, anti-Ly6G AF700, anti-Ly6C APC, anti-CD11b APC-Cy7, anti-IFNγ PE-CF594, and anti-granzyme B PE antibodies, along with appropriate isotype controls (all from BD) for flow cytometry analysis (BD FACSCalibur). M-MDSC were defined as CD11b+Ly6C+Ly6G- and G-MDSC were defined as CD11b+Ly6G+Ly6C-.
+ Open protocol
+ Expand
2

Tumor-Infiltrating Immune Cell Profiling

Check if the same lab product or an alternative is used in the 5 most similar protocols
Tumor tissue was harvested and cut into small fragments followed by digestion with tumor disassociation kit for 30 min (Miltenyi Biotec, USA), and then filtered by 70 µm cell strainers. Mononuclear cells were enriched by percoll gradient centrifuging of the single cell suspension. Cells were washed with PBS and stained with Live/Dead dye, anti-CD4 FITC, anti-CD8 PE-Cy7, anti-Ki67 APC, anti-IFNγ PE-CF594, anti-FoxP3 Percp and anti-granzyme B PE antibodies, along with appropriate isotype controls (all from BD) for flow cytometry analysis (BD FACSCalibur).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!