An empty lentivirus (vector) was used as the negative control. Lentiviral vectors were constructed by Obio Technologies. Infected cells were selected using puromycin. Quantitative real‐time PCR and immunoblotting were carried out to assess the transfection and infection efficiencies.
Mettl14
METTLER14 is a laboratory equipment used for molecular biology and genomics research. It is a component of the methyltransferase complex that catalyzes the addition of methyl groups to RNA.
Lab products found in correlation
9 protocols using mettl14
Manipulation of Circular RNA Pathways
An empty lentivirus (vector) was used as the negative control. Lentiviral vectors were constructed by Obio Technologies. Infected cells were selected using puromycin. Quantitative real‐time PCR and immunoblotting were carried out to assess the transfection and infection efficiencies.
Modulating IGF2BP3, SCD, and METTL14 in Cells
Next, the pHBLV-U6-MCS-EF1-Luc-T2A-Puro vector (HANBIO, Shanghai, China) inserted IGF2BP3-shRNA lentivirus, then the lentiviruses-infected CC cells grew in DMEM containing 5 µg/ml polybrene then. IGF2BP3-knockdown cells were transfected with the SCD-overexpression plasmid to rescue. Stable cell lines were produced by selection using 10 µg/ml puromycin (Solarbio, China). The aforesaid sequences appear in Table
siRNA knockdown of key genes in RA-FLSs
Genetic Manipulation of Gastric Cancer Cells
FAM120A, WTAP, METTL3, METTL14, YTHDC1, SLCTA11, and PD-L1 knockdown and overexpression lentiviruses and their respective control vectors were generated by GenePharma (Shanghai, China). GC cells were inoculated into 6-well dishes and then infected with lentivirus at 60% confluence. Stable transfected cells were produced by treating cells with puromycin (4 μg/ml) for 2 weeks. The shRNA sequences are listed in Supplementary Table
RNA and Protein Modulation Protocol
Knockdown and Overexpression of TRIM9 and METTL14
RNA Interference Targeting Epigenetic Regulators
Silencing HPV and IGF2BP2 in Cervical Cancer
The HPV16 E6/E7-shRNA lentivirus, HPV18 E6/E7-shRNA lentivirus, and NC-shRNA were constructed by GenePharma (Shanghai, China). LV17-NC and LV17-Homo IGF2BP2 were cloned into the pcDNA3.1 (+) vector. The CC cells were infected with lentiviruses and cultured in DMEM supplemented with 5 µg/ml polybrene. To rescue the effect of E6/E7 knockdown on CC cells, HPV16/18 E6/E7-knockdown cells were infected with the IGF2BP2-overexpression lentivirus. Stable cell lines were generated by selection with 10 µg/ml puromycin (Solarbio, China). The expression of HPV16 E6/E7, HPV18 E6/E7, and IGF2BP2 was validated by qRT-PCR and western blot. The siRNA, shRNA and plasmid sequences are listed in
Modulating m6A Regulators in Cells
Lipofectamine 3000 (Invitrogen, Waltham, MA, USA) was used to perform transfections, according to the manufacturer's instructions. A recombinant lentivirus containing sh-circNRIP1 or sh-ALKBH5 was established to stably knock out circNRIP1 or ALKBH5. A non-targeting shRNA (sh-NC) was used as the negative control. circNRIP1 or ALKBH5 were overexpressed using recombinant lentiviruses containing the complete coding sequences of these genes.
An empty lentivirus (vector) was used as the negative control. The lentiviral vectors were constructed by Obio Technologies (Shanghai, China). Infected cells were selected using puromycin. Then, qRT-PCR and immunoblotting were performed to assess the transfection and infection e ciencies.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!