The largest database of trusted experimental protocols

Nod scid il2yr female mice

Manufactured by Jackson ImmunoResearch

NOD/SCID/IL2Rγ−/− female mice are a genetically modified strain of mice. They have a deficiency in the interleukin-2 receptor gamma chain, which results in impaired immune function. These mice are widely used in research applications that require a severely immunocompromised animal model.

Automatically generated - may contain errors

4 protocols using nod scid il2yr female mice

1

Tail Vein Injection in NOD/SCID/IL2yR−/− Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
For tail vein injection assays, 6–8-week-old NOD/SCID/IL2yR−/− female mice were supplied by Jackson Labs (Cat #005557).
+ Open protocol
+ Expand
2

Quantifying Lung Metastasis in Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
The experiments were conducted following protocols approved by ISMMS Institutional Animal Care and Use Committee (IACUC) (protocol number LA11-00122). 6–8-week-old NOD/SCID/IL2yR−/− female mice (Jackson Labs, Cat# 005557) were used. Cells were harvested with 2mM EDTA-PBS, resuspended in 100 μL HBSS (SKmel147: 1.25 × 105 cells; 4L: 5 × 104 cells), and injected into one of the lateral tail veins with a 27-gauge needle. At the experimental endpoint (SKmel147: 3 weeks; 4L: 5 weeks), mice were euthanized by cervical dislocation, lungs were cleared of blood by right ventricle PBS perfusion, and imaged ex vivo for GFP and mCherry fluorescence on a Cytation 7 instrument (BioTek). Quantification of lung colonies was performed using Gen 5 software (BioTek). Harvested lungs were fixed in neutral buffered formalin for 24 h, paraffin embedded and sectioned at 5 μM thickness. Sections were obtained from three levels spaced 100 μM, stained with H&E and acquired at 20× magnification on a NanoZoomer S210 slide scanner (Hamamatsu). Metastatic colonies were identified morphologically and counted using NDP.view 2 software (Hamamatsu). Lung area on each section was calculated by NDP.view 2 software by outlining the edges of the tissue. Slides were blinded to the reviewer (C.N.) prior to analysis.
+ Open protocol
+ Expand
3

Tail Vein Injection in NOD/SCID/IL2yR−/− Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
For tail vein injection assays, 6–8-week-old NOD/SCID/IL2yR−/− female mice were supplied by Jackson Labs (Cat #005557).
+ Open protocol
+ Expand
4

Quantifying Lung Metastasis in Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
The experiments were conducted following protocols approved by ISMMS Institutional Animal Care and Use Committee (IACUC) (protocol number LA11-00122). 6–8-week-old NOD/SCID/IL2yR−/− female mice (Jackson Labs, Cat# 005557) were used. Cells were harvested with 2mM EDTA-PBS, resuspended in 100 μL HBSS (SKmel147: 1.25 × 105 cells; 4L: 5 × 104 cells), and injected into one of the lateral tail veins with a 27-gauge needle. At the experimental endpoint (SKmel147: 3 weeks; 4L: 5 weeks), mice were euthanized by cervical dislocation, lungs were cleared of blood by right ventricle PBS perfusion, and imaged ex vivo for GFP and mCherry fluorescence on a Cytation 7 instrument (BioTek). Quantification of lung colonies was performed using Gen 5 software (BioTek). Harvested lungs were fixed in neutral buffered formalin for 24 h, paraffin embedded and sectioned at 5 μM thickness. Sections were obtained from three levels spaced 100 μM, stained with H&E and acquired at 20× magnification on a NanoZoomer S210 slide scanner (Hamamatsu). Metastatic colonies were identified morphologically and counted using NDP.view 2 software (Hamamatsu). Lung area on each section was calculated by NDP.view 2 software by outlining the edges of the tissue. Slides were blinded to the reviewer (C.N.) prior to analysis.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!