The largest database of trusted experimental protocols

2 protocols using anti acy 1

1

SH-SY5Y Protein Expression Analysis

Check if the same lab product or an alternative is used in the 5 most similar protocols
The SH-SY5Y cells were treated as mentioned above, and proteins were extracted with RIPA lysis buffer (Beyotime, Shanghai, China). The following antibodies were used: anti-GAPDH, anti-Bax, anti-ACY-1, anti-phospho-ERK1/2, anti-ERK1/2, anti-TGF-β, anti-Bcl-2, and anti-Bad (Cell Signaling Technology, Danvers, MA, USA). The samples were visualized using an enhanced chemiluminescence system, and the bands were analyzed with the Image J software.
+ Open protocol
+ Expand
2

Protein Expression Analysis in CRC Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
Lysates from CRC cells were separated on 10% sodium dodecyl sulfate-polyacrylamide gels, and the proteins were then transferred to a polyvinylidene difluoride membrane (Millipore, Billerica, MA, USA). The membranes were blocked with TBST (0.5% Tween-20 in Tris-buffered saline) containing 5% nonfat milk for 1 h at room temperature and then incubated with primary antibody overnight at 4 °C, followed by secondary antibodies for 1 h at room temperature. The following antibodies were used: anti-GAPDH, anti-ACY1, anti-E-cadherin, and β-catenin (Cell Signaling Technology, Boston, MA, USA). The samples were visualized using an enhanced chemiluminescence system (Thermo Fisher Scientific, Cambridge, MA, USA), and the bands were analyzed with ImageJ software (version 1.43 National Institutes of Health, Bethesda, MD, USA).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!