For adoptive transfer of NK cells and macrophages, endogenous cells were depleted with neutralizing antibodies against NK cells and macrophages in B16F10-bearing Fcgr3-KO or WT mice 1 day before the treatment. Syngeneic WT CD45.1+ or Ifng-KO NK cells and macrophages were harvested and selected using a magnetic bead enrichment method (Miltenyi Biotec) and Ifng-KO cells were labeled with 5 μM CellTrace Violet or CFSE (Thermo Fisher). NK cells and macrophages were then i.v. injected at 1 × 106 cells (Tai et al., 2013 ) and 3–4 × 106 cells (Hagemann et al., 2008 (link)) per mouse, respectively.
Magnetic bead enrichment method
The magnetic bead enrichment method is a laboratory technique used to isolate and purify target cells or molecules from complex biological samples. It utilizes magnetic beads coated with specific antibodies or ligands that can bind to the desired target. The sample is incubated with the magnetic beads, and the bound targets are then separated using a magnetic field. This method provides a simple and efficient way to enrich and concentrate the target of interest for further analysis or downstream applications.
2 protocols using magnetic bead enrichment method
Adoptive Transfer of T cells, NK Cells, and Macrophages
Adoptive Transfer of T cells, NK Cells, and Macrophages
For adoptive transfer of NK cells and macrophages, endogenous cells were depleted with neutralizing antibodies against NK cells and macrophages in B16F10-bearing Fcgr3-KO or WT mice 1 day before the treatment. Syngeneic WT CD45.1+ or Ifng-KO NK cells and macrophages were harvested and selected using a magnetic bead enrichment method (Miltenyi Biotec) and Ifng-KO cells were labeled with 5 μM CellTrace Violet or CFSE (Thermo Fisher). NK cells and macrophages were then i.v. injected at 1 × 106 cells (Tai et al., 2013 ) and 3–4 × 106 cells (Hagemann et al., 2008 (link)) per mouse, respectively.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!