Nod cg prkdcscidil2rgtm1wj1 szj
NOD.Cg-PrkdcscidIl2rgtm1Wj1/SzJ is a mouse strain that is deficient in T and B cells, as well as natural killer cells, due to mutations in the Prkdc and Il2rg genes. This strain is commonly used in research as a model for studying immune system function and development.
9 protocols using nod cg prkdcscidil2rgtm1wj1 szj
Targeting Solid Tumors with Engineered CAR T Cells
Patient-Derived Xenograft Tumor Model
Tracking Metastasis in NSG Mice
Murine Models for Immunology Research
Targeting Solid Tumors with Engineered CAR T Cells
Mouse Strain Maintenance and Utilization
NOD SCID Gamma Mice for Research
In Vivo Tumor Growth Inhibition
Example 3
These protocols were used in many of the experiments of the figures. Tumor cells were implanted subcutaneous (SC) in the right flank of NSG (NOD.Cg-Prkdcscid Il2rgtm1Wj1/SzJ) mice (The Jackson Laboratory, Cat. No. 005557) and allowed to grow until an established tumor with a mean volume of around 200 mm3 was reached. In parallel human T cells were cultured in T cell media (X-VIVO 15 [Lonza, Cat. No. 04-418Q], 5% Human Serum, 1% Penicillin/Streptomycin, 0.01 mM 2-Mercaptoethanol) in a G-Rex100M gas permeable flask (Wilson Wolf Cat. No. 81100S) with MACSiBeads from the T Cell Activation/Expansion Kit (Miltenyi Cat. No. 130-091-441) for around 10 days and supplemented with recombinant human IL-2 protein. Tumor growth in mice and human T cell activation/expansion were coordinated so that on Day 0 of the study mice were randomized into groups (N=6) based on tumor size; each were then injected intravenous (IV) with 2.5×106 cultured human T cells and administered the first dose of the COBRA or control molecules. Mice were dosed every 3 days for 7 doses (Days 0, 3, 6, 9, 12, 15 and 18) and then followed for an additional 2-3 weeks until tumors reached >2000 mm3 in volume or the study was terminated. Tumor volumes were measured every 3 days.
Syngeneic Mouse Models in Cancer Research
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!