The largest database of trusted experimental protocols

Anti ly6g bv785

Manufactured by BioLegend

Anti-Ly6G-BV785 is a lab equipment product produced by BioLegend. It is a fluorescently-labeled antibody that targets the Ly6G antigen.

Automatically generated - may contain errors

2 protocols using anti ly6g bv785

1

Neutrophil Depletion and Skin Inflammation Analysis

Check if the same lab product or an alternative is used in the 5 most similar protocols
Neutrophil depletion was achieved by intraperitoneal doses of 1A8 monoclonal anti-Ly6G antibody (Bio X Cell, Lebanon, NH) at 25 mg/kg in saline. Equivalent doses of IgG monoclonal anti-trinitrophenol (clone 2A3, Bio X Cell, Lebanon, NH) were administered to control mice 24 hours before carrying out the dorsal skin edema inflammation model. Four hours after dorsal skin model, mice were killed by anaesthetization, and whole blood was collected through cardiac puncture for flow cytometric analysis of neutrophils. The heparinized blood (1:100, stock heparin 5,000 IU/ml) was incubated with the following antibodies: anti-Ly6G-BV785 (1:200, catalog 127645, BioLegend, San Diego, CA) and anti-Ly6C BV605 (1:200, catalog 128035, BioLegend, San Diego, CA). Samples were acquired in an LSRFORTESSA flow cytometer (BD Biosciences, Oxford, United Kingdom) and analyzed using FlowJo software 9.7.5 (FlowJo, Ashland, OR).
+ Open protocol
+ Expand
2

Analyzing Nanoparticle Uptake in Lung Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
The ALI mice were treated with Cy5.5-labeled NPs for 22 h. The cell suspensions in BALF were stained with anti-CD11b-AF488, anti-CD11c-APC, anti-F4/80-BV421, and anti-Ly6G-BV785 antibodies (BioLegend), and analyzed using CytoFLEX flow cytometer (Beckman Coulter, Inc.). Data were analyzed with FlowJo software X.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!