The largest database of trusted experimental protocols

2 protocols using sh hnrnpa2b1

1

Regulation of NSCLC by HNRNPA2B1

Check if the same lab product or an alternative is used in the 5 most similar protocols
HNRNPA2B1 overexpression plasmids, lentivirus-mediated HNRNPA2B1 shRNA (sh-HNRNPA2B1, 5ʹ-CCGTAAGCTCTTTATTGGTGGCTTA-3ʹ), si-MEG3, miR-21-5p mimics and inhibitor were purchased from GenePharma (Shanghai, China). The sh-NC, vector and miR-NC were used as the control groups. NSCLC cell lines were planted in 6-well plates 24 h prior to sh-HNRNPA2B1, si-MEG3, miR-21-5p mimics or inhibitor transfection with 50–60% confluence, and then mixed with Lipofectamine 2000 (Invitrogen, Carlsbad, CA, USA) according to the manufacture instructions.
+ Open protocol
+ Expand
2

Lentiviral-mediated Knockdown of Key Genes

Check if the same lab product or an alternative is used in the 5 most similar protocols
Short hairpin RNA (shRNA) targeted GLI2, SYVN1, IGF2BP3, IGF2BP2, HNRNPA2B1, HNRNPD, HNRNPK, HNRNPM, HNRNPA1 (shGLI2, shSYVN1, shIGF2BP3, shIGF2BP2, shHNRNPA2B1, shHNRNPD, shHNRNPK, shHNRNPM, and shHNRNPA1) or scrambled oligonucleotides, purchased from GenePharma (Shanghai, China) were inserted into pGLVH1 vector. The shRNA sequences were provided in Table S1. The full length of SYVN1 or PPARα coding sequence was amplified and cloned into a pcDNA3.1 (Invitrogen, Carlsbad, CA, USA) vector (SYVN1, PPARα). Cells were transfected with the above plasmids using Lipofectamine 3000 transfection reagent (Invitrogen) according to manufacturer’s instructions. Lenti-Pac HIV Expression Packaging Mix and the lentiviral vectors (shSYVN1, shIGF2BP3, shGLI2) were used to transfect HEK293T cells for 48 hours and then lentiviral particles were harvested from the supernatant. Stable transfected cells were selected by two weeks puromycin treatment (2 μg/mL).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!