The largest database of trusted experimental protocols

Sh igf2bp2

Manufactured by GenePharma
Sourced in China

Sh-IGF2BP2 is a laboratory equipment product. It is a short hairpin RNA (shRNA) targeting the IGF2BP2 gene. The IGF2BP2 gene encodes a protein involved in the regulation of RNA metabolism and localization. The Sh-IGF2BP2 product can be used to knock down the expression of the IGF2BP2 gene in research studies.

Automatically generated - may contain errors

4 protocols using sh igf2bp2

1

Knockdown and Overexpression of IGF2BP2 in Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
The sequence of the interfering RNAs were as follows: sh-IGF2BP2-1 TTTCAGTTTCCCAAAGATCCG; sh-IGF2BP2-2 GCTGTTAACCAACAAGCCAAT; NC GTTCTCCCGAACGTGTCACGT (GenePharma, China). The sequences for IGF2BP2 overexpression are shown in Table S1 of the additional le 1. The sh-IGF2BP1,2 was synthesized, annealed, and cloned into the pGDV6/GFP/Neo vector to lentivirus-mediated interference (Shanghai Jikai Gene Medicine Technology Co., Ltd, China).
+ Open protocol
+ Expand
2

Subcutaneous Xenograft Tumor Assay in Nude Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
All animal experiments were conducted based on protocols approved by the ethical committee of Animal Experiment Center of Hangzhou Medical College (SCXK (zhe) 2019–0,002). For the subcutaneously implanted tumor assay, 1 × 106 H1299/R cells co-transfected with sh-LINC01001, sh-IGF2BP2 or pcDNA-LINC01001 or mock vector which were purchased from Shanghai GenePharma Co., Ltd. They were resuspended in 100 μl PBS and subcutaneously injected into the left flanks of 4 week-old female BALB/c nude mice (7 mice per group). Afterwards, the nude mice were obtained and raised in the Model Animal Research Center of Nanjing University. Tumor growth was monitored once a week. The nude mice were sacrificed after 15 days, and the tumor specimens were weighed, fixed and then stained by H&E staining for histological analyses. The immunohistochemical (IHC) staining was performed to evaluate the levels of Ki67 in tumor tissues, according to the published protocol (Ding et al., 2003 (link)).
+ Open protocol
+ Expand
3

Functional Validation of m6A Regulators in BMSCs

Check if the same lab product or an alternative is used in the 5 most similar protocols
short hairpin RNA (Sh)-METTL14, sh-YTHDF1, sh-YTHDF2, sh-YTHDC1, sh-IGF2BP1, sh-IGF2BP2, sh-IGF2BP3, sh-NC, empty vector, and SMAD1 overexpression vector, IGF2BP1 overexpression vector, and IGF2BP2 overexpression vector were obtained from Genepharma. BMSCs were seeded into 6-well plates and transfected with sh-METTL14 and sh-NC using Lipofectamine 3000 (Invitrogen, Carlsbad) for 48 h.
+ Open protocol
+ Expand
4

Lentiviral-mediated Knockdown of Key Genes

Check if the same lab product or an alternative is used in the 5 most similar protocols
Short hairpin RNA (shRNA) targeted GLI2, SYVN1, IGF2BP3, IGF2BP2, HNRNPA2B1, HNRNPD, HNRNPK, HNRNPM, HNRNPA1 (shGLI2, shSYVN1, shIGF2BP3, shIGF2BP2, shHNRNPA2B1, shHNRNPD, shHNRNPK, shHNRNPM, and shHNRNPA1) or scrambled oligonucleotides, purchased from GenePharma (Shanghai, China) were inserted into pGLVH1 vector. The shRNA sequences were provided in Table S1. The full length of SYVN1 or PPARα coding sequence was amplified and cloned into a pcDNA3.1 (Invitrogen, Carlsbad, CA, USA) vector (SYVN1, PPARα). Cells were transfected with the above plasmids using Lipofectamine 3000 transfection reagent (Invitrogen) according to manufacturer’s instructions. Lenti-Pac HIV Expression Packaging Mix and the lentiviral vectors (shSYVN1, shIGF2BP3, shGLI2) were used to transfect HEK293T cells for 48 hours and then lentiviral particles were harvested from the supernatant. Stable transfected cells were selected by two weeks puromycin treatment (2 μg/mL).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!