The largest database of trusted experimental protocols

Zen 3.4 blue software

Manufactured by Zeiss
Sourced in Switzerland

The ZEN 3.4 Blue software is a microscope control and image processing platform developed by Zeiss. It provides a user-friendly interface for controlling various Zeiss microscope systems and enables the capture, analysis, and management of microscopic images.

Automatically generated - may contain errors

2 protocols using zen 3.4 blue software

1

Mitochondrial Dynamics in Lipid Droplets

Check if the same lab product or an alternative is used in the 5 most similar protocols
Semi-automated analysis was done using the ZEN 3.4 Blue software (Zeiss). Blastocysts and subcellular structures were manually masked. The ZEN 3.4 Blue inbuilt function zone of influence analysis was carried out on the masked images to determine the number of mitochondria surrounding each LD (radius of 80 pixels). In cases where LDs occurred as clusters, binary dilation with a count of 15 was used to fuse the LDs in a cluster.
+ Open protocol
+ Expand
2

Melanoma Cell Adhesion Assay

Check if the same lab product or an alternative is used in the 5 most similar protocols
The binding assay of melanoma cells to immobilised proteins under static conditions was performed as described before [17 (link)]. For each experiment, a sample in which we checked the lack of binding of melanoma cells to immobilized BSA served as an internal control [17 (link)]. Images were acquired for all samples with identical settings with an AxioObserver.Z1 inverted microscope using a Plan-Neofluar 10×/0.3 objective, an Axiocam 712 mono camera and the ZEN 3.4 blue software (Zeiss, Feldbach, Switzerland). The number of bound melanoma cells was quantified in 3 FOVs per sample using Fiji/ImageJ, and the bound cells per mm2 were calculated as the average number of cells divided by the FOV area.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!