The largest database of trusted experimental protocols

6 protocols using image j

1

Statistical Analysis of Experimental Data

Check if the same lab product or an alternative is used in the 5 most similar protocols
SPSS 21.0, GraphPad Prism 7.0, R project and Image J were used for data processing and mapping. Data are expressed as the mean±standard deviation (SD), and count data are presented as the frequency. For variables that did not fit a normal distribution, Mann Whitney U-tests were performed for comparisons. Differences between two groups were evaluated using the Student’s
t-test when F-test validated the homogeneity of variance or the Welch
t-test when inhomogeneity of variance existed. All experiments were repeated at least three times. Differences are considered significant at
P ≤ 0.05.
+ Open protocol
+ Expand
2

Quantifying Lyme Disease Biomarkers

Check if the same lab product or an alternative is used in the 5 most similar protocols
Statistical Chi squared test for equality of proportions was applied in order to correlate urinary OspA outcome (detectable or non-detectable) to clinical LB diagnosis and serology. Power calculations were performed in order to estimate the power of the test, given the number of samples in each group, the proportions of urinary OspA outcome, and a significance level of 0.05. Calculations were performed using R software (http://www.r-project.com).
Western blotting band intensity was quantified with imagej software (imagej.nih.gov/ij/index.html">http://imagej.nih.gov/ij/index.html) by selecting the area of interest and calculating area, mean and standard deviation of selection peR software instructions. Blast analysis and protein alignment was performed using pBLAST [32 (link)]. Search parameters were as follows: query sequence: KTSTLTISVNSKKTTQLVFTKQDTITVQKYDSAGT, Database Name: non redundant, Program: BLASTP 2.2.31+.
+ Open protocol
+ Expand
3

Image Analysis and Data Modeling for Biological Insights

Check if the same lab product or an alternative is used in the 5 most similar protocols
All image analysis was done using ImageJ (http://rsb.info.nih.gov/ij), and data was further analyzed using self-developed Jupyter notebooks (https://jupyter.org/) and R-scripts (https://www.r-project.org/; available upon request).
+ Open protocol
+ Expand
4

Multi-Wavelength LED Microscopy Setup

Check if the same lab product or an alternative is used in the 5 most similar protocols
An Eclipse Ti microscope (Nikon) was fitted with a 3 high-power LED system (Mightex; 470 nm, 560 nm and 656 nm) including collimators and excitation filters (Semrock; 470 ± 14 nm, 544 ± 12 nm, 650 ± 7.5 nm). The LEDs were controlled using a custom-made current source that was coupled to a 32 channel PCI DAQ card (National Instruments). Furthermore, an image intensifier (Photonis, the Netherlands) was coupled to a high-speed camera (Optronis GmbH), which was triggered by the DAQ card using a custom Labview (National Instruments) program. The microscope was fitted with a custom-built environmental chamber that allowed measurements to be performed at 37 °C and 5% CO2. All analyses were performed using ImageJ (NIH) and R (R Foundation for Statistical Computing).
+ Open protocol
+ Expand
5

Image Analysis and Single-Cell RNA-Seq

Check if the same lab product or an alternative is used in the 5 most similar protocols
Images were processed with Adobe Photoshop, and Image-J (Version 1.47d, Fiji). Position of spots were measured using Image-J. Single-cell RNA-Seq data were analyzed using R 3.6.2 (The R foundation, https://www.r-project.org/).
+ Open protocol
+ Expand
6

Image Processing and Single-cell RNA-Seq

Check if the same lab product or an alternative is used in the 5 most similar protocols
Images were processed with Adobe Photoshop, and Image-J (Version 1.47d, Fiji). Position of spots were measured using Image-J. Single cell RNA-Seq data were analyzed using R 3.6.2 (The R foundation, https://www.r-project.org/).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!