The largest database of trusted experimental protocols

2 protocols using ccr5 fitc

1

Quantifying NK Cell Markers in Whole Blood and Tumors

Check if the same lab product or an alternative is used in the 5 most similar protocols
Whole blood and intratumoural immune cells were stained with CD56-FITC-Viobright, NKG2A-APC, CCR5-FITC, CCR1-APC, CCR3-PE (Miltenyi Biotec), CD3-APC-Cy7, NKp30-BV421, NKp46-PE-Cy7, NKG2D-PE-Cy5, PD-1-PE-Cy7, TIGIT-PE-Cy5, CD69-BV510 (BioLegend). Red blood cells were lysed using BD Lysing Solution (BD Biosciences) as per manufacturer’s instructions. NK cells were quantified as CD56+CD3 cells within the lymphocyte gate. Cells were acquired using the CANTO II (BD Biosciences) flow cytometer and analysed using FlowJo software (Tree Star).
+ Open protocol
+ Expand
2

Multiparametric NK Cell Phenotyping

Check if the same lab product or an alternative is used in the 5 most similar protocols
Single-cell suspensions from blood, omentum, and liver were stained with CD3-APC-Cy7 (BioLegend, San Diego, CA, USA) and CD56-APC, CD56-FITC, NKP46-PE, NKP30-APC, NKG2D-APC, CCR5-FITC, CXCR3-PE, CCR1-APC, CCR2-APC, CXCR2-FITC, CCR3-PE, and CCR6-APC (Miltenyi Biotec, Bergisch Gladbach, Germany). NK cells were quantified as CD56 + CD3 2 cells within the lymphocyte gate. For cytokine profiling and degranulation assay, cells were stimulated with PMA (10 ng/ml) and ionomycin (1 mg/ml) for 1 h. PE-conjugated anti-CD107a (BD Biosciences UK, Oxford, United Kingdom) was added at this time to detect degranulation, followed by the addition of brefeldin A (10 mg/ml) for a further 3 h. Subsequent staining with IFNg-V500, TNF-a-APC, and IL-10-PE (BD Biosciences UK) was performed. Cells were acquired using a CyAn ADP flow cytometer (Beckman Coulter, Brea, CA, USA) and analyzed with FlowJo software (Tree Star, Ashland, OR, USA).
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!