Blueberry (cv ‘Duke’) stem fragments with visible etiological signs were collected and investigated under a dissecting microscope (SZ11, Olympus, Tokyo, Japan). Next, stem fragments with visible pycnidia were rinsed with sterile distilled water (5 min) and kept in a humid chamber (2–5 days). Exuded conidia from the pycnidia were transferred onto a PDA medium in Petri dishes (10 cm dia) and incubated under white light at 20 °C. Based on morphology and an average size of 150 conidia (randomly selected from 24 obtained isolates), identification of the pathogen was performed. The conidia were examined under a BX50 light microscope (Olympus). Measurements of the size of the conidia were made using the CellF program (Olympus).
Cell f program
The Cell^F program is a software application developed by Olympus. It serves as a tool for the analysis and processing of microscopic cell images. The program provides functionalities for tasks such as cell detection, segmentation, and feature extraction.
Lab products found in correlation
4 protocols using cell f program
Blueberry Stem Pathogen Identification
Blueberry (cv ‘Duke’) stem fragments with visible etiological signs were collected and investigated under a dissecting microscope (SZ11, Olympus, Tokyo, Japan). Next, stem fragments with visible pycnidia were rinsed with sterile distilled water (5 min) and kept in a humid chamber (2–5 days). Exuded conidia from the pycnidia were transferred onto a PDA medium in Petri dishes (10 cm dia) and incubated under white light at 20 °C. Based on morphology and an average size of 150 conidia (randomly selected from 24 obtained isolates), identification of the pathogen was performed. The conidia were examined under a BX50 light microscope (Olympus). Measurements of the size of the conidia were made using the CellF program (Olympus).
Sphere Formation Assay for NSCLC Cell Lines
Geometric Morphometric Analysis of Tsetse Fly Wings
Measuring Pollen Size and Viability
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!