Nod shi scid il 2rγnull nog mice
The NOD/Shi-scid/IL-2Rγnull (NOG) mice are a strain of immunodeficient mice. They have a severe combined immunodeficiency (SCID) mutation and lack the interleukin-2 receptor gamma chain, which results in the absence of functional T cells, B cells, and natural killer cells.
Lab products found in correlation
5 protocols using nod shi scid il 2rγnull nog mice
Xenograft Model of Acute Myeloid Leukemia
Orthotopic Liver Tumor Xenograft Model
In vivo studies were performed in female NOD/Shi-scid/IL-2Rγnull (NOG) mice (Taconic Biosciences, Hudson, NY). 2 × 106 HepG2 and Huh-6 cells transduced with luciferase and resuspended in 100 μl phosphate-buffered saline (PBS) were surgically implanted into either the right lobe of the liver through a right flank incision or the left lobe with a midline, abdominal incision. The mice underwent BLI beginning at 10 days after implantation and every week thereafter with the In Vivo Imaging System (IVIS, PerkinElmer, Waltham, MA), and luminescence flux was recorded to assess tumor growth. After seven weeks (HepG2) or four weeks (Huh-6), necropsy was performed, intrahepatic and extrahepatic sites of tumor were noted, and samples were harvested for immunohistochemistry and RNA isolation.
NOG Mouse Hepatocellular Carcinoma Model
Macitentan Inhibits Myeloma Growth
Leukemia Engraftment in NOG Mice
NY) and kept in pathogen-free conditions in the animal facility of the
Interdepartmental Centre of Experimental Research Service (CIRSAL) of the University
of Verona, as approved by the Italian Minister of Health. VR-ALL cells (5 ×
106) were injected via tail vein into 8 to 12 weeks old mice previously
irradiated with 1.2 Gy from a 137Cs source. Eight weeks following the
initial injection of VR-ALL cells, animals were sacrificed and leukemic burden was
quantified in organs as number of hCD45+ cells.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!