Lsm 510 meta nlo microscope
The LSM 510 META NLO microscope is a high-performance laser scanning confocal microscope designed for advanced imaging applications. It features a multi-photon excitation capability, allowing for deeper penetration and reduced phototoxicity compared to single-photon excitation. The microscope is equipped with a range of laser lines and detectors to capture a variety of fluorescence signals.
Lab products found in correlation
13 protocols using lsm 510 meta nlo microscope
Collagen Fiber-Associated Zymography Analysis
Two-Photon Microscopy for Tumor Imaging
Ex vivo two photon microscopy ‐ Tumors were excised from the peritoneal cavity.
In vivo two photon microscopy ‐ Mice bearing window chambers were placed in a fixed position on a xy motorized stage and imaged through the chamber.
Visualizing Dictyostelium Cell Starvation
Pluripotency Characterization of porcine iPSCs
Phosphatase Substrate Kit I (VECTOR Laboratories) according to the
manufacturer's protocol. For immunocytochemistry, porcine iPSCs were fixed and
blocked using the Image-iT®Fixation⁄Permeabilization Kit (Molecular
probe) according to the manufacturer's protocol. The cells were then incubated
with primary antibodies diluted in the blocking buffer for 1 h at RT. Primary
antibodies, Oct4 (1:100; Santa Cruz) and Nanog (1:100; Abcam) were detected by
Alexa fluor 488 or Alexa fluor 594 (Invitrogen) conjugated secondary antibodies.
piPSC images were obtained by sequential scanning of the sample using the LSM
510 Meta NLO microscope (Zeiss, Jena, Germany) and merged with the Zeiss LSM
image browser (ver. 3.2.0.70).
Two-Photon Microscopy Imaging of Tumors
Localization of Heterologously Expressed PCFT
Brain Tissue Processing for Immunohistochemistry
Immunohistochemical Analysis of Prion Pathology
Cytotoxicity Assay of CVE in HT22 Cells
Cytoprotective effects of Caralluma Viridicaulis extract against hydrogen peroxide-induced oxidative stress in HT22 cells
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!