The largest database of trusted experimental protocols

C3h hej h 2kk

Manufactured by Jackson ImmunoResearch
Sourced in United States

C3H/HeJ (H-2Kk) is a mouse strain that is deficient in the Toll-like receptor 4 (TLR4) gene. It is often used as a model for studying the role of TLR4 in immune responses and inflammation.

Automatically generated - may contain errors

2 protocols using c3h hej h 2kk

1

Murine Chimerism Induction Protocols

Check if the same lab product or an alternative is used in the 5 most similar protocols
Adult NOD/ShiLtJ (H-2g7; termed NOD), FVB/NJ (H-2Kq; termed FVB), C3H/HeJ (H-2Kk; termed C3H), and B6.NOD-(D17Mit21-D17Mit10) (H-2g7; termed B6-g7) mice were purchased from the Jackson Laboratory (Bar Harbor, ME, USA), bred and housed in a specific pathogen-free facility at the University of Alberta. All care and handling of animals were conducted in accordance with the guidelines of the Canadian Council on Animal Care. All recipient mice used for chimerism induction were females at 8–10 weeks of age. MHC genotypes of the mice used are shown in Table S1 in Supplementary Material.
+ Open protocol
+ Expand
2

Allogeneic Bone Marrow Transplant in Mice

Check if the same lab product or an alternative is used in the 5 most similar protocols
Six-to-ten-week-old female Balb/c (H2-kd) donor, six-to-eighteen-week-old male and female C57Bl/6 J (H2-kb) recipient, and female C3H/HeJ (H2-kk) third-party mice were purchased from Jackson Laboratory (Bar Harbor, ME, USA). All mice were handled and cared for in accordance to the protocol, approved by the Animal Care and Use Committee at National Heart, Lung, and Blood Institute (NHLBI). All research conducted on animals followed biosafety level 2 guidelines. Following BMT, animals were monitored regularly for survival and morbidity (body weight, listlessness, ruffled fur). Mice who were unable to eat or drink and demonstrated persistent deterioration of body weight were euthanized.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!