The arrays were performed using Agilent Reference DNAs, analyzed with the Agilent Microarray Scanner Feature Extraction Software version 11.5, and Agilent Genomic Workbench 7.0.4.0 software using the ADM-2 algorithm. Genomic positions of the rearrangements refer to the public UCSC database GRCh37.
Agilent genomic workbench 7
Agilent Genomic Workbench 7.0 is a software suite for genomic data analysis. It provides a platform for managing, visualizing, and analyzing genomic data from various experimental techniques.
Lab products found in correlation
14 protocols using agilent genomic workbench 7
Array CGH Analysis of Genomic Rearrangements
The arrays were performed using Agilent Reference DNAs, analyzed with the Agilent Microarray Scanner Feature Extraction Software version 11.5, and Agilent Genomic Workbench 7.0.4.0 software using the ADM-2 algorithm. Genomic positions of the rearrangements refer to the public UCSC database GRCh37.
Array-based Comparative Genomic Hybridization Analysis
Mouse Genomic DNA Microarray Analysis
Array-CGH Protocol for Genomic CNV Analysis
Identifying Copy Number Aberrations
CNAs were kept as true if called by both algorithms ADM-2 (LRR ≥ |0.25|, P-value ≤ 2.90 × 10−07, Bonferroni threshold) and CBS (LRR|0.25|, P-value ≤ 1 × 10−04). The lower statistical significance threshold for CBS is justified by the vastly smaller number of hypotheses tested (number of ADM-2-called CNAs).
Tissue-specificity of the expression levels of the genes involved was obtained from mouse and human BioGPS data, 2018 (Wu et al. 2016 (link)).
Customized Array-Based CNV Analysis
Agilent Array-Based DNA Copy Number Analysis
aCGH and qPCR Analysis of TBCK Deletion
Real-time quantitative PCR (RT-qPCR) of TBCK was performed to detect the predicted small deletion in the region chr4:107,071,580−107,113,380. Six primer pairs were designed on Primer-BLAST (
Array-CGH Analysis of Patients and Parents
Targeted High-Resolution Array-CGH
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!