To quantify the repression efficiency, Northern blotting membranes were exposed to imaging plates and analyzed with the Amersham Typhoon biomolecular imager and ImageQuantTL software. Signals were compared with the signals for the 16S rRNA used as a loading control. The amount of RNA signals detected for the wild-type controls was set to 100%. Northern blot analyses were done in triplicates.
Quantitative analysis of RNA repression
To quantify the repression efficiency, Northern blotting membranes were exposed to imaging plates and analyzed with the Amersham Typhoon biomolecular imager and ImageQuantTL software. Signals were compared with the signals for the 16S rRNA used as a loading control. The amount of RNA signals detected for the wild-type controls was set to 100%. Northern blot analyses were done in triplicates.
Corresponding Organization :
Other organizations : University of Technology Sydney, Universität Ulm, Universität Greifswald, University of Freiburg
Variable analysis
- RNA isolated from strains HV30 × pTA232-tele-0582anti#1, -#2, and -#3
- RNA isolated from wild-type strain HV30 × pTA232
- Repression efficiency quantified by Northern blotting and compared to 16S rRNA loading control
- RNA separation on denaturing 8% polyacrylamide gel or denaturing 1% agarose gel
- RNA transfer to nylon membrane (Hybond-N+ membrane or Pall membrane)
- Radioactively labeled PCR probes against desired targets generated using DECAprime II DNA labeling kit and [α-32P]dCTP
- Membranes incubated with labeled PCR fragments
- Exposure of Northern blotting membranes to imaging plates and analysis with Amersham Typhoon biomolecular imager and ImageQuantTL software
- Wild-type strain HV30 × pTA232 as positive control
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!