XCMS software [61 (link)] was used for untargeted peak detection and mzMatch.R [62 (link)] for peak matching and annotation of related peaks. The IDEOM software package [63 (link)] was used to identify metabolites either through matching accurate masses and retention times of authentic standards (Metabolomics Standards Initiative confidence level 1) or using predicted retention times using a previously validated model [64 (link)] (Metabolomics Standards Initiative confidence level 2) if authentic standards were not available.
Untargeted Metabolomic Profiling of Parasites
XCMS software [61 (link)] was used for untargeted peak detection and mzMatch.R [62 (link)] for peak matching and annotation of related peaks. The IDEOM software package [63 (link)] was used to identify metabolites either through matching accurate masses and retention times of authentic standards (Metabolomics Standards Initiative confidence level 1) or using predicted retention times using a previously validated model [64 (link)] (Metabolomics Standards Initiative confidence level 2) if authentic standards were not available.
Corresponding Organization : University of Basel
Variable analysis
- None explicitly mentioned
- Metabolite masses identified using a Thermo Orbitrap Exactive
- Number of parasite cells (5 × 10^7 cells) collected from cultures grown to mid-log phase
- Extraction of metabolites in 100 μl of chloroform/methanol/water (1:3:1, by vol) as previously described in [60]
- HPLC using a ZIC-pHILIC column (150 mm × 4.6 mm, 5 μm column, Merck Sequant) and a Dionex UltiMate 3000 RSLC system (Thermo, Hemel Hempstead, UK)
- None explicitly mentioned
- None explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!