For more precise analysis of pMLC2 localization and for the line scan analysis, we acquired images from fixed tissues with the Airyscan detector of a Zeiss LSM880 confocal equipped with a ×63/1.4 Plan Apochromat oil immersion objective. Line scans were performed on the Zen Blue software and plotted in GraphPad Prism. Specific line scan were chosen according to the base of the protrusion. The protrusion bases were determined manually by its neck shape (opposite negative curvature shapes). The signal were normalized to the maximal signal of pSqh intensity.
Quantitative Analysis of pMLC2 Localization
For more precise analysis of pMLC2 localization and for the line scan analysis, we acquired images from fixed tissues with the Airyscan detector of a Zeiss LSM880 confocal equipped with a ×63/1.4 Plan Apochromat oil immersion objective. Line scans were performed on the Zen Blue software and plotted in GraphPad Prism. Specific line scan were chosen according to the base of the protrusion. The protrusion bases were determined manually by its neck shape (opposite negative curvature shapes). The signal were normalized to the maximal signal of pSqh intensity.
Corresponding Organization :
Other organizations : Institute for Research in Immunology and Cancer, Université de Montréal
Variable analysis
- Microscope: LSM 700 (Zeiss) and LSM880 (Zeiss)
- Quantifications of pMLC2 fluorescence intensities at the back, the front, and the side of the cluster
- Localization of pMLC2 and line scan analysis
- Microscope objective: ×63/1.4 Plan Apochromat DIC oil immersion and ×63/1.4 Plan Apochromat oil immersion
- No positive or negative controls were explicitly mentioned in the provided information.
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!