For RIP-seq libraries, polyA+ RNA was isolated using Dynabeads Oligo(dT)25 (Invitrogen) beads and constructed into strand-specific libraries using the dUTP method (Parkhomchuk et al., 2009 (link)). Once dUTP-marked double-stranded cDNA was obtained, the remaining library construction steps followed the same protocol as described above for ChIP-seq libraries.
ChIP-seq and RIP-seq Library Preparation
For RIP-seq libraries, polyA+ RNA was isolated using Dynabeads Oligo(dT)25 (Invitrogen) beads and constructed into strand-specific libraries using the dUTP method (Parkhomchuk et al., 2009 (link)). Once dUTP-marked double-stranded cDNA was obtained, the remaining library construction steps followed the same protocol as described above for ChIP-seq libraries.
Corresponding Organization :
Other organizations : Howard Hughes Medical Institute, New York University, Yale University, Yale Cancer Center
Variable analysis
- None explicitly mentioned
- Sequencing of ChIP-seq and RIP-seq libraries
- Preparation of ChIP-seq libraries according to manufacturer's instructions and as described in Asp et al. (2011)
- Preparation of RIP-seq libraries using the dUTP method as described in Parkhomchuk et al. (2009)
- Size selection of ChIP-seq library fragments (300 ± 50 bp)
- Quantification of ChIP-seq libraries by qPCR using primers annealing to the adapter sequence
- Sequencing of ChIP-seq libraries at 7 pM on an Illumina Genome Analyzer IIx or 10 pM on an Illumina HiSeq
- Utilization of barcoding for multiplexing in some cases
- No positive or negative controls were explicitly mentioned in the provided information.
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!