Lyme Disease Antibody Generation Protocol
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Variable analysis
- Different Lyme borreliae species used to generate antisera: B. burgdorferi strain B31-A3, B. afzelii strain VS461-JL, or B. garinii strain ZQ1
- Infectivity of the particular Lyme borreliae strain used to infect mice, determined by quantitative PCR (qPCR) of ear biopsy samples
- Seropositivity of mice for the particular Lyme borreliae strain used to infect them, verified by ELISA
- Swiss-Webster mice purchased from Taconic (Hudson, NY)
- Ixodes scapularis tick larvae obtained from BEI Resources (Manassas, VA)
- B. burgdorferi-infected nymphs generated as described in the referenced section
- All B. burgdorferi, B. afzelii, and B. garinii strains grown in BSK-II complete medium
- Sera from qPCR-positive mice used to verify seropositivity for the particular Lyme borreliae strain used to infect them
- Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!