To perform firefly luciferase complementation imaging assays, the coding regions of the target genes were fused with either nLUC or cLUC and cloned into the pCAMBIA1300 vector as previously described [47 (link)]. These vectors were transformed into A. tumefaciens. The positive clones were injected into N. benthamiana as previously described [47 (link)], the bioluminescent signals were detected by NightSHADE LB985 system (Berthold).
Yeast Two-Hybrid and Luciferase Complementation Assays
To perform firefly luciferase complementation imaging assays, the coding regions of the target genes were fused with either nLUC or cLUC and cloned into the pCAMBIA1300 vector as previously described [47 (link)]. These vectors were transformed into A. tumefaciens. The positive clones were injected into N. benthamiana as previously described [47 (link)], the bioluminescent signals were detected by NightSHADE LB985 system (Berthold).
Corresponding Organization : Wuhan University
Variable analysis
- Expression vectors (pGBKT7 or pGADT7) which contain the attR1-CmR-ccdB-attR2 fragment
- Coding regions of the target genes fused with either nLUC or cLUC and cloned into the pCAMBIA1300 vector
- Yeast transformants grown on SD/-Trp-Leu, SD/-Trp-Leu-His, and SD/-Trp-Leu-His-Ade dropout selective culture-media
- Bioluminescent signals detected by NightSHADE LB985 system (Berthold)
- Yeast strain Y2H Gold (Clontech)
- Gateway entry clones constructed using pDONR207 via BP reactions
- Expression vectors (pGBKT7 or pGADT7) transformed into Y2H Gold yeast
- Positive clones of vectors with coding regions of target genes fused with nLUC or cLUC and cloned into pCAMBIA1300 transformed into A. tumefaciens and injected into N. benthamiana
- Not specified
- Not specified
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!