For the sham procedure, mice received a thoracotomy but the left pulmonary artery was not isolated. The left lung was reinflated using positive pressure, after which the thoracotomy was closed and the mouse extubated. The mouse was sacrificed after a cumulative period of 30 minutes (analogous to the ischemic period) and additional 1–3 h (analogous to the reperfusion period).
Murine Model of Pulmonary Ischemia-Reperfusion
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : San Francisco General Hospital, University of California, San Francisco, Marymount University, Johns Hopkins Medicine, Johns Hopkins University
Protocol cited in 7 other protocols
Variable analysis
- Ischemia time (range from 30 minutes to 2 hours)
- Lung histology (assessed through hematoxylin and eosin (H&E) staining)
- Gene expression (assessed through RNA preparation)
- Anesthesia (Avertin, intraperitoneal)
- Mechanical ventilation
- Analgesia (Buprenorphine, intraperitoneal)
- Surgical procedure (left thoracotomy, left pulmonary artery isolation)
- Positive control: Sham procedure, where mice received a thoracotomy but the left pulmonary artery was not isolated. The left lung was reinflated, the thoracotomy closed, and the mouse extubated. The mouse was sacrificed after a cumulative period of 30 minutes (analogous to the ischemic period) and an additional 1-3 hours (analogous to the reperfusion period).
- Negative control: Not explicitly mentioned.
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!