One-STrEP Tag Purification-HEK-293T (8.107) cells were either infected with rMeV/STrEP-V or with the negative control rMeV/STrEP-Cherry viruses at MOI 1. At 24 hpi, cells were lysed and tagged protein co-complexes were purified and analyzed by Western Blot as previously described [30 (link)].
Generating Measles Virus Knockout Strains
One-STrEP Tag Purification-HEK-293T (8.107) cells were either infected with rMeV/STrEP-V or with the negative control rMeV/STrEP-Cherry viruses at MOI 1. At 24 hpi, cells were lysed and tagged protein co-complexes were purified and analyzed by Western Blot as previously described [30 (link)].
Corresponding Organization : Department of Virology
Other organizations : Sorbonne Université, Institut National de Recherche pour l'Agriculture, l'Alimentation et l'Environnement, Agence Nationale de Sécurité Sanitaire de l’Alimentation, de l’Environnement et du Travail, NeuroDiderot, École Nationale Vétérinaire d'Alfort
Variable analysis
- MOI (0.1, 0.5, 1, 3) of MeV, MeV-ΔV, MeV-GFP, and MeV-ΔV-GFP
- Concentrations of ML-60218 (RNA polymerase III inhibitor) at 25 μM or 50 μM
- Virus titers (TCID50) of MeV, MeV-ΔV, MeV-GFP, and MeV-ΔV-GFP at various time points post-infection
- Protein co-complexes purified and analyzed by Western Blot
- THP-1 and Vero cell lines used for infection
- Incubation time of 24 hours for THP-1 cell infections
- Virus absorbed in serum-free RPMI for a defined period at 37°C before dilution with complete RPMI
- Negative control: MeV inactivated at 70°C for 30 minutes and used to infect cells at MOI 0.5
- Negative control: rMeV/STrEP-Cherry virus used for protein co-complex purification
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!