For quantification, band intensities of eIF2α and p-eIF2α were normalized by the corresponding loading control (tubulin). Then, for both eIF2α and p-eIF2α, normalized band intensities were divided by the average normalized band intensity across the different conditions. Finally, the ratio of p-eIF2α to eIF2α was calculated by dividing the normalized intensities calculated in the previous step. The band intensities were quantified using the ImageJ software [60 (link)].
Western Blot Analysis of eIF2α Phosphorylation
For quantification, band intensities of eIF2α and p-eIF2α were normalized by the corresponding loading control (tubulin). Then, for both eIF2α and p-eIF2α, normalized band intensities were divided by the average normalized band intensity across the different conditions. Finally, the ratio of p-eIF2α to eIF2α was calculated by dividing the normalized intensities calculated in the previous step. The band intensities were quantified using the ImageJ software [60 (link)].
Corresponding Organization :
Other organizations : University of Basel, University Hospital of Basel, Institut de génétique et de biologie moléculaire et cellulaire
Variable analysis
- FCS concentration (1% or 10%)
- Phosphorylation of eIF2α protein
- Cell culture conditions (as described in the 'Cell culture' section)
- Western blot protocol (adapted from previous work [58])
- Lysis buffer (RIPA buffer with protease and phosphatase inhibitors)
- Protein loading amount (15-25 μg)
- SDS-PAGE (10% gel, 1 h at 120 V)
- Membrane transfer, blocking, incubation, washing, and development protocols (followed Cell Signaling guidelines)
- Antibodies used (Phospho-eIF2α, eIF2α, and α-Tubulin)
- Cells treated with 1 μM thapsigargin (TG) and 1 μM hydrogen peroxide for 5 h
- None specified
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!