Collagen-Based Invasion Assay Protocol
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : University of Michigan–Ann Arbor
Protocol cited in 8 other protocols
Variable analysis
- Addition of SF/HGF to the lower compartment of the Transwell chambers at a final concentration of 50 ng/ml
- Addition of protease inhibitors (BB-94, TIMP-1, TIMP-2, aprotinin, bestatin, soybean trypsin inhibitor, E64, pepstatin) to both the upper and lower wells
- Invasive foci counted in randomly selected fields at 20× on a phase-contrast microscope
- Invasion depths measured from digitally captured images of hematoxylin and eosin-stained cross-sections
- Type I collagen prepared from rat tail tendons and dissolved in 0.2% acetic acid to a final concentration of 2.7 mg/ml
- Collagen mixed with 10× DME and 0.34 N NaOH in an 8:1:1 ratio at 4°C and added to the upper well of a 24-mm Transwell dish (3-μm pore size; Corning, Inc.)
- 2–5 × 10^5 cells in complete medium added to the upper well after collagen gelling was complete (45 min at 37°C)
- FCS depleted of plasminogen or gelatinase by lysine-sepharose or gelatin-sepharose affinity chromatography
- All media, including SF/HGF and inhibitors, replaced every 2 d
- MDCK and COS-1 invasion assays routinely terminated after 12 and 5 d, respectively
- Positive control: Not explicitly mentioned
- Negative control: Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!