We made several modifications to the previous heat shock system24 (link),25 (link) to adapt it for laser ablation. First, we replaced the original collimating lens (focal length f = 75 mm) with one of smaller focal length (f = 11 mm) in order to create a smaller diameter beam, allowing a larger fraction of the beam power to transmit through the objective and reach the sample. Second, the laser power output was increased from 260 to 400 mW. Third, we adjusted the pulse duration and count as described above.
Laser-based Cell Ablation Protocol
We made several modifications to the previous heat shock system24 (link),25 (link) to adapt it for laser ablation. First, we replaced the original collimating lens (focal length f = 75 mm) with one of smaller focal length (f = 11 mm) in order to create a smaller diameter beam, allowing a larger fraction of the beam power to transmit through the objective and reach the sample. Second, the laser power output was increased from 260 to 400 mW. Third, we adjusted the pulse duration and count as described above.
Corresponding Organization :
Other organizations : University of Pennsylvania
Variable analysis
- Collimating lens focal length (decreased from 75 mm to 11 mm)
- Laser power output (increased from 260 mW to 400 mW)
- Pulse duration and count (adjusted as described)
- Laser ablation effect on the sample
- Inverted microscope (Nikon TE-2000)
- Thermoelectrically cooled, fiber-coupled diode laser (Fitel FOL1425RUZ-317, 1480 nm wavelength)
- Dichroic beam splitter
- Objective lens (Nikon PLAN APO 60X, NA 1.4, oil immersion)
- Sample slide
- Previous heat shock system used as a positive control
- No negative control explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!