For detection of endogenous IGF2BP proteins in ribosomal fractions, three 15 cm dishes of HepG2 cells at ~80% confluency were harvested as described above. Sample from each fraction was subjected to western blot analysis for IGF2BP1, IGF2BP2, and IGF2BP3.
Profiling Ribosomes Bound to IGF2BP Proteins
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization :
Other organizations : University of Cincinnati Medical Center, Sun Yat-sen University, University of Chicago, Cincinnati Children's Hospital Medical Center, Martin Luther University Halle-Wittenberg, City of Hope, China Medical University
Variable analysis
- Transient overexpression of FLAG tagged IGF2BP (1, or 2, or 3)
- Infection with lentiviral shRNA targeting IGF2BP1
- Presence of FLAG, eIF3A, eIF3B, and HuR proteins in ribosomal fractions (detected by western blot analysis)
- Levels of MYC transcript (measured by qPCR)
- Cell line: HEK293T for overexpression and knockdown experiments, HepG2 for detection of endogenous IGF2BP proteins
- Cell confluency: Confluent for HEK293T, ~80% for HepG2
- Lysis buffer composition: 20 mM HEPES, pH 7.6, 100 mM KCl, 5 mM MgCl2, 100 μg/ml CHX, 1% Triton-X-100, 1:100 protease inhibitor, 40 U/ml SUPERasin
- Fractionation method: Gradient Station (BioCamp) equipped with ECONOUV monitor (BioRad) and Gilson FC203B fraction collector (Mandel Scientific)
- Treatment with cycloheximide (CHX) at 100 μg/ml for 7 min before collection
- Positive control: Untransfected/uninfected HEK293T cells for overexpression/knockdown experiments
- Negative control: Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!