Samples were acquired using a Cyan ADP flow cytometer (Dako, Glostrup, Denmark). Data analysis was done using Summit V 4.3 software. Spectral overlap when using more than one colour was corrected via compensation. Appropriate isotype controls were used for setting gates. The gating strategy used to identify the T cell subset has been shown in
Flow Cytometric Analysis of T and B Cell Subsets
Samples were acquired using a Cyan ADP flow cytometer (Dako, Glostrup, Denmark). Data analysis was done using Summit V 4.3 software. Spectral overlap when using more than one colour was corrected via compensation. Appropriate isotype controls were used for setting gates. The gating strategy used to identify the T cell subset has been shown in
Corresponding Organization : McMaster University
Other organizations : University of Birmingham, University of Lübeck, Kiel University, University Hospital Schleswig-Holstein, Science Research Laboratory, University of Zagreb, Imperial College London, Nottingham Trent University
Variable analysis
- Thawing frozen PBMCs at 37 °C
- Washing PBMCs in RPMI containing FCS (10%)
- Staining PBMCs with combinations of antibodies for 30 min at 4 °C
- Permeabilizing and staining cells for intracellular transcription factors
- Cell subset distribution (T cells, B cells, regulatory T cells, follicular helper T cells)
- Cytokine production by CD4 T cells
- Toxin expressing immune cells
- RPMI media composition
- Incubation temperature (4 °C)
- Incubation time (30 min)
- Washing steps with PBS
- Compensation for spectral overlap when using multiple fluorescent labels
- Isotype controls for setting gates
- Not explicitly mentioned
- Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!