Image-Guided Tumor Resection and Lymphatic Mapping
For image-guided surgery, 48 h after intravenous injection of IR808-DOTA (100 μL, 10 μg) into tumor-bearing nude mice, tumor resection was guided by NIRF imaging. For lymphatic mapping, tumor-bearing mice were intradermally injected with IR808-DOTA (10 μL, 1 μg) on the hind footpad. Lymphatic drainage and sentinel lymph node imaging were carried out 30 min later.
Partial Protocol Preview
This section provides a glimpse into the protocol. The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Zhu J., Jiang Y., Pan X., Xu K., Niu W., Lv Y., Li C., Wang Y., Xue Z., Lei P, & He Y. (2023). In Vivo Evaluation of a Gallium-68-Labeled Tumor-Tracking Cyanine Dye for Positron Emission Tomography/Near-Infrared Fluorescence Carcinoma Imaging, Image-Guided Surgery, and Photothermal Therapy. ACS Omega, 8(6), 6067-6077.
Intravenous injection of IR808-DOTA (100 μL, 10 μg) into tumor-bearing nude mice
Intradermal injection of IR808-DOTA (10 μL, 1 μg) on the hind footpad of tumor-bearing mice
dependent variables
Tumor resection guided by NIRF imaging
Lymphatic drainage and sentinel lymph node imaging
control variables
Time after injection (48 h for image-guided surgery, 30 min for lymphatic mapping)
Tumor-bearing nude mice
controls
Positive control: Not explicitly mentioned
Negative control: Not explicitly mentioned
Annotations
Based on most similar protocols
Etiam vel ipsum. Morbi facilisis vestibulum nisl. Praesent cursus laoreet felis. Integer adipiscing pretium orci. Nulla facilisi. Quisque posuere bibendum purus. Nulla quam mauris, cursus eget, convallis ac, molestie non, enim. Aliquam congue. Quisque sagittis nonummy sapien. Proin molestie sem vitae urna. Maecenas lorem.
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to
get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required