Skip to main content

and
  1. No Access

    Protocol

    Using Open Chromatin Enrichment and Network Hi-C (OCEAN-C) to Identify Open Chromatin Interactions

    The open chromatin enrichment and network Hi-C (OCEAN-C) was developed not only for identifying large-scale chromatin structures, including topologically associated domains (TADs) and A/B compartments, but als...

    Lumeng Jia, Cheng Li, Tingting Li in Enhancers and Promoters (2021)

  2. No Access

    Protocol

    Quantification of d- and l-2-Hydroxyglutarate in Drosophila melanogaster Tissue Samples Using Gas Chromatography-Mass Spectrometry

    The fruit fly Drosophila melanogaster has emerged as an ideal system in which to study 2-hydroxyglutarate (2HG) metabolism. Unlike many mammalian tissues and cell lines, which primarily accumulate d- or l-2HG as ...

    Hongde Li, Jason M. Tennessen in High-Throughput Metabolomics (2019)

  3. No Access

    Protocol

    Haplotype Inference

    Haplotypes, as they specify linkage patterns between individual nucleotide variants, confer critical information for understanding the genetics of human diseases. However, haplotype information is not directly...

    **n Li, **g Li in Statistical Human Genetics (2012)

  4. No Access

    Protocol

    Exploiting Natural Diversity of AAV for the Design of Vectors with Novel Properties

    Twelve AAV serotypes have been described so far in human and nonhuman primate (NHP) populations while surprisingly high diversity of AAV sequences is detected in tissue biopsies. The analysis of these novel AA...

    Guang** Gao, Li Zhong, Olivier Danos in Adeno-Associated Virus (2011)

  5. No Access

    Protocol

    Gene Therapy in Skeletal Muscle Mediated by Adeno-Associated Virus Vectors

    Adeno-associated virus (AAV) is the most promising gene delivery vehicle for muscle-directed gene therapy. AAV’s natural tropism to muscle cells, long-term persistent transgene expression, multiple serotypes, ...

    Chun** Qiao, Taeyoung Koo, Juan Li, **ao **ao in Adeno-Associated Virus (2011)

  6. No Access

    Protocol

    Computational Approaches to the Detection and Analysis of Sequences with Intramolecular G-Quadruplex Forming Potential

    Sequences with the potential to form intramolecular G-quadruplexes (G4-structures) are found in highly nonrandom distributions in the genomes of diverse organisms. These sequences are associated with nucleic a...

    Paul Ryvkin, Steve G. Hershman, Li-San Wang, F. Brad Johnson in G-Quadruplex DNA (2010)

  7. No Access

    Protocol

    An Introduction to Mitochondrial Informatics

    In this chapter, we review the public resources available for human mitochondrial DNA and protein related bioinformatics, with a special focus on mitochondrial single nucleotide polymorphisms (mtSNPs). We also...

    Hsueh-Wei Chang, Li-Yeh Chuang, Yu-Huei Cheng, De-Leung Gu in Genetic Variation (2010)

  8. No Access

    Protocol

    In Vitro and In Vivo Gene Silencing by TransKingdom RNAi (tkRNAi)

    RNA interference (RNAi) is a potent and specific mechanism for eliminating the mRNA of specific genes. This gene silencing mechanism occurs naturally and is highly conserved from plants to human cells, holding...

    Shuanglin **ang, Andrew C. Keates, Johannes Fruehauf in siRNA and miRNA Gene Silencing (2009)

  9. No Access

    Protocol

    Application of ESTs in Microarray Analysis

    Microarray analyses provide information on the relative expression levels of large numbers of gene products (transcripts). As such they have been widely used to examine differences in gene expression across a ...

    Weizhong Li, Lisa Olohan, Daryl Williams, Margaret Hughes in Expressed Sequence Tags (ESTs) (2009)

  10. Protocol

    Mammalian Two-Hybrid Assay for Detecting Protein-Protein Interactions in Vivo

    The mammalian two-hybrid system is a very powerful tool to investigate protein-protein interactions in terms of functional domains and identify potential binding ligands and partners of a protein. Compared wit...

    Runtao He, Xuguang Li in Genomics Protocols (2008)

  11. Protocol

    Application of siRNA Against SARS in the Rhesus Macaque Model

    Containment of the SARS coronavirus (SCV) outbreak was accompanied by the rapid characterization of this new pathogen's genome sequence in 2003, encouraging the development of anti-SCV therapeutics using short...

    Qingquan Tang, Baojian Li, Martin Woodle, Patrick Y. Lu in RNAi (2008)

  12. No Access

    Protocol

    High-Throughput Genoty** of Single Nucleotide Polymorphisms with High Sensitivity

    The ability to analyze a large number of genetic markers consisting of single nucleotide polymorphisms (SNPs) may bring about significant advance in understanding human biology. Recent development of several h...

    Honghua Li, Hui-Yun Wang, **angfeng Cui, Minjie Luo, Guohong Hu in Comparative Genomics (2007)

  13. No Access

    Protocol

    Protein Chip for Detection of DNA Mutations

    A large number of human genetic diseases, bacterial drug resistances, and single-nucleotide polymorphisms are caused by gene mutations. Rapid and high-throughput mutation detection methods are urgently demande...

    **an-En Zhang, Li-Jun Bi in Microarrays (2007)

  14. No Access

    Protocol

    Designing PCR Primer for DNA Methylation Map**

    DNA methylation is an epigenetic mechanism of gene regulation, and aberrant methylation has been associated with various types of diseases, especially cancers. Detection of DNA methylation has thus become an i...

    Long-Cheng Li in PCR Primer Design (2007)

  15. No Access

    Protocol

    In Silico Prediction of Peptide-MHC Binding Affinity Using SVRMHC

    The binding between peptide epitopes and major histocompatibility complex (MHC) proteins is a major event in the cellular immune response. Accurate prediction of the binding between short peptides and class I ...

    Wen Liu, Ji Wan, **angshan Meng, Darren R. Flower, Tongbin Li in Immunoinformatics (2007)

  16. No Access

    Protocol

    Nanotechnology

    Microarrays are important tools for high-throughput analysis of biomolecules. The use of microarrays for parallel screening of nucleic acid and protein profiles has become an industry standard. A few limitatio...

    Hua Chen, Jun Li in Microarrays (2007)

  17. No Access

    Protocol

    Signal Processing and the Design of Microarray Time-Series Experiments

    Recent findings of a genome-wide oscillation involving the transcriptome of the budding yeast Saccharomyces cerevisiae suggest that the most promising path to an understanding of the cell as a dynamic system will...

    Robert R. Klevecz, Caroline M. Li, James L. Bolen in Microarray Data Analysis (2007)

  18. No Access

    Protocol

    Uses of Telomerase Peptides in Anti-Tumor Immune Therapy

    Human telomerase reverse transcriptase (hTERT) represents a universal tumor-associated antigen to activate specific immune response in cancer immune therapy. Peptides derived from hTERT are presented by major ...

    He Li, Indzi Katik, Jun-** Liu in Telomerase Inhibition (2007)

  19. No Access

    Protocol

    Knockdown of Telomerase RNA Using Hammerhead Ribozymes and RNA Interference

    More than 85% of human cancers and over 70% of immortalized human cell lines have highly elevated telomerase activity. In contrast, telomerase activity is down-regulated in most human adult somatic cells, exce...

    Shang Li, Mehdi Nosrati, Mohammed Kashani-Sabet in Telomerase Inhibition (2007)

  20. No Access

    Protocol

    Inhibition of Telomerase by Targeting MAP Kinase Signaling

    Constitutive activation of the mitogen-activated protein (MAP) kinase signaling pathway by oncogenic stimulation is widespread in human cancers. With the recently demonstrated links between MAP kinase, histone...

    Dakang Xu, He Li, Jun-** Liu in Telomerase Inhibition (2007)