Skip to main content

previous disabled Page of 6
and
  1. No Access

    Protocol

    Immunohistochemistry and Immunocytochemistry

    Immunohistochemistry and immunocytochemistry are powerful techniques for localizing the molecular expression of proteins in tissues and cells, especially when combined with the in situ hybridization technique. Im...

    **g Zheng in Phospholipid Signaling Protocols (1998)

  2. No Access

    Protocol

    Stimulation of Anti-HIV-1 Cytotoxic T Lymphocytes by Dendritic Cells

    Dendritic cells (DC) are highly specialized antigen-presenting cells (APC) in both primary and secondary T-cell responses. This may be related to their expression of high levels of MHC class I and II antigens (1-

    **aoli Huang, Zheng Fan, Lian Zheng, Charles R. Rinaldo Jr. in Dendritic Cell Protocols (2001)

  3. No Access

    Protocol

    Measurement of Cytokine and Chemokine Gene Expression Patterns Using cDNA Array

    The purpose of the gene array techniques is to simultaneously analyze the expression or characteristics of a large number of genes (13). These techniques can be used to compare gene expression in various cells o...

    Zheng-Ming Wang, Roman Dziarski in Interleukin Protocols (2001)

  4. No Access

    Protocol

    Measurement of Cytokine and Chemokine mRNA Using Nonisotopic Multiprobe RNase Protection Assay

    The multiprobe ribonuclease protection assay (RPA) is a highly sensitive and specific method for simultaneous detection and quantification of several species of mRNA. Three most distinct advantages of the mult...

    Zheng-Ming Wang, Roman Dziarski in Interleukin Protocols (2001)

  5. No Access

    Protocol

    Analysis of Cytosolic Proteins that Bind to the 5′ Leader Sequence of the Angiotensin AT1 Receptor by RNA Electromobility Shift Assay

    Electromobility shift assays (EMSAs) provide a way to study proteinnucleic acid interactions. This method is based on the observation that the electrophoretic mobility of nucleic acids through polyacrylamide g...

    Zheng Wu, Kamakshi Krishnamurthi, Koby Mok, Kathryn Sandberg in Angiotensin Protocols (2001)

  6. No Access

    Protocol

    Tyrosine Kinase Inhibitors Against EGF Receptor-Positive Malignancies

    The role of protein tyrosine kinases (PTKs) in the survival of cancer cells and their potential use in anticancer therapy has led to their selection as anticancer drug targets. Tyrosine kinases which are being...

    Elise A. Sudbeck, Sutapa Ghosh, **ng-** Liu in Immunotoxin Methods and Protocols (2001)

  7. No Access

    Protocol

    Scanning Low-Frequency Point Mutants in the Mitochondrial Genome Using Constant Denaturant Capillary Electrophoresis

    The ability to measure rare mutational events in mitochondrial genomes from human blood and tissues without resorting to phenotypic selection is invaluable. It is essential for the study of the cause(s) of mitoch...

    Weiming Zheng, Luisa A. Marcelino, William G. Thilly in Mitochondrial DNA (2002)

  8. No Access

    Protocol

    Production and Analysis of Neurospheres from Acutely Dissociated and Postmortem CNS Specimens

    For most of the history of neuroscience, it was widely believed, despite isolated reports to the contrary (1), that de novo generation of neurons in the mammalian CNS did not persist past perinatal development. I...

    Eric D. Lay well, Valery G. Kukekov in Neural Stem Cells: Methods and Protocols (2002)

  9. No Access

    Protocol

    The Blood-CSF Barrier in Culture

    The chemical stability of the central nervous system (CNS) is safeguarded by two major barrier systems that separate the systemic circulation from the cerebral compartment. Within the cerebral compartment, the...

    Wei Zheng, Qiuqu Zhao in Epithelial Cell Culture Protocols (2002)

  10. No Access

    Protocol

    Construction of Genomic Libraries in λ-Vectors

    Lambda (λ) bacteriophages are viruses that specifically infect bacteria. The genome of λ-phage is a double-stranded DNA molecule approx 50 kb in length (1). In bacterial cells, λ-phage employs one of two pathways...

    Yilun Wang, Zheng Cao, Darryl Hood, James G. Townsel in E. coli Plasmid Vectors (2003)

  11. No Access

    Protocol

    Opiate Self-Administration

    Opiates are powerful analgesics commonly used clinically to relieve pain. However, their repeated administration can lead to the development of drug dependence. During this transition from casual use to abuse,...

    Zheng-**ong **, Elliot A. Stein in Opioid Research (2003)

  12. No Access

    Protocol

    RANKL-Mediated Osteoclast Formation from Murine RAW 264.7 Cells

    Osteoclasts (OCs) are the cells uniquely responsible for dissolving both the organic and inorganic components of bone during bone development and remodeling throughout life. These cells originate from hematopo...

    Patricia Collin-Osdoby, Xuefeng Yu, Hong Zheng, Philip Osdoby in Bone Research Protocols (2003)

  13. No Access

    Protocol

    Ribozymes as Tools for Suppression of G Protein γ Subunits

    RNA suppression approaches provide a rapid survey of gene function. Of these approaches (i.e., antisense oligonucleotides, ribozymes, and RNA interference), ribozymes offer significant advantages by operating ...

    Janet D. Robishaw, Zheng-** Guo, Qin Wang in G Protein Signaling (2004)

  14. No Access

    Protocol

    Construction of VNP20009

    The engineering of tumor-targeting Salmonella strains bearing a high degree of both attenuation and tumor inhibition is a recently developed approach to vector-based treatment of cancer (1,2). Tumor-targeted Salm...

    Kenneth Brooks Low, Martina Ittensohn, **ang Luo, Li-Mou Zheng in Suicide Gene Therapy (2004)

  15. No Access

    Protocol

    Phosphorylation Analysis of Hepatitis B Virus Core Protein in Mammalian Cells

    The hepatitis B virus (HBV) C gene encodes the core protein and the precore protein. The core protein, also known as the core antigen, is an important serologic marker for HBV infection. Although this protein ...

    Jie Li, Yanyan Zheng, **ah Choi, **g-hsiung Ou in Hepatitis B and D Protocols (2004)

  16. No Access

    Protocol

    Mutagen-Induced Chromatid Breakage as a Marker of Cancer Risk

    Risk assessment is now recognized as a multidisciplinary process, extending beyond the scope of traditional epidemiologic methodology to include biological evaluation of interindividual differences in carcinog...

    **feng Wu, Yun-Ling Zheng, T. C. Hsu in Molecular Toxicology Protocols (2005)

  17. No Access

    Protocol

    Expression of Human Papillomavirus Type 16 L1 in Baculovirus Expression Systems

    With the great achievements of recombinant DNA technology, a variety of expression systems, including yeast, baculovirus, adenovirus, and attenuated Salmonella expression systems, have been used for the overex...

    ** Zheng, Lusheng Si, Yili Wang in Therapeutic Proteins (2005)

  18. No Access

    Protocol

    Population and Structure Determination of Hidden Folding Intermediates by Native-State Hydrogen Exchange-Directed Protein Engineering and Nuclear Magnetic Resonance

    Structural characterization of folding intermediates has been one of the important steps toward understanding the mechanism of protein folding. However, it has been very difficult to obtain high-resolution str...

    Yawen Bai, Hanqiao Feng, Zheng Zhou in Protein Folding Protocols (2006)

  19. No Access

    Protocol

    Production of Neurospheres from CNS Tissue

    The relatively recent discovery of persistent adult neurogenesis has led to the experimental isolation and characterization of central nervous system neural stem cell populations. Protocols for in vitro analys...

    II Gregory P. Marshall PhD, Heather H. Ross PhD, Oleg Suslov PhD in Neural Stem Cells (2008)

  20. No Access

    Protocol

    Detecting Apoptotic Cells and Monitoring Their Clearance in the Nematode Caenorhabditis elegans

    Apoptosis is a genetically controlled process of cell suicide that plays an important role in animal development and in maintaining homeostasis. The nematode Caenorhabditis elegans has proven to be an excellent m...

    Nan Lu, **aomeng Yu, **angwei He, Zheng Zhou in Apoptosis (2009)

previous disabled Page of 6