Search or add a thesis

Advanced Search (Beta)
Home > Molecular Characterization of Thermostable Cellulase from Thermotoga Naphthophila.

Molecular Characterization of Thermostable Cellulase from Thermotoga Naphthophila.

Thesis Info

Access Option

External Link

Author

Khalid, Aisha

Program

PhD

Institute

University of Veterinary and Animal Sciences

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Biochemistry

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10604/1/Aysha%20Thesis%20Final%20%28Foreign%20evaluated%20new%20format%29%2019-3-19.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676726692779

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Current study deals with the production, purification and characterization of recombinant thermostable cellulase from Thermotoga naphthophila. PCR using the genomic DNA of T. naphthophila as template resulted in amplification of 1 kb cellulase gene. The amplified cellulase gene was cloned in pTZ57R/T and sub-cloned in pET28a. The expression of recombinant cellulase was analyzed using BL21 CodonPlus (DE3) cells as expression host. The expression studies resulted in the production of recombinant enzyme as soluble protein. The recombinant protein was purified by affinity column chromatography. The characterization studies of purified protein demonstrated the optimal enzyme activity at 90 °C and pH 4.8. The presence of cobalt enhanced the cellulase activity and 2.5 mM cobalt was recorded the optimal concentration for the maximal cellulase activity. SDSPAGE analysis confirmed the molecular weight of recombinant protein as 39 kDa. The protein was found thermostable which retained more than 70% residual activity with an incubation of 1.67 h at 90 °C in the presence of cobalt. Presence of ionic and non-ionic detergents showed an inhibitory effect on the enzyme activity. Kinetic studies of recombinant protein demonstrated the km and Vmax values of 0.22 mg/mL and 2500 µmoles/min respectively using carboxymethyl cellulose as substrate. The deinking potential of recombinant cellulase to remove ink from the paper makes this enzyme a suitable candidate for its use in paper Industry. We are reporting a new member of M42 Family of aminopeptidases. The stability of this recombinant cellulase at wide range of temperature, pH, its high level activity and its paper deinking potential makes it a suitable candidate for its use in paper industry.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

پھیرا پاویں جے ہک چاواں دا

پھیرا پاویں جے ہک چاواں دا
مل پے جائے میریاں ہاواں دا
لوکاں پردے اچے کر لئے نیں
ہن دا نہیں لگدا کاواں دا
ہووے پتر ادب تھیں جے نیواں
ٹھر جاندا کالجہ ماواں دا
جیہڑی پاوے تے لٹکاوے وی
مزا اوندا فیر اداواں دا
فر سونڈی حملہ کر دیندی
پھل کھڑدا جدوں کپاہواں دا
کر ذکر اس سوہنے اللہ دا
جیہڑا مالک ساریاں تھاواں دا

Sistem Pendukung Keputusan Pemilihan Kinerja Karyawan Terbaik Menggunakan Metode Simple Additive Weight

Sistem Pendukung Keputusan adalah bagian dari sistem informasi berbasis komputer termasuk sistem berbasis pengetahuan atau manajemen pengetahuan yang di pakai untuk mendukung pengambilan keputusan di dalam suatu organisasi atau perusahaan. Saat ini pengelolaan data penilaian karyawan perusahaan masih dilakukan dengan manual, sehingga semakin besar resiko kesalahan dalam mengelola data dan membutuhkan waktu yang relatif lama. Untuk mempermudah perhitungan penentuan kinerja karyawan terbaik maka penulis menggunakan metode Simple Additive Weighting (SAW). Metode simple additive weighting ini di pilih karena metode ini menentukan nilai bobot untuk setiap atribut, kemudian dilanjutkan dengan proses perangkingan yang akan menyeleksi alternatif-alternatif yang sudah di tentukan seperti etika atau kepribadian, kedisplinan, absensi, tanggung jawab, kerja sama, kemampuan memimpin, kecepatan kerja, ketelitian kerja dan kualitas hasil kerja. Dengan metode perangkingan tersebut, diharapkan penilaian akan lebih tepat karena didasarkan pada nilai kriteria dan bobot yang sudah ditentukan sehingga akan mendapatkan hasil yang lebih akurat terhadap siapa yang akan menerima reward/penghargaan tersebut.

Secure Provenance for Distributed Environment

Data provenance has an essential role in establishing the trustworthiness of data in many applications, where critical decisions have to be made based on the data collected from diverse sources. Therefore, it is indispensable to use authentic and accurate data for such mission-critical applications. In order to fully trust the data provenance itself, it is extremely important to secure the data provenance from forgeries and misuse. Provenance generation, management, and dissemination have received substantial attention from the research community. However, provenance security in a collaborative distributed network has earned less heed from the research community. The traditional time-honoured security solutions cannot be directly applied because of the chained or directed acyclic graph structure of the provenance. For a collaborative distributed network, in the literature, some security solutions have been proposed to secure the provenance information. However,these schemes are not without their limitations. The existing schemes assume transitive trust among participating users, thus attacks initiated by multiple consecutive colluding users on a provenance chain cannot be detected. Such an assumption is beyond the reality, especially working in a file sharing environment or distributed network. Moreover, the existing schemes introduce an additional element to chain the provenance records which results an extra storage overhead. To overcome the aforementioned loopholes, we have proposed secure provenance schemes for a document/file sharing n etwork. The proposed schemes can detect the attacks launched by either consecutive or non-consecutive adversaries. For the provenance records chaining, these schemes aggregate the signatures of the participating users. Experimental results show that the proposed schemes outperform as compared to existing schemes in terms of computation and storage cost. Provenance size is a major hindrance to the adoption of provenance in a resourceconstrained network. The provenance size increases drastically when the number of nodes in the network grow. The growing provenance size becomes the per formance bottleneck especially in Wireless Sensor Networks (WSNs). Different solutions have been proposed in the literature to compress the provenance in formation along with its security. However, in existing provenance compression schemes, the provenance’s size grows linearly with the number of nodes in a WSN. Furthermore, the existing provenance compression schemes are designed for static nodes only and do not account for the mobility factor. Moreover, some secure provenance compression schemes use overlapped arithmetic coding to compress the provenance information. However, there is no criterion to find the overlapping ratio. To overcome the above-mentioned issues, we have proposed a secure provenance compression scheme for mobile nodes of a WSN. Moreover, a novel mechanism has been devised to calculate the overlapping ratio for overlapped arithmetic coding. Furthermore, the proposed scheme assures the confidentiality, integrity, and fresh ness of the provenance information. It is evident from the simulation results that the proposed scheme has higher compression and lower false positive rate.