Search or add a thesis

Advanced Search (Beta)
Home > Synthesis of Indole and Tryptamine Derivatives and Their Bioactivities

Synthesis of Indole and Tryptamine Derivatives and Their Bioactivities

Thesis Info

Access Option

External Link

Author

Kanwal

Program

PhD

Institute

University of Karachi

City

Karachi

Province

Sindh

Country

Pakistan

Thesis Completing Year

2017

Thesis Completion Status

Completed

Subject

Chemistry

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10807/1/Kanwal_Chem_2017_UoK_PRR.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727484381

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


This dissertation describes the syntheses of indole and tryptamine derivatives via various synthetic strategies and screening of their biological activities. All synthetic compounds were characterized by different spectroscopic techniques such as 1H-, and 13C-NMR, EIMS/FAB-MS and EI-HRMS. This dissertation has been divided into three chapters and each chapter has its own numbering of compounds, figures, tables, schemes, and references. Chapter-1 comprises of the syntheses of Schiff bases of tryptamine 60-85 (Part A), urea and thiourea analogues of tryptamine 87-99 (Part B) and evaluation of their biological activities. Compound 78 (IC50 = 206.90 ± 0.88 μM) showed a potent activity against antiglycation activity, while, other thirteen compounds showed good to moderate activity. Chapter-2 describes the broad literature survey regarding the general introduction of indole, its biological importance and various synthetic schemes. It includes synthetic strategies of indole-3-acetamides 55-81 (Part A) and Knoevengal condensates of indole 83-118 (Part B) and evaluation of their biological activities. Eight compounds 84, 85, 88, 94, 106, 111, 115, and 118 were found to be weakly active against antiepileptic activity. Compound 83 (IC50 = 4.03 ± 0.05 μM) and 91 (IC50 = 4.89 ± 0.05 μM) were found to be the most active members of the series. Chapter-3 deals with the syntheses of bis(indolyl)methanes derivatives 38-92. The synthesized analogues were subjected for the random screening and were found to be active against anticancer and anti-inflammatory activities. Five analogues 64 (IC50 = 2.7 ± 0.1 μM), 47 (IC50 = 5.4 ± 0.8 μM), 52 (IC50 = 6.7 ± 0.6 μM), 78 (IC50 = 7.1 ± 1.3 μM), and 42 (IC50 = 7.2 ± 1.2 μM) were found to have potent activity as compared to standard ibuprofen (IC50 = 11.2 ± 1.9 μM), while compounds 45 (IC50 = 17.1 ± 0.2 μM) and 41 (IC50 = 26.6 ± 2.4 μM) possess weak antiinflammatory activity. However, seventeen compounds showed a weak anticancer activity.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

گالی گلوچ( زبان کا غلط استعمال)

زبان کا غلط استعمال
اللہ تعالیٰ خالق ہے اور بقیہ تمام کائنات مخلوق ہے، کوئی فلکی مخلوق ہے، کوئی ارضی مخلوق ہے، کوئی فضائی مخلوق ہے ،مخلوق کا دائرہ کار وسیع ہے لیکن ان جملہ مخلوقات میں اشرف المخلوقات کا تاج اللہ تعالیٰ نے انسان کے سر پر سجایا ہے۔ انسان کو عظمت و رفعت بخشی، انسان کو بلندیوں کی معراج پر پہنچایا۔ اس کا سبب گوشت پوست نہیں تھا، اس کی وجوہات نفاست ولطافت نہیں تھیں۔ یہ اعزاز لحیم اور شحیم ہونے کی بناء پر ودیعت نہیں کیا گیا تھا۔ اس اعزاز کا سبب زبان بنی جواس کو دیگر مخلوقات سے متاثر کرتی ہے۔
انسان زبان سے تلاوت کرتا ہے، زبان سے نعت پڑھتا ہے، زبان سے راہ و ہدایت کی ترجمانی کرتا ہے۔ زبان سے کلمہ پڑھتا ہے، زبان سے اسلام کی تبلیغ کرتا ہے، زبان سے صداقت و دیانت کا اظہار کرتا ہے، انسان کی یہ صفات اسے حقیقت شناس انسان بنا دیتی ہیں، انسان کو معاشرے کے لیے انعام بنا دیتا ہے، اس کی عظمت کو چار چاند لگا دیتی ہے، یہاں تک کہ انسان کوفرشتوں سے بھی عظیم بنادیتی ہے۔ بقول حالیؔ:
فرشتے سے بہتر ہے انسان بننا
مگر اس میں پڑتی ہے محنت زیادہ
اللہ تعالیٰ نے قرآن پاک ِمیں ارشاد فرمایا کہ ’’لوگوں سے اچھے طریقے سے گفتگو کرو‘‘ قرآنِ پاک میں جس طرح نماز کے بارے میں حکم ہے، جس طرح زکوٰۃ کے بارے میں ارشادِ باری تعالیٰ ہے، جس طرح روزوں کے بارے میں حکمِ ربّانی ہے، بالکل اسی طرح زبان کے استعمال کا بھی ذکر ہے، نماز، روزہ، حج، زکوٰۃ اور دیگر عبادات کی بجا آوری سے جس طرح انسان کی زندگی میں نکھار آتا ہے اسی طرح زبان کے صحیح استعمال سے بھی اس کے جملہ لمحات ِزیست مرصعّ ومزیّن ہوجاتے ہیں، اور وہ اپنی زندگی...

حوالہ کا فقہی تصور اور اس کی جدید صورتیں

This article is divided in to two sections: the first one; is to study of Ḥawāla according to Fiqhi rules, i.e. Its definition, conditions, its qualities and its specifications. In the second part, Ḥawāla is discussed according to application of the Bank, and its practical forms in different institutions. Ḥawāla is a contract in which a party or a person transfers his debt from his risk to another party or another person. Ḥawāla is used for different purposes, for example, bill of exchange, Financial Papers and different Banking accounts. This paper also discusses the difference between Ḥawāla and wakālah, Ḥawāla and Kafāla, and also Ḥawāla and Debt. Therefore, analysis, about Ḥawāla is very essential and many studies have been done on it. Furthermore, it will also critically provide their textual evidence and rational arguments in order to reach a financial juristic judgment. Ḥawāla is used in credit card, discounting of bill of exchange, etc. At the end the paper discusses its conclusion and offers some requests and suggestions.

Efficient Pseudonym Based Secure Framework for Intelligent Transport System

Intelligent transport system (ITS), owing to its potential to enhance road safety, comfort, security, and traffic efficiency have attracted attention from automotive industries and academia in recent years. The underlying technology i.e., vehicular ad-hoc networks (VANETs) provide a means for vehicles to intelligently exchange messages regarding road and traffic conditions to enhance safety. Wireless communication in ITS leads to many security and privacy challenges. Security and privacy of ITS are important issues that demand incorporation of confidentiality, privacy, authentication, integrity, non-repudiation, and restrictive obscurity. In order to ensure the privacy of vehicles during communication, it is required that the real identity of vehicles should not be revealed. There must be robust and efficient security and privacy mechanisms for the establishment of a reliable and trustworthy network. In this thesis, an efficient pseudonym based secure framework is proposed for preserving the real identities of vehicles. The proposed distributed architecture allows vehicles to generate pseudonyms in a very private and secure way. In the absence of a distributed architecture, the privacy cannot be preserved by storing information regarding vehicles in a single location. The proposed framework only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. The pseudonym mappings of vehicles are stored at different locations to avoid any chance of vehicle pseudonyms certificates linkability. In addition, the most recent communication pseudonyms of a malicious vehicle are revoked and are stored in the Certificate Revocation List (CRL) that results in small size of the CRL. Therefore, the CRL size does not increase exponentially. The distributed proposed framework guarantees, the vehicles privacy preservation in the real identities mapping and revocation phase from the certificate authorities. The empirical results prove that the proposed framework is robust and efficient with low computational cost, overhead ratio, average latency, and an increased delivery ratio.