Search or add a thesis

Advanced Search (Beta)
Home > Synthesis of Nucleobase-Functionalized b-Tripeptide Scaffolds for Higher Ordered Molecular Architectures

Synthesis of Nucleobase-Functionalized b-Tripeptide Scaffolds for Higher Ordered Molecular Architectures

Thesis Info

Access Option

External Link

Author

Mehmood, Tahir

Program

PhD

Institute

Quaid-I-Azam University

City

Islamabad

Province

Islamabad.

Country

Pakistan

Thesis Completing Year

2012

Thesis Completion Status

Completed

Subject

Chemistry

Language

English

Link

http://prr.hec.gov.pk/jspui/handle/123456789/2058

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727492472

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


The stability of cyclic peptides and their self-assembling ability is an important aspect in the DNA recognition studies. Functionalization of cyclic peptides with nuclear bases may serve the purpose of mimicking and interacting with the DNA single strand. Stacking of the cyclic peptides after functionalzation may develop steric hinderance. L-Lysine, with side chain amino group, was selected to avoid these steric factors. Differently-protected L-lysine was transformed into its respective β-analogue using Arndt Eistert synthesis. These β-amino acids were utilized to synthesize cyclic β-tripeptide scaffolds through a multistep sequence. The scaffolds after deprotection were subjected to functionalization with the selected nuclear bases (adenine, thymine, cytosine and guanine) after conversion to their acetic acid derivatives. The nucleobase-functionalized cyclic β-tripeptide scaffolds were completely deprotected, purified by RP-HPLC and characterized by ESI and HRMS.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

پروفیسر مختار الدین آرزو

آہ! پروفیسر مختار الدین احمد آرزو مرحوم
دارالمصنفین اور دنیائے علم و تحقیق کے لیے یہ خبر بڑی اندوہ ناک رہی کہ ۳۰؍ جون ۲۰۱۰؁ء کو مشہور محقق، مدون اور عالم پروفیسر مختارالدین احمد آرزو نے اس جہاں فانی کو الوداع کہا، اِناﷲ وَاِنا اِلَیہ رَاجِعُون۔
وہ اس بزم دوشیں کے گویا آخری رکن تھے جس میں ڈاکٹر عبدالستار صدیقی، امتیاز علی عرشی اور مالک رام جیسے اہم نام شامل ہیں، ۱۴؍ نومبر ۱۹۲۴؁ء میں ان کی زندگی کا سفر پٹنہ سے شروع ہوا جس کی آخری منزل علی گڑھ کی سرزمین قرار پائی، عمر بھر کی بے قراری کے لیے قرار یہیں مقدر تھا۔ ان کے والد مولانا ظفر الدین قادری خود جید عالم اور صاحب تصانیف کثیرہ اور مولانا احمد رضا خاں بریلوی کے شاگرد رشید تھے، سلسلہ نسب شیخ عبدالقادرر جیلانی تک پہنچتا ہے، اجداد میں سید ابراہیم نامی بزرگ، سلطان فیروز شاہ تغلق کے عہد میں ہندوستان آئے اور سپہ گری میں نمایاں حیثیت حاصل کی، بزرگوں کی اعلیٰ روایات کی پاسبانی نسل در نسل ہوتی رہی، نانہال بہار کی مشہور اور نیک نام بستی استھانواں میں تھا، پہلا نام غلام معین الدین رکھا گیا لیکن بعد میں وہ مختارالدین احمد ہوئے، والدہ کی آرزو تھی کہ بیٹا جامعہ ازہر تک جائے، یہ آرزو عالمی جنگ کی وجہ سے پوری نہ ہوئی لیکن علم و تحقیق کی طلب میں وہ خود مکمل آرزو بن گئے۔
والد بزرگوار سے تعلیم کا سلسلہ شروع ہوا جو شمس الہدیٰ سے ہوتا ہوا مدرسہ بورڈ کے فاضل حدیث کی سند تک دراز ہوا، لیکن طلب علم کی آرزو کے لیے یہ کافی نہیں تھا، انھوں نے جدید تعلیم کے لیے مسلم یونیورسٹی کا رخ کیا، ڈاکٹریٹ کی سند لی، پی ایچ ڈی کے مقالے کی رہنمائی کے لئے عبدالعزیز میمن جیسی باکمال ہستی نصیب ہوئی،...

علامہ ابن جوزی کی تفسیر

This article describes the methodology and characteristics of Zad al-masir fi ‘ilm al-tafsir. This is one the finest work of Allama Ibn al-Jawzī, a 6th century prominent Interpreter. Several editions of this Tafsir have been published. However, the edition of dar al-kitab al-‘arbi, Beirut published in four volumes is selected for this study. This exegesis is based on conventional narrations, authentic quotations from the Islamic Scholars and lingual & grammatical discussions. As a witness, causes of verses (asbab al-Nuz┴l), Makki and Madani Surah’s (chapters), the abrogating and abrogated verses (al-nasikh wal-mans┴kh) and Islamic jurisprudence have been discussed in it where needed. The quality of this translation which is admirable is that mostly authentic Ahadith from original sources, and references to well known basic books in relevant discussions have been described.

Robust and Low Latency Security Framework for Ieee 802. 11 Wireless Networks

Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inherent weakness. ‘Counter Mode Cipher Block Chaining Message Authentication Code Protocol’ (CCMP) has recently been employed to replace flawed ‘Wired Equivalent Privacy’ (WEP) Protocol for the provision of security to IEEE 802.11 wireless local area networks (WLAN). Meanwhile, IEEE 802.11s – draft standard for wireless mesh networks (WMN) – has also proposed to use CCMP. CCMP, a two pass process, introduces considerable latency in multi-hop wireless networks, such as WMN. Increase in latency leads to a decrease in the quality of service for delay sensitive real-time multimedia applications. This research exposes the vulnerability of CCMP against pre- computation time memory trade-off (TMTO) attack and proposes a framework to strengthen the security of WLAN packets using Per-Packet security mechanism. Furthermore, a novel, robust and low latency framework for WMN is also proposed. The architecture of security framework involves introduction of piggyback challenge response protocol for providing data confidentiality and data integrity. Piggyback challenge response protocol offers fresh encryption key for every packet, per-packet authentication and use of secret nonce. Authentication of every packet offers prompt defense against unauthorized access. It is also demonstrated that the security framework is robust against a variety of security attacks. Encrypted and unique nonce provides unpredictability and freshness. Unpredictability prevents pre-computation attack and freshness ensures successful defense against replay attacks. Proposed framework is simulated and its iiperformance is compared with IEEE 802.11i in terms of latency introduced by the security components. For single hop, latency due to the proposed protocol is less than half as compared to CCMP. The improvement in latency becomes more pronounced as the number of hops increase. This novel framework addresses the CCMP deficiencies of high latency and vulnerability against TMTO attack, without compromising any of the security measures implemented in the standard.