The crystal structure of 12 peptides containing the conformationally constrained 1-(aminomethyl)cyclohexaneacetic acid, gabapentin (Gpn), are reported. In all the 39 Gpn residues conformationally characterized so far, the torsion angles about the Calpha-Cbeta and Cbeta-Cgamma bonds are restricted to the gauche conformation (+/-60 degrees ). The Gpn residue is constrained to adopt folded conformations resulting in the formation of intramolecularly hydrogen-bonded structures even in short peptides. The peptides Boc-Ac6c-Gpn-OMe 1 and Boc-Gpn-Aib-Gpn-Aib-OMe 2 provide examples of C7 conformation; peptides Boc-Gpn-Aib-OH 3, Boc-Ac6c-Gpn-OH 4, Boc-Val-Pro-Gpn-OH 5, Piv-Pro-Gpn-Val-OMe 6, and Boc-Gpn-Gpn-Leu-OMe 7 provide examples of C9 conformation; peptide Boc-Ala-Aib-Gpn-Aib-Ala-OMe 8 provides an example of C12 conformation and peptides Boc-betaLeu-Gpn-Val-OMe 9 and Boc-betaPhe-Gpn-Phe-OMe 10 provide examples of C13 conformation. Gpn peptides provide examples of backbone expanded mimetics for canonical alpha-peptide turns like the gamma (C7) and the beta (C10) turns. The hybrid betagamma sequences provide an example of a mimetic of the C13 alpha-turn formed by three contiguous alpha-amino acid residues. Two examples of folded tripeptide structures, Boc-Gpn-betaPhe-Leu-OMe 11 and Boc-Aib-Gpn-betaPhg-NHMe 12, lacking internal hydrogen bonds are also presented. An analysis of available Gpn residue conformations provides the basis for future design of folded hybrid peptides.

Download full-text PDF

Source
http://dx.doi.org/10.1021/ja068910pDOI Listing

Publication Analysis

Top Keywords

provide examples
16
peptides
8
gpn residue
8
examples conformation
8
conformation peptides
8
gpn
5
conformation
5
provide
5
examples
5
hybrid peptide
4

Similar Publications

Towards Context-Rich Automated Biodiversity Assessments: Deriving AI-Powered Insights from Camera Trap Data.

Sensors (Basel)

December 2024

School of Biological and Environmental Sciences, Liverpool John Moores University, James Parsons Building, Byrom Street, Liverpool L3 3AF, UK.

Camera traps offer enormous new opportunities in ecological studies, but current automated image analysis methods often lack the contextual richness needed to support impactful conservation outcomes. Integrating vision-language models into these workflows could address this gap by providing enhanced contextual understanding and enabling advanced queries across temporal and spatial dimensions. Here, we present an integrated approach that combines deep learning-based vision and language models to improve ecological reporting using data from camera traps.

View Article and Find Full Text PDF

Over the past twenty years, camera networks have become increasingly popular. In response to various demands imposed on these networks, several coverage models have been developed in the scientific literature, such as area, trap, barrier, and target coverage. In this paper, a new type of coverage task, the Maximum Target Coverage with k-Barrier Coverage (MTCBC-k) problem, is defined.

View Article and Find Full Text PDF

Unmanned-Aerial-Vehicle-Assisted Secure Free Space Optical Transmission in Internet of Things: Intelligent Strategy for Optimal Fairness.

Sensors (Basel)

December 2024

Qualcomm Communication Technologies (Shanghai) Co., Ltd., Shanghai 201208, China.

In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS employs FSO technique to transfer information to multiple authenticated sensors, to improve the transmission security and reliability with the help of an UAV relay with decode and forward (DF) mode. All the sensors need to first send information to the UAV to obtain security authentication, and then the UAV forwards corresponding information to them.

View Article and Find Full Text PDF

Security is one of the increasingly significant issues given advancements in technology that harness data from multiple devices such as the internet of medical devices. While protecting data from unauthorized user access, several techniques are used including fingerprints, passwords, and others. One of the techniques that has attracted much attention is the use of human features, which has proven to be most effective because of the difficulties in impersonating human-related features.

View Article and Find Full Text PDF

The introduction of biological therapies has revolutionized inflammatory bowel disease (IBD) management. A critical consideration in developing these therapies is ensuring adequate drug concentrations at the site of action. While blood-based biomarkers have shown limited utility in optimizing treatment (except for TNF-alpha inhibitors and thiopurines), tissue drug concentrations may offer valuable insights.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!