Search Results - "Ayed, Dhouha"
-
1
Kinetics of lipid production at lab scale fermenters by a new isolate of Yarrowia lipolytica SKY7
Published in Bioresource technology (01-12-2016)“…•A glycerol concentration of 85.5g/L and C/N ratio of 75 with inoculum volume of 6.25% v/v found optimal.•Biomass concentration of 29.5g/L with 50% w/w lipid…”
Get full text
Journal Article -
2
Harnessing the Effect of pH on Lipid Production in Batch Cultures of Yarrowia lipolytica SKY7
Published in Applied biochemistry and biotechnology (01-04-2018)“…The objective of this research was to investigate the kinetics of lipid production by Yarrowia lipolytica SKY7 in the crude glycerol-supplemented media with…”
Get full text
Journal Article -
3
Management and enforcement of secured E2E network slices across transport domains
Published in Optical fiber technology (01-10-2022)“…•Deployment of Secured E2E Network Slices in multi-domain scenarios.•E2E Network Slices security monitoring through SSLAs.•Transport and Computing domains…”
Get full text
Journal Article -
4
Substrate-Based Approach for the Selection of Oil-Bearing Heterotrophs from Nitrogen-Deficient Soil for Lipid Production
Published in Applied biochemistry and biotechnology (01-02-2015)“…In this study, nine heterotrophic yeast isolates were tested for their ability to assimilate crude glycerol and consecutive conversion to triacylglycerides…”
Get full text
Journal Article -
5
Genetic characterization of the razor clam Solen marginatus (Mollusca: Bivalvia: Solenidae) in Tunisian coasts based on isozyme markers
Published in Biochemical systematics and ecology (01-02-2012)“…The genetic diversity of the razor clam Solen marginatus (Pennánt, 1777) originating from three separated sampling areas of the Tunisian coasts was…”
Get full text
Journal Article -
6
Securing Stack Smashing Protection in WebAssembly Applications
Published 23-10-2024“…WebAssembly is an instruction set architecture and binary format standard, designed for secure execution by an interpreter. Previous work has shown that…”
Get full text
Journal Article -
7
CADeComp: Context-aware deployment of component-based applications
Published in Journal of network and computer applications (01-08-2008)“…The expansion of wireless communication and mobile hand-held devices makes it possible to deploy a broad range of applications on mobile terminals such as PDAs…”
Get full text
Journal Article -
8
Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach
Published in 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid) (01-05-2022)“…Data produced by end devices like smartphones, sensors or IoT devices can be stored and processed across a continuum of compute resources, from end devices via…”
Get full text
Conference Proceeding -
9
ETSI ZSM Driven Security Management in Future Networks
Published in 2022 IEEE Future Networks World Forum (FNWF) (01-10-2022)“…This paper presents a security management framework driven by Zero-Touch Network and Service Management (ZSM) paradigm and embedded in the High-Level…”
Get full text
Conference Proceeding -
10
An event processing approach for threats monitoring of service compositions
Published in 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) (01-10-2013)“…The Future Internet will be populated by not just data and devices, but also services. Approaches in Service-Oriented Architectures are allowing new ways for…”
Get full text
Conference Proceeding -
11
Analysis of XACML policies with ASP
Published in 2015 7th International Conference on New Technologies, Mobility and Security (NTMS) (01-07-2015)“…Security policy administrators face difficulties to ensure that the policies they specify in XACML correspond to what they intend to formulate and to…”
Get full text
Conference Proceeding -
12
Cross-Domain Attribute Conversion for Authentication and Authorization
Published in 2015 10th International Conference on Availability, Reliability and Security (01-08-2015)“…In bio-security emergencies, such as an outbreak of an exotic animal disease, it is essential that the organizations involved in combating this outbreak…”
Get full text
Conference Proceeding -
13
An Adaptation Methodology for the Deployment of Mobile Component-based Applications
Published in 2006 ACS/IEEE International Conference on Pervasive Services (2006)“…The expansion of wireless communication and mobile hand-held devices is a fleeting how software deployment is being performed. Deployed applications have to be…”
Get full text
Conference Proceeding