Open Access. Powered by Scholars. Published by Universities.®

Physics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physics

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Fortifying Iot Against Crimpling Cyber-Attacks: A Systematic Review, Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir Oct 2023

Fortifying Iot Against Crimpling Cyber-Attacks: A Systematic Review, Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, Ali Kashif Bashir

Karbala International Journal of Modern Science

The rapid growth and increasing demand for Internet of Things (IoT) devices in our everyday lives create exciting opportunities for human involvement, data integration, and seamless automation. This fully interconnected ecosystem considerably impacts crucial aspects of our lives, such as transportation, healthcare, energy management, and urban infrastructure. However, alongside the immense benefits, the widespread adoption of IoT also brings a complex web of security threats that can influence society, policy, and infrastructure conditions. IoT devices are particularly vulnerable to security violations, and industrial routines face potentially damaging vulnerabilities. To ensure a trustworthy and robust security framework, it is crucial to …