Thursday, October 31, 2019

Federal Guards Indicted for Abusing Prisoners Essay - 1

Federal Guards Indicted for Abusing Prisoners - Essay Example The issue at hand needs to be clarified and all allegations evaluated. The first step towards doing this is gathering information. The information to gather relates to the issue at hand. The primary decision maker should be identified in the process. Both parties bound to the issue should be interviewed independently in order to ensure that the information at hand is actually the one held by both parties (Reid, 2011). All the views of the parties should be accounted for before and after the abuse occurred. The second step involves deciding the specific ethical issue and determining the conflict therein. This is tailored towards determining the liable party, legally and ethically. After that, the pertinent issue is addressed. Decisions on the pragmatic issues that make the case complex should be addressed. In this case, the entire prison system seems to be implicated in the matter. The complexity of the matter should be weighed against justice, rights, and freedoms of each party, and the right actions were taken prior to the provisions of the law (Reid, 2011). The conclusion arrived at in this case is solely based on the ethics code of conduct for a prison system. The officers’ general standard of conduct should be evaluated ethically and legally. Secondly, applicable laws in this context should be assessed. Compliance with these laws is the principle point of consideration here. Thirdly, personal rights and freedoms should be highlighted for both all the parties involved in order to alleviate occurrences of conflict of interest. The restriction of each party should constitute the conclusion herein, focusing on both ethical and legal issues. Once all that has been done, the unethical conduct is manifested.

Tuesday, October 29, 2019

Electromagnetic Assignment Example | Topics and Well Written Essays - 2500 words

Electromagnetic - Assignment Example All the objectives would be achieved by carrying out several activities such as tests for magnetic shielding, falling magnets and the design of the motor. The lab activity was also aimed at using PHET simulation software to carry out some electromagnetic tests. Magnetic shielding is the act of reducing the electromagnetic field contained in space by blocking the area with barriers made of either conductive or magnetic material. Magnetic shielding, however, does not prevent a magnetic field, preventing lines of flux from traveling from the North Pole to the South Pole of a magnet. However, the fields can be redirected. Any ferromagnetic metal can be used as a shielding metal. A ferromagnetic metal is a material containing either nickel-iron or cobalt. Most of the steel materials are ferromagnetic metals and work well as redirecting shield. Steel is, however, most used because it is less expensive and widely available. The thickness of the shielding material matters to individual levels. When a shield is so thin, it becomes saturated with magnetic field lines and cannot hold any more lines of flux. Thick shielding is therefore required to carry a maximum number of flux lines. A thick shield does not necessarily mean adding more of steel mate rial. Adding steel thickness does not improve the shielding much. In such cases where saturation is an issue, multiple layers of the shielding material are used. There are some specialized materials especially designed for magnetic shielding. The Specialized magnetic shielding materials are always designed to have a higher relative permeability and a lower saturation point. The right shielding materials depend on the particular shielding problem. For instance for a sensitive electronic, Metals can provide an excellent shielding than steel. Or large applications involving large, powerful neodymium magnets,

Sunday, October 27, 2019

The Internet Can Be Used For Terrorism

The Internet Can Be Used For Terrorism The internet covers a vast number of ways in which it can be used for terrorism, the most common way in which terrorist use the internet, is in fact the use we fear least, namely the use to recruit, communicate and spread propaganda. Cyber war, which includes, terrorist attacks such as hacking into nuclear power plants, flight control or even businesss is in reality yet to be seen or even developed by terrorists, however it is still the side of internet terrorism that we fear most. The terrorists using the internet cannot be easily defined as one group of people. John Deutch argues that there are three types of terrorists, the first is state sponsored terrorists, second is groups trying to overthrow their government to gain independence and finally Islamic terrorists who operate and have interests in not one sole country but instead with in a region, which in their case is predominantly, but not solely, the middle east.  [1]  The different aims and the degree of how radical each group is, will affect the extent to which different terrorists are willing to use the internet to achieve their goal. The internets simple accessibility, minimal restrictions and speed to reach vast potential audiences is the basis for why it has become so popular for governments, businesses and the public, including terrorists, to increasingly use it for everyday tasks. The freedom and equality that the internet allows, and which democratic countries support, is a double-edged sword as it allows terrorists to just as easily coordinate and conform to attack these democratic values. The internet provides a means for terrorists to attack on a more level playing field in a cyber war, instead of the traditional means of warfare in which the states military superiority can usually defeat the terrorists. However, accessing and attacking information on the internet can be harder in less democratic countries such as china where the internet is heavily censored. Gabriel Weimann says that most terrorist sites emphasize two issues, the restrictions placed on freedom of expression and the plight of comrades who are now political prisoners  [2]  . With regard to the first point that terrorists sites emphasize the restrictions placed on their freedom, this very notion that they are publicising this worldwide on their sites to mass audiences is a contradiction of having their free speech restricted. Furthermore, despite the United States military attacks on Al Qaeda since the war on terror, Al Qaeda has still gained large publicity in the west. Whether this is video tapes of Osama Bin Laden, or messages warning of further attacks, it has allowed them the freedom to spread their message and fear to their enemies. Weimann goes on to say though that terrorist sites swiftly emerge, modify their formats, and then swiftly disappear again. In some cases, e.g. Al Qaedas, locations and contents change almost daily  [3]  . If terrorists freedom were unrestricted, they would not have to do this, thus the internet is clearly a place that offers terrorists vast opportunities, but not without extr eme risk and precaution. The internets opportunities that have been exploited the most are the use of propaganda and recruiting, targeting mainly potential supporters and the public of the enemy, Potentials are bombarded with anti-American propaganda  [4]  . Prior to the internet, the only outlet the terrorists had was television, radio and newspapers, all of which are selective, and more cautious to a certain extent, of what they choose to publicise. Indirectly however, the internet has actually helped terrorists reach audiences through these traditional media outlets. Press releases are often placed on the websites in an effort to get the organisations point of view into the traditional media.  [5]  Foreign journalists are actually aimed at through the internet; in this manner, the internet not only provides a way for terrorists to reach the public, but also in fact allows them to reach out through traditional media outlets, which previously was very rare. It allows mainstream journalists to access and choose whether to publicise their material, which prior to the internet would have been very hard to get their message to these journalists. The extent of this should not be overstated though, it may have made it easier for terrorist groups to catch the attention of journalists, but that by no means, and is still very rare, that they will publicise their message, at least not in the light that the terrorists would like it to be portrayed anyway. The internet also provides an outlet for psychological warfare, fundraising, co-ordinating attacks and for hiding encrypted manuals and instructions  [6]  . There is much evidence to support this; the IRA as well as other terrorist groups has received many donations online. Psychological warfare has been committed by posting beheadings and murder online, such as the murder of American journalist Daniel pearl. Donald Rumsfeld said that an Al Qaeda terrorist manual said it was possible to gather at least 80% of all information required about the enemy to co-ordinate an attack. As for terrorist manuals and instructions, the terrorists handbook, anarchists cookbook and the Encyclopaedia of jihad, which include details of how to run an underground organisation and execute attacks, can be easily found online. Despite the internet providing an outlet for these uses, most of the operating systems and programs used by these terrorists are likely to be American made; meaning it is highly l ikely that precautionary counter measures are already in place by America to prevent an attack against them. Fundraising can be easily quashed through the collaboration of the governments and card companies, as seen recently with visa and MasterCards ban on donations to Wikileaks. Although not a terrorist organisation, a group nonetheless causing problems to the U.S that they quickly restricted. Psychological warfare using murder and brutality videos are rarely on the internet for long and usually seen by very few because they are not easily available, or plainly because many people do not want to watch them. The internets use for distributing manuals and co-ordinating attacks has proved harder to restrict though and the growth of cloud computing is only hindering this, cloud computing also at the same time provides another possible area for terrorists to attack, particularly businesss using cloud networks. The mass media has overstated the threat of cyber terrorism and made inadequate awareness to the daily uses like recruitment and spreading of propaganda, but this is not to say that the cyber terrorism is not a threat. John Arquilla says that cyberwar Like war in Clausewitzs view, may be a chameleon. It will be adaptable to varying contexts.  [7]  As cyberwar is a new concept, in relation to the centuries of warfare, it is hard to say yet whether this is the case. The extent of its use is fast appearing though, the ability to recruit and train as previously mentioned as well as the ability to hack enemy systems and potentially cripple them shows that a battle could be started, carried out and won with just the effective use of superior hackers. Vice admiral Bevrowski said, We are in the midst of a revolution in military affairs (RMA) unlike any seen since the Napoleonic Age  [8]  . I believe that the development of the internet and networks is actually much larger than the Na poleonic age RMA, but at the same time much more restrained. In a way, it is a much larger revolution because for the first time it creates a more level battlefield for terrorists who can rarely compete militarily against states. Cyberwar in theory can cause an even more destructive victory without killing one person, by solely destroying vital enemy networks and systems, or merely just bluffing that you are capable and willing to do so. Christopher Joyner believes that it only needs an adversary to attack the US banks and the whole economy would crumble.  [9]  On the other hand it could actually prevent what John Arquilla says has been the main aim of warfare since the sixteenth century, attrition or absolute defeat of the enemy  [10]  . If you manage to access the enemys networks, but not attack and instead threaten the enemy to surrender, then this could potentially end the battle without casualties. The flaw in the threat of cyberwar is that although the enemy has effect ively been defeated, they have not been weakened at all and could come back and attack very quickly. Americans and other nations threatened by terrorists will likely have superior defences in place to prevent this sort of catastrophic attack though, limiting and restraining the use of internet warfare by terrorists. At the same time, despite states superior networks and technology, it is very hard for states to know how to directly attack rogue terrorist groups without unintentionally attacking civilians; again, the possibilities for internet warfare are limited. The exception to this would be state sponsored terrorists, states have clear targets such as the military, transportation systems or their stock exchange, all of which can be dealt powerful blows to get them to hand over terrorists and stop supporting them. Traditional views of war can be applied to cyber war, as Von Clausewitz argues; the defending party always has an advantage over the attacking forces. This is true for cyber war and is why attempts to successfully combat cyber terrorism are made more difficult. The defending state has to produce advanced, expensive technological methods to protect all of its information, from its stock exchanges and health care systems to its military and nuclear systems. The attacker on the other hand only has to find a way to access one of these areas to cause catastrophic damage, thus they can spend more time and money focussing on one area of attack while the defending nation has to spread its resources across many; this gives the attacking terrorists the advantage. To combat this, the easiest way is to know what area the terrorists plan to attack so you can focus resources. The problem that arises from this solution though is that it is very easy to start abusing civil liberties by illegally mon itoring citizens activities and restricting certain information; whether this prevents the attack or not, the terrorists will have already won a victory of discrediting the western values of freedom and liberty. The illegal wiretaps that George Bush approved without a warrant under the PATRIOT Act prove this; the threat of terrorism is enough to make governments crack and hand the terrorists a small victory. The rise of internet terrorism has changed the hierarchical system in terror cells to a network of international, independent terrorist cells. In order to combat this, states must co-operate and share information. There is plenty of evidence to suggest that sharing information occurs, it is likely that a lot of useful information is not shared though. The issue is not just the sharing information; if terrorist cells co-ordinate globally then likewise must governments. John Deutch mentions how Europeans protested over the U.S bombing of Libya after a bomb killed two Americans.  [11]  Disagreements make an international response, slower, inefficient and divided. The terrorist cells, for the most part to not have this problem, they join specific terrorist groups because of its reputation and intentions and are usually united under one political or religious aim. The opportunities presented to terrorists by the internet are increasing as the world become more reliant on the internet. At present though, the opportunities are largely non-aggressive and this is mainly because actions such as recruiting over chat rooms and spreading propaganda are hard to combat and even if the enemy finds them, there is usually nothing illegal about these websites and new ones can be easily re-opened under a different name. For terrorists trying to use the internet for aggressive means such as hacking, the opportunities are a lot more limited because most states threatened by terrorism, have invested large amounts of money into cyber defences to combat this.

Friday, October 25, 2019

La violence scolaire - French Essay :: Papers

La violence scolaire - French Essay La violence scolaire est un problÃÆ' ¨me en France depuis longtemps mais pendant la derniÃÆ' ¨re decade, le nombre de cases de violence ait augmentÃÆ' © considÃÆ' ©rablement. Il y avait eu six plans contre la violence mis en place pendant ce decade mais les faits nÂ’a cessÃÆ' © dÂ’augmenter. Pendant dix ans, la petit dÃÆ' ©liquance de mineurs a augmentÃÆ' © de 79% et la derniÃÆ' ¨re annÃÆ' ©e, 81.362 cases de violence scolaire dans ÃÆ' ©coles ont ÃÆ' ©tÃÆ' © rapportÃÆ' ©. Il y a beaucoup de raisons pour la violence qui a devenu si ordinaire dans les ÃÆ' ©coles franÃÆ' §aises. Toujours il y aura des petit disputes entre ÃÆ' ©lÃÆ' ¨ves mais il y a aussi des plus grandes facteurs. Beaucoup des ÃÆ' ©lÃÆ' ¨ves viennent de quartiers trÃÆ' ¨s pauvres et vivent des situations dramatiques, par exemple leur parents sont au chà ¡Ã‚ »Ã¢â€ž ¢mage, ils habitant dans des taudis ou ils subissent le racisme (la nombre de cases de violence racisme a particuliÃÆ' ¨rement augmentÃÆ' © pendant la derniÃÆ' ¨re decade, de pair avec lÂ’augmentation de nombre dÂ’immigrÃÆ' ©s qui entrer en France). Ils nÂ’entrevoient aucune perpective dÂ’avenir donc ils ne comprennent pas pourquoi ils doivent aller au college et ils commencent a le detester. Bien sÃÆ' »r, ÃÆ' §e nÂ’est pas seulement les ÃÆ' ©lÃÆ' ¨ves de situations maux qui sont violentes au collÃÆ' ¨ge, mais les ÃÆ' ©coles avec les nombres plus hauts de cases de violence sont les ÃÆ' ©coles qui situÃÆ' ©s dans les quarties pauvres. LÃÆ'  , les ÃÆ' ©lÃÆ' ¨ves issus de milieux populaires sÂ’y retrouvent en masse. LÂ’ÃÆ' ©cole reproduit donc les inÃÆ' ©galites sociales et cela provoque leur haine et violence quÂ’ils montrent au collÃÆ' ¨ge. Aussi, ces derniÃÆ' ¨res annÃÆ' ©es, lÂ’augmentation de la violence scolaire est allÃÆ' ©e de pair avec la diminution des moyens accordÃÆ' ©s ÃÆ'   lÂ’enseignement. Il y a seulement une simple corrÃÆ' ©lation. LÂ’augmentation du nombre dÂ’ÃÆ' ©lÃÆ' ¨ves par classe, lÂ’impossibilitÃÆ' © dÂ’encore donner une aide individualisÃÆ' ©e auz ÃÆ' ©lÃÆ' ¨ves en difficultÃÆ' © ne peuvent quÂ’accentuer les ÃÆ' ©checs et ÃÆ' ªtre ainsi des gÃÆ' ©nÃÆ' ©rateurs indirects de violence. Bien quÂ’il y eÃÆ' »t beaucoup de plans pour arrÃÆ' ªter la violence scolaire, aucune plan a eu un grand effet.

Thursday, October 24, 2019

MacBride Report Essay

Many Voices One World: An Analysis of the MacBride Report This report on the MacBride Report aims to give the reasons why the report did have a present-day relevance in the Internet aided-text message enabled- 4G networked World. Although considered controversial, the heated discussions on the World Wide Web, books and live arguments among communication stalwarts, the MacBride Report has emerged to be the first ever world-re port to have UNESCO support in matters of communication and the proble ms related to international relations and internal conflicts. The 1979 report has had 16 committee members from all over the world researching the plethora of considerable means of communications; possible outcomes of analysis and the most probable flak that was yet to be received with the New Orde r they conjured up to. Here is a report on the same: The background of inception: Amadau-Mahtar M? Bow (Director-General of UNESCO) was instructed in the 19th session of the UNESCO General Confe rence in Nairobi to undertake a revie w of all the problems of communication with relation to complexities and magnitude of technological advance and international affairs. He appointed the Irish Nobel Laureate Sean MacBride as the President of International Commission for the Study of Communication Proble ms. Several big brains from countries like USA, France, USSR, India, Nigeria, Egypt, the Netherlands, Canada, and Chile etc. were appointe d in the important research work. The MacBride report and the study per se took over two years to complete a thorough research. Two months went only to draft a final report. Precisely, eight sessions in a span of 24 months are the meetings that took place of the committee of people coming from different he mispheres, regions and latitudes. In 1978, in the 20th session of the General Conference of the UNESCO, the MacBride report was unanimously adopted. English, French, Russian, Chinese, Spanis h and Arabic we re the languages initially approved to have the report published in. â€Å"Defenders of journalistic freedom we re labeled intruders on national sovereignty† is a powe rful thing to say, back in 1977 by Sean MacBride. A balanced, non-partisan, within the purview of Objectivity and clearly generic enough to engulf the situation prevalent in the whole world niformly or otherwise was the biggest concern and challe nge, said MacBride. It is inte resting to note in 2011, the â€Å"modern culture of communication† was pretty much different in 1977. The concepts and the tradition of communication to be â€Å"friendly, collabo rative and cooperative† were widely looked forward to. To include every aspect of communication-the people, the need and the means was the first step that the team of intellectu als carried out in their respective nations. H G Wells said (edited) â€Å"History becomes more and more a race between communication and catastrophe. Full use of communication in all its varied strands is vital to assure that humanity has more than a history†¦that our childre n are ensured a future. † Sure enough, communication in the 21st century is almost paralleled with de mocracy, dreams and yes, catastrophe. Evidently, the MacBride project with 16 stalwarts of communication and intelligence tried to build a world order. A New Order of communication that set up various standards defined the m and punched various data in reference to problems, future value and most importantly, the sustainability of communication for the humanity in the peaceful, war-like or a day in the normal course of the late 1900s even. Indians particularly had a very relevant role to play back in 1970s when the report was being studied upon. Various meetings in different generics, cultural and geographical backgrounds were made possible. This was followe d by various pe rspectives on the communication and its absolute need in nations in the Indian sub-continent. This supported by India? s dive rse language culture and the need felt by every citizen from the Indian Sub-continent to preserve and share his language beyond the realms of culture was what made MacBride really unique back then. Boobli George Varghese was the Indian who represented the nation in the committee which drafted the MacBride report-right from its initiation to the end result. The Analysis for yesterday? s tomorrow: The MacBride Report can be understood with present day cases. Communication and the Society: Communication has a direct relevance to evolution, says the report. No matter how advanced we are, our roots go back to days our ancestors spent hours roaming the jungles to search for food, preserve their race by reproduction and save their skin by being akin to the â€Å"Survival of the fittest†. The report asserts that in every action of the early man, communication-oral, physical, gestural or otherwise played a huge part in the development of the species. The thinking social animal later came to discover the Internet to make Earth seem smaller than before. Hence, from the earliest centuries of existence to the discovery of language to the making of paper, to the schools and colleges promoting education and to the latest reports on Mashable. com about the human interaction and development has a task of crediting the same to Communication as the biggest blessing. Comparing communication from the days of 1970s when the communication aided debates, lectures, motivated and guided people via books, maps, enabled sign language in a documented fashion to the communication today: on mobile phones, click of a button, travel, insurance or health, media or entertainment, MacBride predicted most of it. The computers have a major cre dit in the Future section of the history of Communication in the MacBride report; and ve ry appropriately so. Communication Today: This section of report concentrates much on HOW the communication has/had/will happens. Naturally, body language, signs, gestures were the forefathers of short hand, typed words or even handwriting class children take today. The alphabet in Chinese, Latin or Sanskrit has a large r share of history rather, unexplored. The developing nations have been accredited to knowing more than their national languages because of the economic good that comes their way when they possess „skills of a foreign language?. Beyond economics, communication has been one of the biggest employers in developing countries—the Business Process Outsourcing being the most recent relevant example. The MacBride report explores various ways in which communication takes place-among the demography of people in different Diasporas in an alarmingly evolving world. Telephone has an entire chapter dedicated to it. Not surprisingly, even today, telephone and its youngest cousin, mobile phone telephony has the biggest market—practically everywhere in the world. The reason? Communication! Proble ms and Issues of Common Concern: â€Å"Everyone has a right to freedom of opinion and expression, this right includes freedom to hold opinions without interferences and to seek, receive and impart information and ideas through any me dia regardless of frontiers†. The line aptly conjures up the same emotion Sean MacBride expressed in the statement â€Å"Defenders of journalistic freedom we re labeled ntruders on national sovereignty†. According to the MacBride report, there is never a complete free flow of information for several reasons of safety and security, securing important info rmation behind safe fences or for reasons of individual or national inte rests. Censorship could be widely criticize d but it ensures that not all information is leaked, especially the one which does need a non-Wiki Leaks approach. Very interestingly, the MacBride report does predict that one of the proble ms that the world could be facing in the „near future? s blatant exposes. The moral dilemmas of the world dealing with (ref: Wiki Leaks) would be most resourceful to note and study. In another present day scenarios, a certain American radio-announce r/ reporter expressed, â€Å"nervous ness† in the presence of Muslims. He was immediately suspended from job. Such cases are present day cases of proble ms of communication which could be biased, untruth or clearly blurry. Such communication could lead to bigger tensions internationally, hints the MacBride project. The Institutional and Professional Frame work: This is the most interesting part of the MacBride project hinting at various current scenarios in the communication. Considering Facebook is banned in China and that there are local Chinese versions of the same we bsite are the most relevant examples. Economically, China pumps in social network and blogs by way of Chinese-owned (the real owner being the regime, anyway), censored websites that could ban, block or manipulate information if it is inflammable enough to thrust a wind of „free opinion? among the Chinese. The MacBride report does indicate that having Development Strategies and discussing the m on an international forum could give way to debates. It is indeed controversial when communication and entertainment tools like YouTube are temporarily blocked in a democratic India over censorship issues. The Governme nt? s interference in people? s communication is rightfully controversial, so also is the Vigilance factor (terroris m). The MacBride report hints that the re wouldn? t be a win-win law that could ens ure both freedom and security in 100% of the cases. Professional frame work of communication is the need of the ho ur irrespective of the geographical or historical background of the governance. The facts of the 1970s mentioned/studied up on by the committee somehow add totality to the curre nt scenes in communication management. Hence, the elaboration of the present case-studies. The recomme ndations and the flak received: This part of the report forms the conclusive recommendations given by the committee towards solving the various problems discussed and expected in the near future. However, there have been several criticis ms drawn by the MacBride report. Although supported very we ll by international communities, the United States and the United Kingdom condemned the report on basis of an attack on the freedom of the press. There are reports of US and UK withdrawing from the UNESCO in protest in the years 1984 and 1985 (later re joined). Making communication an important part of development is perhaps the strongest message the MacBride reports sends across the world order. In the curre nt scene, internet has replaced the theoretical â€Å"communication device†. No matter which side of the globe once resides in, connectivity to the internet is considered utterly necessarily in a rapidly informed and fast world. Secondly, efforts to preserve languages must begin right from the grass-root stage. No matter how able the technology, the absence of a medium of communication can disable every communicative tweet, Face book status or a text message. Communication is language. Third, perhaps the most important one in the whole world: education. Mere literacy ensures statistical ego-boost to the GDP counting economists. MacBride report hints at education beyond minimum elementary level. In addition to radio, TV and ne wspaper networks, MacBride report focuses its largest recommendation to the integrity of the media in trying situations of world/national/local ne ws. The communication of the ne w world is ensured true and fair if the reporting media conjures up enough confidence to call s pade a spade. Utilization of communication devices, research and development and practical upgrade of knowledge are the other recommendations of the MacBride report.

Wednesday, October 23, 2019

English Lit – Descriptive Writing

Describe the scene at a train station It is 8 o’clock in the morning at Liverpool train station, the busiest hour throughout the whole day, it’s also known as the rush hour. Trains of all imaginable colours gradually draw to a halt, causing a slightly burned smell from the brakes. As the automatic doors fly open, continuous flows start of people shoving and pushing, rushing to get off into the already crowded station. The noise of the tannoy is hidden beneath the murmur of the crowds of people.Mothers franticly scan for their lost children, while groups of people and tourists rush out eagerly ready to explore the city. Teenagers huddled together by the walls giggle to each other while on their new, shiny blackberry mobiles. People sigh due to the now prolonged waiting for the toilets as the queues start to grow. Unfortunately the smell of urine diffuses into the air from the toilets. Business people in their smart suits and briefcases march through the station, obliviou s to anything that is going on.Impatient men and women stomp their fingers on the touch screen ticket machine, hoping that by doing so it will work faster. They then become even more frustrated when they then discover the escalator is not working and have to drag their entire luggage down it. Before the exits, there are many food and drink shops, such as McDonalds, Pizza Hut and Starbucks. There’s a fighting battle for smells as people walk through the centre. Greasy fries and burger smells emmiting from MsDonalds, followed by coffee and cakes from Starbucks, then Pizza and burned wedges from Pizza Hut.