From home to the unhome: An architectural model of a phenomenological inquiry
Abstract Amidst and against the many challenges and disturbances facing the meaning of home, the “unhome” emerges from the phenomenological dialectic between Heidegger’s existentialism and Levinas’s ethics, addressing the challenges and disturbances to the meaning of home. Heidegger argues that home is located topologically, within the bounds of a homely sphere, governed by an apophantic and exclusive binary: home versus its opposite—the world or not-home. Conversely, Levinas offers a less assertive and more dynamic perspective, critiquing Heidegger’s views as uncritical and excessively topological. Levinas defies this binary opposition, framing home as an ethical question rather than a purely spatial construct. In this context, the unhome arises as a Levinasian ethical inquiry into what opposes home. This paper explores the architectural connotation of this phenomenological dialectic and extrapolates from Levinas’s broader phenomenology of the Other to propose an architectural conceptual model of the unhome. This model critiques and complements Heideggerian perspectives and introduces a novel approach, framing the unhome as a hybrid plane of existence where architectural experience becomes chiral. Furthermore, the paper elucidates key architectural concepts—scale, place, materiality, and porosity—through which the unhome can be architecturally experienced. This exploration positions the unhome as profoundly architectural, communicating the dilemma of choosing freedom over security through tectonic elements. It redefines the meaning of home, shifting it from a primarily existential construct to a profoundly ethical one.
577
- 10.1007/978-94-009-9342-6
- Jan 1, 1991
185
- 10.1515/9780773569614
- Oct 17, 2001
6
- 10.3390/rel10020067
- Jan 22, 2019
- Religions
57
- 10.1177/072551369504100102
- May 1, 1995
- Thesis Eleven
374
- 10.1007/978-94-009-4364-3
- Jan 1, 1987
43
- 10.1177/13675494211037683
- Aug 18, 2021
- European Journal of Cultural Studies
344
- 10.7551/mitpress/3467.001.0001
- Dec 6, 2006
880
- 10.4324/9780203820551
- Oct 12, 2012
1109
- 10.4324/9780203401354
- Sep 27, 2006
- Research Article
- 10.1525/jsah.2021.80.3.367
- Sep 1, 2021
- Journal of the Society of Architectural Historians
Review: <i>The Architectural Model: Histories of the Miniature and the Prototype, the Exemplar and the Muse</i>
- Research Article
7
- 10.3390/logistics6020037
- Jun 10, 2022
- Logistics
Background: Logistics problems involve a large number of complexities, which makes the development of models challenging. While computer simulation models are developed for addressing complexities, it is essential to ensure that the necessary operational behaviours are captured, and that the architecture of the model is suitable to represent them. The early stage of simulation modelling, known as conceptual modelling (CM), is thus dependent on successfully extracting tacit operational knowledge and avoiding misunderstanding between the client (customer of the model) and simulation analyst. Objective: This paper developed a methodology for managing the knowledge-acquisition process needed to create a sufficient simulation model at the early or the CM stage to ensure the correctness of operation representation. Methods: A minimum viable model (MVM) methodology was proposed with five principles relevant to CM: iterative development, embedded communication, soliciting tacit knowledge, interactive face validity, and a sufficient model. The method was validated by a case study of freight operations, and the results were encouraging. Conclusions: The MVM method improved the architecture of the simulation model through eliciting tacit knowledge and clearing up communication misunderstandings. It also helped shape the architecture of the model towards the features most appreciated by the client, and features not needed in the model. Originality: The novel contribution of this work is the presentation of a method for eliciting tacit information from industrial clients, and building a minimally sufficient simulation model at the early modelling stage. The framework is demonstrated for logistics operations, though the principles may benefit simulation practitioners more generally.
- Research Article
- 10.14774/jkiid.2013.22.1.105
- Feb 28, 2013
- Korean Institute of Interior Design Journal
This study investigated the application and the change of various architectural models by analyzing expression viewpoint media, which were applied to the visual information of digitalized 3D contemporary architectural models. The purpose of this study was to specify how modern architects have changed 3D architectural models to conceptual, logical, and formational visual information in the process of design. This study discovered a framework of analyses by theoretically investigating a relationship between expression media and expression change in the process of visualizing architectural models. Using the framework of analyses, this study analyzed how the expression viewpoints of architectural model information have been changed and applied. The transformation media of the visual information of digitalized 3D architectural models can be classified into conceptual, analytical, and formational information: 1) Contemporary architects used author-centered subjective viewpoints to express architectural concepts, which were generated in the process of their design. They selected a perspective viewpoint and a bird's eye view in order to present their architectural concepts and to depict them with one architectural model by expanding the visual scope of conceptual information. 2) Contemporary architects adopted observer-centered objective bird's eye view expression media to effectively present their architectural information to building owners and viewers. They used transformal media, which integrate architectural information into 3D and change it to different scales, in order to express their architecture logically. 3) Contemporary architects delivered model information about the generation and change of forms by expressing the image of a project from an author-centered viewpoint, instead of objectively defining formational information. They explained the generation principle of architectural forms via transformal media which develop and rotate an architectural model.
- Conference Article
3
- 10.1109/wsc.2015.7408464
- Dec 1, 2015
Combat system effectiveness simulation (CESS) is a special type of complex system simulation. Three non-functional requirements (NFRs), i.e. model composability, domain-specific modeling, and model evolvability are gaining higher priority from CESS users when evaluating different modeling methodologies for CESS. Traditional CESS modeling methodologies are either domain-neutral (lack of domain characteristics consideration and limited support for model composability) or domain-oriented (lack of openness and evolvability) and fall short of the three NFRs. Inspired by the concept of architecture in systems engineering and software engineering fields, we extend it into a concept of model architecture for complex simulation systems, and propose a model-architecture oriented modeling methodology in which model architecture plays a central role in achieving the three NFRs. Various model-driven engineering (MDE) approaches and technologies, including SMP, UML, DSM, and so forth, are applied where possible in representing the CESS model architecture and its components' behaviors from physical and cognitive domain aspects.
- Conference Article
2
- 10.5555/2888619.2889035
- Dec 6, 2015
Combat system effectiveness simulation (CESS) is a special type of complex system simulation. Three non-functional requirements (NFRs), i.e. model composability, domain-specific modeling, and model evolvability are gaining higher priority from CESS users when evaluating different modeling methodologies for CESS. Traditional CESS modeling methodologies are either domain-neutral (lack of domain characteristics consideration and limited support for model composability) or domain-oriented (lack of openness and evolvability) and fall short of the three NFRs. Inspired by the concept of architecture in systems engineering and software engineering fields, we extend it into a concept of model architecture for complex simulation systems, and propose a model-architecture oriented modeling methodology in which model architecture plays a central role in achieving the three NFRs. Various model-driven engineering (MDE) approaches and technologies, including SMP, UML, DSM, and so forth, are applied where possible in representing the CESS model architecture and its components' behaviors from physical and cognitive domain aspects.
- Book Chapter
- 10.4018/978-1-4666-2651-5.ch014
- Jan 1, 2013
Files are a typical abstract data type for data objects and software modeling, which provides a standard encapsulation and access interface for manipulating large-volume information and persistent data. File management systems are an indispensable component of operating systems and real-time systems for file manipulations. This paper develops a comprehensive design pattern of files and a File Management System (FMS). A rigorous denotational mathematics, Real-Time Process Algebra (RTPA), is adopted, which allows both architectural and behavioral models of files and FMS to be rigorously designed and implemented in a top-down approach. The conceptual model, architectural model, and the static/dynamic behavioral models of files and FMS are systematically presented. This work has been applied in the design and modeling of a real-time operating system (RTOS+).
- Research Article
9
- 10.4018/jssci.2011010107
- Jan 1, 2011
- International Journal of Software Science and Computational Intelligence
Files are a typical abstract data type for data objects and software modeling, which provides a standard encapsulation and access interface for manipulating large-volume information and persistent data. File management systems are an indispensable component of operating systems and real-time systems for file manipulations. This paper develops a comprehensive design pattern of files and a File Management System (FMS). A rigorous denotational mathematics, Real-Time Process Algebra (RTPA), is adopted, which allows both architectural and behavioral models of files and FMS to be rigorously designed and implemented in a top-down approach. The conceptual model, architectural model, and the static/dynamic behavioral models of files and FMS are systematically presented. This work has been applied in the design and modeling of a real-time operating system (RTOS+).
- Conference Article
1
- 10.1109/usbereit48449.2020.9117801
- May 1, 2020
One of the directions of development of information technologies is the development and application of information medical systems, and their integration into a single information space. To solve these problems, it is necessary to develop decision support systems that contribute to improving the efficiency of medical and diagnostic business processes, which should find their place in existing integrated systems. The paper describes architectures review of the existing clinical decision support systems and conceptual model of clinical decision support system. This research proposes the development of architectural model for an intelligent system for supporting clinical decision made on the example of diagnosing blood diseases, that are based on the integration of three architectural templates: object-oriented, three-tier and componential architectural model. The proposed technology for decision support in the diagnosis of blood diseases is described in the form of a conceptual model; knowledge base; user interface; logical inference procedure, mechanism for explaining the decision; module knowledge acquisition. Designed fuzzy production knowledge base based on the general structure of the set of fuzzy production rules, algorithm of search and exclusion of contradictions in the knowledge base.
- Research Article
- 10.1525/nr.2022.26.2.116
- Nov 1, 2022
- Nova Religio
Religion and the Technological Future is an introductory textbook that relates newer scientific and technology developments for transforming human life with their religious and ethical implications. The authors write as religious and ethics educators, not as scientists, but appear fluent with the technologies they discuss. Calvin Mercer is founding chair of the American Academy of Religion’s Human Enhancement and Transhumanism Unit, while Tracy Trothen co-chairs the AAR’s Artificial Intelligence Seminar. Mercer and Trothen introduce various technologies as potentially civilization-changing means for transcending current human capacities (transhumanism), even possibly leading to a posthuman culture.The book is divided into 3 major sections. The first section presents the vocabulary of transhumanism, posthuman, biohacking, and questions of ethics. The second section contains five categories of enhancements—from super longevity and physical augmentations to cognitive, moral, affective, and spiritual improvements. The third section includes special topics like cryonics, mind-uploading, and raises the possibility of digital immortality and superintelligence. The chapters include references and there are questions for specific chapters, a glossary of key words and concepts, and a useful index.The authors provide helpful definitions. Biohacking, for example, means the radical enhancement of human beings with therapies and technologies now available or anticipated in the future. Artificial Intelligence refers to the application of computer technology to replicate or advance intelligent human activities. Narrow AI performs specific functions, like playing chess or autonomous car driving, whereas general, or strong AI, seeks to replicate human intelligence more broadly, such as creating humanoids. Transhumanism is used to characterize an intellectual and cultural movement that advocates the use of a variety of emerging technologies for transforming humans and societies. The convergence of such technologies may make it possible to take control of human evolution.Religion and the Technological Future interrelates the topics of religion and ethics with these technologies and asks ethical questions about their use. The authors also raise the question of whether technology may supplant traditional and contemporary religion. They begin and end their book with a short survey to help readers assess their own level of acceptance or rejection of the application of these technologies on humans. The scale runs from “totally skeptical and opposed” to “open to the possibilities…” to “an eager transhumanist,” with a category of “unsure” at the end (8).The authors point out that humans already replace certain body parts and use restorative techniques for others. Current newer technologies include further pharmaceutical boosts, the application of stem cell research, cloning, genetic engineering such as CRISPR-associated technologies, the use of robotics, artificial intelligence, neural enhancement, nanotechnology, and 3-D printing. CRISPR-Cas9 allows for precise and inexpensive editing of DNA, and its implications include not just disease control but human-controlled selection and self-enhancement. Neural implants will not only remedy disability, but also provide augmented human abilities with potential far superseding current human capabilities.Transhumanism encourages the use of such technology not just to heal disease and allay suffering but to generate a better, more capable and durable human being. Technology used this way may be viewed as a type of religious or philosophical self-transcendence, the purpose of which is to control human evolution, and to enhance or transcend current human experience. This raises religious and ethical questions, but the hope is that it would lead to the benefit of humanity and the world. Transhumanism in this sense would remain relatedly human.The authors raise the possibility, however, that using such technology may lead to digital immortality with personal duplicate imprints of our memories or persons, and even a posthuman species where technology replaces the need for religion. They don’t argue that this is inevitable, but nevertheless a real possibility. Some of this sounds like science fiction. But it also raises many questions, including whether these technologies can and will be used wisely, and whether humanity will need even more religion and better ethics to survive its own technology.
- Book Chapter
- 10.1016/b978-0-08-103009-7.00005-3
- Nov 22, 2019
- 5G Core Networks
Chapter 5 - Key concepts
- Research Article
- 10.1111/rec3.12028
- Jan 1, 2013
- Religion Compass
This article provides an introduction to “deconstruction and religion” by focusing on the late writings of Jacques Derrida, in which religious and ethical themes become particularly prominent. The author explains why Derrida’s writings do not constitute a “theory” or “method” for the study of religion, but rather an attempt to show how “religion” itself is impossible. Derrida’s treatment of “religion” is explicated through an analysis of the key concepts of “faith” and “holiness,” and interpreted as fundamentally an engagement with the question of ethics. The article culminates in an examination of Derrida’s notion of “messianicity,” a key concept in his late texts. Throughout the course of this analysis, attention is paid not only to Derrida’s reading of a number of important philosophical figures (Kant, Levinas, and Austin), but also to the way in which his writings have been appropriated in the attempt to think God and religion after or beyond the Kantian critique of metaphysics and the Heideggerian destruction of onto‐theology.
- Research Article
- 10.31891/2307-5732-2024-341-5-56
- Oct 31, 2024
- Herald of Khmelnytskyi National University. Technical sciences
The article presents the results of the research into the architectural model for an automated gas metering system based on the concept of virtual points of gas metering, which is an abstraction layer above physical gas metering devices providing possibilities for great automation and optimization as well as flexibility and precision in the domain of centralized gas metering. The primary objective of the research is to design an optimal architectural model that satisfies the requirements and constraints of the system's conceptual model. This study delves into the process and describes the result of architectural model creation by covering the following aspects: defining system components and their responsibilities, assigning behaviors to the components, defining cross-component and external interactions, designing data models as well as providing API and communication solutions. Additionally, the research also focuses on the basic external interactions and infrastructure considerations necessary for the operation of the automated system. A significant portion of the research is dedicated to addressing specific challenges inherent in gas metering automation. These challenges include the prediction of gas calorific values, determining the temperature at the points of gas consumption, and the calculation of monthly gas usage in kilowatt-hours. By addressing these issues, the research ensures that the architectural model is completed and includes solutions for the domain problems at the scale of the architecture. The solutions proposed for these challenges are integrated into the overall architectural model, providing a robust framework for future research into the topic as well as a basement for the implementation of an accurate and efficient centralized gas metering automation system. Some of the solutions developed during the research lay on the line between software architecture and user experience design. Also, the research scope includes the infrastructural model required for the automated system to function optimally. This includes encompasses both infrastructure-centric and application-centric models, presenting different viewpoints on the reference infrastructure for the optimal system operation.
- Research Article
3
- 10.33115/udg_bib/cp.v4i08.22065
- Sep 1, 2015
- Communication Papers
The following text analyzes corporate identity from a dynamic perspective. Its aim is to know if brands turn corporate values into behaviours that meet stakeholders’ expectations. Firstly, the essay explains how corporate identity is a key concept in the management of intangible assets because it can generate brand value and reputation. In order to explain this point, authors underline best practices in managing corporate vision and values. Secondly, the paper explores content and commu- nication platforms used by corporate and commercial brands. Lastly, the text sets out how brands should develop a dialogue and co-creation between company and stakeholders, genera- ting consumer participation. Listening to stakeholders and offering them a dialogue plat- form allows companies to obtain insights about its behaviours and expectations. Therefore, brands can offer relevant and accurate products, experiences and content to its stakeholders. Managing brand identity from a co-creation point of view creates differentiation and competitiveness. Nevertheless, it presents a set of challenges, especially when companies have to choose between the expectations of the stakeholders and the corporate identity.
- Research Article
- 10.21432/cjlt28256
- Nov 29, 2022
- Canadian Journal of Learning and Technology
The network is a key concept which has been highly valued in connectivism. Research about the static characteristics of social networks in connectivist learning has been carried out in recent years, however, little knowledge exists regarding the principles of network evolution from a dynamic perspective. This article chose the first connectivist massive open and online course (cMOOC) in China, “Internet plus Education: Dialogue between Theory and Practice” as the research object, using the dynamic analysis method of social networks which is based on stochastic actor-oriented models, to reveal the influence of the individual attributes and network structural attributes on the dynamic evolution of social networks in a cMOOC. We found that: 1) the learners with the same sex, the same social identity, and the same type of behaviour tendency found it much easier to interact with each other; 2) there is a heterogeneous phenomenon with course identity, meaning that compared to communicating with other learners, learners are more inclined to reply to a facilitator; and 3) the reciprocity and transitivity have significant effects on social network evolution. This study is valuable for understanding the network evolution and has implications for the improvement of cMOOC design, in turn improving the online learning experience for cMOOC learners.
- Book Chapter
- 10.4324/9780415249126-l175-1
- Apr 30, 2022
Health research contributes to the development of life-saving vaccines, innovative medical devices, new drugs, improved options for reproductive health, and to the better understanding and treatment of a wide range of diseases and disorders. Yet, pursuing these advancements often requires the participation of human subjects in studies, which involve interventions and procedures (e.g. randomization, blinding, fixed treatment schedules) that may not be in their direct interests and may involve risks to their wellbeing. This raises an ethical question for health research: when and why is it ethically justifiable to expose individuals to risks in the interests of advancing science and/or for the benefit of future populations? Research ethics in the context of health research with human subjects focuses on identifying and examining this question, and on reconciling our moral obligations to individuals with the goals and requirements of the scientific enterprise. The solution to this ethical tension and the ethical justification for research participation is perhaps best understood as depending on a broad range of considerations, including risks, benefits, informed consent, privacy, study design and location, and fair subject selection. Philosophical work in research ethics takes a number of different approaches. These include the application of moral theories to ethical questions (e.g. developing utilitarian arguments to defend germline gene modification in humans), efforts to derive ethical guidance from the examination of case studies (e.g. using a case study to analyse the requirement for informed consent), and approaches that draw both from theory and practice to answer ethical questions (e.g. duty of confidentiality in genetic counselling). One combined approach appeals to broad ethical principles to inform the analysis of human subjects research. We draw on this approach and examine four prominent ethical principles frequently invoked in philosophical debates in research ethics – social value, respect for persons, beneficence, and justice. The principle of social value requires that human subject research should have both scientific and social merit. Otherwise, exposing individual subjects to the risks and harms of research that is not able to produce useful knowledge nor provide direct benefit to research subjects will be unjustifiable. Furthermore, the requirement for social value promotes the responsible use of limited resources and helps reduce waste across the research enterprise. The requirement for respect for persons necessitates that research subjects should not be treated merely as means to an end (e.g. knowledge production) but as autonomous agents with their own preferences and values. One way of ensuring that research subjects are treated with respect is to obtain their informed consent before enrolling them in a study. In order for consent to be considered valid, certain conditions need to apply: first the consenting person should have access to appropriate information that will allow her to make an informed choice; second, the decision to participate in research should be voluntary, and third, the person should have capacity to consent. The principle of beneficence in the context of human subject research includes a negative obligation to avoid harm and a positive obligation to ensure that the risks of research stand in a reasonable relation to the knowledge to be gained. Finally, the principle of justice in human subject research focuses on the fair distribution of research harms and benefits. Initially, the principle of justice served to protect certain populations from the risks and harms of research, including children, pregnant women and marginalized populations. In recent decades, justice has also been conceptualized as an inclusionary principle, arguing for the inclusion of these populations previously excluded from research. The justification for this shift appeals to the right of these populations to the fair access of research benefits, including proven therapeutics.
- Research Article
- 10.2478/alfa-2025-0015
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0013
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0014
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0017
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0012
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0016
- Sep 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0007
- Jun 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0009
- Jun 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0011
- Jun 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Research Article
- 10.2478/alfa-2025-0008
- Jun 1, 2025
- Architecture Papers of the Faculty of Architecture and Design STU
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.