JiaweiArchive

#Overview

#


#Conceptual #Architecture #Urban #Speculative #Narrative #Writing #Research #Programme #Product #Drawing

Media

About


 Karwai Leung Jiawei LIANG All rights reserved  

Date 2023
2023
2023
2023
2023
2023
2023
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2022
2021
2021
2021
2021
2021
2021
2021
2021
2020
2020
2019
2019
2019
2019
2019
2019
2019
2019
2019
2019
2019
2018
2018
2018
2018
2018
2018
2018
2017
2017
2017
*****
*****
*****
*****
*****
*****
*****






Name  
Yemoja 
ENGIMA 
 
Type Architecture-Speculative
Urban design
Architecture
Architecture
Architecture
Programme
Architecture
Film-Art
Programme
Speculative-Art
Architecture-Conceptual
Architecture
Architecture
Architecture-Conceptual
Architecture
Urban design
Architecture
Programme
Architecture
Film-Art
Architecture-Speculative
Architecture
Architecture-Speculative
Architecture
Architecture-Speculative
Architecture-Speculative
Products
Architecture
Architecture-Speculative-Thesis
Products-Writing
Architecture-Speculative
Writing
Architecture-Speculative-Thesis
Architecture-Speculative

Architecture-Research
Narrative-Writing
Architecture-Speculative
Narrative-Writing
Narrative-Writing
Narrative-Writing
Architecture-Speculative
Writing
Narrative-Speculative
Speculative-Writing-Research
Architecture-Speculative
Research
Speculative-Research
Speculative-Research
Architecture
Speculative-Narrative
Architecture-Speculative



Jul. 2019
Speculative Stories “AnthropoTales” A serialized article
The Regeneration Trilogy
Co: Jack,Mugi Lee


The ubiquitous camera in the city, when the camera becomes a post-human metaphor, when technology begins to intervene, people begin to use technology to expand morality, capture private data from GPS positioning, search nearby locations, big data prediction to desire control, privacy monitoring, cut off/ misplace data flow. In this situation, I was able to recognize facial expressions and body language, judge the sensitivity index, conduct standardized training, correct behaviors, and read the security degree of identity information according to rules. Capturing criminal behavior, cutting off neural flow and adopting interference and discipline; Realtime access to the information of love and desire, in the room, public toilets and fitting rooms to control the layout, embrace the kiss standardization, separation of the main body to achieve the goal; Street, ATM, store monitoring to capture facial expressions for data entry. Put identifying emoticons into database administration, everyone plays a role in this top-down system.