• Title/Summary/Keyword: Location based system

Search Result 3,528, Processing Time 0.032 seconds

A Study on Landscape of Cheongpunggye (청풍계(淸風溪) 경관에 관한 연구)

  • Lee, Jin-Hyang;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.29 no.1
    • /
    • pp.50-58
    • /
    • 2011
  • Cheongpunggye is located in a valley where Baekaksan, the main mountain of Seoul and Inwang Mountain corresponding to right-white tiger(石白虎) divination based on topography are crossed. The owner of Cheongpunggye is Seonwon Kim Sangyong and many people had visited there without pause because of beautiful landscape since the early times of Chosun. Seonwon Kim Sangyong had ever studied together with Yulgok Yi I and Woogye Seong Hon. He was one of the Western faction(Seo-in) which was the leading power of Injo Coup and died for his chastity during Second Manchu Invasion of Chosun. He is known as a model of fidelity which is a symbol for scholar's spirit in Chosun together with his younger brother Cheongeum Kim Sangheon. Jangdong region, the clan village of New Andong family was the birthplace of Yulgok School which was the fundamental of scholar spirit of Chosun. And Jangdong would be the source of Jin-Gyeong(Real Scenery) Culture which was bloomed by Baekak club composed of Gyeomjae Jeong Seon, Sacheon Lee Byeongyeon, and Gwanajae Cho Yeongseok. The contents of this study are as follows. First, this study explored the placeness of Seochon region through the historical background like the relation between Jangdong, the clan village of Andong Kim family and Andong Kim family, and achievements of Seonwon Kim Sangyong and circumstances of that times. Second, this study tried to know original landscape of Cheongpunggye by investigating location, topography, water system etc. based on analysis of literature, old map, and paintings describing Cheongpunggye. The study was progressed in this way. To infer the original landscape, about 50 landscape elements of Cheongpunggye shown in Punggyejibseunggi(楓溪集勝記), Cheongpunggye Cheop, Cheongpunggye(淸風溪), the work of Gyeomjae Jeong Sean were searched, and then the location and form of the elements was analyzed. Furthermore, by analyzing the meanings of the names for the landscape elements, the thoughts(Naturalism, Taoism, Confucianism, Buddhism) supporting the structure of Cheongpunggye could be inferred. It is thought that these findings can contribute to exploration of placeness of Cheongpunggye. The study on original landscape of Cheongpunggye can be used as basic data when these works are executed-revival of Cheongpunggye, restoration of small streams in upper part of Cheonggyecheon, renewal of Seochon region.

Design Strategies for Ecological Restoration Using System Dynamics - Focused on 2015 Miryang-si Jayeon Madang Development Project - (시스템 다이내믹스를 활용한 생태복원 설계 전략 - 2015 밀양시 자연마당 조성사업을 사례로 -)

  • Ham, Eun-Kyung;Song, Ki-Hwan;Chon, Jinhyung;Cho, Dong-Gil
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.6
    • /
    • pp.86-97
    • /
    • 2015
  • "The Jayeon Madang Development Project("JMDP")" is a project being promoted by the Ministry of Environment to create a cultural space and a natural rest area within the city. Abuksan, located at Abuksan in Gyeongsangnam-do Miryang-si Naeil-dong, has suffered a substantial amount of environmental degradation over time, so the need for ecological restoration made it a natural choice for the location of the JMDP's site. The purpose of this study is to examine ecological restoration design strategies used in Abuksan as part of the JMDP using system dynamics. The national archery center, hole, and arable land sites are key restoration areas in Abuksan that have faced with ecological problems. In this study, we identified the status of each site, determined key strategies being implemented, and designed based on the strategies implemented up to this point for solving problems associated with each sites through the use of causal loop diagrams. The results of the causal loop diagram analysis are as follows. The national archery center site was designed around strategies including planting green manure crops and introducing hugelkultur to reduce soil acidification and green network degradation. The hole site was designed as a constructed wetland based on the emergence of hygropreference vegetation, hydrated by rainwater collected at the bottom of hole, ecological and cultural benefits of such an environment. The arable land site restoration design was built around planting native vegetation on one part of the arable land site after soil quality improved and around restoration of grassland and a dry wetland on the other part of the site to reduce soil acidification, erosion, and green network degradation. This study is a significant attempt to apply principles of system dynamics to ecological restoration by providing the design strategies using comprehension of some problems in the ecosystem feedback loops, which has not been used before in general design processes for ecological restoration.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Machine Learning Based MMS Point Cloud Semantic Segmentation (머신러닝 기반 MMS Point Cloud 의미론적 분할)

  • Bae, Jaegu;Seo, Dongju;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.939-951
    • /
    • 2022
  • The most important factor in designing autonomous driving systems is to recognize the exact location of the vehicle within the surrounding environment. To date, various sensors and navigation systems have been used for autonomous driving systems; however, all have limitations. Therefore, the need for high-definition (HD) maps that provide high-precision infrastructure information for safe and convenient autonomous driving is increasing. HD maps are drawn using three-dimensional point cloud data acquired through a mobile mapping system (MMS). However, this process requires manual work due to the large numbers of points and drawing layers, increasing the cost and effort associated with HD mapping. The objective of this study was to improve the efficiency of HD mapping by segmenting semantic information in an MMS point cloud into six classes: roads, curbs, sidewalks, medians, lanes, and other elements. Segmentation was performed using various machine learning techniques including random forest (RF), support vector machine (SVM), k-nearest neighbor (KNN), and gradient-boosting machine (GBM), and 11 variables including geometry, color, intensity, and other road design features. MMS point cloud data for a 130-m section of a five-lane road near Minam Station in Busan, were used to evaluate the segmentation models; the average F1 scores of the models were 95.43% for RF, 92.1% for SVM, 91.05% for GBM, and 82.63% for KNN. The RF model showed the best segmentation performance, with F1 scores of 99.3%, 95.5%, 94.5%, 93.5%, and 90.1% for roads, sidewalks, curbs, medians, and lanes, respectively. The variable importance results of the RF model showed high mean decrease accuracy and mean decrease gini for XY dist. and Z dist. variables related to road design, respectively. Thus, variables related to road design contributed significantly to the segmentation of semantic information. The results of this study demonstrate the applicability of segmentation of MMS point cloud data based on machine learning, and will help to reduce the cost and effort associated with HD mapping.

Studies on the Micelle Formation of Nonionic Surfactant(1) -1NMR Self-Diffusion and Proton Relaxation of Polyoxyethylene Alkyl Ether- (계면활성제 수용액의 미셀형성(제1보) - Polyoxyethylene Alkyl Ether의 자기확산과 프로톤 이완 -)

  • Choi, Seung-Ok;Jeong, Hwan-Kyeong;Lee, Jin-Hee;Nam, Ki-Dae
    • Applied Chemistry for Engineering
    • /
    • v.9 no.6
    • /
    • pp.822-828
    • /
    • 1998
  • Binary system of water and polyoxyethylene dodecyl ether, $C_{12}H_{25}(OCH_2CH_2)nOH$, have been studied by $^1H$ NMR techniques. For n=5($C_{12}EO_5$) and n=8($C_{12}EO_8$), the self-diffusion coefficients of nonionic surfactants in the isotropic phase($L_1$) have been measured by using pulsed field gradient technique for a range of temperature and concentrations. In addition the line widths of the different proton signals have been monitored, and samples of some liquid crystalline characteristic were also studied. Dramatic Broadening of the methylene signals of the alkyl($C_{12}H_{25}$) chain is observed as the hexagonal liquid crystalline phase is approached in the $C_{12}EO_5-$water system, while only small broadening is observed in the $C_{12}EO_8-$water system. It was shown that there was a growth of $C_{12}EO_5$ micelles to rods with increasing concentrations, while the $C_{12}EO_8-$ micelles at low temperature remain small in the concentration range. The self-diffusion coefficients of the surfactants decrease rapidly with increasing concentration until a minimum is reached after which there is slow increase. The location of the minimum point occurs at lower concentrations the temperature is close to the cloud point, where the system separate into two isotropic phase. In the line width studies, broadening is found at a certain temperature interval when the concentration is increased in the $C_{12}EO_5$ system. The results indicate that the surfactant aggregates grow in size at the cloud point is approached. The aggregates seem to be flexible and probably not to be of a definite shape close to the cloud point. In the $C_{12}EO_8$ system, the micelles are much less affected by an increase in temperature and micellar growth can't be unambiguously established. The methylene signals of the ethylene oxide moieties consistantly show narrower $^1H$ signals, showing that in the aggregates they are less ordered than the chain methylenes. The various changes in aggregate size and shape are correlated with the stability ranges of the isotropic and liquid crystalline phases according to phase diagrams from the literature. Both aggregate size and phase structure are in qualitative agreement with concentration based on the effective shape of the molecules at different temperature and concentration.

  • PDF

Recommender Systems using Structural Hole and Collaborative Filtering (구조적 공백과 협업필터링을 이용한 추천시스템)

  • Kim, Mingun;Kim, Kyoung-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.107-120
    • /
    • 2014
  • This study proposes a novel recommender system using the structural hole analysis to reflect qualitative and emotional information in recommendation process. Although collaborative filtering (CF) is known as the most popular recommendation algorithm, it has some limitations including scalability and sparsity problems. The scalability problem arises when the volume of users and items become quite large. It means that CF cannot scale up due to large computation time for finding neighbors from the user-item matrix as the number of users and items increases in real-world e-commerce sites. Sparsity is a common problem of most recommender systems due to the fact that users generally evaluate only a small portion of the whole items. In addition, the cold-start problem is the special case of the sparsity problem when users or items newly added to the system with no ratings at all. When the user's preference evaluation data is sparse, two users or items are unlikely to have common ratings, and finally, CF will predict ratings using a very limited number of similar users. Moreover, it may produces biased recommendations because similarity weights may be estimated using only a small portion of rating data. In this study, we suggest a novel limitation of the conventional CF. The limitation is that CF does not consider qualitative and emotional information about users in the recommendation process because it only utilizes user's preference scores of the user-item matrix. To address this novel limitation, this study proposes cluster-indexing CF model with the structural hole analysis for recommendations. In general, the structural hole means a location which connects two separate actors without any redundant connections in the network. The actor who occupies the structural hole can easily access to non-redundant, various and fresh information. Therefore, the actor who occupies the structural hole may be a important person in the focal network and he or she may be the representative person in the focal subgroup in the network. Thus, his or her characteristics may represent the general characteristics of the users in the focal subgroup. In this sense, we can distinguish friends and strangers of the focal user utilizing the structural hole analysis. This study uses the structural hole analysis to select structural holes in subgroups as an initial seeds for a cluster analysis. First, we gather data about users' preference ratings for items and their social network information. For gathering research data, we develop a data collection system. Then, we perform structural hole analysis and find structural holes of social network. Next, we use these structural holes as cluster centroids for the clustering algorithm. Finally, this study makes recommendations using CF within user's cluster, and compare the recommendation performances of comparative models. For implementing experiments of the proposed model, we composite the experimental results from two experiments. The first experiment is the structural hole analysis. For the first one, this study employs a software package for the analysis of social network data - UCINET version 6. The second one is for performing modified clustering, and CF using the result of the cluster analysis. We develop an experimental system using VBA (Visual Basic for Application) of Microsoft Excel 2007 for the second one. This study designs to analyzing clustering based on a novel similarity measure - Pearson correlation between user preference rating vectors for the modified clustering experiment. In addition, this study uses 'all-but-one' approach for the CF experiment. In order to validate the effectiveness of our proposed model, we apply three comparative types of CF models to the same dataset. The experimental results show that the proposed model outperforms the other comparative models. In especial, the proposed model significantly performs better than two comparative modes with the cluster analysis from the statistical significance test. However, the difference between the proposed model and the naive model does not have statistical significance.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

A Study of the Application of 'Digital Heritage ODA' - Focusing on the Myanmar cultural heritage management system - (디지털 문화유산 ODA 적용에 관한 시론적 연구 -미얀마 문화유산 관리시스템을 중심으로-)

  • Jeong, Seongmi
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.198-215
    • /
    • 2020
  • Official development assistance refers to assistance provided by governments and other public institutions in donor countries, aimed at promoting economic development and social welfare in developing countries. The purpose of this research is to examine the construction process of the "Myanmar Cultural Heritage Management System" that is underway as part of the ODA project to strengthen cultural and artistic capabilities and analyze the achievements and challenges of the Digital Cultural Heritage ODA. The digital cultural heritage management system is intended to achieve the permanent preservation and sustainable utilization of tangible and intangible cultural heritage materials. Cultural heritage can be stored in digital archives, newly approached using computer analysis technology, and information can be used in multiple dimensions. First, the Digital Cultural Heritage ODA was able to permanently preserve cultural heritage content that urgently needed digitalization by overcoming and documenting the "risk" associated with cultural heritage under threat of being extinguished, damaged, degraded, or distorted in Myanmar. Second, information on Myanmar's cultural heritage can be systematically managed and used in many ways through linkages between materials. Third, cultural maps can be implemented that are based on accurate geographical location information as to where cultural heritage is located or inherited. Various items of cultural heritage were collectively and intensively visualized to maximize utility and convenience for academic, policy, and practical purposes. Fourth, we were able to overcome the one-sided limitations of cultural ODA in relations between donor and recipient countries. Fifth, the capacity building program run by officials in charge of the beneficiary country, which could be the most important form of sustainable development in the cultural ODA, was operated together. Sixth, there is an implication that it is an ODA that can be relatively smooth and non-face-to-face in nature, without requiring the movement of manpower between countries during the current global pandemic. However, the following tasks remain to be solved through active discussion and deliberation in the future. First, the content of the data uploaded to the system should be verified. Second, to preserve digital cultural heritage, it must be protected from various threats. For example, it is necessary to train local experts to prepare for errors caused by computer viruses, stored data, or operating systems. Third, due to the nature of the rapidly changing environment of computer technology, measures should also be discussed to address the problems that tend to follow when new versions and programs are developed after the end of the ODA project, or when developers have not continued to manage their programs. Fourth, since the classification system criteria and decisions regarding whether the data will be disclosed or not are set according to Myanmar's political judgment, it is necessary to let the beneficiary country understand the ultimate purpose of the cultural ODA project.

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

A Study on the Location Relationship between Ancient Royal Garden and Royal Capital in North-East Asia (동북아시아 고대 궁원과 왕도의 위치 관계에 대한 연구)

  • Jeon, Yong-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.40 no.4
    • /
    • pp.1-14
    • /
    • 2022
  • The ancient North-East Asian royal garden is divided into three types, located in the north inside the palace, in the north outside the palace, and in the south inside or outside the palace, depending on the location relationship between the royal capital and the royal palace. The first is a typical royal garden that follows the ancient Chinese court system of the Chao-hu-chim(前朝後寢). The second is a royal garden located independently of the royal palace, which extends to Geumwon(禁苑). The third is located in the south of royal palace and is the royal garden specialized in Yurak(遊樂) or Hyangyeon(饗宴). The types of ancient North-East Asian royal gardens are classified according to the relationship between main palace(正宮) and secondary palace(別宮), detached palace(離宮), and Geumwon(禁苑), and each has unique characteristics. The first has been established as the garden of the main palace, including the royal garden at Wanggung-ri site in Iksan(益山 王宮里 遺蹟), Han Chang'an capital(漢 長安城), BeiWei Luoyang capital(北魏 洛陽城), Jiankang capital in Southern Dynasties(南朝 建康城), and Daminggong(大明宮) in Tang Dynasty. Here, the royal garden is divided into Naewon(內苑) inside the royal palace and Geumwon(禁苑), outside the royal palace. On the other hand, the second is the royal garden that the royal palace and Geumwon(禁苑) are united. The third is the royal garden that forms part of the royal palace or is independent of the royal palace, and has been specialized as a secondary palace(別宮) and detached palace(離宮). China created the model of ancient North-East Asian royal gardens, and based on this, Baekje, Silla, and Japan of Korea influenced each other and developed a unique palace by showing their originality. The royal garden at Wanggung-ri site in Iksan(益山 王宮里 遺蹟) was influenced by royal gardens of Wei-Jin and Northern & Southern Dynasties(魏晉南北朝). And royal gardens of the Sabi Capital(泗沘都城) were influenced by royal gardens of Jin(秦), Han(漢), Sui(隋), and Tang(唐), and royal gardens of Silla(新羅) were influenced by the royal gardens of Baekje(百濟) and Silla. However, each of these royal gardens also has its own unique characteristics. From this aspect, it can be seen that the ancient North-East Asian court had different lineages depending on the region. Anhakgung Palace in Pyongyang(平壤 安鶴宮) is more likely to be viewed as the Three Kingdoms period than the Goryeo Dynasty. However, it is difficult to raise it to the 5th and 6th centuries due to the overlapping relationship and relics of the lower part of Anhakgung Palace(安鶴宮), and it is generally presumed to be the middle of the 7th century. The royal garden at Anhakgung Palace is a secondary palace(別宮) or detached palace(離宮) that corresponds to the palace of Jang-an capital(長安城) in Pyongyang and is believed to have influenced Dongwon garden(東院庭園) of Heijokyu(平城宮) and Donggung(東宮) and Wolji(月池) in Gyeongju. From this point of view, Dongwon garden(東院庭園) of Heijokyu(平城宮) seems to be related to the palaces of Goguryeo, Baekje, and Silla. This study has many limitations as it focuses on its characteristics and transitions due to the location of the palace in the large framework of ancient North-East Asian royal capital. If these limitations are resolved little by little, it is expected that the understanding of ancient North-East Asian royal gardens will be much wider.