<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>database &#8211; KIKLO</title>
	<atom:link href="https://kiklo.eu/tag/database/feed/" rel="self" type="application/rss+xml" />
	<link>https://kiklo.eu</link>
	<description></description>
	<lastBuildDate>Fri, 12 Dec 2025 09:18:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.1</generator>

<image>
	<url>https://kiklo.eu/wp-content/uploads/2023/10/cropped-LOGO_KIKLO-1-32x32.png</url>
	<title>database &#8211; KIKLO</title>
	<link>https://kiklo.eu</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">228988309</site>	<item>
		<title>Unique Object Identification</title>
		<link>https://kiklo.eu/unique-object-identification/</link>
		
		<dc:creator><![CDATA[kiklo_admin]]></dc:creator>
		<pubDate>Thu, 16 May 2024 09:47:18 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Collaborative Platform]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[ENIGMA]]></category>
		<category><![CDATA[Geolocation]]></category>
		<category><![CDATA[Machnine Learning]]></category>
		<category><![CDATA[QR]]></category>
		<category><![CDATA[UOI]]></category>
		<guid isPermaLink="false">https://kiklo.eu/?p=8600</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element" >
		<div class="wpb_wrapper">
			<p>Identifying and cataloguing <strong>Unique Objects</strong> in Cultural Heritage involves creating a system that ensures accurate documentation, preservation, and accessibility.</p>
<p>The <strong>Unique Authenticity Identifier (UAI©)</strong> is an identification system that serves as the key for accessing interoperable databases with dynamic information on objects. The <strong>UAI</strong> collects metadata, assigns <strong>UAI</strong> licenses, and offers other services such as reference linking or metadata lookup. Here are some approaches and technologies commonly used for <strong>Unique Authenticity Identifier</strong> in Cultural Heritage:</p>
<blockquote class="gem-text-output">
<p>The <strong>Unique Authenticity Identifier </strong>is an identification system that serves as the key for accessing interoperable databases with dynamic information on objects.</p>
</blockquote>
<p><strong> 1. Barcoding and Radio Frequency Identification (RFID) Technology</strong></p>
<p><strong>Barcoding</strong> aims to assign each object a unique barcode and create a database linking barcodes to detailed information about each item. A great deal of image-based techniques applied nowadays can be exploited to directly embed metadata on the resulting data, and different solutions exist to prevent data and metadata permanent linkage issues, such as barcode integration. Barcodes propose today interesting features (robustness, capacity, ease of use) and a high technology readiness level [1].</p>
<p>Next to barcoding, <strong>Radio Frequency Identification (RFID)</strong> is popular in inventory management systems; it electronically transmits information to track the movement of materials. This technology allows for non-contact identification and can be useful in tracking objects within a controlled environment. The most common application of this technology has been in Art Museums and Galleries, where the RFID transponder can be easily affixed to the backing board, stretcher, or frame of an artwork without damage. Not only is this technology helpful for conducting inventories and tracking object movement, but it is also an effective security tool that can be used to track artwork, notify security of the movement or disturbance of an object, and create an alarm situation if an attempt is made to remove an object from the museum building. One of the benefits of RFID technology over barcodes is the ability to read the transponder without it having to be visible to the reader. One of the drawbacks is that metal and water can effectively block the signal if it is between the RFID tag and the reader [2].</p>
<p><strong> 2. QR Codes </strong></p>
<p>Employing QR codes for patrimony and Cultural Heritage digitalizes culture-sharing and heritage site visits. Cultural sites, museums, galleries, and even churches integrate QR codes to improve the experience of domestic and international tourists. QR codes facilitate a faster way of sharing information, making it more appealing to heritage site visitors. They can easily access information about a place’s Cultural Heritage in just a single scan using their smartphone. QR codes can store various types of information and link directly to digital databases [3].</p>
<p>When used as a tool for Cultural Heritage promotion and cultural patrimony preservation, QR codes bridge the physical and digital worlds. Information about tangible and intangible cultures is made available digitally. Moreover, QR codes can create an immersive experience through each scanner’s phone. Cultural site curators can upload a document, image, video, or audio file, customise an HTML page or even embed the link of their website into a QR code [3].</p>
<p><strong> 3. Database Management Systems </strong></p>
<p><strong>Database Management Systems</strong> for Cultural Heritage allow efficient storage and retrieval of information related to cultural objects. This could include details about the object’s origin, history, and any conservation efforts. Database Management Systems are used to manage diverse heritage data (e.g., on the history, value, location, and current condition of cultural heritage), and share this information among interested parties. These systems range in scale from those operated by national governments to those operated by individual experts. With the development of web technology, it is becoming more possible for similar institutions to create and operate databases, with free online tools or platforms supporting this movement. However, despite these improvements, many challenges remain [4].</p>
<p><strong> 4. Geolocation mapping </strong></p>
<p><strong>Geolocation mapping</strong> is the process of associating geographic coordinates with specific locations or points of interest. By integrating this technology, Cultural Heritage sites can be accurately mapped and showcased to everyone worldwide. This can be particularly useful for outdoor installations, monuments, or artifacts with a strong connection to a particular place [5]. By mapping historical landmarks, architectural marvels and culturally significant landscapes, experts can create comprehensive databases and develop strategies to ensure their longevity. Geolocation technology has opened up new avenues for us to explore and immerse ourselves in the past. By combining historical data with precise geographic coordinates, virtual tours and augmented reality experiences can be created, providing an interactive and engaging way to learn about heritage sites [6].</p>
<p><strong>5. </strong><strong>Machine Learning and Artificial Intelligence</strong></p>
<p>The application of <strong>Machine Learning</strong> (ML) to Cultural Heritage has evolved from basic statistical approaches, such as Linear Regression, to complex Deep Learning models. Training machine learning models aims to automatically classify and identify objects based on various attributes. This can help speed up the cataloguing process and improve accuracy. The question remains how much of this actively improves on the underlying algorithm versus using it within a ‘black box’ setting [7].</p>
<p><strong>Artificial Intelligence</strong> (AI) and Cultural Heritage represent a combination that for several years has interested both scientific and cultural institutions regarding the potential of possible interactions and aggregations among the various players in these areas [8].</p>
<p><strong>Artificial Intelligence </strong>and <strong>Machine Learning</strong> offer enormous potential for applications in the digitization and digital curation of Cultural Heritage. But Cultural Heritage institutions have also produced large amounts of digital data that can be suitable for improving AI methods and models. At the same time, there are problems and issues with data used in the AI industry and research, which frequently lack quality curation and introduce or reinforce biases [9].</p>
<p><strong>6. Collaborative Platforms</strong></p>
<p>The term ‘Cultural <strong>Collaborative Platform</strong>’ refers to any digital environment that allows audiences to contribute to the construction of knowledge related to cultural objects in interaction with one or more cultural institutions (support of collaborative cataloguing efforts). This allows experts from different locations to contribute information and collectively build a comprehensive database. Moreover, citizen participation in Cultural Heritage is particularly facilitated in the digital ecosystem by collaborative platforms. However, there are substantial differences between amateur and institutional environments. Neither is neutral: in the former, participation is conditioned by political/ideological visions, in the latter by scientific protocols [10].</p>
<p>When implementing a <strong>Unique Authenticity Identifier</strong> for Cultural Heritage, it’s essential to consider the specific needs and characteristics of the objects, the available resources, and the long-term preservation requirements. Additionally, ensuring data security, privacy, and standardisation is crucial to any system.</p>
<p>All the above solutions are efficient and can be applied to already known and registered objects. One of ENIGMA’s objectives is the development of the novel concept of the <strong>Unique Authenticity Identifier (UAI)</strong>. A multi-parametric non-destructive digital composite indicator will describe the <strong>UAI</strong>. The ENIGMA project aims to use the <strong>UAI</strong> to identify an unknown cultural good by comparing its <strong>UAI</strong> with the <strong>UAIs</strong> of known registered cultural goods. The identification solution will provide an easy-to-read visualisation presenting the similarity of the unknown cultural good to known registered ones.</p>
<p>The article was published at the ENIGMA EU Project blog https://eu-enigma.eu/2024/03/04/unique-object-identification</p>
<p><strong>References and resources</strong></p>
<p>[1] Pamart, Anthony, et al., <em>A metadata enriched system for the documentation of multi-modal digital imaging surveys</em>, 2022.</p>
<p><a href="https://www.researchgate.net/publication/365039299_metadata_enriched_system_for_the_documentation_of_multi-modal_digital_imaging_surveys">https://www.researchgate.net/publication/365039299_metadata_enriched_system_for_the_documentation_of_multi-modal_digital_imaging_surveys</a></p>
<p>[2] Abdur Rasheed, <em>Digital Technology and Knowledge Management in Museums</em>.</p>
<p><a href="https://www.academia.edu/6541620/Abdur_Rasheed_Digital_Technology_and_Knowledge_Management_in_Museums">https://www.academia.edu/6541620/Abdur_Rasheed_Digital_Technology_and_Knowledge_Management_in_Museums</a></p>
<p>[3] Belle B., <em>How to Use QR Codes for Patrimony and Cultural Heritage</em>, QR TIGER, 2023.</p>
<p><a href="https://www.qrcode-tiger.com/qr-codes-for-patrimony-and-cultural-heritage">https://www.qrcode-tiger.com/qr-codes-for-patrimony-and-cultural-heritage</a></p>
<p>[4] International Centre for the Study of the Preservation and Restoration of Cultural Property, <em>Information Data Management and Cultural Heritage</em>.</p>
<p><a href="https://www.iccrom.org/events/information-data-management-and-cultural-heritage">https://www.iccrom.org/events/information-data-management-and-cultural-heritage</a></p>
<p>[5] Mohamed, Hebatallah A., Vascon, Sebastiano, Hibraj, Feliks, James, Stuart, Pilutti, Diego, Del Bue, Alessio, Pelillo, Marcello, <em>Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding</em>, Lecture Notes in Computer Science book series (LNCS), Volume 13645, 2023.</p>
<p><a href="https://link.springer.com/chapter/10.1007/978-3-031-37731-0_12">https://link.springer.com/chapter/10.1007/978-3-031-37731-0_12</a></p>
<p>[6] UTILITIES ONE, <em>Understanding Heritage Through Geolocation Exploring Cultural Significance using Spatial Data</em>, 2023.</p>
<p><a href="https://utilitiesone.com/understanding-heritage-through-geolocation-exploring-cultural-significance-using-spatial-data">https://utilitiesone.com/understanding-heritage-through-geolocation-exploring-cultural-significance-using-spatial-data</a></p>
<p>[7] Fiorucci, Marco, Khoroshiltseva, Marina, Massimiliano, Pontil, James, Stuart, <em>Machine Learning for Cultural Heritage: A Survey</em>, 2020.</p>
<p><a href="https://www.researchgate.net/publication/339317426_Machine_Learning_for_Cultural_Heritage_A_Survey">https://www.researchgate.net/publication/339317426_Machine_Learning_for_Cultural_Heritage_A_Survey</a></p>
<p>[8] Bordoni, Luciana, Mele, Francesco, Sorgente, Antonio, <em>Artificial Intelligence for Cultural Heritage</em>, Cambridge Scholars Publishing, 2016.</p>
<p><a href="https://cambridgescholars.com/product/978-1-4438-9085-4">https://cambridgescholars.com/product/978-1-4438-9085-4</a></p>
<p>[9] Neudecker, Clemens, <em>Cultural Heritage as Data: Digital Curation and Artificial Intelligence in Libraries</em>, 3rd Conference on Digital Curation Technologies, 2022.</p>
<p><a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjsl9_Z_eGDAxVDgP0HHYBFBecQFnoECA4QAQ&amp;url=https%3A%2F%2Fceur-ws.org%2FVol-3234%2Fpaper2.pdf&amp;usg=AOvVaw3i8lLVwbQB-xKEH0ijTv0P&amp;opi=89978449">https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjsl9_Z_eGDAxVDgP0HHYBFBecQFnoECA4QAQ&amp;url=https%3A%2F%2Fceur-ws.org%2FVol-3234%2Fpaper2.pdf&amp;usg=AOvVaw3i8lLVwbQB-xKEH0ijTv0P&amp;opi=89978449</a></p>
<p>[10] Marta, Severo, Collaborative Platforms: Cultural Heritage and Participation, Public History Weekly, 2022.</p>
<p><a href="https://www.researchgate.net/publication/357878608_Collaborative_Platforms_Cultural_Heritage_and_Participation">https://www.researchgate.net/publication/357878608_Collaborative_Platforms_Cultural_Heritage_and_Participation</a></p>

		</div>
	</div>
</div></div></div></div>
</div>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8600</post-id>	</item>
		<item>
		<title>Cultural Heritage Database</title>
		<link>https://kiklo.eu/cultural-heritage-database/</link>
		
		<dc:creator><![CDATA[kiklo_admin]]></dc:creator>
		<pubDate>Thu, 02 Nov 2023 09:32:33 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[cultural heritage]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[objectID]]></category>
		<guid isPermaLink="false">http://dev.kiklo.eu/?p=8364</guid>

					<description><![CDATA[The task of protecting Cultural Heritage poses several challenges. One of the most central of these relates to the question of which Cultural Property should be placed under special legal [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">The task of </span><b><span data-contrast="auto">protecting Cultural Heritage </span></b><span data-contrast="auto">poses several challenges. One of the most central of these relates to the question of which </span><b><span data-contrast="auto">Cultural Property</span></b><span data-contrast="auto"> should be placed under special legal protection. Many countries have responded to this challenge by operating </span><b><span data-contrast="auto">register-based digital systems</span></b><span data-contrast="auto"> under which special </span><b><span data-contrast="auto">protection status</span></b><span data-contrast="auto"> is conferred upon the cultural property of particular significance that is listed in these registers. Although the entries contained in these</span><b><span data-contrast="auto"> digital registers/lists</span></b><span data-contrast="auto"> have altered over the past 100 years, the basic system of individual lists continues to be almost the same </span><span data-contrast="auto">[1]</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Lists of </span><b><span data-contrast="auto">Cultural Property</span></b><span data-contrast="auto"> also exist for </span><b><span data-contrast="auto">lost objects</span></b><span data-contrast="auto">. For example, the </span><b><span data-contrast="auto">Lost Art Database</span></b><span data-contrast="auto"> is run by the German Lost Art Foundation and </span><b><span data-contrast="auto">documents cultural property </span></b><span data-contrast="auto">expropriated as a result of Nazi persecution, especially from Jewish owners, between 1933 and 1945 (“Nazi-looted art”), or for which such a loss cannot be ruled out. With the help of the </span><b><span data-contrast="auto">publication</span></b><span data-contrast="auto"> of so-called Search Requests and Found-Object Reports, former owners or their heirs are to be brought together with </span><b><span data-contrast="auto">current owners</span></b><span data-contrast="auto"> and thus support all stakeholders in finding a just and fair solution </span><span data-contrast="auto">[2]</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The lists of </span><b><span data-contrast="auto">Cultural Objects at Risk</span></b><span data-contrast="auto"> are also particularly important and play a decisive role in the protection of cultural heritage. For instance, the </span><b><span data-contrast="auto">ICOM Red Lists of Cultural Objects at Risk </span></b><span data-contrast="auto">are practical tools to curb the illegal traffic of cultural objects. Red Lists present the categories of cultural objects that can be subjected to theft and traffic. They help individuals, organizations and authorities, such as police or customs officials, </span><b><span data-contrast="auto">identify objects</span></b><span data-contrast="auto"> at risk and </span><b><span data-contrast="auto">prevent them from being illegally sold or exported</span></b><span data-contrast="auto">. It is important to highlight that a Red List is not a list of actual stolen objects. The cultural goods depicted on the lists are inventoried objects within the collections of recognized institutions. They serve to illustrate the categories of </span><b><span data-contrast="auto">cultural goods most vulnerable to illicit traffic</span></b><span data-contrast="auto">. ICOM has been publishing Red Lists since the year 2000, with the scientific collaboration of national and international experts and the unwavering support of dedicated sponsors, to cover the most vulnerable areas of the world in terms of illicit trafficking of cultural objects </span><span data-contrast="auto">[3]</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">Object Identification (Object ID)</span></b><span data-contrast="auto">, an internationally recognized documentation standard conceived to identify and record cultural goods, also plays a key role in the protection, safeguarding and promotion of Cultural Heritage. It sets a standardized procedure to </span><b><span data-contrast="auto">document and describe collections</span></b><span data-contrast="auto"> of archaeological, cultural, and artistic objects. By </span><b><span data-contrast="auto">facilitating the identification </span></b><span data-contrast="auto">of these objects, a standardized description can aid in their recovery in case of </span><b><span data-contrast="auto">loss or theft</span></b><span data-contrast="auto">. Object ID was developed in collaboration with the </span><b><span data-contrast="auto">museum community, police and customs agencies, the art trade, the insurance industry, and valuers of art and antique</span></b><span data-contrast="auto">s. It helps to combat the illicit trade of cultural heritage by encouraging the use of the standard and by bringing together organizations around the world that can encourage its implementation </span><span data-contrast="auto">[4]</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In case of theft, the information gathered and recorded using the Object ID norm can be checked against other databases of stolen artefacts, for example, the INTERPOL database of stolen works of art. Object ID was created as a practical tool for facilitating the </span><b><span data-contrast="auto">recovery of stolen cultural goods </span></b><span data-contrast="auto">and is now </span><b><span data-contrast="auto">internationally recognized</span></b><span data-contrast="auto"> as a necessary and effective tool when inventorying a collection. The Object ID standard defines nine categories of information as well as four steps to fulfil the procedure. The categories are Type of object, Materials and techniques, Measurement, Inscriptions and markings, distinguishing features, Title, Subject, Date or period, and Maker. The four steps are divided as follows: (I) Taking photographs of the object, (II) Identifying the above-mentioned categories, (III) Writing a short description, including additional information, and (IV) Keeping the constituted documentation in a secure place </span><span data-contrast="auto">[4]</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>&nbsp;</p>
<p>[1] https://www.kulturgutschutz-deutschland.de/EN/databaseofculturalpropertyofnationalsignificance/databaseofculturalpropertyofnationalsignificance_node.html</p>
<p>[2] https://kulturgutverluste.de/en/databases/lost-art</p>
<p>[3] https://icom.museum/en/red-lists/</p>
<p>[4] https://icom.museum/en/resources/standards-guidelines/objectid/</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8364</post-id>	</item>
	</channel>
</rss>
