Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
802 results found
- The dynamic cable model is a model that can accurately calculate cable temperatures of medium- and high-voltage cables in changing conditions. Here, environmental situations such as ground temperature, soil moisture and load profile can be dynamic over time, allowing realistic situations for cables ...Read moreLast change on 17th of October 2024, at 14:03 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- At the IMG, there is the Intangible Damage Scheme (IMS), where people can receive compensation if they have suffered stress, anxiety or other psychological symptoms due to the earthquakes. For IMS, applicants can fill in a questionnaire (the personal impact analysis (PIA)) to describe the impact of ...Read moreLast change on 16th of October 2024, at 12:10 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In use
Permanent Monitor Dual Registrations (PMD) Basic Registration of Persons (BRP)
National Agency for Identity Data
The Permanent Monitor Dual Registrations is a set of profiles that searches for dual registrations in the BRP on a weekly basis.Read moreLast change on 15th of October 2024, at 10:32 (CET) | Publication Standard 1.0- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government ...Read moreLast change on 15th of October 2024, at 10:13 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The search algorithm used by the BRP Link Point to determine whether a person logging in with an eIDAS resource already appears in the Basic Registration of Persons (BRP).Read moreLast change on 15th of October 2024, at 8:31 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- This algorithm helps e-mail users determine when an e-mail contains sensitive information and should be sent securely.Read moreLast change on 15th of October 2024, at 8:14 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Bodycam boasRead moreLast change on 15th of October 2024, at 8:07 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Recognise and anonymise privacy-sensitive information and documents.Read moreLast change on 14th of October 2024, at 13:17 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- DPIA
- Status
- In use
- Based on language technology, personal and company names are read and filtered out of text files such as emails and individual documents.Read moreLast change on 14th of October 2024, at 10:47 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm identifies personal data and pre-entered words in documents. An employee must go through the document and check whether the alert is justified and approve or reject it. An employee can add further markings himself. After approval by the employee, all approved alerts and markings are bl...Read moreLast change on 14th of October 2024, at 10:02 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use