Please note: The algorithm descriptions in English have been automatically translated. Errors may have been introduced in this process. For the original descriptions, go to the Dutch version of the Algorithm Register.
1011 results found
- To properly combat fraud by residents in Work and Income services, we use the application of an algorithm as a source of information. This process is part of the Overvecht neighbourhood-focused intervention project (National Intervention Team Steering Group).Read moreLast change on 12th of July 2024, at 9:00 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA, ...
- Status
- Out of use
- We are keen to offer our residents the right help during the Corona period, given that the measures set affect residents' mental state. By predicting where and to what extent youth and Wmo support is needed, we can better respond to this.Read moreLast change on 12th of July 2024, at 8:58 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA, ...
- Status
- Out of use
- By being able to enforce measures during the Corona period in a better and more targeted way, we can properly enforce the General Local Bye-Law (APV).Read moreLast change on 12th of July 2024, at 8:58 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA, ...
- Status
- Out of use
- This algorithm automatically makes a decision on an application to purchase parking credit for visitors. If the applicant receives informal care, then the respective applicant is entitled to a higher parking credit. If granted, the applicant can use the scheme immediately. If rejected, the applicant...Read moreLast change on 11th of July 2024, at 12:04 (CET) | Publication Standard 1.0
- Publication category
- Impactful algorithms
- Impact assessment
- DPIA
- Status
- In use
Fingerprint-based identity verification for inclusion in travel document
National Authority for Identity Data
Algorithm used to verify whether two fingerprints taken from the same finger belong to the same person. The fingerprints in question are those recorded in the travel document.Read moreLast change on 11th of July 2024, at 10:50 (CET) | Publication Standard 1.0- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Among other things, the algorithm recognises and anonymises (personal) data and confidential financial data in documents before they are published.Read moreLast change on 11th of July 2024, at 9:17 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm uses sensor data to make a calculation for predictions of slipperiness risks. These predictions are used to determine where to grit (preventively), in consultation with meteorologists. In addition, the algorithm can issue various alarms, for example when there is a chance of wet road s...Read moreLast change on 10th of July 2024, at 8:18 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- Safe, autonomous and automatic control of traffic flows at an intersection through an iVRI.Read moreLast change on 10th of July 2024, at 8:13 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to review all the pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Governme...Read moreLast change on 8th of July 2024, at 15:45 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use
- The algorithm underlines personal data in documents. An employee has to look at all pages and check whether the document is properly anonymised. Then the software removes all highlighted information and blacklists it. After that, the documents can be published, for example under the Open Government ...Read moreLast change on 8th of July 2024, at 15:45 (CET) | Publication Standard 1.0
- Publication category
- Other algorithms
- Impact assessment
- Field not filled in.
- Status
- In use