Update app.py
Browse files
app.py
CHANGED
@@ -33,10 +33,6 @@ def install_packages():
|
|
33 |
# install packages if necessary
|
34 |
install_packages()
|
35 |
|
36 |
-
# everything else...
|
37 |
-
|
38 |
-
#!!!! NOTE: shift st.set_page_config up script - see notes above
|
39 |
-
|
40 |
|
41 |
import appStore.vulnerability_analysis as vulnerability_analysis
|
42 |
import appStore.doc_processing as processing
|
@@ -58,7 +54,7 @@ with st.sidebar:
|
|
58 |
add_upload(choice)
|
59 |
|
60 |
with st.container():
|
61 |
-
st.markdown("<h2 style='text-align: center; color: black;'> Vulnerability Analysis </h2>", unsafe_allow_html=True)
|
62 |
st.write(' ')
|
63 |
|
64 |
with st.expander("ℹ️ - About this app", expanded=False):
|
@@ -67,9 +63,14 @@ with st.expander("ℹ️ - About this app", expanded=False):
|
|
67 |
The Vulnerability Analysis App is an open-source\
|
68 |
digital tool which aims to assist policy analysts and \
|
69 |
other users in extracting and filtering references \
|
70 |
-
to different vulnerable
|
|
|
|
|
|
|
|
|
71 |
""")
|
72 |
-
|
|
|
73 |
|
74 |
# st.caption("""
|
75 |
# - **Target**: Targets are an intention to achieve a specific result, \
|
@@ -111,6 +112,7 @@ with st.expander("ℹ️ - About this app", expanded=False):
|
|
111 |
# image = Image.open('docStore/img/flow.jpg')
|
112 |
# st.image(image)
|
113 |
#with c3:
|
|
|
114 |
st.write("""
|
115 |
What Happens in background?
|
116 |
|
@@ -118,7 +120,7 @@ with st.expander("ℹ️ - About this app", expanded=False):
|
|
118 |
In this step the document is broken into smaller paragraphs \
|
119 |
(based on word/sentence count).
|
120 |
- Step 2: The paragraphs are then fed to the **Vulnerability Classifier** which detects if
|
121 |
-
the paragraph contains any references to vulnerable groups.
|
122 |
""")
|
123 |
|
124 |
st.write("")
|
|
|
33 |
# install packages if necessary
|
34 |
install_packages()
|
35 |
|
|
|
|
|
|
|
|
|
36 |
|
37 |
import appStore.vulnerability_analysis as vulnerability_analysis
|
38 |
import appStore.doc_processing as processing
|
|
|
54 |
add_upload(choice)
|
55 |
|
56 |
with st.container():
|
57 |
+
st.markdown("<h2 style='text-align: center; color: black;'> Vulnerability Analysis 2.0 </h2>", unsafe_allow_html=True)
|
58 |
st.write(' ')
|
59 |
|
60 |
with st.expander("ℹ️ - About this app", expanded=False):
|
|
|
63 |
The Vulnerability Analysis App is an open-source\
|
64 |
digital tool which aims to assist policy analysts and \
|
65 |
other users in extracting and filtering references \
|
66 |
+
to different groups in vulnerable situations from public documents. \
|
67 |
+
We use Natural Language Processing (NLP), specifically deep \
|
68 |
+
learning-based text representations to search context-sensitively \
|
69 |
+
for mentions of the special needs of groups in vulnerable situations
|
70 |
+
to cluster them thematically.
|
71 |
""")
|
72 |
+
|
73 |
+
#st.write('**Definitions**')
|
74 |
|
75 |
# st.caption("""
|
76 |
# - **Target**: Targets are an intention to achieve a specific result, \
|
|
|
112 |
# image = Image.open('docStore/img/flow.jpg')
|
113 |
# st.image(image)
|
114 |
#with c3:
|
115 |
+
|
116 |
st.write("""
|
117 |
What Happens in background?
|
118 |
|
|
|
120 |
In this step the document is broken into smaller paragraphs \
|
121 |
(based on word/sentence count).
|
122 |
- Step 2: The paragraphs are then fed to the **Vulnerability Classifier** which detects if
|
123 |
+
the paragraph contains any or multiple references to vulnerable groups.
|
124 |
""")
|
125 |
|
126 |
st.write("")
|