import streamlit as st import os import pkg_resources # # Using this wacky hack to get around the massively ridicolous managed env loading order def is_installed(package_name, version): try: pkg = pkg_resources.get_distribution(package_name) return pkg.version == version except pkg_resources.DistributionNotFound: return False # shifted from below - this must be the first streamlit call; otherwise: problems st.set_page_config(page_title = 'Vulnerability Analysis', initial_sidebar_state='expanded', layout="wide") @st.cache_resource # cache the function so it's not called every time app.py is triggered def install_packages(): install_commands = [] if not is_installed("spaces", "0.12.0"): install_commands.append("pip install spaces==0.17.0") if not is_installed("pydantic", "1.8.2"): install_commands.append("pip install pydantic==1.8.2") if not is_installed("typer", "0.4.0"): install_commands.append("pip install typer==0.4.0") if install_commands: os.system(" && ".join(install_commands)) # install packages if necessary install_packages() import appStore.vulnerability_analysis as vulnerability_analysis import appStore.target as target_analysis import appStore.doc_processing as processing from utils.uploadAndExample import add_upload from utils.vulnerability_classifier import label_dict from utils.config import model_dict import pandas as pd import plotly.express as px # st.set_page_config(page_title = 'Vulnerability Analysis', # initial_sidebar_state='expanded', layout="wide") with st.sidebar: # upload and example doc choice = st.sidebar.radio(label = 'Select the Document', help = 'You can upload the document \ or else you can try a example document', options = ('Upload Document', 'Try Example'), horizontal = True) add_upload(choice) # Create a list of options for the dropdown model_options = ['Llama3.1-8B','Llama3.1-70B','Llama3.1-405B','Zephyr 7B β','Mistral-7B','Mixtral-8x7B'] # Dropdown selectbox: model model_sel = st.selectbox('Select a model:', model_options) model_sel_name = model_dict[model_sel] st.session_state['model_sel_name'] = model_sel_name with st.container(): st.markdown("

Vulnerability Analysis 3.1

", unsafe_allow_html=True) st.write(' ') with st.expander("ℹ️ - About this app", expanded=False): st.write( """ The Vulnerability Analysis App is an open-source\ digital tool which aims to assist policy analysts and \ other users in extracting and filtering references \ to different groups in vulnerable situations from public documents. \ We use Natural Language Processing (NLP), specifically deep \ learning-based text representations to search context-sensitively \ for mentions of the special needs of groups in vulnerable situations to cluster them thematically. For more understanding on Methodology [Click Here](https://vulnerability-analysis.streamlit.app/) """) st.write(""" What Happens in background? - Step 1: Once the document is provided to app, it undergoes *Pre-processing*.\ In this step the document is broken into smaller paragraphs \ (based on word/sentence count). - Step 2: The paragraphs are then fed to the **Vulnerability Classifier** which detects if the paragraph contains any or multiple references to vulnerable groups. """) st.write("") # Define the apps used apps = [processing.app, vulnerability_analysis.app, target_analysis.app] multiplier_val =1/len(apps) if st.button("Analyze Document"): prg = st.progress(0.0) for i,func in enumerate(apps): func() prg.progress((i+1)*multiplier_val) # If there is data stored if 'key0' in st.session_state: vulnerability_analysis.vulnerability_display() target_analysis.target_display(model_sel_name=model_sel_name)