Skip to content

Commit 46d59d3

Browse files
committed
chore: consistent formatting for **Output/s:**
- Apparantly[^1], double spaces at end of line allows new line. - New lines help legibility, so use consistently for **Output/s:** [^1]: This for new line, instead of `<br>`, is new to me.
1 parent 7622f4e commit 46d59d3

File tree

1 file changed

+14
-5
lines changed

1 file changed

+14
-5
lines changed

user-guide/usecases/pinelli/4usecase.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -108,23 +108,28 @@ The following guidance summarizes what each notebook does, what to expect, and h
108108
This notebook loads the cleaned input files found in `00_data_cleaned/`, verifies their structure, and merges hazard data (wind speeds) with exposure and damage attributes.
109109
It produces the first standardized dataset used by all subsequent steps.
110110
111-
**Outputs:** `01_checking_data.csv`, `02_combined_processed_files.csv`.
111+
**Outputs:**
112+
`01_checking_data.csv`,
113+
`02_combined_processed_files.csv`.
112114
113115
2. **Compute damage ratios and define wind-speed ranges**
114116
115117
**Notebook:** `03_damage_ratios_&_ranges.ipynb`
116118
This step calculates the *damage ratio* for each record (loss divided by replacement value) and assigns each row to a wind-speed bin.
117119
The notebook also produces exploratory visualizations to understand early behavior of the data.
118120
119-
**Output:** `04_combined_processed_with_ratios.csv`.
121+
**Output:**
122+
`04_combined_processed_with_ratios.csv`.
120123
121124
3. **Build the empirical vulnerability matrix**
122125
123126
**Notebook:** `05_vulnerability_matrix.ipynb`
124127
This notebook aggregates thousands of records into an empirical vulnerability matrix, where each wind-speed bin is associated with an Expected Damage Ratio (EDR).
125128
It also generates a graphical summary of empirical EDR values.
126129
127-
**Outputs:** `06_vulnerability_matrix.csv`, `07_vulnerability_matrix.png`.
130+
**Outputs:**
131+
`06_vulnerability_matrix.csv`,
132+
`07_vulnerability_matrix.png`.
128133
129134
4. **Fit and visualize vulnerability curves**
130135
@@ -137,7 +142,9 @@ The following guidance summarizes what each notebook does, what to expect, and h
137142
138143
Model performance is evaluated using R², RMSE, MAE, and visual comparison.
139144
140-
**Outputs:** `09_vulnerability_data.csv`, `10_vulnerability_data.png`,
145+
**Outputs:**
146+
`09_vulnerability_data.csv`,
147+
`10_vulnerability_data.png`,
141148
`11_vulnerability_curve_with_logistic_regression.csv`,
142149
`12_vulnerability_curve_with_logistic_regression.png`.
143150
@@ -147,7 +154,9 @@ The following guidance summarizes what each notebook does, what to expect, and h
147154
This notebook converts vulnerability information into *fragility curves*, which express the probability that damage exceeds a specified threshold.
148155
These curves are useful for engineering applications, insurance analysis, and risk modeling.
149156
150-
**Outputs:** `14_fragility_data.csv`, `15_fragility_data.png`,
157+
**Outputs:**
158+
`14_fragility_data.csv`,
159+
`15_fragility_data.png`,
151160
`16_fragility_curves_with_logistic_regression.csv`,
152161
`17_fragility_curves_with_logistic_regression.png`.
153162

0 commit comments

Comments
 (0)