Incorporate model file validation checks into csv to binary conversion tools
Validation checks for damage bin dictionary, footprint and vulnerability model files have been incorporated into their respective csv to binary conversion tools, and are run by default. These checks can be suppressed with the -N command line flag. For example:
Additionally, the -S command line flag has been introduced to validatevulnerability and vulnerabilitytobin to suppress warnings when all intensity bins are not present each vulnerability ID. It is recommended to suppress these warnings for multiple peril models:
$ validatevulnerability -S < vulnerability.csv
WARNING: Vulnerability ID 1: Intensity bin 4 missing. All intensity bins must be present for each vulnerability ID in single peril models.
WARNING: Vulnerability ID 2: Intensity bins 1 and 2 missing. All intensity bins must be present for each vulnerability ID in single peril models.
INFO: All Vulnerability file validation checks have passed. Please take note of any warnings.
Incorporate model file validation checks into csv to binary conversion tools
Validation checks for damage bin dictionary, footprint and vulnerability model files have been incorporated into their respective csv to binary conversion tools, and are run by default. These checks can be suppressed with the
-N
command line flag. For example:Additionally, the
-S
command line flag has been introduced tovalidatevulnerability
andvulnerabilitytobin
to suppress warnings when all intensity bins are not present each vulnerability ID. It is recommended to suppress these warnings for multiple peril models: