Upload Gemma3ForCausalLM
Browse files- README.md +191 -461
- config.json +34 -0
- generation_config.json +8 -0
- model.safetensors +3 -0
README.md
CHANGED
@@ -1,469 +1,199 @@
|
|
1 |
---
|
2 |
-
license: gemma
|
3 |
library_name: transformers
|
4 |
-
|
5 |
-
extra_gated_heading: Access Gemma on Hugging Face
|
6 |
-
extra_gated_prompt: >-
|
7 |
-
To access Gemma on Hugging Face, you’re required to review and agree to
|
8 |
-
Google’s usage license. To do this, please ensure you’re logged in to Hugging
|
9 |
-
Face and click below. Requests are processed immediately.
|
10 |
-
extra_gated_button_content: Acknowledge license
|
11 |
---
|
12 |
-
# Model Description
|
13 |
-
|
14 |
-
This model is `google/gemma-3-1b-pt` finetuned on waka books dataset for 1 epoch, with seq_len = 4096 (I know. But not enough $$$)
|
15 |
-
|
16 |
-
# Gemma 3 model card
|
17 |
-
|
18 |
-
**Model Page**: [Gemma](https://ai.google.dev/gemma/docs/core)
|
19 |
-
|
20 |
-
**Resources and Technical Documentation**:
|
21 |
|
22 |
-
|
23 |
-
* [Responsible Generative AI Toolkit][rai-toolkit]
|
24 |
-
* [Gemma on Kaggle][kaggle-gemma]
|
25 |
-
* [Gemma on Vertex Model Garden][vertex-mg-gemma3]
|
26 |
|
27 |
-
|
28 |
-
|
29 |
-
|
30 |
-
|
31 |
-
## Model
|
32 |
-
|
33 |
-
|
34 |
-
|
35 |
-
|
36 |
-
|
37 |
-
|
38 |
-
|
39 |
-
|
40 |
-
|
41 |
-
|
42 |
-
|
43 |
-
|
44 |
-
|
45 |
-
|
46 |
-
|
47 |
-
|
48 |
-
|
49 |
-
|
50 |
-
|
51 |
-
|
52 |
-
|
53 |
-
|
54 |
-
|
55 |
-
|
56 |
-
|
57 |
-
|
58 |
-
|
59 |
-
|
60 |
-
|
61 |
-
|
62 |
-
|
63 |
-
|
64 |
-
|
65 |
-
|
66 |
-
|
67 |
-
|
68 |
-
|
69 |
-
|
70 |
-
|
71 |
-
|
72 |
-
|
73 |
-
|
74 |
-
|
75 |
-
|
76 |
-
|
77 |
-
|
78 |
-
|
79 |
-
|
80 |
-
|
81 |
-
|
82 |
-
|
83 |
-
|
84 |
-
|
85 |
-
|
86 |
-
|
87 |
-
|
88 |
-
|
89 |
-
|
90 |
-
|
91 |
-
|
92 |
-
|
93 |
-
|
94 |
-
|
95 |
-
|
96 |
-
|
97 |
-
|
98 |
-
|
99 |
-
|
100 |
-
|
101 |
-
|
102 |
-
|
103 |
-
|
104 |
-
|
105 |
-
|
106 |
-
|
107 |
-
|
108 |
-
|
109 |
-
|
110 |
-
|
111 |
-
|
112 |
-
|
113 |
-
|
114 |
-
|
115 |
-
|
116 |
-
|
117 |
-
|
118 |
-
|
119 |
-
|
120 |
-
|
121 |
-
|
122 |
-
These models were trained on a dataset of text data that includes a wide variety
|
123 |
-
of sources. The 27B model was trained with 14 trillion tokens, the 12B model was
|
124 |
-
trained with 12 trillion tokens, 4B model was trained with 4 trillion tokens and
|
125 |
-
1B with 2 trillion tokens. Here are the key components:
|
126 |
-
|
127 |
-
- Web Documents: A diverse collection of web text ensures the model is
|
128 |
-
exposed to a broad range of linguistic styles, topics, and vocabulary. The
|
129 |
-
training dataset includes content in over 140 languages.
|
130 |
-
- Code: Exposing the model to code helps it to learn the syntax and
|
131 |
-
patterns of programming languages, which improves its ability to generate
|
132 |
-
code and understand code-related questions.
|
133 |
-
- Mathematics: Training on mathematical text helps the model learn logical
|
134 |
-
reasoning, symbolic representation, and to address mathematical queries.
|
135 |
-
- Images: A wide range of images enables the model to perform image
|
136 |
-
analysis and visual data extraction tasks.
|
137 |
-
The combination of these diverse data sources is crucial for training a powerful
|
138 |
-
multimodal model that can handle a wide variety of different tasks and data
|
139 |
-
formats.
|
140 |
-
|
141 |
-
### Data Preprocessing
|
142 |
-
|
143 |
-
Here are the key data cleaning and filtering methods applied to the training
|
144 |
-
data:
|
145 |
-
|
146 |
-
- CSAM Filtering: Rigorous CSAM (Child Sexual Abuse Material) filtering
|
147 |
-
was applied at multiple stages in the data preparation process to ensure
|
148 |
-
the exclusion of harmful and illegal content.
|
149 |
-
- Sensitive Data Filtering: As part of making Gemma pre-trained models
|
150 |
-
safe and reliable, automated techniques were used to filter out certain
|
151 |
-
personal information and other sensitive data from training sets.
|
152 |
-
- Additional methods: Filtering based on content quality and safety in
|
153 |
-
line with [our policies][safety-policies].
|
154 |
-
## Implementation Information
|
155 |
-
|
156 |
-
Details about the model internals.
|
157 |
-
|
158 |
-
### Hardware
|
159 |
-
|
160 |
-
Gemma was trained using [Tensor Processing Unit (TPU)][tpu] hardware (TPUv4p,
|
161 |
-
TPUv5p and TPUv5e). Training vision-language models (VLMS) requires significant
|
162 |
-
computational power. TPUs, designed specifically for matrix operations common in
|
163 |
-
machine learning, offer several advantages in this domain:
|
164 |
-
|
165 |
-
- Performance: TPUs are specifically designed to handle the massive
|
166 |
-
computations involved in training VLMs. They can speed up training
|
167 |
-
considerably compared to CPUs.
|
168 |
-
- Memory: TPUs often come with large amounts of high-bandwidth memory,
|
169 |
-
allowing for the handling of large models and batch sizes during training.
|
170 |
-
This can lead to better model quality.
|
171 |
-
- Scalability: TPU Pods (large clusters of TPUs) provide a scalable
|
172 |
-
solution for handling the growing complexity of large foundation models.
|
173 |
-
You can distribute training across multiple TPU devices for faster and more
|
174 |
-
efficient processing.
|
175 |
-
- Cost-effectiveness: In many scenarios, TPUs can provide a more
|
176 |
-
cost-effective solution for training large models compared to CPU-based
|
177 |
-
infrastructure, especially when considering the time and resources saved
|
178 |
-
due to faster training.
|
179 |
-
- These advantages are aligned with
|
180 |
-
[Google's commitments to operate sustainably][sustainability].
|
181 |
-
### Software
|
182 |
-
|
183 |
-
Training was done using [JAX][jax] and [ML Pathways][ml-pathways].
|
184 |
-
|
185 |
-
JAX allows researchers to take advantage of the latest generation of hardware,
|
186 |
-
including TPUs, for faster and more efficient training of large models. ML
|
187 |
-
Pathways is Google's latest effort to build artificially intelligent systems
|
188 |
-
capable of generalizing across multiple tasks. This is specially suitable for
|
189 |
-
foundation models, including large language models like these ones.
|
190 |
-
|
191 |
-
Together, JAX and ML Pathways are used as described in the
|
192 |
-
[paper about the Gemini family of models][gemini-2-paper]; *"the 'single
|
193 |
-
controller' programming model of Jax and Pathways allows a single Python
|
194 |
-
process to orchestrate the entire training run, dramatically simplifying the
|
195 |
-
development workflow."*
|
196 |
|
197 |
## Evaluation
|
198 |
|
199 |
-
|
200 |
-
|
201 |
-
###
|
202 |
-
|
203 |
-
|
204 |
-
|
205 |
-
|
206 |
-
|
207 |
-
|
208 |
-
|
209 |
-
|
210 |
-
|
211 |
-
|
212 |
-
|
213 |
-
|
214 |
-
|
215 |
-
|
216 |
-
|
217 |
-
|
218 |
-
|
219 |
-
|
220 |
-
|
221 |
-
|
222 |
-
|
223 |
-
[
|
224 |
-
|
225 |
-
|
226 |
-
|
227 |
-
|
228 |
-
|
229 |
-
[
|
230 |
-
|
231 |
-
|
232 |
-
|
233 |
-
|
234 |
-
|
235 |
-
|
236 |
-
|
237 |
-
|
238 |
-
|
239 |
-
|
240 |
-
|
241 |
-
|
242 |
-
|
243 |
-
|
244 |
-
|
245 |
-
|
246 |
-
|
247 |
-
[
|
248 |
-
|
249 |
-
|
250 |
-
|
251 |
-
[
|
252 |
-
|
253 |
-
|
254 |
-
|
255 |
-
|
256 |
-
|
257 |
-
|
258 |
-
|
259 |
-
|
260 |
-
|
261 |
-
|
262 |
-
|
263 |
-
|
264 |
-
|
265 |
-
|
266 |
-
|
267 |
-
|
268 |
-
|
269 |
-
|
270 |
-
|
271 |
-
[
|
272 |
-
|
273 |
-
|
274 |
-
|
275 |
-
|
276 |
-
|
277 |
-
|
278 |
-
|
279 |
-
|
280 |
-
|
281 |
-
|
282 |
-
|
283 |
-
|
284 |
-
|
285 |
-
|
286 |
-
|
287 |
-
|
288 |
-
|
289 |
-
|
290 |
-
|
291 |
-
|
292 |
-
|
293 |
-
|
294 |
-
[coco-cap]: https://cocodataset.org/#home
|
295 |
-
[docvqa]: https://www.docvqa.org/
|
296 |
-
[info-vqa]: https://arxiv.org/abs/2104.12756
|
297 |
-
[mmmu]: https://arxiv.org/abs/2311.16502
|
298 |
-
[textvqa]: https://textvqa.org/
|
299 |
-
[realworldqa]: https://paperswithcode.com/dataset/realworldqa
|
300 |
-
[remi]: https://arxiv.org/html/2406.09175v1
|
301 |
-
[ai2d]: https://allenai.org/data/diagrams
|
302 |
-
[chartqa]: https://arxiv.org/abs/2203.10244
|
303 |
-
[vqav2]: https://visualqa.org/index.html
|
304 |
-
[blinkvqa]: https://arxiv.org/abs/2404.12390
|
305 |
-
[okvqa]: https://okvqa.allenai.org/
|
306 |
-
[tallyqa]: https://arxiv.org/abs/1810.12440
|
307 |
-
[ss-vqa]: https://arxiv.org/abs/1908.02660
|
308 |
-
[countbenchqa]: https://github.com/google-research/big_vision/blob/main/big_vision/datasets/countbenchqa/
|
309 |
-
|
310 |
-
## Ethics and Safety
|
311 |
-
|
312 |
-
Ethics and safety evaluation approach and results.
|
313 |
-
|
314 |
-
### Evaluation Approach
|
315 |
-
|
316 |
-
Our evaluation methods include structured evaluations and internal red-teaming
|
317 |
-
testing of relevant content policies. Red-teaming was conducted by a number of
|
318 |
-
different teams, each with different goals and human evaluation metrics. These
|
319 |
-
models were evaluated against a number of different categories relevant to
|
320 |
-
ethics and safety, including:
|
321 |
-
|
322 |
-
- **Child Safety**: Evaluation of text-to-text and image to text prompts
|
323 |
-
covering child safety policies, including child sexual abuse and
|
324 |
-
exploitation.
|
325 |
-
- **Content Safety:** Evaluation of text-to-text and image to text prompts
|
326 |
-
covering safety policies including, harassment, violence and gore, and hate
|
327 |
-
speech.
|
328 |
-
- **Representational Harms**: Evaluation of text-to-text and image to text
|
329 |
-
prompts covering safety policies including bias, stereotyping, and harmful
|
330 |
-
associations or inaccuracies.
|
331 |
-
In addition to development level evaluations, we conduct "assurance
|
332 |
-
evaluations" which are our 'arms-length' internal evaluations for responsibility
|
333 |
-
governance decision making. They are conducted separately from the model
|
334 |
-
development team, to inform decision making about release. High level findings
|
335 |
-
are fed back to the model team, but prompt sets are held-out to prevent
|
336 |
-
overfitting and preserve the results' ability to inform decision making.
|
337 |
-
Assurance evaluation results are reported to our Responsibility & Safety Council
|
338 |
-
as part of release review.
|
339 |
-
|
340 |
-
### Evaluation Results
|
341 |
-
|
342 |
-
For all areas of safety testing, we saw major improvements in the categories of
|
343 |
-
child safety, content safety, and representational harms relative to previous
|
344 |
-
Gemma models. All testing was conducted without safety filters to evaluate the
|
345 |
-
model capabilities and behaviors. For both text-to-text and image-to-text, and
|
346 |
-
across all model sizes, the model produced minimal policy violations, and showed
|
347 |
-
significant improvements over previous Gemma models' performance with respect
|
348 |
-
to ungrounded inferences. A limitation of our evaluations was they included only
|
349 |
-
English language prompts.
|
350 |
-
|
351 |
-
## Usage and Limitations
|
352 |
-
|
353 |
-
These models have certain limitations that users should be aware of.
|
354 |
-
|
355 |
-
### Intended Usage
|
356 |
-
|
357 |
-
Open vision-language models (VLMs) models have a wide range of applications
|
358 |
-
across various industries and domains. The following list of potential uses is
|
359 |
-
not comprehensive. The purpose of this list is to provide contextual information
|
360 |
-
about the possible use-cases that the model creators considered as part of model
|
361 |
-
training and development.
|
362 |
-
|
363 |
-
- Content Creation and Communication
|
364 |
-
- Text Generation: These models can be used to generate creative text
|
365 |
-
formats such as poems, scripts, code, marketing copy, and email drafts.
|
366 |
-
- Chatbots and Conversational AI: Power conversational interfaces
|
367 |
-
for customer service, virtual assistants, or interactive applications.
|
368 |
-
- Text Summarization: Generate concise summaries of a text corpus,
|
369 |
-
research papers, or reports.
|
370 |
-
- Image Data Extraction: These models can be used to extract,
|
371 |
-
interpret, and summarize visual data for text communications.
|
372 |
-
- Research and Education
|
373 |
-
- Natural Language Processing (NLP) and VLM Research: These
|
374 |
-
models can serve as a foundation for researchers to experiment with VLM
|
375 |
-
and NLP techniques, develop algorithms, and contribute to the
|
376 |
-
advancement of the field.
|
377 |
-
- Language Learning Tools: Support interactive language learning
|
378 |
-
experiences, aiding in grammar correction or providing writing practice.
|
379 |
-
- Knowledge Exploration: Assist researchers in exploring large
|
380 |
-
bodies of text by generating summaries or answering questions about
|
381 |
-
specific topics.
|
382 |
-
### Limitations
|
383 |
-
|
384 |
-
- Training Data
|
385 |
-
- The quality and diversity of the training data significantly
|
386 |
-
influence the model's capabilities. Biases or gaps in the training data
|
387 |
-
can lead to limitations in the model's responses.
|
388 |
-
- The scope of the training dataset determines the subject areas
|
389 |
-
the model can handle effectively.
|
390 |
-
- Context and Task Complexity
|
391 |
-
- Models are better at tasks that can be framed with clear
|
392 |
-
prompts and instructions. Open-ended or highly complex tasks might be
|
393 |
-
challenging.
|
394 |
-
- A model's performance can be influenced by the amount of context
|
395 |
-
provided (longer context generally leads to better outputs, up to a
|
396 |
-
certain point).
|
397 |
-
- Language Ambiguity and Nuance
|
398 |
-
- Natural language is inherently complex. Models might struggle
|
399 |
-
to grasp subtle nuances, sarcasm, or figurative language.
|
400 |
-
- Factual Accuracy
|
401 |
-
- Models generate responses based on information they learned
|
402 |
-
from their training datasets, but they are not knowledge bases. They
|
403 |
-
may generate incorrect or outdated factual statements.
|
404 |
-
- Common Sense
|
405 |
-
- Models rely on statistical patterns in language. They might
|
406 |
-
lack the ability to apply common sense reasoning in certain situations.
|
407 |
-
### Ethical Considerations and Risks
|
408 |
-
|
409 |
-
The development of vision-language models (VLMs) raises several ethical
|
410 |
-
concerns. In creating an open model, we have carefully considered the following:
|
411 |
-
|
412 |
-
- Bias and Fairness
|
413 |
-
- VLMs trained on large-scale, real-world text and image data can
|
414 |
-
reflect socio-cultural biases embedded in the training material. These
|
415 |
-
models underwent careful scrutiny, input data pre-processing described
|
416 |
-
and posterior evaluations reported in this card.
|
417 |
-
- Misinformation and Misuse
|
418 |
-
- VLMs can be misused to generate text that is false, misleading,
|
419 |
-
or harmful.
|
420 |
-
- Guidelines are provided for responsible use with the model, see the
|
421 |
-
[Responsible Generative AI Toolkit][rai-toolkit].
|
422 |
-
- Transparency and Accountability:
|
423 |
-
- This model card summarizes details on the models' architecture,
|
424 |
-
capabilities, limitations, and evaluation processes.
|
425 |
-
- A responsibly developed open model offers the opportunity to
|
426 |
-
share innovation by making VLM technology accessible to developers and
|
427 |
-
researchers across the AI ecosystem.
|
428 |
-
Risks identified and mitigations:
|
429 |
-
|
430 |
-
- **Perpetuation of biases**: It's encouraged to perform continuous
|
431 |
-
monitoring (using evaluation metrics, human review) and the exploration of
|
432 |
-
de-biasing techniques during model training, fine-tuning, and other use
|
433 |
-
cases.
|
434 |
-
- **Generation of harmful content**: Mechanisms and guidelines for content
|
435 |
-
safety are essential. Developers are encouraged to exercise caution and
|
436 |
-
implement appropriate content safety safeguards based on their specific
|
437 |
-
product policies and application use cases.
|
438 |
-
- **Misuse for malicious purposes**: Technical limitations and developer
|
439 |
-
and end-user education can help mitigate against malicious applications of
|
440 |
-
VLMs. Educational resources and reporting mechanisms for users to flag
|
441 |
-
misuse are provided. Prohibited uses of Gemma models are outlined in the
|
442 |
-
[Gemma Prohibited Use Policy][prohibited-use].
|
443 |
-
- **Privacy violations**: Models were trained on data filtered for removal
|
444 |
-
of certain personal information and other sensitive data. Developers are
|
445 |
-
encouraged to adhere to privacy regulations with privacy-preserving
|
446 |
-
techniques.
|
447 |
-
### Benefits
|
448 |
-
|
449 |
-
At the time of release, this family of models provides high-performance open
|
450 |
-
vision-language model implementations designed from the ground up for
|
451 |
-
responsible AI development compared to similarly sized models.
|
452 |
-
|
453 |
-
Using the benchmark evaluation metrics described in this document, these models
|
454 |
-
have shown to provide superior performance to other, comparably-sized open model
|
455 |
-
alternatives.
|
456 |
-
|
457 |
-
[g3-tech-report]: https://goo.gle/Gemma3Report
|
458 |
-
[rai-toolkit]: https://ai.google.dev/responsible
|
459 |
-
[kaggle-gemma]: https://www.kaggle.com/models/google/gemma-3
|
460 |
-
[vertex-mg-gemma3]: https://console.cloud.google.com/vertex-ai/publishers/google/model-garden/gemma3
|
461 |
-
[terms]: https://ai.google.dev/gemma/terms
|
462 |
-
[safety-policies]: https://ai.google/static/documents/ai-responsibility-update-published-february-2025.pdf
|
463 |
-
[prohibited-use]: https://ai.google.dev/gemma/prohibited_use_policy
|
464 |
-
[tpu]: https://cloud.google.com/tpu/docs/intro-to-tpu
|
465 |
-
[sustainability]: https://sustainability.google/operating-sustainably/
|
466 |
-
[jax]: https://github.com/jax-ml/jax
|
467 |
-
[ml-pathways]: https://blog.google/technology/ai/introducing-pathways-next-generation-ai-architecture/
|
468 |
-
[sustainability]: https://sustainability.google/operating-sustainably/
|
469 |
-
[gemini-2-paper]: https://arxiv.org/abs/2312.11805
|
|
|
1 |
---
|
|
|
2 |
library_name: transformers
|
3 |
+
tags: []
|
|
|
|
|
|
|
|
|
|
|
|
|
4 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 |
|
6 |
+
# Model Card for Model ID
|
|
|
|
|
|
|
7 |
|
8 |
+
<!-- Provide a quick summary of what the model is/does. -->
|
9 |
+
|
10 |
+
|
11 |
+
|
12 |
+
## Model Details
|
13 |
+
|
14 |
+
### Model Description
|
15 |
+
|
16 |
+
<!-- Provide a longer summary of what this model is. -->
|
17 |
+
|
18 |
+
This is the model card of a 🤗 transformers model that has been pushed on the Hub. This model card has been automatically generated.
|
19 |
+
|
20 |
+
- **Developed by:** [More Information Needed]
|
21 |
+
- **Funded by [optional]:** [More Information Needed]
|
22 |
+
- **Shared by [optional]:** [More Information Needed]
|
23 |
+
- **Model type:** [More Information Needed]
|
24 |
+
- **Language(s) (NLP):** [More Information Needed]
|
25 |
+
- **License:** [More Information Needed]
|
26 |
+
- **Finetuned from model [optional]:** [More Information Needed]
|
27 |
+
|
28 |
+
### Model Sources [optional]
|
29 |
+
|
30 |
+
<!-- Provide the basic links for the model. -->
|
31 |
+
|
32 |
+
- **Repository:** [More Information Needed]
|
33 |
+
- **Paper [optional]:** [More Information Needed]
|
34 |
+
- **Demo [optional]:** [More Information Needed]
|
35 |
+
|
36 |
+
## Uses
|
37 |
+
|
38 |
+
<!-- Address questions around how the model is intended to be used, including the foreseeable users of the model and those affected by the model. -->
|
39 |
+
|
40 |
+
### Direct Use
|
41 |
+
|
42 |
+
<!-- This section is for the model use without fine-tuning or plugging into a larger ecosystem/app. -->
|
43 |
+
|
44 |
+
[More Information Needed]
|
45 |
+
|
46 |
+
### Downstream Use [optional]
|
47 |
+
|
48 |
+
<!-- This section is for the model use when fine-tuned for a task, or when plugged into a larger ecosystem/app -->
|
49 |
+
|
50 |
+
[More Information Needed]
|
51 |
+
|
52 |
+
### Out-of-Scope Use
|
53 |
+
|
54 |
+
<!-- This section addresses misuse, malicious use, and uses that the model will not work well for. -->
|
55 |
+
|
56 |
+
[More Information Needed]
|
57 |
+
|
58 |
+
## Bias, Risks, and Limitations
|
59 |
+
|
60 |
+
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
61 |
+
|
62 |
+
[More Information Needed]
|
63 |
+
|
64 |
+
### Recommendations
|
65 |
+
|
66 |
+
<!-- This section is meant to convey recommendations with respect to the bias, risk, and technical limitations. -->
|
67 |
+
|
68 |
+
Users (both direct and downstream) should be made aware of the risks, biases and limitations of the model. More information needed for further recommendations.
|
69 |
+
|
70 |
+
## How to Get Started with the Model
|
71 |
+
|
72 |
+
Use the code below to get started with the model.
|
73 |
+
|
74 |
+
[More Information Needed]
|
75 |
+
|
76 |
+
## Training Details
|
77 |
+
|
78 |
+
### Training Data
|
79 |
+
|
80 |
+
<!-- This should link to a Dataset Card, perhaps with a short stub of information on what the training data is all about as well as documentation related to data pre-processing or additional filtering. -->
|
81 |
+
|
82 |
+
[More Information Needed]
|
83 |
+
|
84 |
+
### Training Procedure
|
85 |
+
|
86 |
+
<!-- This relates heavily to the Technical Specifications. Content here should link to that section when it is relevant to the training procedure. -->
|
87 |
+
|
88 |
+
#### Preprocessing [optional]
|
89 |
+
|
90 |
+
[More Information Needed]
|
91 |
+
|
92 |
+
|
93 |
+
#### Training Hyperparameters
|
94 |
+
|
95 |
+
- **Training regime:** [More Information Needed] <!--fp32, fp16 mixed precision, bf16 mixed precision, bf16 non-mixed precision, fp16 non-mixed precision, fp8 mixed precision -->
|
96 |
+
|
97 |
+
#### Speeds, Sizes, Times [optional]
|
98 |
+
|
99 |
+
<!-- This section provides information about throughput, start/end time, checkpoint size if relevant, etc. -->
|
100 |
+
|
101 |
+
[More Information Needed]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
102 |
|
103 |
## Evaluation
|
104 |
|
105 |
+
<!-- This section describes the evaluation protocols and provides the results. -->
|
106 |
+
|
107 |
+
### Testing Data, Factors & Metrics
|
108 |
+
|
109 |
+
#### Testing Data
|
110 |
+
|
111 |
+
<!-- This should link to a Dataset Card if possible. -->
|
112 |
+
|
113 |
+
[More Information Needed]
|
114 |
+
|
115 |
+
#### Factors
|
116 |
+
|
117 |
+
<!-- These are the things the evaluation is disaggregating by, e.g., subpopulations or domains. -->
|
118 |
+
|
119 |
+
[More Information Needed]
|
120 |
+
|
121 |
+
#### Metrics
|
122 |
+
|
123 |
+
<!-- These are the evaluation metrics being used, ideally with a description of why. -->
|
124 |
+
|
125 |
+
[More Information Needed]
|
126 |
+
|
127 |
+
### Results
|
128 |
+
|
129 |
+
[More Information Needed]
|
130 |
+
|
131 |
+
#### Summary
|
132 |
+
|
133 |
+
|
134 |
+
|
135 |
+
## Model Examination [optional]
|
136 |
+
|
137 |
+
<!-- Relevant interpretability work for the model goes here -->
|
138 |
+
|
139 |
+
[More Information Needed]
|
140 |
+
|
141 |
+
## Environmental Impact
|
142 |
+
|
143 |
+
<!-- Total emissions (in grams of CO2eq) and additional considerations, such as electricity usage, go here. Edit the suggested text below accordingly -->
|
144 |
+
|
145 |
+
Carbon emissions can be estimated using the [Machine Learning Impact calculator](https://mlco2.github.io/impact#compute) presented in [Lacoste et al. (2019)](https://arxiv.org/abs/1910.09700).
|
146 |
+
|
147 |
+
- **Hardware Type:** [More Information Needed]
|
148 |
+
- **Hours used:** [More Information Needed]
|
149 |
+
- **Cloud Provider:** [More Information Needed]
|
150 |
+
- **Compute Region:** [More Information Needed]
|
151 |
+
- **Carbon Emitted:** [More Information Needed]
|
152 |
+
|
153 |
+
## Technical Specifications [optional]
|
154 |
+
|
155 |
+
### Model Architecture and Objective
|
156 |
+
|
157 |
+
[More Information Needed]
|
158 |
+
|
159 |
+
### Compute Infrastructure
|
160 |
+
|
161 |
+
[More Information Needed]
|
162 |
+
|
163 |
+
#### Hardware
|
164 |
+
|
165 |
+
[More Information Needed]
|
166 |
+
|
167 |
+
#### Software
|
168 |
+
|
169 |
+
[More Information Needed]
|
170 |
+
|
171 |
+
## Citation [optional]
|
172 |
+
|
173 |
+
<!-- If there is a paper or blog post introducing the model, the APA and Bibtex information for that should go in this section. -->
|
174 |
+
|
175 |
+
**BibTeX:**
|
176 |
+
|
177 |
+
[More Information Needed]
|
178 |
+
|
179 |
+
**APA:**
|
180 |
+
|
181 |
+
[More Information Needed]
|
182 |
+
|
183 |
+
## Glossary [optional]
|
184 |
+
|
185 |
+
<!-- If relevant, include terms and calculations in this section that can help readers understand the model or model card. -->
|
186 |
+
|
187 |
+
[More Information Needed]
|
188 |
+
|
189 |
+
## More Information [optional]
|
190 |
+
|
191 |
+
[More Information Needed]
|
192 |
+
|
193 |
+
## Model Card Authors [optional]
|
194 |
+
|
195 |
+
[More Information Needed]
|
196 |
+
|
197 |
+
## Model Card Contact
|
198 |
+
|
199 |
+
[More Information Needed]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
config.json
ADDED
@@ -0,0 +1,34 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"architectures": [
|
3 |
+
"Gemma3ForCausalLM"
|
4 |
+
],
|
5 |
+
"attention_bias": false,
|
6 |
+
"attention_dropout": 0.0,
|
7 |
+
"attn_logit_softcapping": null,
|
8 |
+
"bos_token_id": 2,
|
9 |
+
"cache_implementation": "hybrid",
|
10 |
+
"eos_token_id": 1,
|
11 |
+
"final_logit_softcapping": null,
|
12 |
+
"head_dim": 256,
|
13 |
+
"hidden_activation": "gelu_pytorch_tanh",
|
14 |
+
"hidden_size": 1152,
|
15 |
+
"initializer_range": 0.02,
|
16 |
+
"intermediate_size": 6912,
|
17 |
+
"max_position_embeddings": 32768,
|
18 |
+
"model_type": "gemma3_text",
|
19 |
+
"num_attention_heads": 4,
|
20 |
+
"num_hidden_layers": 26,
|
21 |
+
"num_key_value_heads": 1,
|
22 |
+
"pad_token_id": 0,
|
23 |
+
"query_pre_attn_scalar": 256,
|
24 |
+
"rms_norm_eps": 1e-06,
|
25 |
+
"rope_local_base_freq": 10000,
|
26 |
+
"rope_scaling": null,
|
27 |
+
"rope_theta": 1000000,
|
28 |
+
"sliding_window": 512,
|
29 |
+
"sliding_window_pattern": 6,
|
30 |
+
"torch_dtype": "bfloat16",
|
31 |
+
"transformers_version": "4.50.0.dev0",
|
32 |
+
"use_cache": true,
|
33 |
+
"vocab_size": 262144
|
34 |
+
}
|
generation_config.json
ADDED
@@ -0,0 +1,8 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
{
|
2 |
+
"_from_model_config": true,
|
3 |
+
"bos_token_id": 2,
|
4 |
+
"cache_implementation": "hybrid",
|
5 |
+
"eos_token_id": 1,
|
6 |
+
"pad_token_id": 0,
|
7 |
+
"transformers_version": "4.50.0.dev0"
|
8 |
+
}
|
model.safetensors
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:612b131bc86a43ae728b5965c9c804daaa3ff0b3a4155bc9723fd690d3c4081a
|
3 |
+
size 1999811208
|