{ "_name_or_path": "facebook/bart-large-mnli", "_num_labels": 3, "activation_dropout": 0.0, "activation_function": "gelu", "add_final_layer_norm": false, "architectures": [ "BartForSequenceClassification" ], "attention_dropout": 0.0, "bos_token_id": 0, "classif_dropout": 0.0, "classifier_dropout": 0.0, "d_model": 1024, "decoder_attention_heads": 16, "decoder_ffn_dim": 4096, "decoder_layerdrop": 0.0, "decoder_layers": 12, "decoder_start_token_id": 2, "dropout": 0.1, "encoder_attention_heads": 16, "encoder_ffn_dim": 4096, "encoder_layerdrop": 0.0, "encoder_layers": 12, "eos_token_id": 2, "forced_eos_token_id": 2, "gradient_checkpointing": false, "id2label": { "0": "Applied computing", "1": "Computer systems organization", "2": "Computing methodologies", "3": "General and reference", "4": "Hardware", "5": "Human-centered computing", "6": "Information systems", "7": "Mathematics of computing", "8": "Networks", "9": "Security and privacy", "10": "Theory of computation" }, "init_std": 0.02, "is_encoder_decoder": true, "label2id": { "Applied computing": 0, "Computer systems organization": 1, "Computing methodologies": 2, "General and reference": 3, "Hardware": 4, "Human-centered computing": 5, "Information systems": 6, "Mathematics of computing": 7, "Networks": 8, "Security and privacy": 9, "Theory of computation": 10 }, "max_position_embeddings": 1024, "model_type": "bart", "normalize_before": false, "num_hidden_layers": 12, "output_past": false, "pad_token_id": 1, "problem_type": "single_label_classification", "scale_embedding": false, "torch_dtype": "float32", "transformers_version": "4.49.0", "use_cache": true, "vocab_size": 50265 }