Add new SentenceTransformer model.
Browse files- 1_Pooling/config.json +10 -0
- README.md +1143 -0
- config.json +44 -0
- config_sentence_transformers.json +10 -0
- model.safetensors +3 -0
- modules.json +14 -0
- onnx/config.json +45 -0
- onnx/configuration.py +145 -0
- onnx/model.onnx +3 -0
- onnx/special_tokens_map.json +37 -0
- onnx/tokenizer.json +0 -0
- onnx/tokenizer_config.json +62 -0
- onnx/vocab.txt +0 -0
- sentence_bert_config.json +4 -0
- special_tokens_map.json +37 -0
- tokenizer.json +0 -0
- tokenizer_config.json +62 -0
- vocab.txt +0 -0
1_Pooling/config.json
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"word_embedding_dimension": 1024,
|
| 3 |
+
"pooling_mode_cls_token": true,
|
| 4 |
+
"pooling_mode_mean_tokens": false,
|
| 5 |
+
"pooling_mode_max_tokens": false,
|
| 6 |
+
"pooling_mode_mean_sqrt_len_tokens": false,
|
| 7 |
+
"pooling_mode_weightedmean_tokens": false,
|
| 8 |
+
"pooling_mode_lasttoken": false,
|
| 9 |
+
"include_prompt": true
|
| 10 |
+
}
|
README.md
ADDED
|
@@ -0,0 +1,1143 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
---
|
| 2 |
+
base_model: Alibaba-NLP/gte-large-en-v1.5
|
| 3 |
+
library_name: sentence-transformers
|
| 4 |
+
metrics:
|
| 5 |
+
- cosine_accuracy@1
|
| 6 |
+
- cosine_accuracy@3
|
| 7 |
+
- cosine_accuracy@5
|
| 8 |
+
- cosine_accuracy@10
|
| 9 |
+
- cosine_precision@1
|
| 10 |
+
- cosine_precision@3
|
| 11 |
+
- cosine_precision@5
|
| 12 |
+
- cosine_precision@10
|
| 13 |
+
- cosine_recall@1
|
| 14 |
+
- cosine_recall@3
|
| 15 |
+
- cosine_recall@5
|
| 16 |
+
- cosine_recall@10
|
| 17 |
+
- cosine_ndcg@10
|
| 18 |
+
- cosine_mrr@10
|
| 19 |
+
- cosine_map@100
|
| 20 |
+
- dot_accuracy@1
|
| 21 |
+
- dot_accuracy@3
|
| 22 |
+
- dot_accuracy@5
|
| 23 |
+
- dot_accuracy@10
|
| 24 |
+
- dot_precision@1
|
| 25 |
+
- dot_precision@3
|
| 26 |
+
- dot_precision@5
|
| 27 |
+
- dot_precision@10
|
| 28 |
+
- dot_recall@1
|
| 29 |
+
- dot_recall@3
|
| 30 |
+
- dot_recall@5
|
| 31 |
+
- dot_recall@10
|
| 32 |
+
- dot_ndcg@10
|
| 33 |
+
- dot_mrr@10
|
| 34 |
+
- dot_map@100
|
| 35 |
+
pipeline_tag: sentence-similarity
|
| 36 |
+
tags:
|
| 37 |
+
- sentence-transformers
|
| 38 |
+
- sentence-similarity
|
| 39 |
+
- feature-extraction
|
| 40 |
+
- generated_from_trainer
|
| 41 |
+
- dataset_size:586
|
| 42 |
+
- loss:MultipleNegativesRankingLoss
|
| 43 |
+
widget:
|
| 44 |
+
- source_sentence: Explain the spectrum of openness in AI systems as described in
|
| 45 |
+
the document. How do open-source AI systems differ from fully closed AI systems
|
| 46 |
+
in terms of accessibility and innovation?
|
| 47 |
+
sentences:
|
| 48 |
+
- 'targets of cyber attacks; or
|
| 49 |
+
|
| 50 |
+
(iii) permitting the evasion of human control or oversight through
|
| 51 |
+
|
| 52 |
+
means of deception or obfuscation.
|
| 53 |
+
|
| 54 |
+
Models meet this definition even if they are provided to end users with
|
| 55 |
+
|
| 56 |
+
technical safeguards that attempt to prevent users from taking advantage of
|
| 57 |
+
|
| 58 |
+
the relevant unsafe capabilities.
|
| 59 |
+
|
| 60 |
+
(l) The term “Federal law enforcement agency” has the meaning set forth
|
| 61 |
+
|
| 62 |
+
in section 21(a) of Executive Order 14074 of May 25, 2022 (Advancing
|
| 63 |
+
|
| 64 |
+
Effective, Accountable Policing and Criminal Justice Practices To Enhance
|
| 65 |
+
|
| 66 |
+
Public Trust and Public Safety).
|
| 67 |
+
|
| 68 |
+
(m) The term “floating-point operation” means any mathematical
|
| 69 |
+
|
| 70 |
+
operation or assignment involving floating-point numbers, which are a
|
| 71 |
+
|
| 72 |
+
subset of the real numbers typically represented on computers by an integer
|
| 73 |
+
|
| 74 |
+
of fixed precision scaled by an integer exponent of a fixed base.
|
| 75 |
+
|
| 76 |
+
(n) The term “foreign person” has the meaning set forth in section 5(c)
|
| 77 |
+
of
|
| 78 |
+
|
| 79 |
+
Executive Order 13984 of January 19, 2021 (Taking Additional Steps To
|
| 80 |
+
|
| 81 |
+
Address the National Emergency With Respect to Significant Malicious
|
| 82 |
+
|
| 83 |
+
Cyber-Enabled Activities).
|
| 84 |
+
|
| 85 |
+
(o) The terms “foreign reseller” and “foreign reseller of United States
|
| 86 |
+
|
| 87 |
+
Infrastructure as a Service Products” mean a foreign person who has
|
| 88 |
+
|
| 89 |
+
established an Infrastructure as a Service Account to provide Infrastructure
|
| 90 |
+
|
| 91 |
+
as a Service Products subsequently, in whole or in part, to a third party.
|
| 92 |
+
|
| 93 |
+
(p) The term “generative AI” means the class of AI models that emulate
|
| 94 |
+
|
| 95 |
+
the structure and characteristics of input data in order to generate derived
|
| 96 |
+
|
| 97 |
+
synthetic content. This can include images, videos, audio, text, and other
|
| 98 |
+
|
| 99 |
+
digital content.
|
| 100 |
+
|
| 101 |
+
(q) The terms “Infrastructure as a Service Product,” “United States
|
| 102 |
+
|
| 103 |
+
Infrastructure as a Service Product,” “United States Infrastructure as a
|
| 104 |
+
|
| 105 |
+
Service Provider,” and “Infrastructure as a Service Account” each have the
|
| 106 |
+
|
| 107 |
+
respective meanings given to those terms in section 5 of Executive Order
|
| 108 |
+
|
| 109 |
+
13984.
|
| 110 |
+
|
| 111 |
+
(r) The term “integer operation” means any mathematical operation or
|
| 112 |
+
|
| 113 |
+
assignment involving only integers, or whole numbers expressed without a
|
| 114 |
+
|
| 115 |
+
decimal point.05/10/2024, 16:36 Executive Order on the Safe, Secure, and Trustworthy
|
| 116 |
+
Development and Use of Artificial Intelligence | The White House
|
| 117 |
+
|
| 118 |
+
https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artific…
|
| 119 |
+
7/59'
|
| 120 |
+
- "AI safety, enable next-generation medical diagnoses and further other\ncritical\
|
| 121 |
+
\ AI priorities.\n\0\0 Released a for designing safe, secure, and trustworthy\
|
| 122 |
+
\ AI tools\nfor use in education. The Department of Education’s guide discusses\n\
|
| 123 |
+
how developers of educational technologies can design AI that benefits\nstudents\
|
| 124 |
+
\ and teachers while advancing equity, civil rights, trust, and\ntransparency.\
|
| 125 |
+
\ This work builds on the Department’s 2023 \noutlining recommendations for the\
|
| 126 |
+
\ use of AI in teaching and learning.\n\0\0 Published guidance on evaluating the\
|
| 127 |
+
\ eligibility of patent claims\ninvolving inventions related to AI technology, as\
|
| 128 |
+
\ well as other\nemerging technologies. The guidance by the U.S. Patent and Trademark\n\
|
| 129 |
+
Office will guide those inventing in the AI space to protect their AI\ninventions\
|
| 130 |
+
\ and assist patent examiners reviewing applications for\npatents on AI inventions.\n\
|
| 131 |
+
\0\0 Issued a on federal research and development (R&D) to\nadvance trustworthy\
|
| 132 |
+
\ AI over the past four years. The report by the\nNational Science and Technology\
|
| 133 |
+
\ Council examines an annual federal AI\nR&D budget of nearly $3 billion.\n\0\0\
|
| 134 |
+
\ Launched a $23 million initiative to promote the use of privacy-\nenhancing\
|
| 135 |
+
\ technologies to solve real-world problems, including\nrelated to AI. Working\
|
| 136 |
+
\ with industry and agency partners, NSF will\ninvest through its new Privacy-preserving\
|
| 137 |
+
\ Data Sharing in Practice\nprogram in efforts to apply, mature, and scale privacy-enhancing\n\
|
| 138 |
+
technologies for specific use cases and establish testbeds to accelerate\ntheir\
|
| 139 |
+
\ adoption.\n\0\0 Announced millions of dollars in further investments to advance\n\
|
| 140 |
+
responsible AI development and use throughout our society. These\ninclude $30\
|
| 141 |
+
\ million invested through NSF’s Experiential Learning in\nEmerging and Novel\
|
| 142 |
+
\ Technologies program—which supports inclusive\nexperiential learning in fields\
|
| 143 |
+
\ like AI—and $10 million through NSF’s\nExpandAI program, which helps build capacity\
|
| 144 |
+
\ in AI research at\nminority-serving institutions while fostering the development\
|
| 145 |
+
\ of a\ndiverse, AI-ready workforce.\nAdvancing U.S. Leadership Abroad\nPresident\
|
| 146 |
+
\ Biden’s Executive Order emphasized that the United States lead\nglobal efforts\
|
| 147 |
+
\ to unlock AI’s potential and meet its challenges. To advance\nU.S. leadership\
|
| 148 |
+
\ on AI, agencies have:guide\nreport\nreport05/10/2024, 16:35 FACT SHEET: Biden-Harris\
|
| 149 |
+
\ Administration Announces New AI Actions and Receives Additional Major Voluntary\
|
| 150 |
+
\ Commitment on AI | The…\nhttps://www.whitehouse.gov/briefing-room/statements-releases/2024/07/26/fact-sheet-biden-harris-administration-announces-new-ai-actions-and-receives-addit…\
|
| 151 |
+
\ 4/10"
|
| 152 |
+
- "50 Governing AI for Humanity processes such as the recent scientific report\
|
| 153 |
+
\ \non the risks of advanced AI commissioned by \nthe United Kingdom,25 and relevant\
|
| 154 |
+
\ regional \norganizations.\ne. A steering committee would develop a research\
|
| 155 |
+
\ \nagenda ensuring the inclusivity of views and \nincorporation of ethical considerations,\
|
| 156 |
+
\ oversee \nthe allocation of resources, foster collaboration \nwith a network\
|
| 157 |
+
\ of academic institutions and \nother stakeholders, and review the panel’s \n\
|
| 158 |
+
activities and deliverables.100 By drawing on the unique convening power of the\
|
| 159 |
+
\ \nUnited Nations and inclusive global reach across \nstakeholder groups, an\
|
| 160 |
+
\ international scientific panel \ncan deliver trusted scientific collaboration\
|
| 161 |
+
\ processes \nand outputs and correct information asymmetries \nin ways that address\
|
| 162 |
+
\ the representation and \ncoordination gaps identified in paragraphs 66 and \n\
|
| 163 |
+
73, thereby promoting equitable and effective \ninternational AI governance.\n\
|
| 164 |
+
Among the topics discussed in our consultations was the ongoing debate over open\
|
| 165 |
+
\ versus closed AI systems. \nAI systems that are open in varying degrees are\
|
| 166 |
+
\ often referred to as “open-source AI”, but this is somewhat of a \nmisnomer\
|
| 167 |
+
\ when compared with open-source software (code). It is important to recognize\
|
| 168 |
+
\ that openness in AI \nsystems is more of a spectrum than a single attribute.\n\
|
| 169 |
+
One article explained that a “fully closed AI system is only accessible to a particular\
|
| 170 |
+
\ group. It could be an AI \ndeveloper company or a specific group within it,\
|
| 171 |
+
\ mainly for internal research and development purposes. On the \nother hand,\
|
| 172 |
+
\ more open systems may allow public access or make available certain parts, such\
|
| 173 |
+
\ as data, code, or \nmodel characteristics, to facilitate external AI development.”a\n\
|
| 174 |
+
Open-source AI systems in the generative AI field present both risks and opportunities.\
|
| 175 |
+
\ Companies often cite “AI \nsafety” as a reason for not disclosing system specifications,\
|
| 176 |
+
\ reflecting the ongoing tension between open and \nclosed approaches in the industry.\
|
| 177 |
+
\ Debates typically revolve around two extremes: full openness, which entails\
|
| 178 |
+
\ \nsharing all model components and data sets; and partial openness, which involves\
|
| 179 |
+
\ disclosing only model weights. \nOpen-source AI systems encourage innovation\
|
| 180 |
+
\ and are often a requirement for public funding. On the open \nextreme of the\
|
| 181 |
+
\ spectrum, when the underlying code is made freely available, developers around\
|
| 182 |
+
\ the world can \nexperiment, improve and create new applications. This fosters\
|
| 183 |
+
\ a collaborative environment where ideas and \nexpertise are readily shared.\
|
| 184 |
+
\ Some industry leaders argue that this openness is vital to innovation and economic\
|
| 185 |
+
\ \ngrowth.\nHowever, in most cases, open-source AI models are available as application\
|
| 186 |
+
\ programming interfaces. In this case, \nthe original code is not shared, the\
|
| 187 |
+
\ original weights are never changed and model updates become new models. \nAdditionally,\
|
| 188 |
+
\ open-source models tend to be smaller and more transparent. This transparency\
|
| 189 |
+
\ can build trust, \nallow for ethical considerations to be proactively addressed,\
|
| 190 |
+
\ and support validation and replication because users \ncan examine the inner\
|
| 191 |
+
\ workings of the AI system, understand its decision-making process and identify\
|
| 192 |
+
\ potential \nbiases.Box 9: Open versus closed AI systems\na Angela Luna, “The\
|
| 193 |
+
\ open or closed AI dilemma”, 2 May 2024. Available at https://bipartisanpolicy.org/blog/the-open-or-closed-ai-dilemma\
|
| 194 |
+
\ .\n25 International Scientific Report on the Safety of Advanced AI: Interim\
|
| 195 |
+
\ Report. Available at https://gov.uk/government/publications/international-scientific-report-\n\
|
| 196 |
+
on-the-safety-of-advanced-ai ."
|
| 197 |
+
- source_sentence: What role does the report propose for the United Nations in establishing
|
| 198 |
+
a governance regime for AI, and how does it envision this regime contributing
|
| 199 |
+
to a new social contract that protects vulnerable populations?
|
| 200 |
+
sentences:
|
| 201 |
+
- "HUMAN ALTERNATIVES, \nCONSIDERATION, AND \nFALLBACK \nHOW THESE PRINCIPLES CAN\
|
| 202 |
+
\ MOVE INTO PRACTICE\nReal-life examples of how these principles can become reality,\
|
| 203 |
+
\ through laws, policies, and practical \ntechnical and sociotechnical approaches\
|
| 204 |
+
\ to protecting rights, opportunities, and access. \nHealthcare “navigators” help\
|
| 205 |
+
\ people find their way through online signup forms to choose \nand obtain healthcare.\
|
| 206 |
+
\ A Navigator is “an individual or organization that's trained and able to help\
|
| 207 |
+
\ \nconsumers, small businesses, and their employees as they look for health coverage\
|
| 208 |
+
\ options through the \nMarketplace (a government web site), including completing\
|
| 209 |
+
\ eligibility and enrollment forms.”106 For \nthe 2022 plan year, the Biden-Harris\
|
| 210 |
+
\ Administration increased funding so that grantee organizations could \n“train\
|
| 211 |
+
\ and certify more than 1,500 Navigators to help uninsured consumers find affordable\
|
| 212 |
+
\ and comprehensive \nhealth coverage. ”107\nThe customer service industry has\
|
| 213 |
+
\ successfully integrated automated services such as \nchat-bots and AI-driven\
|
| 214 |
+
\ call response systems with escalation to a human support team.\n108 Many businesses\
|
| 215 |
+
\ now use partially automated customer service platforms that help answer customer\
|
| 216 |
+
\ \nquestions and compile common problems for human agents to review. These integrated\
|
| 217 |
+
\ human-AI \nsystems allow companies to provide faster customer care while maintaining\
|
| 218 |
+
\ human agents to answer \ncalls or otherwise respond to complicated requests.\
|
| 219 |
+
\ Using both AI and human agents is viewed as key to \nsuccessful customer service.109\n\
|
| 220 |
+
Ballot curing laws in at least 24 states require a fallback system that allows\
|
| 221 |
+
\ voters to \ncorrect their ballot and have it counted in the case that a voter\
|
| 222 |
+
\ signature matching algorithm incorrectly flags their ballot as invalid or there\
|
| 223 |
+
\ is another issue with their ballot, and review by an election official does\
|
| 224 |
+
\ not rectify the problem. Some federal courts have found that such cure procedures\
|
| 225 |
+
\ are constitutionally required.\n110 Ballot \ncuring processes vary among states,\
|
| 226 |
+
\ and include direct phone calls, emails, or mail contact by election \nofficials.111\
|
| 227 |
+
\ Voters are asked to provide alternative information or a new signature to verify\
|
| 228 |
+
\ the validity of their \nballot. \n52"
|
| 229 |
+
- "SECTION TITLE\nHUMAN ALTERNATIVES , C ONSIDERATION , AND FALLBACK\nYou should\
|
| 230 |
+
\ be able to opt out, where appropriate, and have access to a person who can quickly\
|
| 231 |
+
\ \nconsider and remedy problems you encounter. You should be able to opt out\
|
| 232 |
+
\ from automated systems in \nfavor of a human alternative, where appropriate.\
|
| 233 |
+
\ Appropriateness should be determined based on reasonable expectations in a given\
|
| 234 |
+
\ context and with a focus on ensuring broad accessibility and protecting the\
|
| 235 |
+
\ public from especially harmful impacts. In some cases, a human or other alternative\
|
| 236 |
+
\ may be required by law. You should have access to timely human consideration\
|
| 237 |
+
\ and remedy by a fallback and escalation process if an automated system fails,\
|
| 238 |
+
\ it produces an error, or you would like to appeal or contest its impacts on\
|
| 239 |
+
\ you. Human consideration and fallback should be accessible, equitable, effective,\
|
| 240 |
+
\ maintained, accompanied by appropriate operator training, and should not impose\
|
| 241 |
+
\ an unreasonable burden on the public. Automated systems with an intended use\
|
| 242 |
+
\ within sensi\n-\ntive domains, including, but not limited to, criminal justice,\
|
| 243 |
+
\ employment, education, and health, should additional -\nly be tailored to the\
|
| 244 |
+
\ purpose, provide meaningful access for oversight, include training for any people\
|
| 245 |
+
\ interacting with the system, and incorporate human consideration for adverse\
|
| 246 |
+
\ or high-risk decisions. Reporting that includes a description of these human\
|
| 247 |
+
\ governance processes and assessment of their timeliness, accessibility, outcomes,\
|
| 248 |
+
\ and effectiveness should be made public whenever possible. \nDefinitions for\
|
| 249 |
+
\ key terms in The Blueprint for an AI Bill of Rights can be found in Applying\
|
| 250 |
+
\ the Blueprint for an AI Bill of Rights. \nAccompanying analysis and tools for\
|
| 251 |
+
\ actualizing each principle can be found in the Technical Companion. \n7"
|
| 252 |
+
- "Final Report 21E. Reflections on institutional \nmodels\nlxiv Discussions\
|
| 253 |
+
\ about AI often resolve into extremes. \nIn our consultations around the world,\
|
| 254 |
+
\ we engaged \nwith those who see a future of boundless goods \nprovided by ever-cheaper,\
|
| 255 |
+
\ ever-more-helpful AI \nsystems. We also spoke with those wary of darker \nfutures,\
|
| 256 |
+
\ of division and unemployment, and even \nextinction.8\nlxv We do not know whether\
|
| 257 |
+
\ the utopian or dystopian \nfuture is more likely. Equally, we are mindful that\
|
| 258 |
+
\ \nthe technology may go in a direction that does \naway with this duality. This\
|
| 259 |
+
\ report focuses on \nthe near-term opportunities and risks, based on \nscience\
|
| 260 |
+
\ and grounded in fact. \nlxvi The seven recommendations outlined above offer\
|
| 261 |
+
\ \nour best hope for reaping the benefits of AI, while \nminimizing and mitigating\
|
| 262 |
+
\ the risks, as AI continues \nevolving. We are also mindful of the practical\
|
| 263 |
+
\ \nchallenges to international institution-building \non a larger scale. This\
|
| 264 |
+
\ is why we are proposing a \nnetworked institutional approach, with light and\
|
| 265 |
+
\ \nagile support. If or when risks become more acute \nand the stakes for opportunities\
|
| 266 |
+
\ escalate, such \ncalculations may change. \nlxvii The world wars led to the\
|
| 267 |
+
\ modern international \nsystem; the development of ever-more-powerful \nchemical,\
|
| 268 |
+
\ biological and nuclear weapons led \nto regimes limiting their spread and promoting\
|
| 269 |
+
\ \npeaceful uses of the underlying technologies. \nEvolving understanding of\
|
| 270 |
+
\ our common humanity \nled to the modern human rights system and our \nongoing\
|
| 271 |
+
\ commitment to the SDGs for all. Climate \nchange evolved from a niche concern\
|
| 272 |
+
\ to a global \nchallenge.lxviii AI may similarly rise to a level that requires\
|
| 273 |
+
\ more \nresources and more authority than is proposed \nin the above-mentioned\
|
| 274 |
+
\ recommendations, \ninto harder functions of norm elaboration, \nimplementation,\
|
| 275 |
+
\ monitoring, verification and \nvalidation, enforcement, accountability, remedies\
|
| 276 |
+
\ \nfor harm and emergency responses. Reflecting on \nsuch institutional models,\
|
| 277 |
+
\ therefore, is prudent. The \nfinal section of this report seeks to contribute\
|
| 278 |
+
\ to \nthat effort.\n4. A call to action\nlxix We remain optimistic about the\
|
| 279 |
+
\ future with AI and \nits positive potential. That optimism depends, \nhowever,\
|
| 280 |
+
\ on realism about the risks and the \ninadequacy of structures and incentives\
|
| 281 |
+
\ currently \nin place. The technology is too important, and the \nstakes are\
|
| 282 |
+
\ too high, to rely only on market forces \nand a fragmented patchwork of national\
|
| 283 |
+
\ and \nmultilateral action.\nlxx The United Nations can be the vehicle for a\
|
| 284 |
+
\ new \nsocial contract for AI that ensures global buy-\nin for a governance regime\
|
| 285 |
+
\ which protects and \nempowers us all. Such a social contract will ensure \n\
|
| 286 |
+
that opportunities are fairly distributed, and the \nrisks are not loaded on to\
|
| 287 |
+
\ the most vulnerable – or \npassed on to future generations, as we have seen,\
|
| 288 |
+
\ \ntragically, with climate change.\nlxxi As a group and as individuals from\
|
| 289 |
+
\ across many \nfields of expertise, organizations and parts of the \nworld, we\
|
| 290 |
+
\ look forward to continuing this crucial \nconversation. Together with the many\
|
| 291 |
+
\ others we \nhave connected with on this journey, and the global \ncommunity\
|
| 292 |
+
\ they represent, we hope that this report \ncontributes to our combined efforts\
|
| 293 |
+
\ to govern AI \nfor humanity.\n8 See https://safe.ai/work/statement-on-ai-risk\
|
| 294 |
+
\ ."
|
| 295 |
+
- source_sentence: What are the potential consequences of coordination gaps between
|
| 296 |
+
various AI governance initiatives, as highlighted in the context information?
|
| 297 |
+
sentences:
|
| 298 |
+
- "44 Governing AI for Humanity B. Coordination gaps\n72 The ongoing emergence\
|
| 299 |
+
\ and evolution of AI \ngovernance initiatives are not guaranteed to \nwork together\
|
| 300 |
+
\ effectively for humanity. Instead, \ncoordination gaps have appeared. Effective\
|
| 301 |
+
\ \nhandshaking between the selective plurilateral \ninitiatives (see fig. 8)\
|
| 302 |
+
\ and other regional initiatives is \nnot assured, risking incompatibility between\
|
| 303 |
+
\ regions.\n73 Nor are there global mechanisms for all international \nstandards\
|
| 304 |
+
\ development organizations (see fig. 7), \ninternational scientific research\
|
| 305 |
+
\ initiatives or AI \ncapacity-building initiatives to coordinate with each \n\
|
| 306 |
+
other, undermining interoperability of approaches \nand resulting in fragmentation.\
|
| 307 |
+
\ The resulting \ncoordination gaps between various sub-global \ninitiatives are\
|
| 308 |
+
\ in some cases best addressed at the \nglobal level.\n74 A separate set of coordination\
|
| 309 |
+
\ gaps arise within \nthe United Nations system, reflected in the array of \n\
|
| 310 |
+
diverse United Nations documents and initiatives \nin relation to AI. Figure 9\
|
| 311 |
+
\ shows 27 United Nations-\nrelated instruments in specific domains that may \n\
|
| 312 |
+
apply to AI – 23 of them are binding and will require \ninterpretation as they\
|
| 313 |
+
\ pertain to AI. A further 29 \ndomain-level documents from the United Nations\
|
| 314 |
+
\ \nand related organizations focus specifically on AI, \nnone of which are binding.17\
|
| 315 |
+
\ In some cases, these \ncan address AI risks and harness AI benefits in \nspecific\
|
| 316 |
+
\ domains.75 The level of activity shows the importance of AI \nto United Nations\
|
| 317 |
+
\ programmes. As AI expands to \naffect ever-wider aspects of society, there will\
|
| 318 |
+
\ be \ngrowing calls for diverse parts of the United Nations \nsystem to act,\
|
| 319 |
+
\ including through binding norms. \nIt also shows the ad hoc nature of the responses,\
|
| 320 |
+
\ \nwhich have largely developed organically in specific \ndomains and without\
|
| 321 |
+
\ an overarching strategy. The \nresulting coordination gaps invite overlaps and\
|
| 322 |
+
\ \nhinder interoperability and impact.\n76 The number and diversity of approaches\
|
| 323 |
+
\ are a sign \nthat the United Nations system is responding to \nan emerging issue.\
|
| 324 |
+
\ With proper orchestration, and \nin combination with processes taking a holistic\
|
| 325 |
+
\ \napproach, these efforts can offer an efficient and \nsustainable pathway to\
|
| 326 |
+
\ inclusive international AI \ngovernance in specific domains. This could enable\
|
| 327 |
+
\ \nmeaningful, harmonized and coordinated impacts \non areas such as health,\
|
| 328 |
+
\ education, technical \nstandards and ethics, instead of merely contributing\
|
| 329 |
+
\ \nto the proliferation of initiatives and institutions \nin this growing field.\
|
| 330 |
+
\ International law, including \ninternational human rights law, provides a shared\
|
| 331 |
+
\ \nnormative foundation for all AI-related efforts, \nthereby facilitating coordination\
|
| 332 |
+
\ and coherence."
|
| 333 |
+
- "\0\0 Issued a comprehensive plan for U.S. engagement on global AI\nstandards. The\
|
| 334 |
+
\ plan, developed by the NIST, incorporates broad public\nand private-sector input,\
|
| 335 |
+
\ identifies objectives and priority areas for AI\nstandards work, and lays out\
|
| 336 |
+
\ actions for U.S. stakeholders including U.S.\nagencies. NIST and others agencies\
|
| 337 |
+
\ will report on priority actions in 180\ndays. \n\0\0 Developed for managing\
|
| 338 |
+
\ risks to human rights posed by AI.\nThe Department of State’s “Risk Management\
|
| 339 |
+
\ Profile for AI and Human\nRights”—developed in close coordination with NIST and\
|
| 340 |
+
\ the U.S. Agency\nfor International Development—recommends actions based on the\
|
| 341 |
+
\ NIST\nAI Risk Management Framework to governments, the private sector, and\n\
|
| 342 |
+
civil society worldwide, to identify and manage risks to human rights\narising\
|
| 343 |
+
\ from the design, development, deployment, and use of AI. \n\0\0 Launched a global\
|
| 344 |
+
\ network of AI Safety Institutes and other\ngovernment-backed scientific offices\
|
| 345 |
+
\ to advance AI safety at a technical\nlevel. This network will accelerate critical\
|
| 346 |
+
\ information exchange and\ndrive toward common or compatible safety evaluations\
|
| 347 |
+
\ and policies.\n\0\0 Launched a landmark United Nations General Assembly resolution.\n\
|
| 348 |
+
The unanimously adopted resolution, with more than 100 co-sponsors,\nlays out\
|
| 349 |
+
\ a common vision for countries around the world to promote the\nsafe and secure\
|
| 350 |
+
\ use of AI to address global challenges.\n\0\0 Expanded global support for the\
|
| 351 |
+
\ U.S.-led Political Declaration on the\nResponsible Military Use of Artificial\
|
| 352 |
+
\ Intelligence and\nAutonomy. Fifty-five nations now endorse the political declaration,\n\
|
| 353 |
+
which outlines a set of norms for the responsible development,\ndeployment, and\
|
| 354 |
+
\ use of military AI capabilities.\nThe Table below summarizes many of the activities\
|
| 355 |
+
\ that federal agencies\nhave completed in response to the Executive Order:guidance05/10/2024,\
|
| 356 |
+
\ 16:35 FACT SHEET: Biden-Harris Administration Announces New AI Actions and Receives\
|
| 357 |
+
\ Additional Major Voluntary Commitment on AI | The…\nhttps://www.whitehouse.gov/briefing-room/statements-releases/2024/07/26/fact-sheet-biden-harris-administration-announces-new-ai-actions-and-receives-addit…\
|
| 358 |
+
\ 5/10"
|
| 359 |
+
- "Final Report 55f. In addition, diverse stakeholders – in particular \ntechnology\
|
| 360 |
+
\ companies and civil society \nrepresentatives – could be invited to engage \n\
|
| 361 |
+
through existing institutions detailed below, as \nwell as policy workshops on\
|
| 362 |
+
\ particular aspects \nof AI governance such as limits (if any) of open-\nsource\
|
| 363 |
+
\ approaches to the most advanced forms \nof AI, thresholds for tracking and reporting\
|
| 364 |
+
\ of \nAI incidents, application of human rights law to \nnovel use cases, or\
|
| 365 |
+
\ the use of competition law/\nantitrust to address concentrations of power \n\
|
| 366 |
+
among technology companies.30\ng. The proposed AI office could also curate a \n\
|
| 367 |
+
repository of AI governance examples, including \nlegislation, policies and institutions\
|
| 368 |
+
\ from \naround the world for consideration of the policy \ndialogue, working\
|
| 369 |
+
\ with existing efforts, such as \nOECD.\n109 Notwithstanding the two General\
|
| 370 |
+
\ Assembly \nresolutions on AI in 2024, there is currently \nno mandated institutionalized\
|
| 371 |
+
\ dialogue on \nAI governance at the United Nations that \ncorresponds to the\
|
| 372 |
+
\ reliably inclusive vision of this \nrecommendation. Similar processes do exist\
|
| 373 |
+
\ at \nthe international level, but primarily in regional or \nplurilateral constellations\
|
| 374 |
+
\ (para. 57), which are not \nreliably inclusive and global.\n110 Complementing\
|
| 375 |
+
\ a fluid process of plurilateral and \nregional AI summits,31 the United Nations\
|
| 376 |
+
\ can \noffer a stable home for dialogue on AI governance. \nInclusion by design\
|
| 377 |
+
\ – a crucial requirement for \nplaying a stabilizing role in geopolitically delicate\
|
| 378 |
+
\ \ntimes – can also address representation and \ncoordination gaps identified\
|
| 379 |
+
\ in paragraphs 64 and \n72, promoting more effective collective action on AI\
|
| 380 |
+
\ \ngovernance in the common interest of all countries. AI standards exchange\
|
| 381 |
+
\ \n \nRecommendation 3: AI standards exchange \n \nWe recommend the creation\
|
| 382 |
+
\ of an AI standards \nexchange, bringing together representatives from \nnational\
|
| 383 |
+
\ and international standard-development \norganizations, technology companies,\
|
| 384 |
+
\ civil society \nand representatives from the international scientific \npanel.\
|
| 385 |
+
\ It would be tasked with:\na. Developing and maintaining a register of \ndefinitions\
|
| 386 |
+
\ and applicable standards for \nmeasuring and evaluating AI systems;\nb. Debating\
|
| 387 |
+
\ and evaluating the standards and the \nprocesses for creating them; and\nc.\
|
| 388 |
+
\ Identifying gaps where new standards are \nneeded.\n111 When AI systems were\
|
| 389 |
+
\ first explored, few standards \nexisted to help to navigate or measure this\
|
| 390 |
+
\ new \nfrontier. The Turing Test – of whether a machine can \nexhibit behaviour\
|
| 391 |
+
\ equivalent to (or indistinguishable \nfrom) a human being – captured the popular\
|
| 392 |
+
\ \nimagination, but is of more cultural than scientific \nsignificance. Indeed,\
|
| 393 |
+
\ it is telling that some of \nthe greatest computational advances have been \n\
|
| 394 |
+
measured by their success in games, such as when \na computer could beat humans\
|
| 395 |
+
\ at chess, Go, poker \nor Jeopardy. Such measures were easily understood \nby\
|
| 396 |
+
\ non-specialists, but were neither rigorous nor \nparticularly scientific.\n\
|
| 397 |
+
112 More recently, there has been a proliferation of \nstandards. Figure 13 illustrates\
|
| 398 |
+
\ the increasing \nnumber of relevant standards adopted by ITU, the \nInternational\
|
| 399 |
+
\ Organization for Standardization (ISO), \nthe International Electrotechnical\
|
| 400 |
+
\ Commission \n(IEC) and the Institute of Electrical and Electronics \nEngineers\
|
| 401 |
+
\ (IEEE).32\n30 Such a gathering could also provide an opportunity for multi-stakeholder\
|
| 402 |
+
\ debate of any hardening of the global governance of AI. These might include,\
|
| 403 |
+
\ for \nexample, prohibitions on the development of uncontainable or uncontrollable\
|
| 404 |
+
\ AI systems, or requirements that all AI systems be sufficiently transparent\
|
| 405 |
+
\ so that \ntheir consequences can be traced back to a legal actor that can assume\
|
| 406 |
+
\ responsibility for them.\n31 Although multiple AI summits have helped a subset\
|
| 407 |
+
\ of 20–30 countries to align on AI safety issues, participation has been inconsistent:\
|
| 408 |
+
\ Brazil, China and \nIreland endorsed the Bletchley Declaration in November 2023,\
|
| 409 |
+
\ but not the Seoul Ministerial Statement six months later (see fig. 12). Conversely,\
|
| 410 |
+
\ Mexico and \nNew Zealand endorsed the Seoul Ministerial Statement, but did not\
|
| 411 |
+
\ endorse the Bletchley Declaration.\n32 Many new standards are also emerging\
|
| 412 |
+
\ at the national and multinational levels, such as the United States White House\
|
| 413 |
+
\ Voluntary AI Commitments and the \nEuropean Union Codes of Practice for the\
|
| 414 |
+
\ AI Act."
|
| 415 |
+
- source_sentence: Describe the minimum set of criteria that should be included in
|
| 416 |
+
the incident reporting process for GAI systems, according to the organizational
|
| 417 |
+
practices established for identifying incidents.
|
| 418 |
+
sentences:
|
| 419 |
+
- "APPENDIX\nSummaries of Additional Engagements: \n•OSTP created an email address\
|
| 420 |
+
\ ( ai-equity@ostp.eop.gov ) to solicit comments from the public on the use of\n\
|
| 421 |
+
artificial intelligence and other data-driven technologies in their lives.\n•OSTP\
|
| 422 |
+
\ issued a Request For Information (RFI) on the use and governance of biometric\
|
| 423 |
+
\ technologies.113 The\npurpose of this RFI was to understand the extent and variety\
|
| 424 |
+
\ of biometric technologies in past, current, or\nplanned use; the domains in\
|
| 425 |
+
\ which these technologies are being used; the entities making use of them; currentprinciples,\
|
| 426 |
+
\ practices, or policies governing their use; and the stakeholders that are, or\
|
| 427 |
+
\ may be, impacted by theiruse or regulation. The 130 responses to this RFI are\
|
| 428 |
+
\ available in full online\n114 and were submitted by the below\nlisted organizations\
|
| 429 |
+
\ and individuals:\nAccenture \nAccess Now ACT | The App Association AHIP \nAIethicist.org\
|
| 430 |
+
\ \nAirlines for America Alliance for Automotive Innovation Amelia Winger-Bearskin\
|
| 431 |
+
\ American Civil Liberties Union American Civil Liberties Union of Massachusetts\
|
| 432 |
+
\ American Medical Association ARTICLE19 Attorneys General of the District of\
|
| 433 |
+
\ Columbia, Illinois, Maryland, Michigan, Minnesota, New York, North Carolina,\
|
| 434 |
+
\ Oregon, Vermont, and Washington Avanade Aware Barbara Evans Better Identity\
|
| 435 |
+
\ Coalition Bipartisan Policy Center Brandon L. Garrett and Cynthia Rudin Brian\
|
| 436 |
+
\ Krupp Brooklyn Defender Services BSA | The Software Alliance Carnegie Mellon\
|
| 437 |
+
\ University Center for Democracy & Technology Center for New Democratic Processes\
|
| 438 |
+
\ Center for Research and Education on Accessible Technology and Experiences at\
|
| 439 |
+
\ University of Washington, Devva Kasnitz, L Jean Camp, Jonathan Lazar, Harry\
|
| 440 |
+
\ Hochheiser Center on Privacy & Technology at Georgetown Law Cisco Systems City\
|
| 441 |
+
\ of Portland Smart City PDX Program CLEAR Clearview AI Cognoa Color of Change\
|
| 442 |
+
\ Common Sense Media Computing Community Consortium at Computing Research Association\
|
| 443 |
+
\ Connected Health Initiative Consumer Technology Association Courtney Radsch\
|
| 444 |
+
\ Coworker Cyber Farm Labs Data & Society Research Institute Data for Black Lives\
|
| 445 |
+
\ Data to Actionable Knowledge Lab at Harvard University Deloitte Dev Technology\
|
| 446 |
+
\ Group Digital Therapeutics Alliance Digital Welfare State & Human Rights Project\
|
| 447 |
+
\ and Center for Human Rights and Global Justice at New York University School\
|
| 448 |
+
\ of Law, and Temple University Institute for Law, Innovation & Technology Dignari\
|
| 449 |
+
\ Douglas Goddard Edgar Dworsky Electronic Frontier Foundation Electronic Privacy\
|
| 450 |
+
\ Information Center, Center for Digital Democracy, and Consumer Federation of\
|
| 451 |
+
\ America FaceTec Fight for the Future Ganesh Mani Georgia Tech Research Institute\
|
| 452 |
+
\ Google Health Information Technology Research and Development Interagency Working\
|
| 453 |
+
\ Group HireVue HR Policy Association ID.me Identity and Data Sciences Laboratory\
|
| 454 |
+
\ at Science Applications International Corporation Information Technology and\
|
| 455 |
+
\ Innovation Foundation Information Technology Industry Council Innocence Project\
|
| 456 |
+
\ Institute for Human-Centered Artificial Intelligence at Stanford University\
|
| 457 |
+
\ Integrated Justice Information Systems Institute International Association of\
|
| 458 |
+
\ Chiefs of Police International Biometrics + Identity Association International\
|
| 459 |
+
\ Business Machines Corporation International Committee of the Red Cross Inventionphysics\
|
| 460 |
+
\ iProov Jacob Boudreau Jennifer K. Wagner, Dan Berger, Margaret Hu, and Sara\
|
| 461 |
+
\ Katsanis Jonathan Barry-Blocker Joseph Turow Joy Buolamwini Joy Mack Karen Bureau\
|
| 462 |
+
\ Lamont Gholston Lawyers’ Committee for Civil Rights Under Law \n60"
|
| 463 |
+
- "19 GV-4.1-003 Establish policies, procedures, and processes for oversight functions\
|
| 464 |
+
\ (e.g., senior \nleadership, legal, compliance, including internal evaluation\
|
| 465 |
+
\ ) across the GAI \nlifecycle, from problem formulation and supply chains to\
|
| 466 |
+
\ system decommission. Value Chain and Component \nIntegration \nAI Actor Tasks:\
|
| 467 |
+
\ AI Deployment, AI Design, AI Development, Operation and Monitoring \n \nGOVERN\
|
| 468 |
+
\ 4.2: Organizational teams document the risks and potential impacts of the AI\
|
| 469 |
+
\ technology they design, develop, deploy, \nevaluate, and use, and they communicate\
|
| 470 |
+
\ about the impacts more broadly. \nAction ID Suggested Action GAI Risks \n\
|
| 471 |
+
GV-4.2-001 Establish terms of use and terms of service for GAI systems . Intellectual\
|
| 472 |
+
\ Property ; Dangerous , \nViolent, or Hateful Content ; \nObscene, Degrading,\
|
| 473 |
+
\ and/or \nAbusive Content \nGV-4.2-002 Include relevant AI Actors in the GAI\
|
| 474 |
+
\ system risk identification process. Human -AI Configuration \nGV-4.2-0 03 Verify\
|
| 475 |
+
\ that downstream GAI system impacts (such as the use of third -party \nplugins)\
|
| 476 |
+
\ are included in the impact documentation process. Value Chain and Component\
|
| 477 |
+
\ \nIntegration \nAI Actor Tasks: AI Deployment, AI Design, AI Development,\
|
| 478 |
+
\ Operation and Monitoring \n \nGOVERN 4.3: Organizational practices are in place\
|
| 479 |
+
\ to enable AI testing, identification of incidents, and information sharing. \
|
| 480 |
+
\ \nAction ID Suggested Action GAI Risks \nGV4.3-- 001 Establish policies for\
|
| 481 |
+
\ measuring the effectiveness of employed content \nprovenance methodologies (e.g.,\
|
| 482 |
+
\ cryptography, watermarking, steganography, etc.) Information Integrity \nGV-4.3-002\
|
| 483 |
+
\ Establish o rganizational practices to identify the minimum set of criteria\
|
| 484 |
+
\ \nnecessary for GAI system incident reporting such as: System ID (auto -generated\
|
| 485 |
+
\ \nmost likely), Title, Reporter, System/Source, Data Reported, Date of Incident,\
|
| 486 |
+
\ Description, Impact(s), Stakeholder(s) Impacted. Information Security"
|
| 487 |
+
- "72 Governing AI for Humanity Box 15: Possible functions and first-year deliverables\
|
| 488 |
+
\ of the AI office\nThe AI office should have a light structure and aim to be\
|
| 489 |
+
\ agile, trusted and networked. Where necessary, it should \noperate in a “hub\
|
| 490 |
+
\ and spoke” manner to connect to other parts of the United Nations system and\
|
| 491 |
+
\ beyond.\nOutreach could include serving as a key node in a so-called soft coordination\
|
| 492 |
+
\ architecture between Member \nStates, plurilateral networks, civil society organizations,\
|
| 493 |
+
\ academia and technology companies in a regime complex \nthat weaves together\
|
| 494 |
+
\ to solve problems collaboratively through networking, and as a safe, trusted\
|
| 495 |
+
\ place to \nconvene on relevant topics. Ambitiously, it could become the glue\
|
| 496 |
+
\ that helps to hold such other evolving networks \ntogether.\nSupporting the\
|
| 497 |
+
\ various initiatives proposed in this report includes the important function\
|
| 498 |
+
\ of ensuring inclusiveness \nat speed in delivering outputs such as scientific\
|
| 499 |
+
\ reports, governance dialogue and identifying appropriate follow-\nup entities.\n\
|
| 500 |
+
Common understanding :\n• Facilitate recruitment of and support the international\
|
| 501 |
+
\ scientific panel.\nCommon ground :\n• Service policy dialogues with multi-stakeholder\
|
| 502 |
+
\ inputs in support of interoperability and policy learning. \nAn initial priority\
|
| 503 |
+
\ topic is the articulation of risk thresholds and safety frameworks across jurisdictions\n\
|
| 504 |
+
• Support ITU, ISO/IEC and IEEE on setting up the AI standards exchange.\nCommon\
|
| 505 |
+
\ benefits :\n• Support the AI capacity development network with an initial focus\
|
| 506 |
+
\ on building public interest AI capacity \namong public officials and social\
|
| 507 |
+
\ entrepreneurs. Define the initial network vision, outcomes, go vernance \nstructure,\
|
| 508 |
+
\ partnerships and operational mechanisms.\n• Define the vision, outcomes, governance\
|
| 509 |
+
\ structure and operational mechanisms for the global fund for AI, \nand seek\
|
| 510 |
+
\ feedback from Member States, industry and civil society stakeholders on the\
|
| 511 |
+
\ proposal, with a \nview to funding initial projects within six months of establishment.\n\
|
| 512 |
+
• Prepare and publish an annual list of prioritized investment areas to guide\
|
| 513 |
+
\ both the global fund for AI and \ninvestments outside that structure.\nCoherent\
|
| 514 |
+
\ effort :\n• Establish lightweight mechanisms that support Member States and\
|
| 515 |
+
\ other relevant organizations to be \nmore connected, coordinated and effective\
|
| 516 |
+
\ in pursuing their global AI governance efforts.\n• Prepare initial frameworks\
|
| 517 |
+
\ to guide and monitor the AI office’s work, including a global governance risk\
|
| 518 |
+
\ \ntaxonomy, a global AI policy landscape review and a global stakeholder map.\n\
|
| 519 |
+
• Develop and implement quarterly reporting and periodic in-person presentations\
|
| 520 |
+
\ to Member States on \nthe AI office’s progress against its workplan and establish\
|
| 521 |
+
\ feedback channels to support adjustments as \nneeded.\n• Establish a steering\
|
| 522 |
+
\ committee jointly led by the AI office, ITU, UNC TAD, UNESCO and other relevant\
|
| 523 |
+
\ \nUnited Nations entities and organizations to accelerate the work of the United\
|
| 524 |
+
\ Nations in service of the \nfunctions above, and review progress of the accelerated\
|
| 525 |
+
\ efforts every three months.\n• Promote joint learning and development opportunities\
|
| 526 |
+
\ for Member State representatives to support them \nto carry out their responsibilities\
|
| 527 |
+
\ for global AI governance, in cooperation with relevant United Nations \nentities\
|
| 528 |
+
\ and organizations such as the United Nations Institute for Training and Research\
|
| 529 |
+
\ and the United \nNations University."
|
| 530 |
+
- source_sentence: What are some of the legal frameworks mentioned in the context
|
| 531 |
+
that aim to protect personal information, and how do they relate to data privacy
|
| 532 |
+
concerns?
|
| 533 |
+
sentences:
|
| 534 |
+
- "NOTICE & \nEXPLANATION \nWHAT SHOULD BE EXPECTED OF AUTOMATED SYSTEMS\nThe expectations\
|
| 535 |
+
\ for automated systems are meant to serve as a blueprint for the development\
|
| 536 |
+
\ of additional \ntechnical standards and practices that are tailored for particular\
|
| 537 |
+
\ sectors and contexts. \nTailored to the level of risk. An assessment should\
|
| 538 |
+
\ be done to determine the level of risk of the auto -\nmated system. In settings\
|
| 539 |
+
\ where the consequences are high as determined by a risk assessment, or extensive\
|
| 540 |
+
\ \noversight is expected (e.g., in criminal justice or some public sector settings),\
|
| 541 |
+
\ explanatory mechanisms should be built into the system design so that the system’s\
|
| 542 |
+
\ full behavior can be explained in advance (i.e., only fully transparent models\
|
| 543 |
+
\ should be used), rather than as an after-the-decision interpretation. In other\
|
| 544 |
+
\ settings, the extent of explanation provided should be tailored to the risk\
|
| 545 |
+
\ level. \nValid. The explanation provided by a system should accurately reflect\
|
| 546 |
+
\ the factors and the influences that led \nto a particular decision, and should\
|
| 547 |
+
\ be meaningful for the particular customization based on purpose, target, and\
|
| 548 |
+
\ level of risk. While approximation and simplification may be necessary for the\
|
| 549 |
+
\ system to succeed based on the explanatory purpose and target of the explanation,\
|
| 550 |
+
\ or to account for the risk of fraud or other concerns related to revealing decision-making\
|
| 551 |
+
\ information, such simplifications should be done in a scientifically supportable\
|
| 552 |
+
\ way. Where appropriate based on the explanatory system, error ranges for the\
|
| 553 |
+
\ explanation should be calculated and included in the explanation, with the choice\
|
| 554 |
+
\ of presentation of such information balanced with usability and overall interface\
|
| 555 |
+
\ complexity concerns. \nDemonstrate protections for notice and explanation \n\
|
| 556 |
+
Reporting. Summary reporting should document the determinations made based on\
|
| 557 |
+
\ the above consider -\nations, including: the responsible entities for accountability\
|
| 558 |
+
\ purposes; the goal and use cases for the system, identified users, and impacted\
|
| 559 |
+
\ populations; the assessment of notice clarity and timeliness; the assessment\
|
| 560 |
+
\ of the explanation's validity and accessibility; the assessment of the level\
|
| 561 |
+
\ of risk; and the account and assessment of how explanations are tailored, including\
|
| 562 |
+
\ to the purpose, the recipient of the explanation, and the level of risk. Individualized\
|
| 563 |
+
\ profile information should be made readily available to the greatest extent\
|
| 564 |
+
\ possible that includes explanations for any system impacts or inferences. Reporting\
|
| 565 |
+
\ should be provided in a clear plain language and machine-readable manner. \n\
|
| 566 |
+
44"
|
| 567 |
+
- "25 MP-2.3-002 Review and document accuracy, representativeness, relevance, suitability\
|
| 568 |
+
\ of data \nused at different stages of AI life cycle. Harmful Bias and Homogenization\
|
| 569 |
+
\ ; \nIntellectual Property \nMP-2.3-003 Deploy and document fact -checking techniques\
|
| 570 |
+
\ to verify the accuracy and \nveracity of information generated by GAI systems,\
|
| 571 |
+
\ especially when the \ninformation comes from multiple (or unknown) sources.\
|
| 572 |
+
\ Information Integrity \nMP-2.3-004 Develop and implement testing techniques\
|
| 573 |
+
\ to identify GAI produced content (e.g., synthetic media) that might be indistinguishable\
|
| 574 |
+
\ from human -generated content. Information Integrity \nMP-2.3-005 Implement\
|
| 575 |
+
\ plans for GAI systems to undergo regular adversarial testing to identify \n\
|
| 576 |
+
vulnerabilities and potential manipulation or misuse. Information Security \n\
|
| 577 |
+
AI Actor Tasks: AI Development, Domain Experts, TEVV \n \nMAP 3.4: Processes\
|
| 578 |
+
\ for operator and practitioner proficiency with AI system performance and trustworthiness\
|
| 579 |
+
\ – and relevant \ntechnical standards and certifications – are defined, assessed,\
|
| 580 |
+
\ and documented. \nAction ID Suggested Action GAI Risks \nMP-3.4-001 Evaluate\
|
| 581 |
+
\ whether GAI operators and end -users can accurately understand \ncontent lineage\
|
| 582 |
+
\ and origin. Human -AI Configuration ; \nInformation Integrity \nMP-3.4-002\
|
| 583 |
+
\ Adapt existing training programs to include modules on digital content \ntransparency.\
|
| 584 |
+
\ Information Integrity \nMP-3.4-003 Develop certification programs that test\
|
| 585 |
+
\ proficiency in managing GAI risks and \ninterpreting content provenance, relevant\
|
| 586 |
+
\ to specific industry and context. Information Integrity \nMP-3.4-004 Delineate\
|
| 587 |
+
\ human proficiency tests from tests of GAI capabilities. Human -AI Configuration\
|
| 588 |
+
\ \nMP-3.4-005 Implement systems to continually monitor and track the outcomes\
|
| 589 |
+
\ of human- GAI \nconfigurations for future refinement and improvements . Human\
|
| 590 |
+
\ -AI Configuration ; \nInformation Integrity \nMP-3.4-006 Involve the end -users,\
|
| 591 |
+
\ practitioners, and operators in GAI system in prototyping \nand testing activities.\
|
| 592 |
+
\ Make sure these tests cover various scenarios , such as crisis \nsituations\
|
| 593 |
+
\ or ethically sensitive contexts. Human -AI Configuration ; \nInformation Integrity\
|
| 594 |
+
\ ; Harmful Bias \nand Homogenization ; Dangerous , \nViolent, or Hateful Content\
|
| 595 |
+
\ \nAI Actor Tasks: AI Design, AI Development, Domain Experts, End -Users, Human\
|
| 596 |
+
\ Factors, Operation and Monitoring"
|
| 597 |
+
- '65. See, e.g., Scott Ikeda. Major Data Broker Exposes 235 Million Social Media
|
| 598 |
+
Profiles in Data Lead: Info
|
| 599 |
+
|
| 600 |
+
Appears to Have Been Scraped Without Permission. CPO Magazine. Aug. 28, 2020.
|
| 601 |
+
https://
|
| 602 |
+
|
| 603 |
+
www.cpomagazine.com/cyber-security/major-data-broker-exposes-235-million-social-media-profiles-
|
| 604 |
+
|
| 605 |
+
in-data-leak/; Lily Hay Newman. 1.2 Billion Records Found Exposed Online in a
|
| 606 |
+
Single Server . WIRED,
|
| 607 |
+
|
| 608 |
+
Nov. 22, 2019. https://www.wired.com/story/billion-records-exposed-online/
|
| 609 |
+
|
| 610 |
+
66.Lola Fadulu. Facial Recognition Technology in Public Housing Prompts Backlash
|
| 611 |
+
. New York Times.
|
| 612 |
+
|
| 613 |
+
Sept. 24, 2019.
|
| 614 |
+
|
| 615 |
+
https://www.nytimes.com/2019/09/24/us/politics/facial-recognition-technology-housing.html
|
| 616 |
+
|
| 617 |
+
67. Jo Constantz. ‘They Were Spying On Us’: Amazon, Walmart, Use Surveillance
|
| 618 |
+
Technology to Bust
|
| 619 |
+
|
| 620 |
+
Unions. Newsweek. Dec. 13, 2021.
|
| 621 |
+
|
| 622 |
+
https://www.newsweek.com/they-were-spying-us-amazon-walmart-use-surveillance-technology-bust-
|
| 623 |
+
|
| 624 |
+
unions-1658603
|
| 625 |
+
|
| 626 |
+
68. See, e.g., enforcement actions by the FTC against the photo storage app Everalbaum
|
| 627 |
+
|
| 628 |
+
(https://www.ftc.gov/legal-library/browse/cases-proceedings/192-3172-everalbum-inc-matter),
|
| 629 |
+
and
|
| 630 |
+
|
| 631 |
+
against Weight Watchers and their subsidiary Kurbo(https://www.ftc.gov/legal-library/browse/cases-proceedings/1923228-weight-watchersww)
|
| 632 |
+
|
| 633 |
+
69. See, e.g., HIPAA, Pub. L 104-191 (1996); Fair Debt Collection Practices Act
|
| 634 |
+
(FDCPA), Pub. L. 95-109
|
| 635 |
+
|
| 636 |
+
(1977); Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g),
|
| 637 |
+
Children''s Online
|
| 638 |
+
|
| 639 |
+
Privacy Protection Act of 1998, 15 U.S.C. 6501–6505, and Confidential Information
|
| 640 |
+
Protection andStatistical Efficiency Act (CIPSEA) (116 Stat. 2899)
|
| 641 |
+
|
| 642 |
+
70. Marshall Allen. You Snooze, You Lose: Insurers Make The Old Adage Literally
|
| 643 |
+
True . ProPublica. Nov.
|
| 644 |
+
|
| 645 |
+
21, 2018.
|
| 646 |
+
|
| 647 |
+
https://www.propublica.org/article/you-snooze-you-lose-insurers-make-the-old-adage-literally-true
|
| 648 |
+
|
| 649 |
+
71.Charles Duhigg. How Companies Learn Your Secrets. The New York Times. Feb.
|
| 650 |
+
16, 2012.
|
| 651 |
+
|
| 652 |
+
https://www.nytimes.com/2012/02/19/magazine/shopping-habits.html72. Jack Gillum
|
| 653 |
+
and Jeff Kao. Aggression Detectors: The Unproven, Invasive Surveillance Technology
|
| 654 |
+
|
| 655 |
+
Schools are Using to Monitor Students. ProPublica. Jun. 25, 2019.
|
| 656 |
+
|
| 657 |
+
https://features.propublica.org/aggression-detector/the-unproven-invasive-surveillance-technology-
|
| 658 |
+
|
| 659 |
+
schools-are-using-to-monitor-students/
|
| 660 |
+
|
| 661 |
+
73.Drew Harwell. Cheating-detection companies made millions during the pandemic.
|
| 662 |
+
Now students are
|
| 663 |
+
|
| 664 |
+
fighting back. Washington Post. Nov. 12, 2020.
|
| 665 |
+
|
| 666 |
+
https://www.washingtonpost.com/technology/2020/11/12/test-monitoring-student-revolt/
|
| 667 |
+
|
| 668 |
+
74. See, e.g., Heather Morrison. Virtual Testing Puts Disabled Students at a Disadvantage.
|
| 669 |
+
Government
|
| 670 |
+
|
| 671 |
+
Technology. May 24, 2022.
|
| 672 |
+
|
| 673 |
+
https://www.govtech.com/education/k-12/virtual-testing-puts-disabled-students-at-a-disadvantage;
|
| 674 |
+
|
| 675 |
+
Lydia X. Z. Brown, Ridhi Shetty, Matt Scherer, and Andrew Crawford. Ableism And
|
| 676 |
+
Disability
|
| 677 |
+
|
| 678 |
+
Discrimination In New Surveillance Technologies: How new surveillance technologies
|
| 679 |
+
in education,
|
| 680 |
+
|
| 681 |
+
policing, health care, and the workplace disproportionately harm disabled people
|
| 682 |
+
. Center for Democracy
|
| 683 |
+
|
| 684 |
+
and Technology Report. May 24, 2022.https://cdt.org/insights/ableism-and-disability-discrimination-in-new-surveillance-technologies-how-new-surveillance-technologies-in-education-policing-health-care-and-the-workplace-disproportionately-harm-disabled-people/
|
| 685 |
+
|
| 686 |
+
69'
|
| 687 |
+
model-index:
|
| 688 |
+
- name: SentenceTransformer based on Alibaba-NLP/gte-large-en-v1.5
|
| 689 |
+
results:
|
| 690 |
+
- task:
|
| 691 |
+
type: information-retrieval
|
| 692 |
+
name: Information Retrieval
|
| 693 |
+
dataset:
|
| 694 |
+
name: Unknown
|
| 695 |
+
type: unknown
|
| 696 |
+
metrics:
|
| 697 |
+
- type: cosine_accuracy@1
|
| 698 |
+
value: 0.71875
|
| 699 |
+
name: Cosine Accuracy@1
|
| 700 |
+
- type: cosine_accuracy@3
|
| 701 |
+
value: 0.921875
|
| 702 |
+
name: Cosine Accuracy@3
|
| 703 |
+
- type: cosine_accuracy@5
|
| 704 |
+
value: 0.96875
|
| 705 |
+
name: Cosine Accuracy@5
|
| 706 |
+
- type: cosine_accuracy@10
|
| 707 |
+
value: 1.0
|
| 708 |
+
name: Cosine Accuracy@10
|
| 709 |
+
- type: cosine_precision@1
|
| 710 |
+
value: 0.71875
|
| 711 |
+
name: Cosine Precision@1
|
| 712 |
+
- type: cosine_precision@3
|
| 713 |
+
value: 0.30729166666666663
|
| 714 |
+
name: Cosine Precision@3
|
| 715 |
+
- type: cosine_precision@5
|
| 716 |
+
value: 0.19374999999999998
|
| 717 |
+
name: Cosine Precision@5
|
| 718 |
+
- type: cosine_precision@10
|
| 719 |
+
value: 0.09999999999999999
|
| 720 |
+
name: Cosine Precision@10
|
| 721 |
+
- type: cosine_recall@1
|
| 722 |
+
value: 0.71875
|
| 723 |
+
name: Cosine Recall@1
|
| 724 |
+
- type: cosine_recall@3
|
| 725 |
+
value: 0.921875
|
| 726 |
+
name: Cosine Recall@3
|
| 727 |
+
- type: cosine_recall@5
|
| 728 |
+
value: 0.96875
|
| 729 |
+
name: Cosine Recall@5
|
| 730 |
+
- type: cosine_recall@10
|
| 731 |
+
value: 1.0
|
| 732 |
+
name: Cosine Recall@10
|
| 733 |
+
- type: cosine_ndcg@10
|
| 734 |
+
value: 0.8727659974381962
|
| 735 |
+
name: Cosine Ndcg@10
|
| 736 |
+
- type: cosine_mrr@10
|
| 737 |
+
value: 0.8304687500000002
|
| 738 |
+
name: Cosine Mrr@10
|
| 739 |
+
- type: cosine_map@100
|
| 740 |
+
value: 0.8304687500000001
|
| 741 |
+
name: Cosine Map@100
|
| 742 |
+
- type: dot_accuracy@1
|
| 743 |
+
value: 0.734375
|
| 744 |
+
name: Dot Accuracy@1
|
| 745 |
+
- type: dot_accuracy@3
|
| 746 |
+
value: 0.921875
|
| 747 |
+
name: Dot Accuracy@3
|
| 748 |
+
- type: dot_accuracy@5
|
| 749 |
+
value: 0.96875
|
| 750 |
+
name: Dot Accuracy@5
|
| 751 |
+
- type: dot_accuracy@10
|
| 752 |
+
value: 1.0
|
| 753 |
+
name: Dot Accuracy@10
|
| 754 |
+
- type: dot_precision@1
|
| 755 |
+
value: 0.734375
|
| 756 |
+
name: Dot Precision@1
|
| 757 |
+
- type: dot_precision@3
|
| 758 |
+
value: 0.30729166666666663
|
| 759 |
+
name: Dot Precision@3
|
| 760 |
+
- type: dot_precision@5
|
| 761 |
+
value: 0.19374999999999998
|
| 762 |
+
name: Dot Precision@5
|
| 763 |
+
- type: dot_precision@10
|
| 764 |
+
value: 0.09999999999999999
|
| 765 |
+
name: Dot Precision@10
|
| 766 |
+
- type: dot_recall@1
|
| 767 |
+
value: 0.734375
|
| 768 |
+
name: Dot Recall@1
|
| 769 |
+
- type: dot_recall@3
|
| 770 |
+
value: 0.921875
|
| 771 |
+
name: Dot Recall@3
|
| 772 |
+
- type: dot_recall@5
|
| 773 |
+
value: 0.96875
|
| 774 |
+
name: Dot Recall@5
|
| 775 |
+
- type: dot_recall@10
|
| 776 |
+
value: 1.0
|
| 777 |
+
name: Dot Recall@10
|
| 778 |
+
- type: dot_ndcg@10
|
| 779 |
+
value: 0.8785327200386421
|
| 780 |
+
name: Dot Ndcg@10
|
| 781 |
+
- type: dot_mrr@10
|
| 782 |
+
value: 0.8382812500000002
|
| 783 |
+
name: Dot Mrr@10
|
| 784 |
+
- type: dot_map@100
|
| 785 |
+
value: 0.8382812500000001
|
| 786 |
+
name: Dot Map@100
|
| 787 |
+
---
|
| 788 |
+
|
| 789 |
+
# SentenceTransformer based on Alibaba-NLP/gte-large-en-v1.5
|
| 790 |
+
|
| 791 |
+
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [Alibaba-NLP/gte-large-en-v1.5](https://huggingface.co/Alibaba-NLP/gte-large-en-v1.5). It maps sentences & paragraphs to a 1024-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
|
| 792 |
+
|
| 793 |
+
## Model Details
|
| 794 |
+
|
| 795 |
+
### Model Description
|
| 796 |
+
- **Model Type:** Sentence Transformer
|
| 797 |
+
- **Base model:** [Alibaba-NLP/gte-large-en-v1.5](https://huggingface.co/Alibaba-NLP/gte-large-en-v1.5) <!-- at revision 104333d6af6f97649377c2afbde10a7704870c7b -->
|
| 798 |
+
- **Maximum Sequence Length:** 8192 tokens
|
| 799 |
+
- **Output Dimensionality:** 1024 tokens
|
| 800 |
+
- **Similarity Function:** Cosine Similarity
|
| 801 |
+
<!-- - **Training Dataset:** Unknown -->
|
| 802 |
+
<!-- - **Language:** Unknown -->
|
| 803 |
+
<!-- - **License:** Unknown -->
|
| 804 |
+
|
| 805 |
+
### Model Sources
|
| 806 |
+
|
| 807 |
+
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
|
| 808 |
+
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
|
| 809 |
+
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
|
| 810 |
+
|
| 811 |
+
### Full Model Architecture
|
| 812 |
+
|
| 813 |
+
```
|
| 814 |
+
SentenceTransformer(
|
| 815 |
+
(0): Transformer({'max_seq_length': 8192, 'do_lower_case': False}) with Transformer model: NewModel
|
| 816 |
+
(1): Pooling({'word_embedding_dimension': 1024, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
|
| 817 |
+
)
|
| 818 |
+
```
|
| 819 |
+
|
| 820 |
+
## Usage
|
| 821 |
+
|
| 822 |
+
### Direct Usage (Sentence Transformers)
|
| 823 |
+
|
| 824 |
+
First install the Sentence Transformers library:
|
| 825 |
+
|
| 826 |
+
```bash
|
| 827 |
+
pip install -U sentence-transformers
|
| 828 |
+
```
|
| 829 |
+
|
| 830 |
+
Then you can load this model and run inference.
|
| 831 |
+
```python
|
| 832 |
+
from sentence_transformers import SentenceTransformer
|
| 833 |
+
|
| 834 |
+
# Download from the 🤗 Hub
|
| 835 |
+
model = SentenceTransformer("sentence_transformers_model_id")
|
| 836 |
+
# Run inference
|
| 837 |
+
sentences = [
|
| 838 |
+
'What are some of the legal frameworks mentioned in the context that aim to protect personal information, and how do they relate to data privacy concerns?',
|
| 839 |
+
"65. See, e.g., Scott Ikeda. Major Data Broker Exposes 235 Million Social Media Profiles in Data Lead: Info\nAppears to Have Been Scraped Without Permission. CPO Magazine. Aug. 28, 2020. https://\nwww.cpomagazine.com/cyber-security/major-data-broker-exposes-235-million-social-media-profiles-\nin-data-leak/; Lily Hay Newman. 1.2 Billion Records Found Exposed Online in a Single Server . WIRED,\nNov. 22, 2019. https://www.wired.com/story/billion-records-exposed-online/\n66.Lola Fadulu. Facial Recognition Technology in Public Housing Prompts Backlash . New York Times.\nSept. 24, 2019.\nhttps://www.nytimes.com/2019/09/24/us/politics/facial-recognition-technology-housing.html\n67. Jo Constantz. ‘They Were Spying On Us’: Amazon, Walmart, Use Surveillance Technology to Bust\nUnions. Newsweek. Dec. 13, 2021.\nhttps://www.newsweek.com/they-were-spying-us-amazon-walmart-use-surveillance-technology-bust-\nunions-1658603\n68. See, e.g., enforcement actions by the FTC against the photo storage app Everalbaum\n(https://www.ftc.gov/legal-library/browse/cases-proceedings/192-3172-everalbum-inc-matter), and\nagainst Weight Watchers and their subsidiary Kurbo(https://www.ftc.gov/legal-library/browse/cases-proceedings/1923228-weight-watchersww)\n69. See, e.g., HIPAA, Pub. L 104-191 (1996); Fair Debt Collection Practices Act (FDCPA), Pub. L. 95-109\n(1977); Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g), Children's Online\nPrivacy Protection Act of 1998, 15 U.S.C. 6501–6505, and Confidential Information Protection andStatistical Efficiency Act (CIPSEA) (116 Stat. 2899)\n70. Marshall Allen. You Snooze, You Lose: Insurers Make The Old Adage Literally True . ProPublica. Nov.\n21, 2018.\nhttps://www.propublica.org/article/you-snooze-you-lose-insurers-make-the-old-adage-literally-true\n71.Charles Duhigg. How Companies Learn Your Secrets. The New York Times. Feb. 16, 2012.\nhttps://www.nytimes.com/2012/02/19/magazine/shopping-habits.html72. Jack Gillum and Jeff Kao. Aggression Detectors: The Unproven, Invasive Surveillance Technology\nSchools are Using to Monitor Students. ProPublica. Jun. 25, 2019.\nhttps://features.propublica.org/aggression-detector/the-unproven-invasive-surveillance-technology-\nschools-are-using-to-monitor-students/\n73.Drew Harwell. Cheating-detection companies made millions during the pandemic. Now students are\nfighting back. Washington Post. Nov. 12, 2020.\nhttps://www.washingtonpost.com/technology/2020/11/12/test-monitoring-student-revolt/\n74. See, e.g., Heather Morrison. Virtual Testing Puts Disabled Students at a Disadvantage. Government\nTechnology. May 24, 2022.\nhttps://www.govtech.com/education/k-12/virtual-testing-puts-disabled-students-at-a-disadvantage;\nLydia X. Z. Brown, Ridhi Shetty, Matt Scherer, and Andrew Crawford. Ableism And Disability\nDiscrimination In New Surveillance Technologies: How new surveillance technologies in education,\npolicing, health care, and the workplace disproportionately harm disabled people . Center for Democracy\nand Technology Report. May 24, 2022.https://cdt.org/insights/ableism-and-disability-discrimination-in-new-surveillance-technologies-how-new-surveillance-technologies-in-education-policing-health-care-and-the-workplace-disproportionately-harm-disabled-people/\n69",
|
| 840 |
+
'25 MP-2.3-002 Review and document accuracy, representativeness, relevance, suitability of data \nused at different stages of AI life cycle. Harmful Bias and Homogenization ; \nIntellectual Property \nMP-2.3-003 Deploy and document fact -checking techniques to verify the accuracy and \nveracity of information generated by GAI systems, especially when the \ninformation comes from multiple (or unknown) sources. Information Integrity \nMP-2.3-004 Develop and implement testing techniques to identify GAI produced content (e.g., synthetic media) that might be indistinguishable from human -generated content. Information Integrity \nMP-2.3-005 Implement plans for GAI systems to undergo regular adversarial testing to identify \nvulnerabilities and potential manipulation or misuse. Information Security \nAI Actor Tasks: AI Development, Domain Experts, TEVV \n \nMAP 3.4: Processes for operator and practitioner proficiency with AI system performance and trustworthiness – and relevant \ntechnical standards and certifications – are defined, assessed, and documented. \nAction ID Suggested Action GAI Risks \nMP-3.4-001 Evaluate whether GAI operators and end -users can accurately understand \ncontent lineage and origin. Human -AI Configuration ; \nInformation Integrity \nMP-3.4-002 Adapt existing training programs to include modules on digital content \ntransparency. Information Integrity \nMP-3.4-003 Develop certification programs that test proficiency in managing GAI risks and \ninterpreting content provenance, relevant to specific industry and context. Information Integrity \nMP-3.4-004 Delineate human proficiency tests from tests of GAI capabilities. Human -AI Configuration \nMP-3.4-005 Implement systems to continually monitor and track the outcomes of human- GAI \nconfigurations for future refinement and improvements . Human -AI Configuration ; \nInformation Integrity \nMP-3.4-006 Involve the end -users, practitioners, and operators in GAI system in prototyping \nand testing activities. Make sure these tests cover various scenarios , such as crisis \nsituations or ethically sensitive contexts. Human -AI Configuration ; \nInformation Integrity ; Harmful Bias \nand Homogenization ; Dangerous , \nViolent, or Hateful Content \nAI Actor Tasks: AI Design, AI Development, Domain Experts, End -Users, Human Factors, Operation and Monitoring',
|
| 841 |
+
]
|
| 842 |
+
embeddings = model.encode(sentences)
|
| 843 |
+
print(embeddings.shape)
|
| 844 |
+
# [3, 1024]
|
| 845 |
+
|
| 846 |
+
# Get the similarity scores for the embeddings
|
| 847 |
+
similarities = model.similarity(embeddings, embeddings)
|
| 848 |
+
print(similarities.shape)
|
| 849 |
+
# [3, 3]
|
| 850 |
+
```
|
| 851 |
+
|
| 852 |
+
<!--
|
| 853 |
+
### Direct Usage (Transformers)
|
| 854 |
+
|
| 855 |
+
<details><summary>Click to see the direct usage in Transformers</summary>
|
| 856 |
+
|
| 857 |
+
</details>
|
| 858 |
+
-->
|
| 859 |
+
|
| 860 |
+
<!--
|
| 861 |
+
### Downstream Usage (Sentence Transformers)
|
| 862 |
+
|
| 863 |
+
You can finetune this model on your own dataset.
|
| 864 |
+
|
| 865 |
+
<details><summary>Click to expand</summary>
|
| 866 |
+
|
| 867 |
+
</details>
|
| 868 |
+
-->
|
| 869 |
+
|
| 870 |
+
<!--
|
| 871 |
+
### Out-of-Scope Use
|
| 872 |
+
|
| 873 |
+
*List how the model may foreseeably be misused and address what users ought not to do with the model.*
|
| 874 |
+
-->
|
| 875 |
+
|
| 876 |
+
## Evaluation
|
| 877 |
+
|
| 878 |
+
### Metrics
|
| 879 |
+
|
| 880 |
+
#### Information Retrieval
|
| 881 |
+
|
| 882 |
+
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)
|
| 883 |
+
|
| 884 |
+
| Metric | Value |
|
| 885 |
+
|:--------------------|:-----------|
|
| 886 |
+
| cosine_accuracy@1 | 0.7188 |
|
| 887 |
+
| cosine_accuracy@3 | 0.9219 |
|
| 888 |
+
| cosine_accuracy@5 | 0.9688 |
|
| 889 |
+
| cosine_accuracy@10 | 1.0 |
|
| 890 |
+
| cosine_precision@1 | 0.7188 |
|
| 891 |
+
| cosine_precision@3 | 0.3073 |
|
| 892 |
+
| cosine_precision@5 | 0.1937 |
|
| 893 |
+
| cosine_precision@10 | 0.1 |
|
| 894 |
+
| cosine_recall@1 | 0.7188 |
|
| 895 |
+
| cosine_recall@3 | 0.9219 |
|
| 896 |
+
| cosine_recall@5 | 0.9688 |
|
| 897 |
+
| cosine_recall@10 | 1.0 |
|
| 898 |
+
| cosine_ndcg@10 | 0.8728 |
|
| 899 |
+
| cosine_mrr@10 | 0.8305 |
|
| 900 |
+
| cosine_map@100 | 0.8305 |
|
| 901 |
+
| dot_accuracy@1 | 0.7344 |
|
| 902 |
+
| dot_accuracy@3 | 0.9219 |
|
| 903 |
+
| dot_accuracy@5 | 0.9688 |
|
| 904 |
+
| dot_accuracy@10 | 1.0 |
|
| 905 |
+
| dot_precision@1 | 0.7344 |
|
| 906 |
+
| dot_precision@3 | 0.3073 |
|
| 907 |
+
| dot_precision@5 | 0.1937 |
|
| 908 |
+
| dot_precision@10 | 0.1 |
|
| 909 |
+
| dot_recall@1 | 0.7344 |
|
| 910 |
+
| dot_recall@3 | 0.9219 |
|
| 911 |
+
| dot_recall@5 | 0.9688 |
|
| 912 |
+
| dot_recall@10 | 1.0 |
|
| 913 |
+
| dot_ndcg@10 | 0.8785 |
|
| 914 |
+
| dot_mrr@10 | 0.8383 |
|
| 915 |
+
| **dot_map@100** | **0.8383** |
|
| 916 |
+
|
| 917 |
+
<!--
|
| 918 |
+
## Bias, Risks and Limitations
|
| 919 |
+
|
| 920 |
+
*What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
|
| 921 |
+
-->
|
| 922 |
+
|
| 923 |
+
<!--
|
| 924 |
+
### Recommendations
|
| 925 |
+
|
| 926 |
+
*What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
|
| 927 |
+
-->
|
| 928 |
+
|
| 929 |
+
## Training Details
|
| 930 |
+
|
| 931 |
+
### Training Dataset
|
| 932 |
+
|
| 933 |
+
#### Unnamed Dataset
|
| 934 |
+
|
| 935 |
+
|
| 936 |
+
* Size: 586 training samples
|
| 937 |
+
* Columns: <code>sentence_0</code> and <code>sentence_1</code>
|
| 938 |
+
* Approximate statistics based on the first 586 samples:
|
| 939 |
+
| | sentence_0 | sentence_1 |
|
| 940 |
+
|:--------|:-----------------------------------------------------------------------------------|:------------------------------------------------------------------------------------|
|
| 941 |
+
| type | string | string |
|
| 942 |
+
| details | <ul><li>min: 20 tokens</li><li>mean: 35.95 tokens</li><li>max: 60 tokens</li></ul> | <ul><li>min: 8 tokens</li><li>mean: 545.8 tokens</li><li>max: 1018 tokens</li></ul> |
|
| 943 |
+
* Samples:
|
| 944 |
+
| sentence_0 | sentence_1 |
|
| 945 |
+
|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
| 946 |
+
| <code>What are the primary objectives outlined in the "Blueprint for an AI Bill of Rights" as it pertains to the American people?</code> | <code>BLUEPRINT FOR AN <br>AI B ILL OF <br>RIGHTS <br>MAKING AUTOMATED <br>SYSTEMS WORK FOR <br>THE AMERICAN PEOPLE <br>OCTOBER 2022</code> |
|
| 947 |
+
| <code>In what ways does the document propose to ensure that automated systems are designed and implemented to benefit society?</code> | <code>BLUEPRINT FOR AN <br>AI B ILL OF <br>RIGHTS <br>MAKING AUTOMATED <br>SYSTEMS WORK FOR <br>THE AMERICAN PEOPLE <br>OCTOBER 2022</code> |
|
| 948 |
+
| <code>What is the primary purpose of the Blueprint for an AI Bill of Rights as published by the White House Office of Science and Technology Policy in October 2022?</code> | <code>About this Document <br>The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People was <br>published by the White House Office of Science and Technology Policy in October 2022. This framework was <br>released one year after OSTP announced the launch of a process to develop “a bill of rights for an AI-powered <br>world.” Its release follows a year of public engagement to inform this initiative. The framework is available <br>online at: https://www.whitehouse.gov/ostp/ai-bill-of-rights <br>About the Office of Science and Technology Policy <br>The Office of Science and Technology Policy (OSTP) was established by the National Science and Technology <br>Policy, Organization, and Priorities Act of 1976 to provide the President and others within the Executive Office <br>of the President with advice on the scientific, engineering, and technological aspects of the economy, national <br>security, health, foreign relations, the environment, and the technological recovery and use of resources, among <br>other topics. OSTP leads interagency science and technology policy coordination efforts, assists the Office of <br>Management and Budget (OMB) with an annual review and analysis of Federal research and development in <br>budgets, and serves as a source of scientific and technological analysis and judgment for the President with <br>respect to major policies, plans, and programs of the Federal Government. <br>Legal Disclaimer <br>The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People is a white paper <br>published by the White House Office of Science and Technology Policy. It is intended to support the <br>development of policies and practices that protect civil rights and promote democratic values in the building, <br>deployment, and governance of automated systems. <br>The Blueprint for an AI Bill of Rights is non-binding and does not constitute U.S. government policy. It <br>does not supersede, modify, or direct an interpretation of any existing statute, regulation, policy, or <br>international instrument. It does not constitute binding guidance for the public or Federal agencies and <br>therefore does not require compliance with the principles described herein. It also is not determinative of what <br>the U.S. government’s position will be in any international negotiation. Adoption of these principles may not <br>meet the requirements of existing statutes, regulations, policies, or international instruments, or the <br>requirements of the Federal agencies that enforce them. These principles are not intended to, and do not, <br>prohibit or limit any lawful activity of a government agency, including law enforcement, national security, or <br>intelligence activities. <br>The appropriate application of the principles set forth in this white paper depends significantly on the <br>context in which automated systems are being utilized. In some circumstances, application of these principles <br>in whole or in part may not be appropriate given the intended use of automated systems to achieve government <br>agency missions. Future sector-specific guidance will likely be necessary and important for guiding the use of <br>automated systems in certain settings such as AI systems used as part of school building security or automated <br>health diagnostic systems. <br>The Blueprint for an AI Bill of Rights recognizes that law enforcement activities require a balancing of <br>equities, for example, between the protection of sensitive law enforcement information and the principle of <br>notice; as such, notice may not be appropriate, or may need to be adjusted to protect sources, methods, and <br>other law enforcement equities. Even in contexts where these principles may not apply in whole or in part, <br>federal departments and agencies remain subject to judicial, privacy, and civil liberties oversight as well as <br>existing policies and safeguards that govern automated systems, including, for example, Executive Order 13960, <br>Promoting the Use of Trustworthy Artificial Intelligence in the Federal Government (December 2020). <br>This white paper recognizes that national security (which includes certain law enforcement and <br>homeland security activities) and defense activities are of increased sensitivity and interest to our nation’s <br>adversaries and are often subject to special requirements, such as those governing classified information and <br>other protected data. Such activities require alternative, compatible safeguards through existing policies that <br>govern automated systems and AI, such as the Department of Defense (DOD) AI Ethical Principles and <br>Responsible AI Implementation Pathway and the Intelligence Community (IC) AI Ethics Principles and <br>Framework. The implementation of these policies to national security and defense activities can be informed by <br>the Blueprint for an AI Bill of Rights where feasible.</code> |
|
| 949 |
+
* Loss: [<code>MultipleNegativesRankingLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#multiplenegativesrankingloss) with these parameters:
|
| 950 |
+
```json
|
| 951 |
+
{
|
| 952 |
+
"scale": 20.0,
|
| 953 |
+
"similarity_fct": "cos_sim"
|
| 954 |
+
}
|
| 955 |
+
```
|
| 956 |
+
|
| 957 |
+
### Training Hyperparameters
|
| 958 |
+
#### Non-Default Hyperparameters
|
| 959 |
+
|
| 960 |
+
- `eval_strategy`: steps
|
| 961 |
+
- `per_device_train_batch_size`: 5
|
| 962 |
+
- `per_device_eval_batch_size`: 5
|
| 963 |
+
- `num_train_epochs`: 2
|
| 964 |
+
- `multi_dataset_batch_sampler`: round_robin
|
| 965 |
+
|
| 966 |
+
#### All Hyperparameters
|
| 967 |
+
<details><summary>Click to expand</summary>
|
| 968 |
+
|
| 969 |
+
- `overwrite_output_dir`: False
|
| 970 |
+
- `do_predict`: False
|
| 971 |
+
- `eval_strategy`: steps
|
| 972 |
+
- `prediction_loss_only`: True
|
| 973 |
+
- `per_device_train_batch_size`: 5
|
| 974 |
+
- `per_device_eval_batch_size`: 5
|
| 975 |
+
- `per_gpu_train_batch_size`: None
|
| 976 |
+
- `per_gpu_eval_batch_size`: None
|
| 977 |
+
- `gradient_accumulation_steps`: 1
|
| 978 |
+
- `eval_accumulation_steps`: None
|
| 979 |
+
- `torch_empty_cache_steps`: None
|
| 980 |
+
- `learning_rate`: 5e-05
|
| 981 |
+
- `weight_decay`: 0.0
|
| 982 |
+
- `adam_beta1`: 0.9
|
| 983 |
+
- `adam_beta2`: 0.999
|
| 984 |
+
- `adam_epsilon`: 1e-08
|
| 985 |
+
- `max_grad_norm`: 1
|
| 986 |
+
- `num_train_epochs`: 2
|
| 987 |
+
- `max_steps`: -1
|
| 988 |
+
- `lr_scheduler_type`: linear
|
| 989 |
+
- `lr_scheduler_kwargs`: {}
|
| 990 |
+
- `warmup_ratio`: 0.0
|
| 991 |
+
- `warmup_steps`: 0
|
| 992 |
+
- `log_level`: passive
|
| 993 |
+
- `log_level_replica`: warning
|
| 994 |
+
- `log_on_each_node`: True
|
| 995 |
+
- `logging_nan_inf_filter`: True
|
| 996 |
+
- `save_safetensors`: True
|
| 997 |
+
- `save_on_each_node`: False
|
| 998 |
+
- `save_only_model`: False
|
| 999 |
+
- `restore_callback_states_from_checkpoint`: False
|
| 1000 |
+
- `no_cuda`: False
|
| 1001 |
+
- `use_cpu`: False
|
| 1002 |
+
- `use_mps_device`: False
|
| 1003 |
+
- `seed`: 42
|
| 1004 |
+
- `data_seed`: None
|
| 1005 |
+
- `jit_mode_eval`: False
|
| 1006 |
+
- `use_ipex`: False
|
| 1007 |
+
- `bf16`: False
|
| 1008 |
+
- `fp16`: False
|
| 1009 |
+
- `fp16_opt_level`: O1
|
| 1010 |
+
- `half_precision_backend`: auto
|
| 1011 |
+
- `bf16_full_eval`: False
|
| 1012 |
+
- `fp16_full_eval`: False
|
| 1013 |
+
- `tf32`: None
|
| 1014 |
+
- `local_rank`: 0
|
| 1015 |
+
- `ddp_backend`: None
|
| 1016 |
+
- `tpu_num_cores`: None
|
| 1017 |
+
- `tpu_metrics_debug`: False
|
| 1018 |
+
- `debug`: []
|
| 1019 |
+
- `dataloader_drop_last`: False
|
| 1020 |
+
- `dataloader_num_workers`: 0
|
| 1021 |
+
- `dataloader_prefetch_factor`: None
|
| 1022 |
+
- `past_index`: -1
|
| 1023 |
+
- `disable_tqdm`: False
|
| 1024 |
+
- `remove_unused_columns`: True
|
| 1025 |
+
- `label_names`: None
|
| 1026 |
+
- `load_best_model_at_end`: False
|
| 1027 |
+
- `ignore_data_skip`: False
|
| 1028 |
+
- `fsdp`: []
|
| 1029 |
+
- `fsdp_min_num_params`: 0
|
| 1030 |
+
- `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
|
| 1031 |
+
- `fsdp_transformer_layer_cls_to_wrap`: None
|
| 1032 |
+
- `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
|
| 1033 |
+
- `deepspeed`: None
|
| 1034 |
+
- `label_smoothing_factor`: 0.0
|
| 1035 |
+
- `optim`: adamw_torch
|
| 1036 |
+
- `optim_args`: None
|
| 1037 |
+
- `adafactor`: False
|
| 1038 |
+
- `group_by_length`: False
|
| 1039 |
+
- `length_column_name`: length
|
| 1040 |
+
- `ddp_find_unused_parameters`: None
|
| 1041 |
+
- `ddp_bucket_cap_mb`: None
|
| 1042 |
+
- `ddp_broadcast_buffers`: False
|
| 1043 |
+
- `dataloader_pin_memory`: True
|
| 1044 |
+
- `dataloader_persistent_workers`: False
|
| 1045 |
+
- `skip_memory_metrics`: True
|
| 1046 |
+
- `use_legacy_prediction_loop`: False
|
| 1047 |
+
- `push_to_hub`: False
|
| 1048 |
+
- `resume_from_checkpoint`: None
|
| 1049 |
+
- `hub_model_id`: None
|
| 1050 |
+
- `hub_strategy`: every_save
|
| 1051 |
+
- `hub_private_repo`: False
|
| 1052 |
+
- `hub_always_push`: False
|
| 1053 |
+
- `gradient_checkpointing`: False
|
| 1054 |
+
- `gradient_checkpointing_kwargs`: None
|
| 1055 |
+
- `include_inputs_for_metrics`: False
|
| 1056 |
+
- `eval_do_concat_batches`: True
|
| 1057 |
+
- `fp16_backend`: auto
|
| 1058 |
+
- `push_to_hub_model_id`: None
|
| 1059 |
+
- `push_to_hub_organization`: None
|
| 1060 |
+
- `mp_parameters`:
|
| 1061 |
+
- `auto_find_batch_size`: False
|
| 1062 |
+
- `full_determinism`: False
|
| 1063 |
+
- `torchdynamo`: None
|
| 1064 |
+
- `ray_scope`: last
|
| 1065 |
+
- `ddp_timeout`: 1800
|
| 1066 |
+
- `torch_compile`: False
|
| 1067 |
+
- `torch_compile_backend`: None
|
| 1068 |
+
- `torch_compile_mode`: None
|
| 1069 |
+
- `dispatch_batches`: None
|
| 1070 |
+
- `split_batches`: None
|
| 1071 |
+
- `include_tokens_per_second`: False
|
| 1072 |
+
- `include_num_input_tokens_seen`: False
|
| 1073 |
+
- `neftune_noise_alpha`: None
|
| 1074 |
+
- `optim_target_modules`: None
|
| 1075 |
+
- `batch_eval_metrics`: False
|
| 1076 |
+
- `eval_on_start`: False
|
| 1077 |
+
- `eval_use_gather_object`: False
|
| 1078 |
+
- `batch_sampler`: batch_sampler
|
| 1079 |
+
- `multi_dataset_batch_sampler`: round_robin
|
| 1080 |
+
|
| 1081 |
+
</details>
|
| 1082 |
+
|
| 1083 |
+
### Training Logs
|
| 1084 |
+
| Epoch | Step | dot_map@100 |
|
| 1085 |
+
|:------:|:----:|:-----------:|
|
| 1086 |
+
| 0.4237 | 50 | 0.8383 |
|
| 1087 |
+
|
| 1088 |
+
|
| 1089 |
+
### Framework Versions
|
| 1090 |
+
- Python: 3.10.12
|
| 1091 |
+
- Sentence Transformers: 3.1.1
|
| 1092 |
+
- Transformers: 4.44.2
|
| 1093 |
+
- PyTorch: 2.4.1+cu121
|
| 1094 |
+
- Accelerate: 0.34.2
|
| 1095 |
+
- Datasets: 3.0.1
|
| 1096 |
+
- Tokenizers: 0.19.1
|
| 1097 |
+
|
| 1098 |
+
## Citation
|
| 1099 |
+
|
| 1100 |
+
### BibTeX
|
| 1101 |
+
|
| 1102 |
+
#### Sentence Transformers
|
| 1103 |
+
```bibtex
|
| 1104 |
+
@inproceedings{reimers-2019-sentence-bert,
|
| 1105 |
+
title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
|
| 1106 |
+
author = "Reimers, Nils and Gurevych, Iryna",
|
| 1107 |
+
booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
|
| 1108 |
+
month = "11",
|
| 1109 |
+
year = "2019",
|
| 1110 |
+
publisher = "Association for Computational Linguistics",
|
| 1111 |
+
url = "https://arxiv.org/abs/1908.10084",
|
| 1112 |
+
}
|
| 1113 |
+
```
|
| 1114 |
+
|
| 1115 |
+
#### MultipleNegativesRankingLoss
|
| 1116 |
+
```bibtex
|
| 1117 |
+
@misc{henderson2017efficient,
|
| 1118 |
+
title={Efficient Natural Language Response Suggestion for Smart Reply},
|
| 1119 |
+
author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
|
| 1120 |
+
year={2017},
|
| 1121 |
+
eprint={1705.00652},
|
| 1122 |
+
archivePrefix={arXiv},
|
| 1123 |
+
primaryClass={cs.CL}
|
| 1124 |
+
}
|
| 1125 |
+
```
|
| 1126 |
+
|
| 1127 |
+
<!--
|
| 1128 |
+
## Glossary
|
| 1129 |
+
|
| 1130 |
+
*Clearly define terms in order to be accessible across audiences.*
|
| 1131 |
+
-->
|
| 1132 |
+
|
| 1133 |
+
<!--
|
| 1134 |
+
## Model Card Authors
|
| 1135 |
+
|
| 1136 |
+
*Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
|
| 1137 |
+
-->
|
| 1138 |
+
|
| 1139 |
+
<!--
|
| 1140 |
+
## Model Card Contact
|
| 1141 |
+
|
| 1142 |
+
*Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
|
| 1143 |
+
-->
|
config.json
ADDED
|
@@ -0,0 +1,44 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"_name_or_path": "Alibaba-NLP/gte-large-en-v1.5",
|
| 3 |
+
"architectures": [
|
| 4 |
+
"NewModel"
|
| 5 |
+
],
|
| 6 |
+
"attention_probs_dropout_prob": 0.0,
|
| 7 |
+
"auto_map": {
|
| 8 |
+
"AutoConfig": "Alibaba-NLP/new-impl--configuration.NewConfig",
|
| 9 |
+
"AutoModel": "Alibaba-NLP/new-impl--modeling.NewModel",
|
| 10 |
+
"AutoModelForMaskedLM": "Alibaba-NLP/new-impl--modeling.NewForMaskedLM",
|
| 11 |
+
"AutoModelForMultipleChoice": "Alibaba-NLP/new-impl--modeling.NewForMultipleChoice",
|
| 12 |
+
"AutoModelForQuestionAnswering": "Alibaba-NLP/new-impl--modeling.NewForQuestionAnswering",
|
| 13 |
+
"AutoModelForSequenceClassification": "Alibaba-NLP/new-impl--modeling.NewForSequenceClassification",
|
| 14 |
+
"AutoModelForTokenClassification": "Alibaba-NLP/new-impl--modeling.NewForTokenClassification"
|
| 15 |
+
},
|
| 16 |
+
"classifier_dropout": null,
|
| 17 |
+
"hidden_act": "gelu",
|
| 18 |
+
"hidden_dropout_prob": 0.1,
|
| 19 |
+
"hidden_size": 1024,
|
| 20 |
+
"initializer_range": 0.02,
|
| 21 |
+
"intermediate_size": 4096,
|
| 22 |
+
"layer_norm_eps": 1e-12,
|
| 23 |
+
"layer_norm_type": "layer_norm",
|
| 24 |
+
"logn_attention_clip1": false,
|
| 25 |
+
"logn_attention_scale": false,
|
| 26 |
+
"max_position_embeddings": 8192,
|
| 27 |
+
"model_type": "new",
|
| 28 |
+
"num_attention_heads": 16,
|
| 29 |
+
"num_hidden_layers": 24,
|
| 30 |
+
"pack_qkv": true,
|
| 31 |
+
"pad_token_id": 0,
|
| 32 |
+
"position_embedding_type": "rope",
|
| 33 |
+
"rope_scaling": {
|
| 34 |
+
"factor": 2.0,
|
| 35 |
+
"type": "ntk"
|
| 36 |
+
},
|
| 37 |
+
"rope_theta": 160000,
|
| 38 |
+
"torch_dtype": "float32",
|
| 39 |
+
"transformers_version": "4.44.2",
|
| 40 |
+
"type_vocab_size": 2,
|
| 41 |
+
"unpad_inputs": false,
|
| 42 |
+
"use_memory_efficient_attention": false,
|
| 43 |
+
"vocab_size": 30528
|
| 44 |
+
}
|
config_sentence_transformers.json
ADDED
|
@@ -0,0 +1,10 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"__version__": {
|
| 3 |
+
"sentence_transformers": "3.1.1",
|
| 4 |
+
"transformers": "4.44.2",
|
| 5 |
+
"pytorch": "2.4.1+cu121"
|
| 6 |
+
},
|
| 7 |
+
"prompts": {},
|
| 8 |
+
"default_prompt_name": null,
|
| 9 |
+
"similarity_fn_name": null
|
| 10 |
+
}
|
model.safetensors
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:3c0b605f1be5bbdb1437fb0f484850b1a0bfcbe06f8529b618131c370fbbf190
|
| 3 |
+
size 1736585680
|
modules.json
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
[
|
| 2 |
+
{
|
| 3 |
+
"idx": 0,
|
| 4 |
+
"name": "0",
|
| 5 |
+
"path": "",
|
| 6 |
+
"type": "sentence_transformers.models.Transformer"
|
| 7 |
+
},
|
| 8 |
+
{
|
| 9 |
+
"idx": 1,
|
| 10 |
+
"name": "1",
|
| 11 |
+
"path": "1_Pooling",
|
| 12 |
+
"type": "sentence_transformers.models.Pooling"
|
| 13 |
+
}
|
| 14 |
+
]
|
onnx/config.json
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"_name_or_path": "policy_gte_large_2plus/",
|
| 3 |
+
"architectures": [
|
| 4 |
+
"NewModel"
|
| 5 |
+
],
|
| 6 |
+
"attention_probs_dropout_prob": 0.0,
|
| 7 |
+
"auto_map": {
|
| 8 |
+
"AutoConfig": "configuration.NewConfig",
|
| 9 |
+
"AutoModel": "Alibaba-NLP/new-impl--modeling.NewModel",
|
| 10 |
+
"AutoModelForMaskedLM": "Alibaba-NLP/new-impl--modeling.NewForMaskedLM",
|
| 11 |
+
"AutoModelForMultipleChoice": "Alibaba-NLP/new-impl--modeling.NewForMultipleChoice",
|
| 12 |
+
"AutoModelForQuestionAnswering": "Alibaba-NLP/new-impl--modeling.NewForQuestionAnswering",
|
| 13 |
+
"AutoModelForSequenceClassification": "Alibaba-NLP/new-impl--modeling.NewForSequenceClassification",
|
| 14 |
+
"AutoModelForTokenClassification": "Alibaba-NLP/new-impl--modeling.NewForTokenClassification"
|
| 15 |
+
},
|
| 16 |
+
"classifier_dropout": null,
|
| 17 |
+
"export_model_type": "transformer",
|
| 18 |
+
"hidden_act": "gelu",
|
| 19 |
+
"hidden_dropout_prob": 0.1,
|
| 20 |
+
"hidden_size": 1024,
|
| 21 |
+
"initializer_range": 0.02,
|
| 22 |
+
"intermediate_size": 4096,
|
| 23 |
+
"layer_norm_eps": 1e-12,
|
| 24 |
+
"layer_norm_type": "layer_norm",
|
| 25 |
+
"logn_attention_clip1": false,
|
| 26 |
+
"logn_attention_scale": false,
|
| 27 |
+
"max_position_embeddings": 8192,
|
| 28 |
+
"model_type": "new",
|
| 29 |
+
"num_attention_heads": 16,
|
| 30 |
+
"num_hidden_layers": 24,
|
| 31 |
+
"pack_qkv": true,
|
| 32 |
+
"pad_token_id": 0,
|
| 33 |
+
"position_embedding_type": "rope",
|
| 34 |
+
"rope_scaling": {
|
| 35 |
+
"factor": 2.0,
|
| 36 |
+
"type": "ntk"
|
| 37 |
+
},
|
| 38 |
+
"rope_theta": 160000,
|
| 39 |
+
"torch_dtype": "float32",
|
| 40 |
+
"transformers_version": "4.44.2",
|
| 41 |
+
"type_vocab_size": 2,
|
| 42 |
+
"unpad_inputs": false,
|
| 43 |
+
"use_memory_efficient_attention": false,
|
| 44 |
+
"vocab_size": 30528
|
| 45 |
+
}
|
onnx/configuration.py
ADDED
|
@@ -0,0 +1,145 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# coding=utf-8
|
| 2 |
+
# Copyright 2024 The GTE Team Authors and Alibaba Group.
|
| 3 |
+
# Copyright (c) 2018, NVIDIA CORPORATION. All rights reserved.
|
| 4 |
+
#
|
| 5 |
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
| 6 |
+
# you may not use this file except in compliance with the License.
|
| 7 |
+
# You may obtain a copy of the License at
|
| 8 |
+
#
|
| 9 |
+
# http://www.apache.org/licenses/LICENSE-2.0
|
| 10 |
+
#
|
| 11 |
+
# Unless required by applicable law or agreed to in writing, software
|
| 12 |
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
| 13 |
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
| 14 |
+
# See the License for the specific language governing permissions and
|
| 15 |
+
# limitations under the License.
|
| 16 |
+
""" NEW model configuration"""
|
| 17 |
+
from transformers.configuration_utils import PretrainedConfig
|
| 18 |
+
from transformers.utils import logging
|
| 19 |
+
|
| 20 |
+
logger = logging.get_logger(__name__)
|
| 21 |
+
|
| 22 |
+
|
| 23 |
+
class NewConfig(PretrainedConfig):
|
| 24 |
+
r"""
|
| 25 |
+
This is the configuration class to store the configuration of a [`NewModel`] or a [`TFNewModel`]. It is used to
|
| 26 |
+
instantiate a NEW model according to the specified arguments, defining the model architecture. Instantiating a
|
| 27 |
+
configuration with the defaults will yield a similar configuration to that of the NEW
|
| 28 |
+
[izhx/new-base-en](https://huggingface.co/izhx/new-base-en) architecture.
|
| 29 |
+
|
| 30 |
+
Configuration objects inherit from [`PretrainedConfig`] and can be used to control the model outputs. Read the
|
| 31 |
+
documentation from [`PretrainedConfig`] for more information.
|
| 32 |
+
|
| 33 |
+
|
| 34 |
+
Args:
|
| 35 |
+
vocab_size (`int`, *optional*, defaults to 30522):
|
| 36 |
+
Vocabulary size of the NEW model. Defines the number of different tokens that can be represented by the
|
| 37 |
+
`inputs_ids` passed when calling [`NewModel`] or [`TFNewModel`].
|
| 38 |
+
hidden_size (`int`, *optional*, defaults to 768):
|
| 39 |
+
Dimensionality of the encoder layers and the pooler layer.
|
| 40 |
+
num_hidden_layers (`int`, *optional*, defaults to 12):
|
| 41 |
+
Number of hidden layers in the Transformer encoder.
|
| 42 |
+
num_attention_heads (`int`, *optional*, defaults to 12):
|
| 43 |
+
Number of attention heads for each attention layer in the Transformer encoder.
|
| 44 |
+
intermediate_size (`int`, *optional*, defaults to 3072):
|
| 45 |
+
Dimensionality of the "intermediate" (often named feed-forward) layer in the Transformer encoder.
|
| 46 |
+
hidden_act (`str` or `Callable`, *optional*, defaults to `"gelu"`):
|
| 47 |
+
The non-linear activation function (function or string) in the encoder and pooler. If string, `"gelu"`,
|
| 48 |
+
`"relu"`, `"silu"` and `"gelu_new"` are supported.
|
| 49 |
+
hidden_dropout_prob (`float`, *optional*, defaults to 0.1):
|
| 50 |
+
The dropout probability for all fully connected layers in the embeddings, encoder, and pooler.
|
| 51 |
+
attention_probs_dropout_prob (`float`, *optional*, defaults to 0.1):
|
| 52 |
+
The dropout ratio for the attention probabilities.
|
| 53 |
+
max_position_embeddings (`int`, *optional*, defaults to 512):
|
| 54 |
+
The maximum sequence length that this model might ever be used with. Typically set this to something large
|
| 55 |
+
just in case (e.g., 512 or 1024 or 2048).
|
| 56 |
+
type_vocab_size (`int`, *optional*, defaults to 2):
|
| 57 |
+
The vocabulary size of the `token_type_ids` passed when calling [`NewModel`] or [`TFNewModel`].
|
| 58 |
+
initializer_range (`float`, *optional*, defaults to 0.02):
|
| 59 |
+
The standard deviation of the truncated_normal_initializer for initializing all weight matrices.
|
| 60 |
+
layer_norm_eps (`float`, *optional*, defaults to 1e-12):
|
| 61 |
+
The epsilon used by the layer normalization layers.
|
| 62 |
+
position_embedding_type (`str`, *optional*, defaults to `"rope"`):
|
| 63 |
+
Type of position embedding. Choose one of `"absolute"`, `"rope"`.
|
| 64 |
+
rope_theta (`float`, *optional*, defaults to 10000.0):
|
| 65 |
+
The base period of the RoPE embeddings.
|
| 66 |
+
rope_scaling (`Dict`, *optional*):
|
| 67 |
+
Dictionary containing the scaling configuration for the RoPE embeddings. Currently supports two scaling
|
| 68 |
+
strategies: linear and dynamic. Their scaling factor must be a float greater than 1. The expected format is
|
| 69 |
+
`{"type": strategy name, "factor": scaling factor}`. When using this flag, don't update
|
| 70 |
+
`max_position_embeddings` to the expected new maximum. See the following thread for more information on how
|
| 71 |
+
these scaling strategies behave:
|
| 72 |
+
https://www.reddit.com/r/LocalLLaMA/comments/14mrgpr/dynamically_scaled_rope_further_increases/. This is an
|
| 73 |
+
experimental feature, subject to breaking API changes in future versions.
|
| 74 |
+
classifier_dropout (`float`, *optional*):
|
| 75 |
+
The dropout ratio for the classification head.
|
| 76 |
+
|
| 77 |
+
Examples:
|
| 78 |
+
|
| 79 |
+
```python
|
| 80 |
+
>>> from transformers import NewConfig, NewModel
|
| 81 |
+
|
| 82 |
+
>>> # Initializing a NEW izhx/new-base-en style configuration
|
| 83 |
+
>>> configuration = NewConfig()
|
| 84 |
+
|
| 85 |
+
>>> # Initializing a model (with random weights) from the izhx/new-base-en style configuration
|
| 86 |
+
>>> model = NewModel(configuration)
|
| 87 |
+
|
| 88 |
+
>>> # Accessing the model configuration
|
| 89 |
+
>>> configuration = model.config
|
| 90 |
+
```"""
|
| 91 |
+
|
| 92 |
+
model_type = "new"
|
| 93 |
+
|
| 94 |
+
def __init__(
|
| 95 |
+
self,
|
| 96 |
+
vocab_size=30528,
|
| 97 |
+
hidden_size=768,
|
| 98 |
+
num_hidden_layers=12,
|
| 99 |
+
num_attention_heads=12,
|
| 100 |
+
intermediate_size=3072,
|
| 101 |
+
hidden_act="gelu",
|
| 102 |
+
hidden_dropout_prob=0.1,
|
| 103 |
+
attention_probs_dropout_prob=0.0,
|
| 104 |
+
max_position_embeddings=2048,
|
| 105 |
+
type_vocab_size=1,
|
| 106 |
+
initializer_range=0.02,
|
| 107 |
+
layer_norm_type='layer_norm',
|
| 108 |
+
layer_norm_eps=1e-12,
|
| 109 |
+
# pad_token_id=0,
|
| 110 |
+
position_embedding_type="rope",
|
| 111 |
+
rope_theta=10000.0,
|
| 112 |
+
rope_scaling=None,
|
| 113 |
+
classifier_dropout=None,
|
| 114 |
+
pack_qkv=True,
|
| 115 |
+
unpad_inputs=False,
|
| 116 |
+
use_memory_efficient_attention=False,
|
| 117 |
+
logn_attention_scale=False,
|
| 118 |
+
logn_attention_clip1=False,
|
| 119 |
+
**kwargs,
|
| 120 |
+
):
|
| 121 |
+
super().__init__(**kwargs)
|
| 122 |
+
|
| 123 |
+
self.vocab_size = vocab_size
|
| 124 |
+
self.hidden_size = hidden_size
|
| 125 |
+
self.num_hidden_layers = num_hidden_layers
|
| 126 |
+
self.num_attention_heads = num_attention_heads
|
| 127 |
+
self.hidden_act = hidden_act
|
| 128 |
+
self.intermediate_size = intermediate_size
|
| 129 |
+
self.hidden_dropout_prob = hidden_dropout_prob
|
| 130 |
+
self.attention_probs_dropout_prob = attention_probs_dropout_prob
|
| 131 |
+
self.max_position_embeddings = max_position_embeddings
|
| 132 |
+
self.type_vocab_size = type_vocab_size
|
| 133 |
+
self.initializer_range = initializer_range
|
| 134 |
+
self.layer_norm_type = layer_norm_type
|
| 135 |
+
self.layer_norm_eps = layer_norm_eps
|
| 136 |
+
self.position_embedding_type = position_embedding_type
|
| 137 |
+
self.rope_theta = rope_theta
|
| 138 |
+
self.rope_scaling = rope_scaling
|
| 139 |
+
self.classifier_dropout = classifier_dropout
|
| 140 |
+
|
| 141 |
+
self.pack_qkv = pack_qkv
|
| 142 |
+
self.unpad_inputs = unpad_inputs
|
| 143 |
+
self.use_memory_efficient_attention = use_memory_efficient_attention
|
| 144 |
+
self.logn_attention_scale = logn_attention_scale
|
| 145 |
+
self.logn_attention_clip1 = logn_attention_clip1
|
onnx/model.onnx
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:343e333536b1f293902c0ce8c2622de443abe9ba2e023149e1891e7efd758d92
|
| 3 |
+
size 1745854634
|
onnx/special_tokens_map.json
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"cls_token": {
|
| 3 |
+
"content": "[CLS]",
|
| 4 |
+
"lstrip": false,
|
| 5 |
+
"normalized": false,
|
| 6 |
+
"rstrip": false,
|
| 7 |
+
"single_word": false
|
| 8 |
+
},
|
| 9 |
+
"mask_token": {
|
| 10 |
+
"content": "[MASK]",
|
| 11 |
+
"lstrip": false,
|
| 12 |
+
"normalized": false,
|
| 13 |
+
"rstrip": false,
|
| 14 |
+
"single_word": false
|
| 15 |
+
},
|
| 16 |
+
"pad_token": {
|
| 17 |
+
"content": "[PAD]",
|
| 18 |
+
"lstrip": false,
|
| 19 |
+
"normalized": false,
|
| 20 |
+
"rstrip": false,
|
| 21 |
+
"single_word": false
|
| 22 |
+
},
|
| 23 |
+
"sep_token": {
|
| 24 |
+
"content": "[SEP]",
|
| 25 |
+
"lstrip": false,
|
| 26 |
+
"normalized": false,
|
| 27 |
+
"rstrip": false,
|
| 28 |
+
"single_word": false
|
| 29 |
+
},
|
| 30 |
+
"unk_token": {
|
| 31 |
+
"content": "[UNK]",
|
| 32 |
+
"lstrip": false,
|
| 33 |
+
"normalized": false,
|
| 34 |
+
"rstrip": false,
|
| 35 |
+
"single_word": false
|
| 36 |
+
}
|
| 37 |
+
}
|
onnx/tokenizer.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
onnx/tokenizer_config.json
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"added_tokens_decoder": {
|
| 3 |
+
"0": {
|
| 4 |
+
"content": "[PAD]",
|
| 5 |
+
"lstrip": false,
|
| 6 |
+
"normalized": false,
|
| 7 |
+
"rstrip": false,
|
| 8 |
+
"single_word": false,
|
| 9 |
+
"special": true
|
| 10 |
+
},
|
| 11 |
+
"100": {
|
| 12 |
+
"content": "[UNK]",
|
| 13 |
+
"lstrip": false,
|
| 14 |
+
"normalized": false,
|
| 15 |
+
"rstrip": false,
|
| 16 |
+
"single_word": false,
|
| 17 |
+
"special": true
|
| 18 |
+
},
|
| 19 |
+
"101": {
|
| 20 |
+
"content": "[CLS]",
|
| 21 |
+
"lstrip": false,
|
| 22 |
+
"normalized": false,
|
| 23 |
+
"rstrip": false,
|
| 24 |
+
"single_word": false,
|
| 25 |
+
"special": true
|
| 26 |
+
},
|
| 27 |
+
"102": {
|
| 28 |
+
"content": "[SEP]",
|
| 29 |
+
"lstrip": false,
|
| 30 |
+
"normalized": false,
|
| 31 |
+
"rstrip": false,
|
| 32 |
+
"single_word": false,
|
| 33 |
+
"special": true
|
| 34 |
+
},
|
| 35 |
+
"103": {
|
| 36 |
+
"content": "[MASK]",
|
| 37 |
+
"lstrip": false,
|
| 38 |
+
"normalized": false,
|
| 39 |
+
"rstrip": false,
|
| 40 |
+
"single_word": false,
|
| 41 |
+
"special": true
|
| 42 |
+
}
|
| 43 |
+
},
|
| 44 |
+
"clean_up_tokenization_spaces": true,
|
| 45 |
+
"cls_token": "[CLS]",
|
| 46 |
+
"do_lower_case": true,
|
| 47 |
+
"mask_token": "[MASK]",
|
| 48 |
+
"max_length": 8000,
|
| 49 |
+
"model_max_length": 8192,
|
| 50 |
+
"pad_to_multiple_of": null,
|
| 51 |
+
"pad_token": "[PAD]",
|
| 52 |
+
"pad_token_type_id": 0,
|
| 53 |
+
"padding_side": "right",
|
| 54 |
+
"sep_token": "[SEP]",
|
| 55 |
+
"stride": 0,
|
| 56 |
+
"strip_accents": null,
|
| 57 |
+
"tokenize_chinese_chars": true,
|
| 58 |
+
"tokenizer_class": "BertTokenizer",
|
| 59 |
+
"truncation_side": "right",
|
| 60 |
+
"truncation_strategy": "longest_first",
|
| 61 |
+
"unk_token": "[UNK]"
|
| 62 |
+
}
|
onnx/vocab.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
sentence_bert_config.json
ADDED
|
@@ -0,0 +1,4 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"max_seq_length": 8192,
|
| 3 |
+
"do_lower_case": false
|
| 4 |
+
}
|
special_tokens_map.json
ADDED
|
@@ -0,0 +1,37 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"cls_token": {
|
| 3 |
+
"content": "[CLS]",
|
| 4 |
+
"lstrip": false,
|
| 5 |
+
"normalized": false,
|
| 6 |
+
"rstrip": false,
|
| 7 |
+
"single_word": false
|
| 8 |
+
},
|
| 9 |
+
"mask_token": {
|
| 10 |
+
"content": "[MASK]",
|
| 11 |
+
"lstrip": false,
|
| 12 |
+
"normalized": false,
|
| 13 |
+
"rstrip": false,
|
| 14 |
+
"single_word": false
|
| 15 |
+
},
|
| 16 |
+
"pad_token": {
|
| 17 |
+
"content": "[PAD]",
|
| 18 |
+
"lstrip": false,
|
| 19 |
+
"normalized": false,
|
| 20 |
+
"rstrip": false,
|
| 21 |
+
"single_word": false
|
| 22 |
+
},
|
| 23 |
+
"sep_token": {
|
| 24 |
+
"content": "[SEP]",
|
| 25 |
+
"lstrip": false,
|
| 26 |
+
"normalized": false,
|
| 27 |
+
"rstrip": false,
|
| 28 |
+
"single_word": false
|
| 29 |
+
},
|
| 30 |
+
"unk_token": {
|
| 31 |
+
"content": "[UNK]",
|
| 32 |
+
"lstrip": false,
|
| 33 |
+
"normalized": false,
|
| 34 |
+
"rstrip": false,
|
| 35 |
+
"single_word": false
|
| 36 |
+
}
|
| 37 |
+
}
|
tokenizer.json
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
tokenizer_config.json
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"added_tokens_decoder": {
|
| 3 |
+
"0": {
|
| 4 |
+
"content": "[PAD]",
|
| 5 |
+
"lstrip": false,
|
| 6 |
+
"normalized": false,
|
| 7 |
+
"rstrip": false,
|
| 8 |
+
"single_word": false,
|
| 9 |
+
"special": true
|
| 10 |
+
},
|
| 11 |
+
"100": {
|
| 12 |
+
"content": "[UNK]",
|
| 13 |
+
"lstrip": false,
|
| 14 |
+
"normalized": false,
|
| 15 |
+
"rstrip": false,
|
| 16 |
+
"single_word": false,
|
| 17 |
+
"special": true
|
| 18 |
+
},
|
| 19 |
+
"101": {
|
| 20 |
+
"content": "[CLS]",
|
| 21 |
+
"lstrip": false,
|
| 22 |
+
"normalized": false,
|
| 23 |
+
"rstrip": false,
|
| 24 |
+
"single_word": false,
|
| 25 |
+
"special": true
|
| 26 |
+
},
|
| 27 |
+
"102": {
|
| 28 |
+
"content": "[SEP]",
|
| 29 |
+
"lstrip": false,
|
| 30 |
+
"normalized": false,
|
| 31 |
+
"rstrip": false,
|
| 32 |
+
"single_word": false,
|
| 33 |
+
"special": true
|
| 34 |
+
},
|
| 35 |
+
"103": {
|
| 36 |
+
"content": "[MASK]",
|
| 37 |
+
"lstrip": false,
|
| 38 |
+
"normalized": false,
|
| 39 |
+
"rstrip": false,
|
| 40 |
+
"single_word": false,
|
| 41 |
+
"special": true
|
| 42 |
+
}
|
| 43 |
+
},
|
| 44 |
+
"clean_up_tokenization_spaces": true,
|
| 45 |
+
"cls_token": "[CLS]",
|
| 46 |
+
"do_lower_case": true,
|
| 47 |
+
"mask_token": "[MASK]",
|
| 48 |
+
"max_length": 8000,
|
| 49 |
+
"model_max_length": 8192,
|
| 50 |
+
"pad_to_multiple_of": null,
|
| 51 |
+
"pad_token": "[PAD]",
|
| 52 |
+
"pad_token_type_id": 0,
|
| 53 |
+
"padding_side": "right",
|
| 54 |
+
"sep_token": "[SEP]",
|
| 55 |
+
"stride": 0,
|
| 56 |
+
"strip_accents": null,
|
| 57 |
+
"tokenize_chinese_chars": true,
|
| 58 |
+
"tokenizer_class": "BertTokenizer",
|
| 59 |
+
"truncation_side": "right",
|
| 60 |
+
"truncation_strategy": "longest_first",
|
| 61 |
+
"unk_token": "[UNK]"
|
| 62 |
+
}
|
vocab.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|