Mungert commited on
Commit
09b8946
·
verified ·
0 Parent(s):

Super-squash history to reclaim storage

Browse files
.gitattributes ADDED
@@ -0,0 +1,51 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ *.7z filter=lfs diff=lfs merge=lfs -text
2
+ *.arrow filter=lfs diff=lfs merge=lfs -text
3
+ *.bin filter=lfs diff=lfs merge=lfs -text
4
+ *.bz2 filter=lfs diff=lfs merge=lfs -text
5
+ *.ckpt filter=lfs diff=lfs merge=lfs -text
6
+ *.ftz filter=lfs diff=lfs merge=lfs -text
7
+ *.gz filter=lfs diff=lfs merge=lfs -text
8
+ *.h5 filter=lfs diff=lfs merge=lfs -text
9
+ *.joblib filter=lfs diff=lfs merge=lfs -text
10
+ *.lfs.* filter=lfs diff=lfs merge=lfs -text
11
+ *.mlmodel filter=lfs diff=lfs merge=lfs -text
12
+ *.model filter=lfs diff=lfs merge=lfs -text
13
+ *.msgpack filter=lfs diff=lfs merge=lfs -text
14
+ *.npy filter=lfs diff=lfs merge=lfs -text
15
+ *.npz filter=lfs diff=lfs merge=lfs -text
16
+ *.onnx filter=lfs diff=lfs merge=lfs -text
17
+ *.ot filter=lfs diff=lfs merge=lfs -text
18
+ *.parquet filter=lfs diff=lfs merge=lfs -text
19
+ *.pb filter=lfs diff=lfs merge=lfs -text
20
+ *.pickle filter=lfs diff=lfs merge=lfs -text
21
+ *.pkl filter=lfs diff=lfs merge=lfs -text
22
+ *.pt filter=lfs diff=lfs merge=lfs -text
23
+ *.pth filter=lfs diff=lfs merge=lfs -text
24
+ *.rar filter=lfs diff=lfs merge=lfs -text
25
+ *.safetensors filter=lfs diff=lfs merge=lfs -text
26
+ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
27
+ *.tar.* filter=lfs diff=lfs merge=lfs -text
28
+ *.tar filter=lfs diff=lfs merge=lfs -text
29
+ *.tflite filter=lfs diff=lfs merge=lfs -text
30
+ *.tgz filter=lfs diff=lfs merge=lfs -text
31
+ *.wasm filter=lfs diff=lfs merge=lfs -text
32
+ *.xz filter=lfs diff=lfs merge=lfs -text
33
+ *.zip filter=lfs diff=lfs merge=lfs -text
34
+ *.zst filter=lfs diff=lfs merge=lfs -text
35
+ *tfevents* filter=lfs diff=lfs merge=lfs -text
36
+ gemma-3-12b-it-qat-q4_0-q2_k_l.gguf filter=lfs diff=lfs merge=lfs -text
37
+ gemma-3-12b-it-qat-q4_0-q3_k_l.gguf filter=lfs diff=lfs merge=lfs -text
38
+ gemma-3-12b-it-qat-q4_0-q2_k_s.gguf filter=lfs diff=lfs merge=lfs -text
39
+ gemma-3-12b-it-qat-q4_0-q3_k_m.gguf filter=lfs diff=lfs merge=lfs -text
40
+ gemma-3-12b-it-qat-q4_0-q3_k_s.gguf filter=lfs diff=lfs merge=lfs -text
41
+ gemma-3-12b-it-qat-q4_0-iq1_s.gguf filter=lfs diff=lfs merge=lfs -text
42
+ gemma-3-12b-it-qat-q4_0-iq1_m.gguf filter=lfs diff=lfs merge=lfs -text
43
+ gemma-3-12b-it-qat-q4_0-iq2_xs.gguf filter=lfs diff=lfs merge=lfs -text
44
+ gemma-3-12b-it-qat-q4_0-iq2_xxs.gguf filter=lfs diff=lfs merge=lfs -text
45
+ gemma-3-12b-it-qat-q4_0-iq2_s.gguf filter=lfs diff=lfs merge=lfs -text
46
+ gemma-3-12b-it-qat-q4_0-iq2_m.gguf filter=lfs diff=lfs merge=lfs -text
47
+ gemma-3-12b-it-qat-q4_0-iq3_xs.gguf filter=lfs diff=lfs merge=lfs -text
48
+ gemma-3-12b-it-qat-q4_0-iq3_xxs.gguf filter=lfs diff=lfs merge=lfs -text
49
+ gemma-3-12b-it-qat-q4_0-iq3_s.gguf filter=lfs diff=lfs merge=lfs -text
50
+ gemma-3-12b-it-qat-q4_0-iq3_m.gguf filter=lfs diff=lfs merge=lfs -text
51
+ gemma-3-12b-it-qat-q4_0.imatrix filter=lfs diff=lfs merge=lfs -text
README.md ADDED
@@ -0,0 +1,448 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ license: gemma
3
+ pipeline_tag: image-text-to-text
4
+ extra_gated_heading: Access Gemma on Hugging Face
5
+ extra_gated_prompt: >-
6
+ To access Gemma on Hugging Face, you’re required to review and agree to
7
+ Google’s usage license. To do this, please ensure you’re logged in to Hugging
8
+ Face and click below. Requests are processed immediately.
9
+ extra_gated_button_content: Acknowledge license
10
+ base_model: google/gemma-3-12b-it
11
+ tags:
12
+ - gemma
13
+ - gemma3
14
+ ---
15
+
16
+
17
+
18
+ # <span style="color: #7FFF7F;">Gemma-3 12B Instruct GGUF Models</span>
19
+ > [!Note]
20
+ > Experimetal requantization!! I wanted to test if the QAT model requantized performs better than the bf16 model quantized to the same bit level.
21
+ >
22
+ > I have created a imatrix files from the google original QAT Q4_0 quantized model. This imatrix is then used to recompress the model to lower bit quants
23
+ >
24
+ > Please leave feedback.
25
+ >
26
+ > I tested with the 4b model quantized from bf16 and one requantized from the QAT Q4_0 model. Both quantized with same tensor quants
27
+
28
+ My results :
29
+
30
+ ```
31
+ python3 ~/code/GGUFModelBuilder/perp_test_2_files.py ./gemma-3-4b-it-qat-q4_0-q3_k_l.gguf ./google_gemma-3-4b-it-q3_k_l.gguf
32
+
33
+ Testing model: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf
34
+ Running: llama.cpp/llama-perplexity -m gemma-3-4b-it-qat-q4_0-q3_k_l.gguf -f perplexity_test_data.txt --ctx-size 256 --ppl-stride 32 --chunks 1 --threads 4
35
+ [✓] Perplexity: 4.0963 (Time: 284.70s)
36
+
37
+ Testing model: google_gemma-3-4b-it-q3_k_l.gguf
38
+ Running: llama.cpp/llama-perplexity -m google_gemma-3-4b-it-q3_k_l.gguf -f perplexity_test_data.txt --ctx-size 256 --ppl-stride 32 --chunks 1 --threads 4
39
+ [✓] Perplexity: 4.5557 (Time: 287.15s)
40
+
41
+ === Comparison Results ===
42
+ Model 1: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf - Perplexity: 4.10 (Time: 284.70s)
43
+ Model 2: google_gemma-3-4b-it-q3_k_l.gguf - Perplexity: 4.56 (Time: 287.15s)
44
+
45
+ Winner: gemma-3-4b-it-qat-q4_0-q3_k_l.gguf (Difference: 0.46)
46
+ ```
47
+
48
+ A different test :
49
+
50
+ Asking both models to : write some .net code to test if a website is using quantum safe encryption
51
+
52
+ And then asking Deepseek-R1 to evaluate :
53
+
54
+ Evaluation of the Two Models' Outputs
55
+
56
+ Both models attempted to solve the problem of detecting quantum-safe encryption, but the QAT q4_0 model's code is significantly better for the following reasons:
57
+ 1. Technical Accuracy
58
+
59
+ QAT q4_0 Model:
60
+
61
+ Checks both TLS version and cipher suites, which are critical for assessing quantum resistance. While the implementation has flaws (e.g., assuming TLS version is exposed in HTTP headers), the approach aligns with security best practices.
62
+
63
+ Explicitly acknowledges limitations (e.g., "not a definitive test") and avoids overpromising.
64
+
65
+ BF16 Model:
66
+
67
+ Relies on checking for a non-standard TLS/1.3 header, which does not exist in HTTP responses. TLS version is part of the SSL/TLS handshake and cannot be retrieved via HttpClient headers.
68
+
69
+ Contains incorrect logic (e.g., client.GetAwaiter().GetResult(null) is nonsensical and throws runtime errors).
70
+
71
+ 2. Code Quality
72
+
73
+ QAT q4_0 Model:
74
+
75
+ Uses modern async/await patterns for non-blocking I/O.
76
+
77
+ Separates concerns into methods (CheckTLSVersionAsync, CheckCipherSuiteAsync).
78
+
79
+ Includes robust error handling and logging.
80
+
81
+ BF16 Model:
82
+
83
+ Uses blocking synchronous code (GetAwaiter().GetResult()), which violates .NET best practices and risks deadlocks.
84
+
85
+ Poorly structured (e.g., redundant using blocks, unclear variable names like result).
86
+
87
+ 3. Security Relevance
88
+
89
+ QAT q4_0 Model:
90
+
91
+ Focuses on cipher suites, which are closer to the actual indicators of quantum resistance (e.g., AES-256-GCM). While not truly quantum-safe, these are stronger than outdated algorithms.
92
+
93
+ Mentions the need to update cipher lists based on NIST guidelines.
94
+
95
+ BF16 Model:
96
+
97
+ Misleadingly claims to check for "AES-256-CBC" (a deprecated cipher mode) but never implements it.
98
+
99
+ Fails to address cipher suites entirely, rendering the check meaningless.
100
+
101
+ 4. Realism
102
+
103
+ QAT q4_0 Model:
104
+
105
+ Acknowledges the complexity of quantum-safe detection and clarifies that HTTP-based checks are insufficient. This aligns with real-world security practices.
106
+
107
+ BF16 Model:
108
+
109
+ Implies that checking for TLS 1.3 guarantees quantum safety, which is false. TLS 1.3 uses classical cryptography and is not inherently quantum-resistant.
110
+
111
+ 5. Usability
112
+
113
+ QAT q4_0 Model:
114
+
115
+ Provides clear console output (e.g., "No quantum-resistant cipher suites detected").
116
+
117
+ Includes a working Main method with an example URL.
118
+
119
+ BF16 Model:
120
+
121
+ Fails to compile due to syntax errors (e.g., client.GetAwaiter().GetResult(null) is invalid).
122
+
123
+ Lacks meaningful output (e.g., no details about why a site is deemed insecure).
124
+
125
+ Critical Flaws in Both Models
126
+
127
+ Header Misuse: Both models incorrectly assume TLS version and cipher suites are exposed in HTTP headers (e.g., Sec-Cipher). In reality, this data is part of the SSL/TLS handshake and requires low-level inspection (e.g., using SslStream or libraries like BouncyCastle).
128
+
129
+ Quantum-Safe Misunderstanding: Neither code checks for post-quantum algorithms (e.g., CRYSTALS-Kyber). Current TLS 1.3 cipher suites are not quantum-safe, so both models provide false positives.
130
+
131
+ Final Verdict
132
+
133
+ The QAT q4_0 model's code is superior because it:
134
+
135
+ Follows better coding practices (async/await, error handling).
136
+
137
+ Attempts a more relevant security analysis (TLS + cipher suites).
138
+
139
+ Explicitly acknowledges limitations.
140
+
141
+ However, both models fail to solve the original problem due to fundamental misunderstandings of TLS/SSL mechanics. For a production-grade solution, direct inspection of the TLS handshake (e.g., via SslStream) and support for post-quantum algorithms would be required.
142
+
143
+
144
+ Overall the perp difference was small (my test set was also small) and running the Deepseek test produced different results on subsequent runs . So I can not come to a definite conclusion. But I would say is worth investigating further.
145
+
146
+
147
+
148
+
149
+ # Gemma 3 model card
150
+
151
+ **Model Page**: [Gemma](https://ai.google.dev/gemma/docs/core)
152
+
153
+ > [!Note]
154
+ > This repository corresponds to the 12 **instruction-tuned** version of the Gemma 3 model in GGUF format using Quantization Aware Training (QAT).
155
+ > The GGUF corresponds to Q4_0 quantization.
156
+ >
157
+ > Thanks to QAT, the model is able to preserve similar quality as `bfloat16` while significantly reducing the memory requirements
158
+ > to load the model.
159
+ >
160
+ > You can find the half-precision version [here](https://huggingface.co/google/gemma-3-12b-it).
161
+
162
+
163
+ **Resources and Technical Documentation**:
164
+
165
+ * [Gemma 3 Technical Report][g3-tech-report]
166
+ * [Responsible Generative AI Toolkit][rai-toolkit]
167
+ * [Gemma on Kaggle][kaggle-gemma]
168
+ * [Gemma on Vertex Model Garden][vertex-mg-gemma3]
169
+
170
+ **Terms of Use**: [Terms][terms]
171
+
172
+ **Authors**: Google DeepMind
173
+
174
+ ## Model Information
175
+
176
+ Summary description and brief definition of inputs and outputs.
177
+
178
+ ### Description
179
+
180
+ Gemma is a family of lightweight, state-of-the-art open models from Google,
181
+ built from the same research and technology used to create the Gemini models.
182
+ Gemma 3 models are multimodal, handling text and image input and generating text
183
+ output, with open weights for both pre-trained variants and instruction-tuned
184
+ variants. Gemma 3 has a large, 128K context window, multilingual support in over
185
+ 140 languages, and is available in more sizes than previous versions. Gemma 3
186
+ models are well-suited for a variety of text generation and image understanding
187
+ tasks, including question answering, summarization, and reasoning. Their
188
+ relatively small size makes it possible to deploy them in environments with
189
+ limited resources such as laptops, desktops or your own cloud infrastructure,
190
+ democratizing access to state of the art AI models and helping foster innovation
191
+ for everyone.
192
+
193
+ ### Inputs and outputs
194
+
195
+ - **Input:**
196
+ - Text string, such as a question, a prompt, or a document to be summarized
197
+ - Images, normalized to 896 x 896 resolution and encoded to 256 tokens
198
+ each
199
+ - Total input context of 128K tokens for the 4B, 12B, and 27B sizes, and
200
+ 32K tokens for the 1B size
201
+
202
+ - **Output:**
203
+ - Generated text in response to the input, such as an answer to a
204
+ question, analysis of image content, or a summary of a document
205
+ - Total output context of 8192 tokens
206
+
207
+ ### Usage
208
+
209
+ Below, there are some code snippets on how to get quickly started with running the model.
210
+
211
+ **llama.cpp (text-only)**
212
+
213
+ ```sh
214
+ ./llama-cli -hf google/gemma-3-27b-it-qat-q4_0-gguf -p "Write a poem about the Kraken."
215
+ ```
216
+
217
+ **llama.cpp (image input)**
218
+
219
+ ```sh
220
+ wget https://github.com/bebechien/gemma/blob/main/surprise.png?raw=true -O ~/Downloads/surprise.png
221
+ ./llama-gemma3-cli -hf google/gemma-3-12b-it-qat-q4_0-gguf -p "Describe this image." --image ~/Downloads/surprise.png
222
+ ```
223
+
224
+ **ollama (text only)**
225
+
226
+ Using GGUFs with Ollama via Hugging Face does not support image inputs at the moment. Please check the [docs on running gated repositories](https://huggingface.co/docs/hub/en/ollama#run-private-ggufs-from-the-hugging-face-hub).
227
+
228
+
229
+ ```sh
230
+ ollama run hf.co/google/gemma-3-12b-it-qat-q4_0-gguf
231
+ ```
232
+
233
+ ### Citation
234
+
235
+ ```none
236
+ @article{gemma_2025,
237
+ title={Gemma 3},
238
+ url={https://goo.gle/Gemma3Report},
239
+ publisher={Kaggle},
240
+ author={Gemma Team},
241
+ year={2025}
242
+ }
243
+ ```
244
+
245
+ ## Model Data
246
+
247
+ Data used for model training and how the data was processed.
248
+
249
+ ### Training Dataset
250
+
251
+ These models were trained on a dataset of text data that includes a wide variety
252
+ of sources. the 12B model was
253
+ trained with 12 trillion tokens, 4B model was trained with 4 trillion tokens and
254
+ 1B with 2 trillion tokens. Here are the key components:
255
+
256
+ - Web Documents: A diverse collection of web text ensures the model is
257
+ exposed to a broad range of linguistic styles, topics, and vocabulary. The
258
+ training dataset includes content in over 140 languages.
259
+ - Code: Exposing the model to code helps it to learn the syntax and
260
+ patterns of programming languages, which improves its ability to generate
261
+ code and understand code-related questions.
262
+ - Mathematics: Training on mathematical text helps the model learn logical
263
+ reasoning, symbolic representation, and to address mathematical queries.
264
+ - Images: A wide range of images enables the model to perform image
265
+ analysis and visual data extraction tasks.
266
+
267
+ The combination of these diverse data sources is crucial for training a powerful
268
+ multimodal model that can handle a wide variety of different tasks and data
269
+ formats.
270
+
271
+ ### Data Preprocessing
272
+
273
+ Here are the key data cleaning and filtering methods applied to the training
274
+ data:
275
+
276
+ - CSAM Filtering: Rigorous CSAM (Child Sexual Abuse Material) filtering
277
+ was applied at multiple stages in the data preparation process to ensure
278
+ the exclusion of harmful and illegal content.
279
+ - Sensitive Data Filtering: As part of making Gemma pre-trained models
280
+ safe and reliable, automated techniques were used to filter out certain
281
+ personal information and other sensitive data from training sets.
282
+ - Additional methods: Filtering based on content quality and safety in
283
+ line with [our policies][safety-policies].
284
+
285
+ ## Implementation Information
286
+
287
+ Details about the model internals.
288
+
289
+ ### Hardware
290
+
291
+ Gemma was trained using [Tensor Processing Unit (TPU)][tpu] hardware (TPUv4p,
292
+ TPUv5p and TPUv5e). Training vision-language models (VLMS) requires significant
293
+ computational power. TPUs, designed specifically for matrix operations common in
294
+ machine learning, offer several advantages in this domain:
295
+
296
+ - Performance: TPUs are specifically designed to handle the massive
297
+ computations involved in training VLMs. They can speed up training
298
+ considerably compared to CPUs.
299
+ - Memory: TPUs often come with large amounts of high-bandwidth memory,
300
+ allowing for the handling of large models and batch sizes during training.
301
+ This can lead to better model quality.
302
+ - Scalability: TPU Pods (large clusters of TPUs) provide a scalable
303
+ solution for handling the growing complexity of large foundation models.
304
+ You can distribute training across multiple TPU devices for faster and more
305
+ efficient processing.
306
+ - Cost-effectiveness: In many scenarios, TPUs can provide a more
307
+ cost-effective solution for training large models compared to CPU-based
308
+ infrastructure, especially when considering the time and resources saved
309
+ due to faster training.
310
+ - These advantages are aligned with
311
+ [Google's commitments to operate sustainably][sustainability].
312
+
313
+ ### Software
314
+
315
+ Training was done using [JAX][jax] and [ML Pathways][ml-pathways].
316
+
317
+ JAX allows researchers to take advantage of the latest generation of hardware,
318
+ including TPUs, for faster and more efficient training of large models. ML
319
+ Pathways is Google's latest effort to build artificially intelligent systems
320
+ capable of generalizing across multiple tasks. This is specially suitable for
321
+ foundation models, including large language models like these ones.
322
+
323
+ Together, JAX and ML Pathways are used as described in the
324
+ [paper about the Gemini family of models][gemini-2-paper]; *"the 'single
325
+ controller' programming model of Jax and Pathways allows a single Python
326
+ process to orchestrate the entire training run, dramatically simplifying the
327
+ development workflow."*
328
+
329
+
330
+ ### Intended Usage
331
+
332
+ Open vision-language models (VLMs) models have a wide range of applications
333
+ across various industries and domains. The following list of potential uses is
334
+ not comprehensive. The purpose of this list is to provide contextual information
335
+ about the possible use-cases that the model creators considered as part of model
336
+ training and development.
337
+
338
+ - Content Creation and Communication
339
+ - Text Generation: These models can be used to generate creative text
340
+ formats such as poems, scripts, code, marketing copy, and email drafts.
341
+ - Chatbots and Conversational AI: Power conversational interfaces
342
+ for customer service, virtual assistants, or interactive applications.
343
+ - Text Summarization: Generate concise summaries of a text corpus,
344
+ research papers, or reports.
345
+ - Image Data Extraction: These models can be used to extract,
346
+ interpret, and summarize visual data for text communications.
347
+ - Research and Education
348
+ - Natural Language Processing (NLP) and VLM Research: These
349
+ models can serve as a foundation for researchers to experiment with VLM
350
+ and NLP techniques, develop algorithms, and contribute to the
351
+ advancement of the field.
352
+ - Language Learning Tools: Support interactive language learning
353
+ experiences, aiding in grammar correction or providing writing practice.
354
+ - Knowledge Exploration: Assist researchers in exploring large
355
+ bodies of text by generating summaries or answering questions about
356
+ specific topics.
357
+
358
+ ### Limitations
359
+
360
+ - Training Data
361
+ - The quality and diversity of the training data significantly
362
+ influence the model's capabilities. Biases or gaps in the training data
363
+ can lead to limitations in the model's responses.
364
+ - The scope of the training dataset determines the subject areas
365
+ the model can handle effectively.
366
+ - Context and Task Complexity
367
+ - Models are better at tasks that can be framed with clear
368
+ prompts and instructions. Open-ended or highly complex tasks might be
369
+ challenging.
370
+ - A model's performance can be influenced by the amount of context
371
+ provided (longer context generally leads to better outputs, up to a
372
+ certain point).
373
+ - Language Ambiguity and Nuance
374
+ - Natural language is inherently complex. Models might struggle
375
+ to grasp subtle nuances, sarcasm, or figurative language.
376
+ - Factual Accuracy
377
+ - Models generate responses based on information they learned
378
+ from their training datasets, but they are not knowledge bases. They
379
+ may generate incorrect or outdated factual statements.
380
+ - Common Sense
381
+ - Models rely on statistical patterns in language. They might
382
+ lack the ability to apply common sense reasoning in certain situations.
383
+
384
+ ### Ethical Considerations and Risks
385
+
386
+ The development of vision-language models (VLMs) raises several ethical
387
+ concerns. In creating an open model, we have carefully considered the following:
388
+
389
+ - Bias and Fairness
390
+ - VLMs trained on large-scale, real-world text and image data can
391
+ reflect socio-cultural biases embedded in the training material. These
392
+ models underwent careful scrutiny, input data pre-processing described
393
+ and posterior evaluations reported in this card.
394
+ - Misinformation and Misuse
395
+ - VLMs can be misused to generate text that is false, misleading,
396
+ or harmful.
397
+ - Guidelines are provided for responsible use with the model, see the
398
+ [Responsible Generative AI Toolkit][rai-toolkit].
399
+ - Transparency and Accountability:
400
+ - This model card summarizes details on the models' architecture,
401
+ capabilities, limitations, and evaluation processes.
402
+ - A responsibly developed open model offers the opportunity to
403
+ share innovation by making VLM technology accessible to developers and
404
+ researchers across the AI ecosystem.
405
+
406
+ Risks identified and mitigations:
407
+
408
+ - **Perpetuation of biases**: It's encouraged to perform continuous
409
+ monitoring (using evaluation metrics, human review) and the exploration of
410
+ de-biasing techniques during model training, fine-tuning, and other use
411
+ cases.
412
+ - **Generation of harmful content**: Mechanisms and guidelines for content
413
+ safety are essential. Developers are encouraged to exercise caution and
414
+ implement appropriate content safety safeguards based on their specific
415
+ product policies and application use cases.
416
+ - **Misuse for malicious purposes**: Technical limitations and developer
417
+ and end-user education can help mitigate against malicious applications of
418
+ VLMs. Educational resources and reporting mechanisms for users to flag
419
+ misuse are provided. Prohibited uses of Gemma models are outlined in the
420
+ [Gemma Prohibited Use Policy][prohibited-use].
421
+ - **Privacy violations**: Models were trained on data filtered for removal
422
+ of certain personal information and other sensitive data. Developers are
423
+ encouraged to adhere to privacy regulations with privacy-preserving
424
+ techniques.
425
+
426
+ ### Benefits
427
+
428
+ At the time of release, this family of models provides high-performance open
429
+ vision-language model implementations designed from the ground up for
430
+ responsible AI development compared to similarly sized models.
431
+
432
+ Using the benchmark evaluation metrics described in this document, these models
433
+ have shown to provide superior performance to other, comparably-sized open model
434
+ alternatives.
435
+
436
+ [g3-tech-report]: https://goo.gle/Gemma3Report
437
+ [rai-toolkit]: https://ai.google.dev/responsible
438
+ [kaggle-gemma]: https://www.kaggle.com/models/google/gemma-3
439
+ [vertex-mg-gemma3]: https://console.cloud.google.com/vertex-ai/publishers/google/model-garden/gemma3
440
+ [terms]: https://ai.google.dev/gemma/terms
441
+ [safety-policies]: https://ai.google/static/documents/ai-responsibility-update-published-february-2025.pdf
442
+ [prohibited-use]: https://ai.google.dev/gemma/prohibited_use_policy
443
+ [tpu]: https://cloud.google.com/tpu/docs/intro-to-tpu
444
+ [sustainability]: https://sustainability.google/operating-sustainably/
445
+ [jax]: https://github.com/jax-ml/jax
446
+ [ml-pathways]: https://blog.google/technology/ai/introducing-pathways-next-generation-ai-architecture/
447
+ [sustainability]: https://sustainability.google/operating-sustainably/
448
+ [gemini-2-paper]: https://arxiv.org/abs/2312.11805
gemma-3-12b-it-qat-q4_0-iq1_m.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2b9f5cf15302deeb24ae7fdc5a6333887c11fe8afca5a9ec285d620a851f0e2f
3
+ size 3613438688
gemma-3-12b-it-qat-q4_0-iq1_s.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f42431d0a2fc006dcc504a6e9c2c4b50c7c677d22e213270414cceff33dcb718
3
+ size 3454186208
gemma-3-12b-it-qat-q4_0-iq2_m.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b1d6688f374eade2fd3383117c38ce5698d86250c16e82fc871884d0531df8f2
3
+ size 4858704608
gemma-3-12b-it-qat-q4_0-iq2_s.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ced85007810538cfad8b21c47b01f2efdf3232e8c9e499a42938de09decc417a
3
+ size 4646367968
gemma-3-12b-it-qat-q4_0-iq2_xs.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d1c1055f3121b1191e4666aa3143795fc3455bc2912d2bf1faa7fd88ba75e46e
3
+ size 4114789088
gemma-3-12b-it-qat-q4_0-iq2_xxs.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4c077cf766bbaab2451b7d05ffda0e94fadb7e2bfd55dba1ed40389b19b66815
3
+ size 3878859488
gemma-3-12b-it-qat-q4_0-iq3_m.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f9d64f4d448663f1e42184fd85ea95da3387de79ad4565cdf67d74ef93075917
3
+ size 5655519968
gemma-3-12b-it-qat-q4_0-iq3_s.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dae1a6f1dd2b797ab95b7dd2b1f2a3f7491dc1525b1561f9e077d5e0bbec1996
3
+ size 5458113248
gemma-3-12b-it-qat-q4_0-iq3_xs.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9772bc0c90bd2337fec4d75cac2d4b77031f1836b1868c0795eb1c2763f8fe17
3
+ size 5205963488
gemma-3-12b-it-qat-q4_0-iq3_xxs.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ce0a1be735aabc4423ca586a606ac43e53748c1fbe46e6caf0449fb100c59680
3
+ size 4918424288
gemma-3-12b-it-qat-q4_0-q2_k_s.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0a238297c6b4bb016cfb751090d410529f572ec2e5ed4d72a7368cb36930d71f
3
+ size 4448408288
gemma-3-12b-it-qat-q4_0-q3_k_m.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a61126ab2f6dfdd0da1908f56b0df765b53d60bbeaa8d1e2421f457e216163de
3
+ size 6008615648
gemma-3-12b-it-qat-q4_0-q3_k_s.gguf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9914658fb5ccebe3c2a872ee660b0f660030a85b397086bdd3696a39a59aa48c
3
+ size 5458113248
gemma-3-12b-it-qat-q4_0.imatrix ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cc2966da9eda17ebf183aa04927ff04dbdf1a8076b9bfd8686e3a3116ae16f9b
3
+ size 7433132