Edit model card

SetFit

This is a SetFit model that can be used for Text Classification. A LogisticRegression instance is used for classification.

The model has been trained using an efficient few-shot learning technique that involves:

  1. Fine-tuning a Sentence Transformer with contrastive learning.
  2. Training a classification head with features from the fine-tuned Sentence Transformer.

Model Details

Model Description

  • Model Type: SetFit
  • Classification head: a LogisticRegression instance
  • Maximum Sequence Length: 512 tokens
  • Number of Classes: 3 classes

Model Sources

Model Labels

Label Examples
0
  • "Meteorological Report: Pune, India \nPune, located in the state of Maharashtra, India, experiences a tropical wet and dry climate. The city is situated on the leeward side of the Western Ghats, which significantly influences its weather patterns. Pune's climate is characterized by three distinct seasons: summer, monsoon, and winter.Summer in Pune begins in March and lasts until early June. During this period, the city experiences hot and dry conditions with temperatures ranging from 30°C to 40°C (86°F to 104°F). The afternoons can be particularly scorching, but the evenings often bring some relief with cooler temperatures. Humidity levels are relatively low, making the heat more bearable compared to coastal regions. The monsoon season, from June to September, brings substantial rainfall to Pune. The city receives an average annual rainfall of around 700 mm (27.5 inches), with the majority of it falling during these months. The temperatures during the monsoon season range between 20°C to 30°C (68°F to 86°F). The rain is crucial for replenishing water reservoirs and supporting agriculture in the region. However, it can also lead to waterlogging and traffic disruptions.Winter in Pune is mild and pleasant, stretching from November to February. Temperatures during this season range from 10°C to 30°C (50°F to 86°F), making it the most comfortable time of the year. The weather is generally dry, with clear skies and minimal rainfall. Nighttime temperatures can occasionally drop to single digits, particularly in December and January, requiring light warm clothing.Overall, Pune's climate is favorable for residents and visitors alike, with each season offering a unique experience of the city's weather."
  • 'Training Guidelines: 1. Personnel Selection: Ensure only qualified personnel with relevant certifications and experience are selected for tank operations.\n2. Training Programs: Conduct comprehensive training programs covering tank operation, safety protocols, emergency response, and routine maintenance procedures.\n3. Simulation Drills: Utilize simulation drills to provide hands-on experience in handling various scenarios, including leakages, fire, and equipment malfunctions.\n4. Certification: Provide periodic certification and re-certification to ensure personnel remain up-to-date with the latest practices and standards.\nMaintenance Guidelines: 1. Routine Inspections: Schedule regular inspections to check for wear and tear, corrosion, and any structural damages.\n2. Cleaning: Implement a cleaning regimen to prevent contamination and build-up of residues. Use appropriate cleaning agents compatible with the tank material.\n3. Lubrication: Regularly lubricate moving parts to prevent friction and wear. Use manufacturer-recommended lubricants.\n4. Component Replacement: Replace worn-out or damaged components promptly to prevent operational failures. Keep an inventory of essential spare parts.\n5. Record Keeping: Maintain detailed logs of all maintenance activities, including dates, actions taken, and personnel involved.\nInspection Guidelines: 1. Visual Inspections: Conduct frequent visual inspections to detect surface-level issues such as cracks, dents, or leaks.\n2. Non-Destructive Testing (NDT): Use NDT methods such as ultrasonic testing, radiographic testing, and magnetic particle inspection to identify internal defects without causing damage.\n3. Pressure Testing: Perform pressure tests periodically to ensure the tank can withstand operational pressures. Follow safety protocols to avoid accidents.\n4. Corrosion Monitoring: Monitor for signs of corrosion using tools like corrosion coupons and electronic monitors. Apply anti-corrosion coatings as necessary.\n5. Regulatory Compliance: Ensure all inspections adhere to local, national, and international standards and regulations. Update inspection procedures as regulations evolve.\nSummary: Adhering to these guidelines will ensure the safe, efficient, and long-lasting operation of tanks. Proper training, regular maintenance, and thorough inspections are critical components of an effective tank management program.\n\n'
  • "Disciplinary Investigation Report Employee Name: John Doe Position: Senior Data Analyst Department: IT Department\nDate: July 16, 2024 Incident Description: On June 30, 2024, a significant breach of confidential data was reported within the IT department. Initial investigations indicated that sensitive company data, including client information and proprietary algorithms, had been leaked to an external source. An internal audit was promptly initiated to identify the source of the breach. Investigation Process: A thorough investigation was conducted, led by the IT Security Team, in collaboration with Human Resources and Legal Departments. The process included: 1. Log Analysis: Reviewing access logs and data transfer records to trace unauthorized access. 2. Interviews: Conducting interviews with all IT department staff, focusing on those with access to the leaked data.\n3. Device Inspection: Analyzing company-issued devices and personal devices (with consent) of employees for any signs of data transmission or security breaches. 4. Email and Communication Review: Scrutinizing email exchanges and other communication channels for suspicious activity. Findings: The investigation revealed the following key points: 1. Access Logs: John Doe's access logs showed multiple unauthorized access attempts to the confidential data repository outside regular working hours.\n2. Device Analysis: An inspection of John Doe\x92s company-issued laptop revealed encrypted files matching the leaked data.3. Communication Records: Email records showed exchanges between John Doe and an external party discussing sensitive information. Conclusion: Based on the evidence gathered, it was concluded that John Doe was responsible for the leakage of confidential data. His actions violated company policies on data security and confidentiality.\nRecommendations: 1. Termination: Immediate termination of John Doe\x92s employment contract due to gross misconduct. 2. Legal Action: Initiate legal proceedings against John Doe for breach of confidentiality agreements and potential damages.\n3. Policy Review: Conduct a review of current data security policies and enhance access control measures to prevent future incidents. 4. Training: Implement mandatory data security training for all employees to reinforce the importance of safeguarding confidential information. Report Prepared By: Jane Smith Head of IT Security XYZ Corporation\n\n"
1
  • "This document provides detailed training guidelines and technical procedures for authorized personnel. The information contained herein is classified and for official use only, not intended for public release. Unauthorized disclosure or distribution of this material is strictly prohibited and may result in disciplinary action. Section 1: Training Guidelines for Equipment Operation\n1.1 Introduction to Equipment Operation \x95 Authorized personnel must complete the comprehensive training program before operating any specialized equipment. This training ensures safe and efficient use, minimizing risks and maximizing operational effectiveness.\n1.2 Training Objectives \x95 Familiarize operators with the equipment's functionality and controls.\n\x95 Ensure understanding of safety protocols and emergency procedures.\n\x95 Develop proficiency in routine maintenance tasks and troubleshooting common issues.\n1.3 Training Modules \x95 Module 1: Equipment Overview o Introduction to equipment specifications, features, and capabilities. o Review of operator manuals and safety guidelines.\n\x95 Module 2: Basic Operation o Hands-on training with equipment controls and interfaces.\no Safe startup and shutdown procedures. \x95 Module 3: Advanced Operation o Training on advanced features and operational modes. o Scenarios for handling non-standard operating conditions. \x95 Module 4: Maintenance and Troubleshooting o Routine maintenance tasks, including inspection and lubrication. o Common troubleshooting techniques and problem resolution. 1.4 Certification and Evaluation \x95 Operators must pass a written exam and a practical skills assessment to be certified. Regular refresher courses are required to maintain certification.\nSection 2: Technical Procedures for Maintenance 2.1 Preventive Maintenance Schedule\n\x95 Adherence to the preventive maintenance schedule is critical to ensure the longevity and reliability of equipment. The following procedures should be performed at the specified intervals: 2.2 Daily Maintenance Tasks \x95 Visual Inspection o Check for visible damage, leaks, or wear. o Ensure all safety guards and covers are in place. \x95 Operational Check\no Test all controls and emergency stop functions. o Verify that all indicators and displays are functioning correctly. 2.3 Weekly Maintenance Tasks \x95 Lubrication\no Apply the recommended lubricants to all moving parts as specified in the equipment manual.\n\x95 Filter Inspection and Replacement o Inspect air and fluid filters; replace if necessary.\n\x95 Electrical System Check o Inspect wiring and connections for signs of wear or corrosion.\no Test battery levels and charging systems. 2.4 Monthly Maintenance Tasks\n\x95 System Calibration o Perform calibration checks on all measurement and control systems.\no Adjust settings as necessary to ensure accuracy. \x95 Detailed Inspection\no Conduct a thorough inspection of all mechanical and hydraulic systems.\no Replace any worn or damaged components.\n2.5 Documentation and Reporting\n\x95 Maintain detailed records of all maintenance activities. Report any issues or irregularities to the maintenance supervisor immediately. Use the standardized maintenance log for consistency and traceability.\nSection 3: Safety and Emergency Procedures\n3.1 Safety Protocols \x95 All personnel must adhere to established safety protocols to prevent accidents and injuries. Personal protective equipment (PPE) must be worn at all times when operating or maintaining equipment.\n3.2 Emergency Shutdown Procedure\n\x95 In the event of an emergency, follow these steps:\no Immediately activate the emergency stop button.\no Evacuate the area if necessary.\no Notify the supervisor and follow the emergency response plan.\n3.3 Accident Reporting\n\x95 Report all accidents and near-misses to the safety officer. Complete the incident report form with detailed information about the event, including time, location, and involved personnel.\n________________________________________\nConclusion\nThe training and technical procedures outlined in this document are essential for maintaining the safety, efficiency, and reliability of our operations. Adherence to these guidelines will ensure that all personnel are adequately trained and that equipment is properly maintained. This document is for official use only and must not be released to the public. Any questions or concerns regarding this material should be directed to the training coordinator or technical supervisor\n\n"
  • 'Section 1: Equipment Operation 1.1 Start-Up Procedures \x95 Initial Inspection: o Verify that all safety guards are in place. o Check for any visible damage or leaks.\n\x95 Power On: o Ensure the main power supply is connected and operational. o Switch on the equipment using the designated control panel.\n\x95 System Checks: o Monitor control panel indicators to ensure all systems are functioning correctly. o Perform a brief test run to confirm operational readiness.\n1.2 Operational Guidelines \x95 Normal Operation: o Operate the equipment within the specified parameters as outlined in the technical manual.\no Monitor equipment performance continuously to detect any irregularities. \x95 Emergency Stop: o In case of an emergency, activate the emergency stop button immediately.\no Follow the emergency shutdown procedure to secure the equipment. Section 2: Maintenance Procedures 2.1 Daily Maintenance\n\x95 Visual Inspection: o Conduct a visual check for any signs of wear, damage, or leaks. o Ensure all moving parts are functioning smoothly.\n\x95 Lubrication: o Apply the recommended lubricants to all moving components. 2.2 Weekly Maintenance\n\x95 System Checks: o Inspect all safety devices and ensure they are operational. o Check electrical connections for signs of wear or corrosion.\n2.3 Monthly Maintenance \x95 Deep Inspection: o Perform a thorough inspection of all mechanical and electrical systems.\no Replace any worn or damaged parts. \x95 Calibration: o Calibrate all measurement and control systems to ensure accuracy.\n2.4 Documentation \x95 Maintain a detailed log of all maintenance activities, including dates and actions taken.\n\x95 Report any anomalies or issues to the maintenance supervisor immediately. Conclusion Adhering to these operation and maintenance procedures will ensure the safe and efficient use of restricted plant equipment. This manual is for authorized personnel only and must be handled with the utmost confidentiality. For further information or clarification, please contact the maintenance supervisor.\n\n'
  • 'Section 1: Procurement Process 1.1 Vendor Selection \x95 Approved Vendors: o Utilize only pre-approved vendors from the company\x92s vendor list.\no Perform due diligence to ensure vendors meet the company\x92s quality and compliance standards. \x95 Vendor Evaluation: o Conduct regular evaluations of vendor performance based on delivery times, product quality, and cost efficiency.\no Submit evaluation reports to the procurement manager for review. 1.2 Purchase Requisition \x95 Requisition Approval: o All purchase requisitions must be submitted through the company\x92s procurement system.\no Obtain necessary approvals from department heads before proceeding. \x95 Order Placement: o Once approved, place orders with selected vendors using standardized purchase orders.\no Ensure all orders are in compliance with company policies and budget constraints. 1.3 Contract Management \x95 Contract Review: o All contracts must be reviewed by the legal department before finalization.\no Ensure terms and conditions align with company policies and regulatory requirements. \x95 Renewal and Termination: o Monitor contract expiration dates and initiate renewals or terminations as needed.\no Maintain a repository of all active contracts for reference and compliance checks. Section 2: Supply Chain Management 2.1 Inventory Management\n\x95 Stock Levels: o Maintain optimal inventory levels to meet production demands without overstocking. o Perform regular inventory audits to ensure accuracy.\n\x95 Storage Conditions: o Store materials in designated areas under appropriate conditions to prevent damage or degradation. 2.2 Logistics and Distribution\n\x95 Shipping Coordination: o Coordinate with logistics partners to ensure timely and cost-effective delivery of materials. o Track shipments and resolve any issues promptly.\n\x95 Documentation: o Maintain accurate records of all incoming and outgoing shipments for accountability and traceability. Conclusion Adhering to these supply and procurement guidelines is essential for the efficient and compliant operation of [Company Name]. This document is for internal use only and should not be shared outside the company. For further information or clarification, please contact the procurement department.\n\n'
2
  • 'Job Advertisement Report Position Available: Our company, ZeonAI, is currently seeking talented individuals to join our team in various roles. We are committed to fostering a dynamic and inclusive work environment where employees can thrive and contribute to our continued success. 1. Job Openings: We have openings for positions across different departments, including but not limited to: \x95 Software Engineer: Develop innovative solutions to enhance our digital platforms.\n\x95 Marketing Specialist: Drive creative campaigns and strategies to promote our products/services. \x95 Customer Support Representative: Provide exceptional service and support to our valued customers.\n\x95 Financial Analyst: Analyze financial data and trends to support strategic decision-making. 2. Company Overview: At [Company Name], we pride ourselves on our dedication to excellence, innovation, and customer satisfaction. Our team consists of diverse professionals who are passionate about making a positive impact in their respective fields. 3. Benefits and Culture: \x95 Competitive Compensation: We offer competitive salaries and benefits packages commensurate with experience and qualifications.\n\x95 Career Development: Opportunities for growth and professional development through training programs and mentorship. \x95 Work-Life Balance: Flexible work arrangements and a supportive work environment that promotes work-life balance.\n\x95 Collaborative Culture: Join a team of talented individuals who collaborate to achieve our goals and drive innovation. 4. How to Apply: To apply for any of these positions, please visit our careers page at [Company Website] and submit your resume along with a cover letter outlining your qualifications and interest in joining our team. We look forward to reviewing your application and welcoming new members to our [Company Name] family. 5. Contact Information: For inquiries or more information about these job openings, please contact our Human Resources department at [HR Contact Email or Phone Number].\nJoin us at [Company Name] and embark on a rewarding career journey where your skills and contributions make a difference. We invite talented individuals who share our passion for excellence to apply and become part of our dynamic team.\nDocument Control: \x95 Version: 1.0 \x95 Effective Date: [Date] \x95 Next Review Date: [Date] For further updates or inquiries regarding job openings at [Company Name], please visit our website or contact Human Resources.\n\n'
  • "Flood Situation in Assam: Review Report The flood situation in Assam has been a recurring challenge, impacting the state's landscape, communities, and infrastructure annually during the monsoon season. In 2024, the floods have once again devastated several districts, exacerbating the humanitarian and economic burdens on the region. 1. Impact and Scale: The floods in Assam have affected millions of people across districts such as Dhubri, Goalpara, and Barpeta. Heavy rainfall and swollen rivers, including the Brahmaputra and its tributaries, have inundated vast areas, submerging homes, crops, and livestock. 2. Humanitarian Crisis: Thousands of families have been displaced, seeking refuge in relief camps set up by the government and humanitarian organizations. Access to clean water, sanitation facilities, and healthcare remains a critical concern, amplifying the risk of waterborne diseases and health emergencies.\n3. Economic Losses: The agricultural sector, a primary source of livelihood for many in Assam, has borne the brunt of the floods. Crops ready for harvest have been destroyed, leading to severe financial losses for farmers. Infrastructure such as roads, bridges, and schools has also been damaged, hampering access and recovery efforts. 4. Government Response: The Assam state government, supported by national agencies and NGOs, has been actively involved in rescue operations, relief distribution, and providing shelter to affected populations. Efforts to rebuild damaged infrastructure and restore normalcy are ongoing, although challenges persist due to the scale of destruction.\n5. Long-Term Mitigation Strategies: To mitigate future flood impacts, there is a growing emphasis on long-term measures such as riverbank erosion control, construction of embankments, and early warning systems. Community awareness and preparedness initiatives are also being prioritized to enhance resilience against recurring floods. Conclusion: The flood situation in Assam demands sustained attention and collective action to alleviate immediate hardships and implement sustainable solutions. Addressing the multifaceted challenges posed by floods requires coordinated efforts from all stakeholders, ensuring the safety, well-being, and resilience of communities in the region.\nDocument Control: \x95 Version: 1.0 \x95 Effective Date: [Date] \x95 Next Review Date: [Date] For further updates or inquiries regarding the flood situation in Assam, please contact the Disaster Management Authority or relevant state authorities.\n\n\n"
  • "Demonetization, implemented in India on November 8, 2016, aimed to curb black money, counterfeit currency, and corruption while promoting digital transactions. However, its impact and effectiveness have been subjects of intense debate and scrutiny.\nProponents argue that demonetization disrupted illegal financial activities, forcing unaccounted wealth into the formal banking system. It encouraged digital payments, potentially reducing cash-based transactions and improving transparency. Moreover, the move signaled a strong political will to tackle corruption and parallel economy.\nOn the contrary, critics highlight several shortcomings. The sudden withdrawal of high-denomination currency notes led to cash shortages, particularly affecting rural areas and small businesses reliant on cash transactions. The informal sector, comprising a significant portion of the economy, faced severe disruptions, impacting livelihoods and economic growth.\nMoreover, demonetization did not significantly curb black money or corruption, as evidenced by the return of almost all demonetized currency to banks. The costs of implementation, including printing new currency and managing logistical challenges, were substantial. The move also diverted attention from other pressing economic reforms.\nLooking ahead, lessons from demonetization underscore the need for comprehensive planning, stakeholder consultation, and phased implementation of economic policies. Future reforms should prioritize inclusive growth, address structural issues, and leverage technology to enhance financial transparency without causing undue hardship to vulnerable populations.\nIn conclusion, while demonetization aimed to achieve noble objectives, its outcomes were mixed. The policy's success in achieving its primary goals remains contentious, highlighting the complexities of economic policy formulation and implementation in a diverse and evolving economy."

Evaluation

Metrics

Label Accuracy
all 1.0

Uses

Direct Use for Inference

First install the SetFit library:

pip install setfit

Then you can load this model and run inference.

from setfit import SetFitModel

# Download from the 🤗 Hub
model = SetFitModel.from_pretrained("amritzeon/setfit_finetuned_ide")
# Run inference
preds = model("Participating in the Government e-Marketplace (GeM) portal offers significant advantages for vendors and buyers alike. GeM is an online platform initiated by the Government of India to facilitate procurement of goods and services by government departments, public sector units, and autonomous bodies. For vendors, registering on GeM opens doors to a vast market of government buyers, enhancing business opportunities and visibility. The portal provides a transparent and efficient procurement process, reducing paperwork and transaction costs. Vendors can showcase their products/services, respond to bids electronically, and receive timely payments, fostering ease of doing business.
On the buyer side, GeM streamlines procurement operations by offering a wide range of products and services from verified sellers at competitive prices. It ensures compliance with procurement rules and promotes transparency through online tracking and monitoring of transactions. Government entities benefit from cost savings, reduced procurement time, and access to a diverse supplier base. Participation in GeM promotes digital governance, aligning with the government's initiatives for transparency, efficiency, and promoting local businesses. It empowers vendors, particularly MSMEs, to compete on a level playing field and contribute to India's economic growth. Embracing GeM facilitates a seamless procurement experience while driving socio-economic development through enhanced market access and operational efficiency.")

Training Details

Training Set Metrics

Training set Min Median Max
Word count 75 337.2667 706
Label Training Sample Count
0 10
1 10
2 10

Training Hyperparameters

  • batch_size: (30, 30)
  • num_epochs: (2, 2)
  • max_steps: -1
  • sampling_strategy: oversampling
  • body_learning_rate: (2e-05, 1e-05)
  • head_learning_rate: 0.01
  • loss: CosineSimilarityLoss
  • distance_metric: cosine_distance
  • margin: 0.25
  • end_to_end: False
  • use_amp: False
  • warmup_proportion: 0.1
  • seed: 42
  • eval_max_steps: -1
  • load_best_model_at_end: True

Training Results

Epoch Step Training Loss Validation Loss
0.05 1 0.1952 -
1.0 20 - 0.1326
2.0 40 - 0.0704
  • The bold row denotes the saved checkpoint.

Framework Versions

  • Python: 3.10.12
  • SetFit: 1.0.3
  • Sentence Transformers: 3.0.1
  • Transformers: 4.39.0
  • PyTorch: 2.3.0+cu121
  • Datasets: 2.20.0
  • Tokenizers: 0.15.2

Citation

BibTeX

@article{https://doi.org/10.48550/arxiv.2209.11055,
    doi = {10.48550/ARXIV.2209.11055},
    url = {https://arxiv.org/abs/2209.11055},
    author = {Tunstall, Lewis and Reimers, Nils and Jo, Unso Eun Seo and Bates, Luke and Korat, Daniel and Wasserblat, Moshe and Pereg, Oren},
    keywords = {Computation and Language (cs.CL), FOS: Computer and information sciences, FOS: Computer and information sciences},
    title = {Efficient Few-Shot Learning Without Prompts},
    publisher = {arXiv},
    year = {2022},
    copyright = {Creative Commons Attribution 4.0 International}
}
Downloads last month
3
Safetensors
Model size
109M params
Tensor type
F32
·
Inference API
This model does not have enough activity to be deployed to Inference API (serverless) yet. Increase its social visibility and check back later, or deploy to Inference Endpoints (dedicated) instead.

Evaluation results