File size: 52,726 Bytes
dd6bc59
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
---
language:
- en
license: apache-2.0
library_name: sentence-transformers
tags:
- sentence-transformers
- sentence-similarity
- feature-extraction
- generated_from_trainer
- dataset_size:900
- loss:MatryoshkaLoss
- loss:MultipleNegativesRankingLoss
base_model: BAAI/bge-base-en-v1.5
datasets: []
metrics:
- cosine_accuracy@1
- cosine_accuracy@3
- cosine_accuracy@5
- cosine_accuracy@10
- cosine_precision@1
- cosine_precision@3
- cosine_precision@5
- cosine_precision@10
- cosine_recall@1
- cosine_recall@3
- cosine_recall@5
- cosine_recall@10
- cosine_ndcg@10
- cosine_mrr@10
- cosine_map@100
widget:
- source_sentence: Vendor Risk Assessment View Breach Management View Privacy Policy
    Management View Privacy Center View Learn more Security Identify data risk and
    enable protection & control Data Security Posture Management View Data Access
    Intelligence & Governance View Data Risk Management View Data Breach Analysis
    View Learn more Governance Optimize Data Governance with granular insights into
    your data Data Catalog View Data Lineage View Data Quality View Data Controls
    Orchestrator View Solutions Technologies Covering you everywhere with 1000+ integrations
    across data systems. Snowflake View AWS View Microsoft 365 View Salesforce View
    Workday View GCP View Azure View Oracle View Learn more Regulations Automate compliance
    with global privacy regulations. US California CCPA View US California CPRA View
    European Union GDPR View Thailand’s PDPA View China PIPL View Canada PIPEDA View
    Brazil's LGPD View \+ More View Learn more Roles Identify data risk and enable
    protection & control. Privacy View Security View Governance View Marketing View
    Resources Blog Read through our articles written by industry experts Collateral
    Product brochures, white papers, infographics, analyst reports and more. Knowledge
    Center Learn about the data privacy, security and governance landscape. Securiti
    Education Courses and Certifications for data privacy, security and governance
    professionals. Company About Us Learn all about Securiti, our mission and history
    Partner Program Join our Partner Program Contact Us Contact us to learn more or
    schedule a demo News Coverage Read about Securiti in the news Press Releases Find
    our latest press releases Careers Join the
  sentences:
  - What is the purpose of tracking changes and transformations of data throughout
    its lifecycle?
  - What is the role of ePD in the European privacy regime and its relation to GDPR?
  - How can data governance be optimized using granular insights?
- source_sentence: Learn more Asset and Data Discovery Discover dark and native data
    assets Learn more Data Access Intelligence & Governance Identify which users have
    access to sensitive data and prevent unauthorized access Learn more Data Privacy
    Automation PrivacyCenter.Cloud | Data Mapping | DSR Automation | Assessment Automation
    | Vendor Assessment | Breach Management | Privacy Notice Learn more Sensitive
    Data Intelligence Discover & Classify Structured and Unstructured Data | People
    Data Graph Learn more Data Flow Intelligence & Governance Prevent sensitive data
    sprawl through real-time streaming platforms Learn more Data Consent Automation
    First Party Consent | Third Party & Cookie Consent Learn more Data Security Posture
    Management Secure sensitive data in hybrid multicloud and SaaS environments Learn
    more Data Breach Impact Analysis & Response Analyze impact of a data breach and
    coordinate response per global regulatory obligations Learn more Data Catalog
    Automatically catalog datasets and enable users to find, understand, trust and
    access data Learn more Data Lineage Track changes and transformations of data
    throughout its lifecycle Data Controls Orchestrator View Data Command Center View
    Sensitive Data Intelligence View Asset Discovery Data Discovery & Classification
    Sensitive Data Catalog People Data Graph Learn more Privacy Automate compliance
    with global privacy regulations Data Mapping Automation View Data Subject Request
    Automation View People Data Graph View Assessment Automation View Cookie Consent
    View Universal Consent View Vendor Risk Assessment View Breach Management View
    Privacy Policy Management View Privacy Center View Learn more Security Identify
    data risk and enable protection & control Data Security Posture Management View
    Data Access Intelligence & Governance View Data Risk Management View Data Breach
    Analysis View Learn more Governance Optimize Data Governance with granular insights
    into your data Data Catalog View Data Lineage View Data Quality View Data Controls
    Orchestrator ,  View Learn more Asset and Data Discovery Discover dark and native
    data assets Learn more Data Access Intelligence & Governance Identify which users
    have access to sensitive data and prevent unauthorized access Learn more Data
    Privacy Automation PrivacyCenter.Cloud | Data Mapping | DSR Automation | Assessment
    Automation | Vendor Assessment | Breach Management | Privacy Notice Learn more
    Sensitive Data Intelligence Discover & Classify Structured and Unstructured Data
    | People Data Graph Learn more Data Flow Intelligence & Governance Prevent sensitive
    data sprawl through real-time streaming platforms Learn more Data Consent Automation
    First Party Consent | Third Party & Cookie Consent Learn more Data Security Posture
    Management Secure sensitive data in hybrid multicloud and SaaS environments Learn
    more Data Breach Impact Analysis & Response Analyze impact of a data breach and
    coordinate response per global regulatory obligations Learn more Data Catalog
    Automatically catalog datasets and enable users to find, understand, trust and
    access data Learn more Data Lineage Track changes and transformations of data
    throughout its lifecycle Data Controls Orchestrator View Data Command Center View
    Sensitive Data Intelligence View Asset Discovery Data Discovery & Classification
    Sensitive Data Catalog People Data Graph Learn more Privacy Automate compliance
    with global privacy regulations Data Mapping Automation View Data Subject Request
    Automation View People Data Graph View Assessment Automation View Cookie Consent
    View Universal Consent View Vendor Risk Assessment View Breach Management View
    Privacy Policy Management View Privacy Center View Learn more Security Identify
    data risk and enable protection & control Data Security Posture Management View
    Data Access Intelligence & Governance View Data Risk Management View Data Breach
    Analysis View Learn more Governance Optimize Data Governance with granular insights
    into your data Data Catalog View Data Lineage View Data Quality View Data Controls
  sentences:
  - What is the purpose of Asset and Data Discovery in data governance and security?
  - Which EU member states have strict cyber laws?
  - What is the obligation for organizations to provide Data Protection Impact Assessments
    (DPIAs) under the LGPD?
- source_sentence: 'which the data is processed. **Right to Access:** Data subjects
    have the right to obtain confirmation whether or not the controller holds personal
    data about them, access their personal data, and obtain descriptions of data recipients.
    **Right to Rectification** : Under the right to rectification, data subjects can
    request the correction of their data. **Right to Erasure:** Data subjects have
    the right to request the erasure and destruction of the data that is no longer
    needed by the organization. **Right to Object:** The data subject has the right
    to prevent the data controller from processing personal data if such processing
    causes or is likely to cause unwarranted damage or distress to the data subject.
    **Right not to be Subjected to Automated Decision-Making** : The data subject
    has the right to not be subject to automated decision-making that significantly
    affects the individual. ## Facts related to Ghana’s Data Protection Act 2012 1
    While processing personal data, organizations must comply with eight privacy principles:
    lawfulness of processing, data quality, security measures, accountability, purpose
    specification, purpose limitation, openness, and data subject participation. 2
    In the event of a security breach, the data controller shall take measures to
    prevent the breach and notify the Commission and the data subject about the breach
    as soon as reasonably practicable after the discovery of the breach. 3 The DPA
    specifies lawful grounds for data processing, including data subject’s consent,
    the performance of a contract, the interest of data subject and public interest,
    lawful obligations, and the legitimate interest of the data controller. 4 The
    DPA requires data controllers to register with the Data Protection Commission
    (DPC). 5 The DPA provides varying fines and terms of imprisonment according to
    the severity and sensitivity of the violation, such as any person who sells personal
    data may get fined up to 2500 penalty units or up to five years imprisonment or
    both. ### Forrester Names Securiti a Leader in the Privacy Management Wave Q4,
    2021 Read the Report ### Securiti named a Leader in the IDC MarketScape for Data
    Privacy Compliance Software Read the Report At Securiti, our mission is to enable
    enterprises to safely harness the incredible power of data and the cloud by controlling
    the complex security, privacy and compliance risks. Copyright (C) 2023 Securiti
    Sitem'
  sentences:
  - What information is required for data subjects regarding data transfers under
    the GDPR, including personal data categories, data recipients, retention period,
    and automated decision making?
  - What privacy principles must organizations follow when processing personal data
    under Ghana's Data Protection Act 2012?
  - What is the purpose of Thailand's PDPA?
- source_sentence: 'consumer has the right to have his/her personal data stored or
    processed by the data controller be deleted. ## Portability The consumer has a
    right to obtain a copy of his/her personal data in a portable, technically feasible
    and readily usable format that allows the consumer to transmit the data to another
    controller without hindrance. ## Opt out The consumer has the right to opt out
    of the processing of the personal data for purposes of targeted advertising, the
    sale of personal data, or profiling in furtherance of decisions that produce legal
    or similarly significant effects concerning the consumer. **Time period to fulfill
    DSR request: ** All data subject rights’ requests (DSR requests) must be fulfilled
    by the data controller within a 45 day period. **Extension in time period: **
    data controllers may seek for an extension of 45 days in fulfilling the request
    depending on the complexity and number of the consumer''s requests. **Denial of
    DSR request: ** If a DSR request is to be denied, the data controller must inform
    the consumer of the reasons within a 45 days period. **Appeal against refusal:
    ** Consumers have a right to appeal the decision for refusal of grant of the DSR
    request. The appeal must be decided within 45 days but the time period can be
    further extended by 60 additional days. **Limitation of DSR requests per year:
    ** Requests for data portability may be made only twice in a year. **Charges:
    ** DSR requests must be fulfilled free of charge once in a year. Any subsequent
    request within a 12 month period can be charged. **Authentication: ** A data controller
    is not to respond to a consumer request unless it can authenticate the request
    using reasonably commercial means. A data controller can request additional information
    from the consumer for the purposes of authenticating the request. ## Who must
    comply? CPA applies to all data controllers who conduct business in Colorado or
    produce or deliver commercial products or services that are intentionally targeted
    to residents of Colorado if they match any one or both of these conditions: If
    they control or process the personal data of 100,000 consumers or more during
    a calendar year; or If they derive revenue or receive a discount on the price
    of goods or services from the sale of personal data and process or control the
    personal data of 25,000'
  sentences:
  - What is the US California CCPA and how does it relate to data privacy regulations?
  - What does the People Data Graph serve in terms of privacy, security, and governance?
  - What rights does a consumer have regarding the portability of their personal data?
- source_sentence: 'PR and Federal Data Protection Act within Germany; To promote
    awareness within the public related to the risks, rules, safeguards, and rights
    concerning the processing of personal data; To handle all complaints raised by
    data subjects related to data processing in addition to carrying out investigations
    to find out if any data handler has breached any provisions of the Act; ## Penalties
    for Non compliance The GDPR already laid down some stringent penalties for companies
    that would be found in breach of the law''s provisions. More importantly, as opposed
    to other data protection laws such as the CCPA and CPRA, non-compliance with the
    law also meant penalties. Germany''s Federal Data Protection Act has a slightly
    more lenient take in this regard. Suppose a data handler is found to have fraudulently
    collected data, processed, shared, or sold data without proper consent from the
    data subjects, not responded or responded with delay to a data subject request,
    or failed to inform the data subject of a breach properly. In that case, it can
    be fined up to €50,000. This is in addition to the GDPR''s €20 million or 4% of
    the total worldwide annual turnover of the preceding financial year, whichever
    is higher, that any organisation found in breach of the law is subject to. However,
    for this fine to be applied, either the data subject, the Federal Commissioner,
    or the regulatory authority must file an official complaint. ## How an Organization
    Can Operationalize the Law Data handlers processing data inside Germany can remain
    compliant with the country''s data protection law if they fulfill the following
    conditions: Have a comprehensive privacy policy that educates all users of their
    rights and how to contact the relevant personnel within the organisation in case
    of a query Hire a competent Data Protection Officer that understands the GDPR
    and Federal Data Protection Act thoroughly and can lead compliance efforts within
    your organisation Ensure all the company''s employees and staff are acutely aware
    of their responsibilities under the law Conduct regular data protection impact
    assessments as well as data mapping exercises to ensure maximum efficiency in
    your compliance efforts Notify the relevant authorities of a data breach as soon
    as possible ## How can Securiti Help Data privacy and compliance have become incredibly
    vital in earning users'' trust globally. Most users now expect most businesses
    to take all the relevant measures to ensure the data they collect is properly
    stored, protected, and maintained. Data protection laws have made such efforts
    legally mandatory'
  sentences:
  - What are the benefits of automating compliance with global privacy regulations
    for data protection and control?
  - What is required for an official complaint to be filed under Germany's Federal
    Data Protection Act?
  - Why is tracking data lineage important for data management and security?
pipeline_tag: sentence-similarity
model-index:
- name: SentenceTransformer based on BAAI/bge-base-en-v1.5
  results:
  - task:
      type: information-retrieval
      name: Information Retrieval
    dataset:
      name: dim 512
      type: dim_512
    metrics:
    - type: cosine_accuracy@1
      value: 0.08
      name: Cosine Accuracy@1
    - type: cosine_accuracy@3
      value: 0.31
      name: Cosine Accuracy@3
    - type: cosine_accuracy@5
      value: 0.47
      name: Cosine Accuracy@5
    - type: cosine_accuracy@10
      value: 0.65
      name: Cosine Accuracy@10
    - type: cosine_precision@1
      value: 0.08
      name: Cosine Precision@1
    - type: cosine_precision@3
      value: 0.10333333333333333
      name: Cosine Precision@3
    - type: cosine_precision@5
      value: 0.09399999999999999
      name: Cosine Precision@5
    - type: cosine_precision@10
      value: 0.06499999999999999
      name: Cosine Precision@10
    - type: cosine_recall@1
      value: 0.08
      name: Cosine Recall@1
    - type: cosine_recall@3
      value: 0.31
      name: Cosine Recall@3
    - type: cosine_recall@5
      value: 0.47
      name: Cosine Recall@5
    - type: cosine_recall@10
      value: 0.65
      name: Cosine Recall@10
    - type: cosine_ndcg@10
      value: 0.3343233273884531
      name: Cosine Ndcg@10
    - type: cosine_mrr@10
      value: 0.2366031746031746
      name: Cosine Mrr@10
    - type: cosine_map@100
      value: 0.24981059879972897
      name: Cosine Map@100
  - task:
      type: information-retrieval
      name: Information Retrieval
    dataset:
      name: dim 256
      type: dim_256
    metrics:
    - type: cosine_accuracy@1
      value: 0.09
      name: Cosine Accuracy@1
    - type: cosine_accuracy@3
      value: 0.29
      name: Cosine Accuracy@3
    - type: cosine_accuracy@5
      value: 0.46
      name: Cosine Accuracy@5
    - type: cosine_accuracy@10
      value: 0.65
      name: Cosine Accuracy@10
    - type: cosine_precision@1
      value: 0.09
      name: Cosine Precision@1
    - type: cosine_precision@3
      value: 0.09666666666666668
      name: Cosine Precision@3
    - type: cosine_precision@5
      value: 0.092
      name: Cosine Precision@5
    - type: cosine_precision@10
      value: 0.06499999999999999
      name: Cosine Precision@10
    - type: cosine_recall@1
      value: 0.09
      name: Cosine Recall@1
    - type: cosine_recall@3
      value: 0.29
      name: Cosine Recall@3
    - type: cosine_recall@5
      value: 0.46
      name: Cosine Recall@5
    - type: cosine_recall@10
      value: 0.65
      name: Cosine Recall@10
    - type: cosine_ndcg@10
      value: 0.3342796810716671
      name: Cosine Ndcg@10
    - type: cosine_mrr@10
      value: 0.2370753968253968
      name: Cosine Mrr@10
    - type: cosine_map@100
      value: 0.2495249393048939
      name: Cosine Map@100
  - task:
      type: information-retrieval
      name: Information Retrieval
    dataset:
      name: dim 128
      type: dim_128
    metrics:
    - type: cosine_accuracy@1
      value: 0.08
      name: Cosine Accuracy@1
    - type: cosine_accuracy@3
      value: 0.28
      name: Cosine Accuracy@3
    - type: cosine_accuracy@5
      value: 0.43
      name: Cosine Accuracy@5
    - type: cosine_accuracy@10
      value: 0.6
      name: Cosine Accuracy@10
    - type: cosine_precision@1
      value: 0.08
      name: Cosine Precision@1
    - type: cosine_precision@3
      value: 0.09333333333333334
      name: Cosine Precision@3
    - type: cosine_precision@5
      value: 0.08599999999999998
      name: Cosine Precision@5
    - type: cosine_precision@10
      value: 0.059999999999999984
      name: Cosine Precision@10
    - type: cosine_recall@1
      value: 0.08
      name: Cosine Recall@1
    - type: cosine_recall@3
      value: 0.28
      name: Cosine Recall@3
    - type: cosine_recall@5
      value: 0.43
      name: Cosine Recall@5
    - type: cosine_recall@10
      value: 0.6
      name: Cosine Recall@10
    - type: cosine_ndcg@10
      value: 0.3082112269933052
      name: Cosine Ndcg@10
    - type: cosine_mrr@10
      value: 0.21817460317460313
      name: Cosine Mrr@10
    - type: cosine_map@100
      value: 0.2329761521137356
      name: Cosine Map@100
  - task:
      type: information-retrieval
      name: Information Retrieval
    dataset:
      name: dim 64
      type: dim_64
    metrics:
    - type: cosine_accuracy@1
      value: 0.05
      name: Cosine Accuracy@1
    - type: cosine_accuracy@3
      value: 0.17
      name: Cosine Accuracy@3
    - type: cosine_accuracy@5
      value: 0.36
      name: Cosine Accuracy@5
    - type: cosine_accuracy@10
      value: 0.53
      name: Cosine Accuracy@10
    - type: cosine_precision@1
      value: 0.05
      name: Cosine Precision@1
    - type: cosine_precision@3
      value: 0.056666666666666664
      name: Cosine Precision@3
    - type: cosine_precision@5
      value: 0.07200000000000001
      name: Cosine Precision@5
    - type: cosine_precision@10
      value: 0.05299999999999999
      name: Cosine Precision@10
    - type: cosine_recall@1
      value: 0.05
      name: Cosine Recall@1
    - type: cosine_recall@3
      value: 0.17
      name: Cosine Recall@3
    - type: cosine_recall@5
      value: 0.36
      name: Cosine Recall@5
    - type: cosine_recall@10
      value: 0.53
      name: Cosine Recall@10
    - type: cosine_ndcg@10
      value: 0.24965377482070814
      name: Cosine Ndcg@10
    - type: cosine_mrr@10
      value: 0.1642142857142857
      name: Cosine Mrr@10
    - type: cosine_map@100
      value: 0.18144130849038587
      name: Cosine Map@100
---

# SentenceTransformer based on BAAI/bge-base-en-v1.5

This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [BAAI/bge-base-en-v1.5](https://huggingface.co./BAAI/bge-base-en-v1.5). It maps sentences & paragraphs to a 768-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.

## Model Details

### Model Description
- **Model Type:** Sentence Transformer
- **Base model:** [BAAI/bge-base-en-v1.5](https://huggingface.co./BAAI/bge-base-en-v1.5) <!-- at revision a5beb1e3e68b9ab74eb54cfd186867f64f240e1a -->
- **Maximum Sequence Length:** 512 tokens
- **Output Dimensionality:** 768 tokens
- **Similarity Function:** Cosine Similarity
<!-- - **Training Dataset:** Unknown -->
- **Language:** en
- **License:** apache-2.0

### Model Sources

- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co./models?library=sentence-transformers)

### Full Model Architecture

```
SentenceTransformer(
  (0): Transformer({'max_seq_length': 512, 'do_lower_case': True}) with Transformer model: BertModel 
  (1): Pooling({'word_embedding_dimension': 768, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
  (2): Normalize()
)
```

## Usage

### Direct Usage (Sentence Transformers)

First install the Sentence Transformers library:

```bash
pip install -U sentence-transformers
```

Then you can load this model and run inference.
```python
from sentence_transformers import SentenceTransformer

# Download from the 🤗 Hub
model = SentenceTransformer("MugheesAwan11/bge-base-securiti-dataset-1-v9")
# Run inference
sentences = [
    "PR and Federal Data Protection Act within Germany; To promote awareness within the public related to the risks, rules, safeguards, and rights concerning the processing of personal data; To handle all complaints raised by data subjects related to data processing in addition to carrying out investigations to find out if any data handler has breached any provisions of the Act; ## Penalties for Non compliance The GDPR already laid down some stringent penalties for companies that would be found in breach of the law's provisions. More importantly, as opposed to other data protection laws such as the CCPA and CPRA, non-compliance with the law also meant penalties. Germany's Federal Data Protection Act has a slightly more lenient take in this regard. Suppose a data handler is found to have fraudulently collected data, processed, shared, or sold data without proper consent from the data subjects, not responded or responded with delay to a data subject request, or failed to inform the data subject of a breach properly. In that case, it can be fined up to €50,000. This is in addition to the GDPR's €20 million or 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher, that any organisation found in breach of the law is subject to. However, for this fine to be applied, either the data subject, the Federal Commissioner, or the regulatory authority must file an official complaint. ## How an Organization Can Operationalize the Law Data handlers processing data inside Germany can remain compliant with the country's data protection law if they fulfill the following conditions: Have a comprehensive privacy policy that educates all users of their rights and how to contact the relevant personnel within the organisation in case of a query Hire a competent Data Protection Officer that understands the GDPR and Federal Data Protection Act thoroughly and can lead compliance efforts within your organisation Ensure all the company's employees and staff are acutely aware of their responsibilities under the law Conduct regular data protection impact assessments as well as data mapping exercises to ensure maximum efficiency in your compliance efforts Notify the relevant authorities of a data breach as soon as possible ## How can Securiti Help Data privacy and compliance have become incredibly vital in earning users' trust globally. Most users now expect most businesses to take all the relevant measures to ensure the data they collect is properly stored, protected, and maintained. Data protection laws have made such efforts legally mandatory",
    "What is required for an official complaint to be filed under Germany's Federal Data Protection Act?",
    'Why is tracking data lineage important for data management and security?',
]
embeddings = model.encode(sentences)
print(embeddings.shape)
# [3, 768]

# Get the similarity scores for the embeddings
similarities = model.similarity(embeddings, embeddings)
print(similarities.shape)
# [3, 3]
```

<!--
### Direct Usage (Transformers)

<details><summary>Click to see the direct usage in Transformers</summary>

</details>
-->

<!--
### Downstream Usage (Sentence Transformers)

You can finetune this model on your own dataset.

<details><summary>Click to expand</summary>

</details>
-->

<!--
### Out-of-Scope Use

*List how the model may foreseeably be misused and address what users ought not to do with the model.*
-->

## Evaluation

### Metrics

#### Information Retrieval
* Dataset: `dim_512`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)

| Metric              | Value      |
|:--------------------|:-----------|
| cosine_accuracy@1   | 0.08       |
| cosine_accuracy@3   | 0.31       |
| cosine_accuracy@5   | 0.47       |
| cosine_accuracy@10  | 0.65       |
| cosine_precision@1  | 0.08       |
| cosine_precision@3  | 0.1033     |
| cosine_precision@5  | 0.094      |
| cosine_precision@10 | 0.065      |
| cosine_recall@1     | 0.08       |
| cosine_recall@3     | 0.31       |
| cosine_recall@5     | 0.47       |
| cosine_recall@10    | 0.65       |
| cosine_ndcg@10      | 0.3343     |
| cosine_mrr@10       | 0.2366     |
| **cosine_map@100**  | **0.2498** |

#### Information Retrieval
* Dataset: `dim_256`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)

| Metric              | Value      |
|:--------------------|:-----------|
| cosine_accuracy@1   | 0.09       |
| cosine_accuracy@3   | 0.29       |
| cosine_accuracy@5   | 0.46       |
| cosine_accuracy@10  | 0.65       |
| cosine_precision@1  | 0.09       |
| cosine_precision@3  | 0.0967     |
| cosine_precision@5  | 0.092      |
| cosine_precision@10 | 0.065      |
| cosine_recall@1     | 0.09       |
| cosine_recall@3     | 0.29       |
| cosine_recall@5     | 0.46       |
| cosine_recall@10    | 0.65       |
| cosine_ndcg@10      | 0.3343     |
| cosine_mrr@10       | 0.2371     |
| **cosine_map@100**  | **0.2495** |

#### Information Retrieval
* Dataset: `dim_128`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)

| Metric              | Value     |
|:--------------------|:----------|
| cosine_accuracy@1   | 0.08      |
| cosine_accuracy@3   | 0.28      |
| cosine_accuracy@5   | 0.43      |
| cosine_accuracy@10  | 0.6       |
| cosine_precision@1  | 0.08      |
| cosine_precision@3  | 0.0933    |
| cosine_precision@5  | 0.086     |
| cosine_precision@10 | 0.06      |
| cosine_recall@1     | 0.08      |
| cosine_recall@3     | 0.28      |
| cosine_recall@5     | 0.43      |
| cosine_recall@10    | 0.6       |
| cosine_ndcg@10      | 0.3082    |
| cosine_mrr@10       | 0.2182    |
| **cosine_map@100**  | **0.233** |

#### Information Retrieval
* Dataset: `dim_64`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)

| Metric              | Value      |
|:--------------------|:-----------|
| cosine_accuracy@1   | 0.05       |
| cosine_accuracy@3   | 0.17       |
| cosine_accuracy@5   | 0.36       |
| cosine_accuracy@10  | 0.53       |
| cosine_precision@1  | 0.05       |
| cosine_precision@3  | 0.0567     |
| cosine_precision@5  | 0.072      |
| cosine_precision@10 | 0.053      |
| cosine_recall@1     | 0.05       |
| cosine_recall@3     | 0.17       |
| cosine_recall@5     | 0.36       |
| cosine_recall@10    | 0.53       |
| cosine_ndcg@10      | 0.2497     |
| cosine_mrr@10       | 0.1642     |
| **cosine_map@100**  | **0.1814** |

<!--
## Bias, Risks and Limitations

*What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
-->

<!--
### Recommendations

*What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
-->

## Training Details

### Training Dataset

#### Unnamed Dataset


* Size: 900 training samples
* Columns: <code>positive</code> and <code>anchor</code>
* Approximate statistics based on the first 1000 samples:
  |         | positive                                                                              | anchor                                                                            |
  |:--------|:--------------------------------------------------------------------------------------|:----------------------------------------------------------------------------------|
  | type    | string                                                                                | string                                                                            |
  | details | <ul><li>min: 159 tokens</li><li>mean: 445.26 tokens</li><li>max: 512 tokens</li></ul> | <ul><li>min: 7 tokens</li><li>mean: 22.05 tokens</li><li>max: 82 tokens</li></ul> |
* Samples:
  | positive                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | anchor                                                                                                  |
  |:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:--------------------------------------------------------------------------------------------------------|
  | <code>orra The Andorra personal data protection act came into force on May 17, 2022, by the Andorra Data Protection Authority (ADPA). Learn more about Andorra PDPA ### United Kingdom The UK Data Protection Act (DPA) 2018 is the amended version of the Data Protection Act that was passed in 1998. The DPA 2018 implements the GDPR with several additions and restrictions. Learn more about UK DPA ### Botswana The Botswana Data Protection came into effect on October 15, 2021 after the issuance of the Data Protection Act (Commencement Date) Order 2021 by the Minister of Presidential Affairs, Governance and Public Administration. Learn more about Botswana DPA ### Zambia On March 31, 2021, the Zambian parliament formally passed the Data Protection Act No. 3 of 2021 and the Electronic Communications and Transactions Act No. 4 of 2021. Learn more about Zambia DPA ### Jamaica On November 30, 2020, the First Schedule of the Data Protection Act No. 7 of 2020 came into effect following the publication of Supplement No. 160 of Volume CXLIV in the Jamaica Gazette Supplement. Learn more about Jamaica DPA ### Belarus The Law on Personal Data Protection of May 7, 2021, No. 99-Z, entered into effect within Belarus on November 15, 2021. Learn more about Belarus DPA ### Russian Federation The primary Russian law on data protection, Federal Law No. 152-FZ has been in effect since July 2006. Learn more ### Eswatini On March 4, 2022, the Eswatini Communications Commission published the Data Protection Act No. 5 of 2022, simultaneously announcing its immediate enforcement. Learn more ### Oman The Royal Decree 6/2022 promulgating the Personal Data Protection Law (PDPL) was passed on February 9, 2022. Learn more ### Sri Lanka Sri Lanka's parliament formally passed the Personal Data Protection Act (PDPA), No. 9 Of 2022, on March 19, 2022. Learn more ### Kuwait Kuwait's DPPR was formally introduced by the CITRA to ensure the Gulf country's data privacy infrastructure. Learn more ### Brunei Darussalam The draft Personal Data Protection Order is Brunei’s primary data protection law which came into effect in 2022. Learn more ### India India’</code>                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <code>What is the name of India's data protection law before May 17, 2022?</code>                       |
  | <code>the affected data subjects and regulatory authority about the breach and whether any of their information has been compromised as a result. ### Data Protection Impact Assessment There is no requirement for conducting data protection impact assessment under the PDPA. ### Record of Processing Activities A data controller must keep and maintain a record of any privacy notice, data subject request, or any other information relating to personal data processed by him in the form and manner that may be determined by the regulatory authority. ### Cross Border Data Transfer Requirements The PDPA provides that personal data can be transferred out of Malaysia only when the recipient country is specified as adequate in the Official Gazette. The personal data of data subjects can not be disclosed without the consent of the data subject. The PDPA provides the following exceptions to the cross border data transfer requirements: Where the consent of data subject is obtained for transfer; or Where the transfer is necessary for the performance of contract between the parties; The transfer is for the purpose of any legal proceedings or for the purpose of obtaining legal advice or for establishing, exercising or defending legal rights; The data user has taken all reasonable precautions and exercised all due diligence to ensure that the personal data will not in that place be processed in any manner which, if that place is Malaysia, would be a contravention of this PDPA; The transfer is necessary in order to protect the vital interests of the data subject; or The transfer is necessary as being in the public interest in circumstances as determined by the Minister. ## Data Subject Rights The data subjects or the person whose data is being collected has certain rights under the PDPA. The most prominent rights can be categorized under the following: ## Right to withdraw consent The PDPA, like some of the other landmark data protection laws such as CPRA and GDPR gives data subjects the right to revoke their consent at any time by way of written notice from having their data collected processed. ## Right to access and rectification As per this right, anyone whose data has been collected has the right to request to review their personal data and have it updated. The onus is on the data handlers to respond to such a request as soon as possible while also making it easier for data subjects on how they can request access to their personal data. ## Right to data portability Data subjects have the right to request that their data be stored in a manner where it</code> | <code>What is the requirement for conducting a data protection impact assessment under the PDPA?</code> |
  | <code>more Privacy Automate compliance with global privacy regulations Data Mapping Automation View Data Subject Request Automation View People Data Graph View Assessment Automation View Cookie Consent View Universal Consent View Vendor Risk Assessment View Breach Management View Privacy Policy Management View Privacy Center View Learn more Security Identify data risk and enable protection & control Data Security Posture Management View Data Access Intelligence & Governance View Data Risk Management View Data Breach Analysis View Learn more Governance Optimize Data Governance with granular insights into your data Data Catalog View Data Lineage View Data Quality View Data Controls Orchestrator View Solutions Technologies Covering you everywhere with 1000+ integrations across data systems. Snowflake View AWS View Microsoft 365 View Salesforce View Workday View GCP View Azure View Oracle View Learn more Regulations Automate compliance with global privacy regulations. US California CCPA View US California CPRA View European Union GDPR View Thailand’s PDPA View China PIPL View Canada PIPEDA View Brazil's LGPD View \+ More View Learn more Roles Identify data risk and enable protection & control. Privacy View Security View Governance View Marketing View Resources Blog Read through our articles written by industry experts Collateral Product brochures, white papers, infographics, analyst reports and more. Knowledge Center Learn about the data privacy, security and governance landscape. Securiti Education Courses and Certifications for data privacy, security and governance professionals. Company About Us Learn all about</code>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <code>What is Data Subject Request Automation?</code>                                                   |
* Loss: [<code>MatryoshkaLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters:
  ```json
  {
      "loss": "MultipleNegativesRankingLoss",
      "matryoshka_dims": [
          512,
          256,
          128,
          64
      ],
      "matryoshka_weights": [
          1,
          1,
          1,
          1
      ],
      "n_dims_per_step": -1
  }
  ```

### Training Hyperparameters
#### Non-Default Hyperparameters

- `eval_strategy`: epoch
- `per_device_train_batch_size`: 32
- `per_device_eval_batch_size`: 16
- `learning_rate`: 2e-05
- `num_train_epochs`: 2
- `lr_scheduler_type`: cosine
- `warmup_ratio`: 0.1
- `bf16`: True
- `tf32`: True
- `load_best_model_at_end`: True
- `optim`: adamw_torch_fused
- `batch_sampler`: no_duplicates

#### All Hyperparameters
<details><summary>Click to expand</summary>

- `overwrite_output_dir`: False
- `do_predict`: False
- `eval_strategy`: epoch
- `prediction_loss_only`: True
- `per_device_train_batch_size`: 32
- `per_device_eval_batch_size`: 16
- `per_gpu_train_batch_size`: None
- `per_gpu_eval_batch_size`: None
- `gradient_accumulation_steps`: 1
- `eval_accumulation_steps`: None
- `learning_rate`: 2e-05
- `weight_decay`: 0.0
- `adam_beta1`: 0.9
- `adam_beta2`: 0.999
- `adam_epsilon`: 1e-08
- `max_grad_norm`: 1.0
- `num_train_epochs`: 2
- `max_steps`: -1
- `lr_scheduler_type`: cosine
- `lr_scheduler_kwargs`: {}
- `warmup_ratio`: 0.1
- `warmup_steps`: 0
- `log_level`: passive
- `log_level_replica`: warning
- `log_on_each_node`: True
- `logging_nan_inf_filter`: True
- `save_safetensors`: True
- `save_on_each_node`: False
- `save_only_model`: False
- `restore_callback_states_from_checkpoint`: False
- `no_cuda`: False
- `use_cpu`: False
- `use_mps_device`: False
- `seed`: 42
- `data_seed`: None
- `jit_mode_eval`: False
- `use_ipex`: False
- `bf16`: True
- `fp16`: False
- `fp16_opt_level`: O1
- `half_precision_backend`: auto
- `bf16_full_eval`: False
- `fp16_full_eval`: False
- `tf32`: True
- `local_rank`: 0
- `ddp_backend`: None
- `tpu_num_cores`: None
- `tpu_metrics_debug`: False
- `debug`: []
- `dataloader_drop_last`: False
- `dataloader_num_workers`: 0
- `dataloader_prefetch_factor`: None
- `past_index`: -1
- `disable_tqdm`: False
- `remove_unused_columns`: True
- `label_names`: None
- `load_best_model_at_end`: True
- `ignore_data_skip`: False
- `fsdp`: []
- `fsdp_min_num_params`: 0
- `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
- `fsdp_transformer_layer_cls_to_wrap`: None
- `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
- `deepspeed`: None
- `label_smoothing_factor`: 0.0
- `optim`: adamw_torch_fused
- `optim_args`: None
- `adafactor`: False
- `group_by_length`: False
- `length_column_name`: length
- `ddp_find_unused_parameters`: None
- `ddp_bucket_cap_mb`: None
- `ddp_broadcast_buffers`: False
- `dataloader_pin_memory`: True
- `dataloader_persistent_workers`: False
- `skip_memory_metrics`: True
- `use_legacy_prediction_loop`: False
- `push_to_hub`: False
- `resume_from_checkpoint`: None
- `hub_model_id`: None
- `hub_strategy`: every_save
- `hub_private_repo`: False
- `hub_always_push`: False
- `gradient_checkpointing`: False
- `gradient_checkpointing_kwargs`: None
- `include_inputs_for_metrics`: False
- `eval_do_concat_batches`: True
- `fp16_backend`: auto
- `push_to_hub_model_id`: None
- `push_to_hub_organization`: None
- `mp_parameters`: 
- `auto_find_batch_size`: False
- `full_determinism`: False
- `torchdynamo`: None
- `ray_scope`: last
- `ddp_timeout`: 1800
- `torch_compile`: False
- `torch_compile_backend`: None
- `torch_compile_mode`: None
- `dispatch_batches`: None
- `split_batches`: None
- `include_tokens_per_second`: False
- `include_num_input_tokens_seen`: False
- `neftune_noise_alpha`: None
- `optim_target_modules`: None
- `batch_eval_metrics`: False
- `batch_sampler`: no_duplicates
- `multi_dataset_batch_sampler`: proportional

</details>

### Training Logs
| Epoch   | Step   | Training Loss | dim_128_cosine_map@100 | dim_256_cosine_map@100 | dim_512_cosine_map@100 | dim_64_cosine_map@100 |
|:-------:|:------:|:-------------:|:----------------------:|:----------------------:|:----------------------:|:---------------------:|
| 0.3448  | 10     | 7.0997        | -                      | -                      | -                      | -                     |
| 0.6897  | 20     | 5.0842        | -                      | -                      | -                      | -                     |
| 1.0     | 29     | -             | 0.2367                 | 0.2561                 | 0.2502                 | 0.1813                |
| 1.0345  | 30     | 4.7423        | -                      | -                      | -                      | -                     |
| 1.3793  | 40     | 3.7933        | -                      | -                      | -                      | -                     |
| 1.7241  | 50     | 3.4879        | -                      | -                      | -                      | -                     |
| **2.0** | **58** | **-**         | **0.233**              | **0.2495**             | **0.2498**             | **0.1814**            |

* The bold row denotes the saved checkpoint.

### Framework Versions
- Python: 3.10.14
- Sentence Transformers: 3.0.1
- Transformers: 4.41.2
- PyTorch: 2.1.2+cu121
- Accelerate: 0.31.0
- Datasets: 2.19.1
- Tokenizers: 0.19.1

## Citation

### BibTeX

#### Sentence Transformers
```bibtex
@inproceedings{reimers-2019-sentence-bert,
    title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
    author = "Reimers, Nils and Gurevych, Iryna",
    booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
    month = "11",
    year = "2019",
    publisher = "Association for Computational Linguistics",
    url = "https://arxiv.org/abs/1908.10084",
}
```

#### MatryoshkaLoss
```bibtex
@misc{kusupati2024matryoshka,
    title={Matryoshka Representation Learning}, 
    author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi},
    year={2024},
    eprint={2205.13147},
    archivePrefix={arXiv},
    primaryClass={cs.LG}
}
```

#### MultipleNegativesRankingLoss
```bibtex
@misc{henderson2017efficient,
    title={Efficient Natural Language Response Suggestion for Smart Reply}, 
    author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
    year={2017},
    eprint={1705.00652},
    archivePrefix={arXiv},
    primaryClass={cs.CL}
}
```

<!--
## Glossary

*Clearly define terms in order to be accessible across audiences.*
-->

<!--
## Model Card Authors

*Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
-->

<!--
## Model Card Contact

*Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
-->